Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/11/2024, 19:34

General

  • Target

    cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe

  • Size

    1.9MB

  • MD5

    ee9c5875f526c3f44381beb36b6eaa62

  • SHA1

    423ea51703796def5f3449b68c8bc62298187766

  • SHA256

    cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690

  • SHA512

    516a491737a3983832e22659f2df44f88d2dd172fa142bf41282c2b56d12b7ac90147b6786491a0dbb77d18c71d1ae6b24bd0236530671e866b9a9fbdd12ee86

  • SSDEEP

    49152:A1t85yCgjs/XJlrig6LfarKLYoorkGNlaK1C4:1Ajsv/rigDrKxorpna3

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

xworm

Version

5.0

C2

backto54.duckdns.org:8989

helldog24.duckdns.org:8989

Mutex

7Fvn9wsSHJeXUB5q

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://property-imper.sbs

Extracted

Family

lumma

C2

https://blade-govern.sbs/api

https://story-tense-faz.sbs/api

https://disobey-curly.sbs/api

https://motion-treesz.sbs/api

https://powerful-avoids.sbs/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 1 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 10 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 30 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3536
      • C:\Users\Admin\AppData\Local\Temp\cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe
        "C:\Users\Admin\AppData\Local\Temp\cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3964
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2012
          • C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe
            "C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4948
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
              5⤵
              • Uses browser remote debugging
              • Enumerates system info in registry
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:4056
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff83c8bcc40,0x7ff83c8bcc4c,0x7ff83c8bcc58
                6⤵
                  PID:1608
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:2
                  6⤵
                    PID:836
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1896,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2088 /prefetch:3
                    6⤵
                      PID:2368
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2448 /prefetch:8
                      6⤵
                        PID:3128
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:4300
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:4448
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4140,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4448 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:4996
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4768,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4812 /prefetch:8
                        6⤵
                          PID:4024
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4888,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4908 /prefetch:8
                          6⤵
                            PID:4256
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4840,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4772 /prefetch:8
                            6⤵
                              PID:4960
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4908,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4588 /prefetch:8
                              6⤵
                                PID:5000
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5268,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5280 /prefetch:8
                                6⤵
                                  PID:3508
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5260,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5256 /prefetch:8
                                  6⤵
                                    PID:2740
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5172,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5224 /prefetch:2
                                    6⤵
                                    • Uses browser remote debugging
                                    PID:3252
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                  5⤵
                                  • Uses browser remote debugging
                                  • Enumerates system info in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                  • Suspicious use of FindShellTrayWindow
                                  PID:3156
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83c8c46f8,0x7ff83c8c4708,0x7ff83c8c4718
                                    6⤵
                                    • Checks processor information in registry
                                    • Enumerates system info in registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:6128
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
                                    6⤵
                                      PID:916
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:3
                                      6⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5752
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:8
                                      6⤵
                                        PID:4960
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                                        6⤵
                                        • Uses browser remote debugging
                                        PID:5896
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:1
                                        6⤵
                                        • Uses browser remote debugging
                                        PID:5708
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:1
                                        6⤵
                                        • Uses browser remote debugging
                                        PID:4112
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:1
                                        6⤵
                                        • Uses browser remote debugging
                                        PID:3052
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe" & rd /s /q "C:\ProgramData\GCGCBAECFCAK" & exit
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:5156
                                      • C:\Windows\SysWOW64\timeout.exe
                                        timeout /t 10
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Delays execution with timeout.exe
                                        PID:6000
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1009351041\PeRVAzl.ps1"
                                    4⤵
                                    • Suspicious use of SetThreadContext
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:440
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                      5⤵
                                      • Checks computer location settings
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of SetWindowsHookEx
                                      PID:5740
                                      • C:\Users\Admin\AppData\Local\Temp\parduo.exe
                                        "C:\Users\Admin\AppData\Local\Temp\parduo.exe"
                                        6⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Drops file in Windows directory
                                        • System Location Discovery: System Language Discovery
                                        PID:5056
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c copy Accordingly Accordingly.bat & Accordingly.bat
                                          7⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5804
                                          • C:\Windows\SysWOW64\tasklist.exe
                                            tasklist
                                            8⤵
                                            • Enumerates processes with tasklist
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:6060
                                          • C:\Windows\SysWOW64\findstr.exe
                                            findstr /I "wrsa opssvc"
                                            8⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1604
                                          • C:\Windows\SysWOW64\tasklist.exe
                                            tasklist
                                            8⤵
                                            • Enumerates processes with tasklist
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4504
                                          • C:\Windows\SysWOW64\findstr.exe
                                            findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                            8⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5672
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c md 714773
                                            8⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4320
                                          • C:\Windows\SysWOW64\findstr.exe
                                            findstr /V "WOMENSVERLINEDLL" Replacement
                                            8⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3392
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c copy /b ..\Within + ..\Print + ..\Albums + ..\Coated + ..\Modern + ..\Lincoln + ..\Nearest + ..\Wider + ..\Cancel + ..\Adoption y
                                            8⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5772
                                          • C:\Users\Admin\AppData\Local\Temp\714773\For.pif
                                            For.pif y
                                            8⤵
                                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of SendNotifyMessage
                                            • Suspicious use of SetWindowsHookEx
                                            PID:5848
                                          • C:\Windows\SysWOW64\choice.exe
                                            choice /d y /t 5
                                            8⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5128
                                  • C:\Users\Admin\AppData\Local\Temp\1009360001\9346052029.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1009360001\9346052029.exe"
                                    4⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4616
                                  • C:\Users\Admin\AppData\Local\Temp\1009361001\f1ac5583e7.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1009361001\f1ac5583e7.exe"
                                    4⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5600
                                  • C:\Users\Admin\AppData\Local\Temp\1009362001\c4ab395678.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1009362001\c4ab395678.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:3200
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM firefox.exe /T
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4856
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM chrome.exe /T
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3128
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM msedge.exe /T
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5304
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM opera.exe /T
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:312
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM brave.exe /T
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4528
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                      5⤵
                                        PID:5656
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                          6⤵
                                          • Checks processor information in registry
                                          • Modifies registry class
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of SetWindowsHookEx
                                          PID:5940
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1968 -prefMapHandle 1960 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7781faa8-8d99-4cbc-a8ba-5474a3e24a5b} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" gpu
                                            7⤵
                                              PID:6080
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65dd4f9d-33f8-4071-9b3e-f2c6f6bf35fb} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" socket
                                              7⤵
                                                PID:5600
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3204 -childID 1 -isForBrowser -prefsHandle 3208 -prefMapHandle 3224 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b00b27fe-5093-4d6a-a982-a90bcbee8db2} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" tab
                                                7⤵
                                                  PID:4328
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3884 -childID 2 -isForBrowser -prefsHandle 3788 -prefMapHandle 2776 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04bf0954-f3f6-4bcd-8ef3-8a513819b953} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" tab
                                                  7⤵
                                                    PID:3576
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4724 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4768 -prefMapHandle 4764 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {30918991-3904-48a2-bc64-8e3a950e300e} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" utility
                                                    7⤵
                                                    • Checks processor information in registry
                                                    PID:2752
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 3 -isForBrowser -prefsHandle 5308 -prefMapHandle 5304 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b389f219-72ec-4ab2-8b06-8cc044a8c754} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" tab
                                                    7⤵
                                                      PID:4500
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5456 -childID 4 -isForBrowser -prefsHandle 5464 -prefMapHandle 5468 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ddd7ed6b-26ef-4033-b1fa-625c0f2a09ed} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" tab
                                                      7⤵
                                                        PID:5748
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5664 -childID 5 -isForBrowser -prefsHandle 5740 -prefMapHandle 5736 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec86843d-ed32-4f24-982a-681195ed2c0a} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" tab
                                                        7⤵
                                                          PID:5632
                                                  • C:\Users\Admin\AppData\Local\Temp\1009363001\ebbb22282c.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1009363001\ebbb22282c.exe"
                                                    4⤵
                                                    • Modifies Windows Defender Real-time Protection settings
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Windows security modification
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5728
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c schtasks.exe /create /tn "Double" /tr "wscript //B 'C:\Users\Admin\AppData\Local\HealthSync Innovations\MediConnect.js'" /sc minute /mo 5 /F
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:6040
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks.exe /create /tn "Double" /tr "wscript //B 'C:\Users\Admin\AppData\Local\HealthSync Innovations\MediConnect.js'" /sc minute /mo 5 /F
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:5484
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MediConnect.url" & echo URL="C:\Users\Admin\AppData\Local\HealthSync Innovations\MediConnect.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MediConnect.url" & exit
                                                2⤵
                                                • Drops startup file
                                                • System Location Discovery: System Language Discovery
                                                PID:6124
                                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                              1⤵
                                                PID:5044
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                1⤵
                                                  PID:2944
                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:764
                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:4232

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\ProgramData\remcos\logs.dat

                                                  Filesize

                                                  210B

                                                  MD5

                                                  6e263df53282363f35b1145c72b4fd04

                                                  SHA1

                                                  2f11ba739555d65e986a82baac9870c622bd10b0

                                                  SHA256

                                                  13724325b2185180b8710b60d0d5ea788857aee966862a74377fa4a6a56d0136

                                                  SHA512

                                                  b4aada90fedd47a37c86cb1e0c660bd5554f895c5cae0dfb1ab0aa1a77fa76d5eca81bb7f41e2d9f932d153954d8bcce710a4c832432b2f305dd49b581d1d5cd

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                  Filesize

                                                  649B

                                                  MD5

                                                  8af69161970d6bda32abf15f644e7eeb

                                                  SHA1

                                                  2c600124ffaaabbda69ac4dc34a313cbdc0dd9d3

                                                  SHA256

                                                  2f46d4d12500d865709f6c21b01700c5c3e2f4187a3222c8992487cbffd72eb2

                                                  SHA512

                                                  361900de36f7398a7beebe8c3cad6228e7096275c3d8c145b07c4000b1b947ba93ef5236a71218037586ddcd64ca2c1b689477882fc26c312e8e175796b292d3

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json

                                                  Filesize

                                                  851B

                                                  MD5

                                                  07ffbe5f24ca348723ff8c6c488abfb8

                                                  SHA1

                                                  6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                  SHA256

                                                  6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                  SHA512

                                                  7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json

                                                  Filesize

                                                  854B

                                                  MD5

                                                  4ec1df2da46182103d2ffc3b92d20ca5

                                                  SHA1

                                                  fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                  SHA256

                                                  6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                  SHA512

                                                  939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                  Filesize

                                                  2B

                                                  MD5

                                                  d751713988987e9331980363e24189ce

                                                  SHA1

                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                  SHA256

                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                  SHA512

                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  7de1bbdc1f9cf1a58ae1de4951ce8cb9

                                                  SHA1

                                                  010da169e15457c25bd80ef02d76a940c1210301

                                                  SHA256

                                                  6e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e

                                                  SHA512

                                                  e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  85ba073d7015b6ce7da19235a275f6da

                                                  SHA1

                                                  a23c8c2125e45a0788bac14423ae1f3eab92cf00

                                                  SHA256

                                                  5ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617

                                                  SHA512

                                                  eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  155e64a4a3ae4edb88a59d9d16948b69

                                                  SHA1

                                                  ab8497462faad2b90ed91030034f22472b1d3dc5

                                                  SHA256

                                                  5f00a6156db097261ccd6b2116e49be0540cab5be7cdfb8d7ca97a178a52f452

                                                  SHA512

                                                  1fd555bef1ba76efe5c9a38b724c93da7fb4aeaa80d5e39b0493ac77bc540fa739bec9772094c15a925ed02aecac3b7c63c82dbe7d845855db467aa52a81a002

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c64ff869-b3fd-4d89-96d2-1004b908ef09.tmp

                                                  Filesize

                                                  1B

                                                  MD5

                                                  5058f1af8388633f609cadb75a75dc9d

                                                  SHA1

                                                  3a52ce780950d4d969792a2559cd519d7ee8c727

                                                  SHA256

                                                  cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                  SHA512

                                                  0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json

                                                  Filesize

                                                  19KB

                                                  MD5

                                                  b7f05ae4d2d7ecbaf9290c0a6910c952

                                                  SHA1

                                                  6113c82ed3dde679b3a5ef7f90966cb9b7565e85

                                                  SHA256

                                                  6fe13a21cbcf2ee8f1c405c83342bcd54e3d2268f6d3daac648e1396230b3323

                                                  SHA512

                                                  5f750de0bd30535c9233f76b5ec4af40c633c2c8c9ee31c18f9d57e1f08107531ca70d9e9c1f7c77c0099d6eb10563e9eab05b42711d0fca084b55f2b07e0be2

                                                • C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe

                                                  Filesize

                                                  409KB

                                                  MD5

                                                  4ea576c1e8f58201fd4219a86665eaa9

                                                  SHA1

                                                  efaf3759b04ee0216254cf07095d52b110c7361f

                                                  SHA256

                                                  d94206d9509cc47cae22c94d32658b31cf65c37b1b15ce035ffaa5ce5872ad2f

                                                  SHA512

                                                  0c7462bc590d06f0ead37246f189d4d56e1d62ff73f67bf7e2ce9c653d8c56812a5f1306fb504168f7e33b87485c3465ea921a36f1ba5b458d7763e45c649494

                                                • C:\Users\Admin\AppData\Local\Temp\1009351041\PeRVAzl.ps1

                                                  Filesize

                                                  3.0MB

                                                  MD5

                                                  2b918bf4566595e88a664111ce48b161

                                                  SHA1

                                                  e32fbdf64bb71dc870bfad9bbd571f11c6a723f4

                                                  SHA256

                                                  48492827286d403668996ae3814b2216b3b616f2fb4af2022bf3d2fc3f979a26

                                                  SHA512

                                                  e3d58adbe13befe91fb950cc52b16d6d2fcb8f6d65bab4020222713207b07ce78b76e2e2532cf3de23149e934ba1e1cb9046a95a18424a668bfa4a355af6f44a

                                                • C:\Users\Admin\AppData\Local\Temp\1009360001\9346052029.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  a8e9a412b9680f5a669fc267b2e699a9

                                                  SHA1

                                                  a9da906593df158e178a5fc69f4054e1b9d74d6f

                                                  SHA256

                                                  8c57cf7312440ff96cc26011bf2d5ecf6c89acbb7f086e90b4af99dc9da7c719

                                                  SHA512

                                                  49d46ed63554079d3e1fe12f2fd99e7a40151cec87a7d17d391d37b02586e0bcb6bb10dfbbff7f122fe8d3d46e04f28912cbd9fa98f5c19da08fb625ead2aa76

                                                • C:\Users\Admin\AppData\Local\Temp\1009361001\f1ac5583e7.exe

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  9db1d2d5cacb20cc6ff48e135ae00541

                                                  SHA1

                                                  4c0000c8c9bb9f3cf3eff91f573648a89f2bc5e8

                                                  SHA256

                                                  4121db764f1ef59ccca1f43acedd27e0e6a086ef49359d75cd41d9c063857ebe

                                                  SHA512

                                                  fee1aec4dc791ffe349ffb95daba48b6f7e198aa3fe1c69c5be1d68c43faa9cfac6f8f79a18ec4be3b1162903036779188ea2c20bac0e75827752601adc0f937

                                                • C:\Users\Admin\AppData\Local\Temp\1009362001\c4ab395678.exe

                                                  Filesize

                                                  900KB

                                                  MD5

                                                  19fcdf56ae709a03be8137ad630d1c9b

                                                  SHA1

                                                  e3f487ed3ab79fc05b892db548da9aa14cd69171

                                                  SHA256

                                                  73f94f70d57668c306dc97607d38353817bee05d8c220db436ed3c610cfa6ca2

                                                  SHA512

                                                  da5645416691df32c29851f1f933e60082874145b99d62dd92294fe893e1bf4a67b1926c5b73a69ab10c976a59e019dd6787fe75973c72e464f083bec1522c13

                                                • C:\Users\Admin\AppData\Local\Temp\1009363001\ebbb22282c.exe

                                                  Filesize

                                                  2.7MB

                                                  MD5

                                                  34c86fde97a82e80250312333150a710

                                                  SHA1

                                                  636a5d3d2623c35e2b3fa4462d105cfdc3f3f4f5

                                                  SHA256

                                                  97e5fa31a1a59c88b9fc3b2790bbb3068359b8e09ec9edc1635b8a2efe968aaf

                                                  SHA512

                                                  63ec0114ea8cceb1f89cec992afe7fb343ff8fb610e5f973c966f0493945d39809c31e4653d5e36c361969ef733f2d5e1dd22c4ffba649cf34a9ffe3aa868e7c

                                                • C:\Users\Admin\AppData\Local\Temp\714773\For.pif

                                                  Filesize

                                                  872KB

                                                  MD5

                                                  18ce19b57f43ce0a5af149c96aecc685

                                                  SHA1

                                                  1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                  SHA256

                                                  d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                  SHA512

                                                  a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                • C:\Users\Admin\AppData\Local\Temp\714773\y

                                                  Filesize

                                                  697KB

                                                  MD5

                                                  96c47dc37e1d58ad8b3d39ec2636ad68

                                                  SHA1

                                                  65743f382dfd6b2aab4368e599f68ccccbf457ad

                                                  SHA256

                                                  9dd46dd37f298b683c039d59458edb4502bd22cdfcf687da9c51cc5c5a22f823

                                                  SHA512

                                                  1ec95f6db4a541b8c68ef29df6a2dec844e20b27a7c489121a6a07e4b1c943ae74fe3fee27a6c5fa034e3276743891139f23e1572ad81a74bfb7398008f6c3c6

                                                • C:\Users\Admin\AppData\Local\Temp\Accordingly

                                                  Filesize

                                                  14KB

                                                  MD5

                                                  3308b4ac40164525bb3be5512f731cbf

                                                  SHA1

                                                  fd0cf2b34957e6c891cb46af29cbc6ba98544e8d

                                                  SHA256

                                                  3e26ccd9ab5ec7b5b850bf32207ff2f7d030435bc07c0c7d81e55f8501979dc0

                                                  SHA512

                                                  3277c89b6a3128910f3de9a74783905ab179c971fb88e188eed0931cd6a049a5faa60eeaec43484b76a073f6cf50fb80f3b3989fc96d3df00f2679c00c6e2b4a

                                                • C:\Users\Admin\AppData\Local\Temp\Adoption

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  8c792e91c999ef3f86d146ec4357dfe1

                                                  SHA1

                                                  fb5cf5b21b94b64e7761c8b955bf307f9f2871b1

                                                  SHA256

                                                  cef488cd90549e45e91207f2f703642a8fc5f5ec39a2b87391a5dc3dbbc060ea

                                                  SHA512

                                                  5d182ffa6f0573b8607ed3039cce8120d8a6637aac0443316a0777b7ad384d9bd644d8787ce24b8af7bcd66399e763b591a47dcb0691753fa13a954d12fa122e

                                                • C:\Users\Admin\AppData\Local\Temp\Albums

                                                  Filesize

                                                  78KB

                                                  MD5

                                                  c921a93d3d8768393d6fd288ef7d3626

                                                  SHA1

                                                  826cd8ded83329a124c834d8644d164e656f5830

                                                  SHA256

                                                  bfd39fe90080c4ad2484061dde6521ab38aaa3a5c4189365c549fd586680c5d3

                                                  SHA512

                                                  f3f4ef74425844485e237cccca48677fbd391c78e062351e91921e6834269fc12b2f314b1ca5d2df4d53c2ba8f4323b723ba052b9b7b49ca875add8e8acb95c9

                                                • C:\Users\Admin\AppData\Local\Temp\Cancel

                                                  Filesize

                                                  80KB

                                                  MD5

                                                  94252e7ea5928c3384fad7a7345ee48c

                                                  SHA1

                                                  d4c94d10bce143056811ab47a9e64bc3e13d9e0e

                                                  SHA256

                                                  c28fb31ae80d35e5fe4a72ea0951a8f716b29b006465e7ae09455a92d77b61fc

                                                  SHA512

                                                  b892d496078d099b17d92401756c6f43ead013eaecef412b09d6ff32a0f32750ece8ab91fee0ac35683ef6758b8c28f7d924c5d55fa7dff1f39edb62f2f10d97

                                                • C:\Users\Admin\AppData\Local\Temp\Coated

                                                  Filesize

                                                  58KB

                                                  MD5

                                                  6653fbd98cfcf87d8f39a0107d49ba70

                                                  SHA1

                                                  4d4ead6802154ba90fa517093205552c156f6408

                                                  SHA256

                                                  2d1c705a2197d1f37e1ae3591e06370f89bf2c6e35c18d9020559f7fff5a6007

                                                  SHA512

                                                  c83b7bef5242c31afce44a04f55efc87e1bf1fdac4653cd85fc20733a054dfea93d34d3216808c0e29decff8032f8f3adab72d497922b8c4155d4dc104c61fd1

                                                • C:\Users\Admin\AppData\Local\Temp\Lincoln

                                                  Filesize

                                                  90KB

                                                  MD5

                                                  c5bb73e77ced7f6ab691bc6048afc56e

                                                  SHA1

                                                  abc3c84bc42e70b385b1a19790c5e4a8f05817fb

                                                  SHA256

                                                  493da51541861815d62a13dc10d81a97b1446bd3805d93652a869ea963a83993

                                                  SHA512

                                                  870d0413a9f89dc1f5f31dbe007ea2cd10b453963af65fe0e4c32d938aeaf445c6c4c50452a57e52960270dc0732aacceee2e56cb1d90aa96f11d39693e62b5b

                                                • C:\Users\Admin\AppData\Local\Temp\Modern

                                                  Filesize

                                                  94KB

                                                  MD5

                                                  a25ea81dd7c11e371df8a950f65f3376

                                                  SHA1

                                                  536c8dc73cdca582414f62ce0dce642c2af7a266

                                                  SHA256

                                                  e55aaea71afea173fe27f33913ab858f643708d407dd9952898bc0f25e2d900e

                                                  SHA512

                                                  f49342a4643b211da25492e99ad396f1a3898217d3d43bd1c47989d81d0537f24c9337e9cfe1cc01b3a3271fb4d308e529fad059b9bad5c14de702c3bf80ea80

                                                • C:\Users\Admin\AppData\Local\Temp\Nearest

                                                  Filesize

                                                  69KB

                                                  MD5

                                                  fe1f720ce3a97cfa239177af5075260d

                                                  SHA1

                                                  2b7146d0203557c8dddf3d0d2a88a51f6cb5fd1e

                                                  SHA256

                                                  dc09313c346e77488b917f0c71532a8d4575f95379c9f8160473bbcb3175317e

                                                  SHA512

                                                  a333983b4b3bdfb611b67f87d5be636c9cc0563fc454ee784cbd542042210fbc9d194900631e9dbac871515e49fabe3521cfbc2caeeb57da0a896fb5d1e64efb

                                                • C:\Users\Admin\AppData\Local\Temp\Print

                                                  Filesize

                                                  90KB

                                                  MD5

                                                  b54857f700feec0ac4bf74912ec624ce

                                                  SHA1

                                                  75ebbd85b0fa5e60d42956f2e016a7e25500a57c

                                                  SHA256

                                                  bf34e48b8be5cf77c4f23803d86a424aae876d8e2d4c1cf86588992b1ae53736

                                                  SHA512

                                                  5613a86aed053a1241e0164714cd117db83ce48b8d2069de1380558085c48e8c5c90c11c7627d36ae3f61602791fd27264f5cdd838dfc5b76682206320e04b28

                                                • C:\Users\Admin\AppData\Local\Temp\Replacement

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  f173d5c8c8846b0a6c530649346ce39b

                                                  SHA1

                                                  c929ac894dce5a462d9b3d82a701f5f730dd8b27

                                                  SHA256

                                                  fa4414d47c19a25899eb590a4eeb632cab620e880252cc5acc93661a6f686561

                                                  SHA512

                                                  7b78f69a32f6d6bcb5b0e6696fcce2e38849b120cba4eabb77895ae8b9f756ff6d34b68a9943cd13f9496d64b7d955f6f3d4b2e91d43171c0c49423aaf441cac

                                                • C:\Users\Admin\AppData\Local\Temp\Verbal

                                                  Filesize

                                                  865KB

                                                  MD5

                                                  e8d598224c95801dec480c70543df88e

                                                  SHA1

                                                  9ab515652e41ee027272af911eb6a54a1de0aa75

                                                  SHA256

                                                  5474c4b28e94710f60e82ce08033f32dcab71dda811538851a7f9c3604fd95f4

                                                  SHA512

                                                  a2cd491ea6e63c770f8033dccfdfa2bedfaeb052a520016fd9417a72749c8e88b28b5440aaea19f4313b162b88fcd5d5339496faf6135b1c1e3eb68c35320b1f

                                                • C:\Users\Admin\AppData\Local\Temp\Wider

                                                  Filesize

                                                  66KB

                                                  MD5

                                                  06f3bb08e567b1b629a959f85a3aa6eb

                                                  SHA1

                                                  f2413f66c91b3733f5a32e1afc7e595c1b1056fd

                                                  SHA256

                                                  7769b5c3388facff4c70dfb60bb5af9060fb11a260825284a192a5537b06946f

                                                  SHA512

                                                  e19d8d6f4b0f140c7f853f6707febb204c5ca243022796eef927be402b52d8a3e678d81281a468fdf3723ac59f17c66c4a5c2f2affac8eef96df2e6f9eddd9b7

                                                • C:\Users\Admin\AppData\Local\Temp\Within

                                                  Filesize

                                                  66KB

                                                  MD5

                                                  6bfa1135bd266eb7f92ce9cf2979179c

                                                  SHA1

                                                  71655f8fc9a55a70c087d3b5a6063dd12330ccb0

                                                  SHA256

                                                  02c7089cbe35fa9354c10ab76e399cb0e614163facb9fe254b8e20278eb6057d

                                                  SHA512

                                                  dde9e0b53be8bd18c838e1ac645c6ca6fe25e2659a254bda5002686f872192ca8ac5b2c6eee3ac613a755d35c6deb677190f8c27049ccacc3811ec3a13ca8899

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xl5ectii.ytf.ps1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  ee9c5875f526c3f44381beb36b6eaa62

                                                  SHA1

                                                  423ea51703796def5f3449b68c8bc62298187766

                                                  SHA256

                                                  cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690

                                                  SHA512

                                                  516a491737a3983832e22659f2df44f88d2dd172fa142bf41282c2b56d12b7ac90147b6786491a0dbb77d18c71d1ae6b24bd0236530671e866b9a9fbdd12ee86

                                                • C:\Users\Admin\AppData\Local\Temp\parduo.exe

                                                  Filesize

                                                  2.0MB

                                                  MD5

                                                  272878833f720819effc3ed1eed0f773

                                                  SHA1

                                                  e17e4d822165997c463aa21c6efd102185af319d

                                                  SHA256

                                                  508729820be5115513aea17ba818986181ae0d8b842ef492c2040edab383526a

                                                  SHA512

                                                  c6904e869e861a9d4c009d23adc153047f210a2dc40b58a91d08c10210913d79fb6efd12c36ddedfdf695d1337d54f85519606eb5f33ddce655444793243b6d4

                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir4056_105033737\6c9553e8-6bd0-4839-ac22-0d8b1af22685.tmp

                                                  Filesize

                                                  135KB

                                                  MD5

                                                  3f6f93c3dccd4a91c4eb25c7f6feb1c1

                                                  SHA1

                                                  9b73f46adfa1f4464929b408407e73d4535c6827

                                                  SHA256

                                                  19f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e

                                                  SHA512

                                                  d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4

                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir4056_105033737\CRX_INSTALL\_locales\en_CA\messages.json

                                                  Filesize

                                                  711B

                                                  MD5

                                                  558659936250e03cc14b60ebf648aa09

                                                  SHA1

                                                  32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                  SHA256

                                                  2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                  SHA512

                                                  1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                  Filesize

                                                  479KB

                                                  MD5

                                                  09372174e83dbbf696ee732fd2e875bb

                                                  SHA1

                                                  ba360186ba650a769f9303f48b7200fb5eaccee1

                                                  SHA256

                                                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                  SHA512

                                                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                  Filesize

                                                  13.8MB

                                                  MD5

                                                  0a8747a2ac9ac08ae9508f36c6d75692

                                                  SHA1

                                                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                  SHA256

                                                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                  SHA512

                                                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  edc1e50b98f2a90d539aa2a243794989

                                                  SHA1

                                                  4fb8947c8d71a7099a19c70aabb5e939db00940d

                                                  SHA256

                                                  1b97b831ed2de108dd160de7bf219c114090bde23eef430b2d0cd2e1abe213d8

                                                  SHA512

                                                  66bece07421bb7d86deb7d1ebd5f9edeb3210a26b83b36f89ff92e25c734b4ca61fcbdea9edc77b16db116f3c61e2f09cd6da88b28519ce10c76b6cfe61b6d6c

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  b2dae7deb3e2e21c8bc8c720a623f1f1

                                                  SHA1

                                                  04dd46606c5d46e1548e53010364c77e1331e6cf

                                                  SHA256

                                                  50d864127c6b804521c13a3f36a270a60744e559608b568c5e7311a5d6f5eb78

                                                  SHA512

                                                  53885e75ba9775b9d1382b3ea52346a95a6006df29c9e6c184014891093d9f02fbd79672e65a6716cfd348280d7eab42bb5275eb6ba8e994a8eef5f13004e829

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin

                                                  Filesize

                                                  17KB

                                                  MD5

                                                  448de192425fb352bb2ce132fdae0e25

                                                  SHA1

                                                  1b9722df1e139ffc73a6352ea6aa739b0e7010c7

                                                  SHA256

                                                  962d88e2915aab7c9da213d4c12d622d5d81bacf8b68d6092962bec7408fece3

                                                  SHA512

                                                  debe6c66d439fc026a0d71b2971e439f288abc477c3c626a6848c3d217d7891c0366534bd7005f0c0a9eb614fac4e326c1827990fd80cdda2a410ee6b3024368

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  17a93cf41c9284935022bc14aa714c41

                                                  SHA1

                                                  46a5b71bb05be26ae679425e37261b37783c038d

                                                  SHA256

                                                  8ce5fd9d5c2eca8a5cace03f188263758a6de81e0d0fbeaff3cdf83b2a1420ec

                                                  SHA512

                                                  0bf6c8c2adf73d826fd076317fd79a5ce6d856e79b28a051e69ac1912752ba043c100ed66572f607e20c75d405b4610a0ea9eeeacf503ec1289eea864132c349

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  9d44031f5bc216873a0b30799cd55ea2

                                                  SHA1

                                                  2c9f542f85ecd2959b8d26d72f286ef925c9d1b8

                                                  SHA256

                                                  60c94417209dd288230b89c719fb5f9c6fc5b024821b883429dd4f512e36da3c

                                                  SHA512

                                                  f2df2ae3f4a9de7e4218168906c37222cac308a1c2a451a54b35279a2b30b556a92ec90bac33a1f4bc7a9bfd881a948be5378e8c4fddf8fb772d6b8d00be2748

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  28KB

                                                  MD5

                                                  117e0a2ea064f91526f47d5e423ab7ba

                                                  SHA1

                                                  3e3b1511179c6a952909aa8ceaedf1cb228a8eec

                                                  SHA256

                                                  20c5bdbccda7b98c4bbdbe1e558b8bff331386370ac58c6073bf5de9858dda6c

                                                  SHA512

                                                  a333a73fed74dd93df3de85af4abf800642bbaf970c211af0a08c1cd21b915890b791f279e913d396b6706079c7245224b6b43cfdc3e0c37016436f5ab252dde

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\b4da9c67-ab6e-4b2d-bd8a-5e81355c25d0

                                                  Filesize

                                                  982B

                                                  MD5

                                                  ef7ef927751ae4274a65946d462d30ad

                                                  SHA1

                                                  506201b3024e5a17de71b5759334d35d0ab65243

                                                  SHA256

                                                  d271f6e59fbbc92b6afaea2d1aa95297e82a7ae78a1c834259e8fb3a437ed59d

                                                  SHA512

                                                  7eba1a7c0bf3545e76a47c6d25b7b86f90bc8a19d12e85a69e73d0655ec7208d7c7d1b17c53aa046e4edc31bc0a77602eeb927247a1f61cf8a19f9b0ee38a568

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\cf3ed3a8-613e-4d2d-bdee-403a076532ac

                                                  Filesize

                                                  671B

                                                  MD5

                                                  34f9d57fd042cf20d40678902729ac1c

                                                  SHA1

                                                  0e71d29ea6eb1ba233d4dff047574296415b0014

                                                  SHA256

                                                  cfefe6b50b304fea0ac40eef1eaee22723e9cc075ac7db02882929889044d36d

                                                  SHA512

                                                  587d822df0b41232ad2d66fb0f0ede7fd63e8f3c7379ae06143672ffb156ba6a1b27b24d2f8fda8807878f8591f5ef3c116590f49f13c320356d47b1dc1e2c60

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\d098e477-0610-45aa-be26-d36581e29cb7

                                                  Filesize

                                                  28KB

                                                  MD5

                                                  60e4c701b0ac625f53ddb37844c24208

                                                  SHA1

                                                  27e08fc21314ec5757fb3864eb52babe1cb9fe01

                                                  SHA256

                                                  ec4b4363b88e98021de68c89aef09163678132267bb830a999bd50d284724578

                                                  SHA512

                                                  e1d2f0886b22f6b51e3f94044e6cc310deac4cef4b901fe3c14ae2c9f6ad19bc8dc100476d8dd22476c09c8c89fe216ba32456528d0e7e35a657c946bba658b4

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  842039753bf41fa5e11b3a1383061a87

                                                  SHA1

                                                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                  SHA256

                                                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                  SHA512

                                                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                  Filesize

                                                  116B

                                                  MD5

                                                  2a461e9eb87fd1955cea740a3444ee7a

                                                  SHA1

                                                  b10755914c713f5a4677494dbe8a686ed458c3c5

                                                  SHA256

                                                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                  SHA512

                                                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp

                                                  Filesize

                                                  479B

                                                  MD5

                                                  49ddb419d96dceb9069018535fb2e2fc

                                                  SHA1

                                                  62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                  SHA256

                                                  2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                  SHA512

                                                  48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                  Filesize

                                                  372B

                                                  MD5

                                                  bf957ad58b55f64219ab3f793e374316

                                                  SHA1

                                                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                  SHA256

                                                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                  SHA512

                                                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                  Filesize

                                                  17.8MB

                                                  MD5

                                                  daf7ef3acccab478aaa7d6dc1c60f865

                                                  SHA1

                                                  f8246162b97ce4a945feced27b6ea114366ff2ad

                                                  SHA256

                                                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                  SHA512

                                                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  688bed3676d2104e7f17ae1cd2c59404

                                                  SHA1

                                                  952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                  SHA256

                                                  33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                  SHA512

                                                  7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  36e5ee071a6f2f03c5d3889de80b0f0d

                                                  SHA1

                                                  cf6e8ddb87660ef1ef84ae36f97548a2351ac604

                                                  SHA256

                                                  6be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683

                                                  SHA512

                                                  99b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs-1.js

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  a0235725036f1d085972e7623cc38d93

                                                  SHA1

                                                  e9908b73de457d78ad4430664f59bd4c2a43a70e

                                                  SHA256

                                                  8cac35d34b76dffab14610fbd94a8907d6f4ef1b46d2390cae514de5165a1ff4

                                                  SHA512

                                                  393934ff89ecdd788c8e481f98f736641cf6445ecae8cd69066d824d77ec35a387c0bc9b12c55480c1c8b29472fc26838c3b86d0f00bf9d655b2523022a89d40

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs-1.js

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  a22a5d99c7023fca3ab7782483d609e1

                                                  SHA1

                                                  17bcd86e071103cc54844d286a0552f9072b156d

                                                  SHA256

                                                  abff525cef8711fa41449afcb923411274220cb7c0bc905c27c801ffca6d1538

                                                  SHA512

                                                  75c3be05f0389dcb2ee95e4e97d86e6b5048f9c055c960f5e13ce49ce0a3518f2b402fa8239eb5a724ac7134a3100a531c686fa8cf4f33e2edd3a0d2e411a8eb

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs-1.js

                                                  Filesize

                                                  12KB

                                                  MD5

                                                  30cc7dd52a9f6485e7c5ae7d7609aa10

                                                  SHA1

                                                  43ba2fc972bbbdfe3c745688a3797c34b6c1d90d

                                                  SHA256

                                                  2c1743b774c36bad06e5e11511f6ca753ca2ae43c9dc7db30f84611083d678a9

                                                  SHA512

                                                  62d123577d712e9c326f6f4307029cdd9f769eaba3e6b0993e7bb5ce647b85930c4aea55071b934c9215030b102901e7cc44dea69c1aadb6f8e2966bd8ef809a

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs.js

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  13613b173377446d8bb0200d37f7e435

                                                  SHA1

                                                  763717191b3c77a2de98abb560bff9c98e9346ba

                                                  SHA256

                                                  1bacddd66f5d875573da46fcdec22f52f2895553aac1ff1fbb80af06bce1753d

                                                  SHA512

                                                  a5c8a8d60347902e88f979b1d5fa87fa3ee35c745b247c4c1674a1e5b857fafcc6865b665b50c7d044f81f33494c1dfd216ddb0f533e583d4e021b3d6406e88c

                                                • memory/440-207-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-253-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-227-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-199-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-197-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-196-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-203-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-72-0x0000000004AB0000-0x0000000004AE6000-memory.dmp

                                                  Filesize

                                                  216KB

                                                • memory/440-205-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-209-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-211-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-213-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-1787-0x000000000B510000-0x000000000B5A2000-memory.dmp

                                                  Filesize

                                                  584KB

                                                • memory/440-1789-0x000000000B5B0000-0x000000000B64C000-memory.dmp

                                                  Filesize

                                                  624KB

                                                • memory/440-73-0x0000000005230000-0x0000000005858000-memory.dmp

                                                  Filesize

                                                  6.2MB

                                                • memory/440-215-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-74-0x00000000051B0000-0x00000000051D2000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/440-75-0x0000000005990000-0x00000000059F6000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/440-76-0x0000000005A00000-0x0000000005A66000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/440-217-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-219-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-221-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-224-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-86-0x0000000005B70000-0x0000000005EC4000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/440-225-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-229-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-231-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-233-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-235-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-237-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-239-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-241-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-243-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-245-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-247-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-249-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-251-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-201-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-87-0x0000000006050000-0x000000000606E000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/440-88-0x00000000060A0000-0x00000000060EC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/440-107-0x000000000A020000-0x000000000A262000-memory.dmp

                                                  Filesize

                                                  2.3MB

                                                • memory/440-255-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-257-0x0000000006500000-0x0000000006598000-memory.dmp

                                                  Filesize

                                                  608KB

                                                • memory/440-193-0x0000000006500000-0x000000000659C000-memory.dmp

                                                  Filesize

                                                  624KB

                                                • memory/440-195-0x000000000B810000-0x000000000BDB4000-memory.dmp

                                                  Filesize

                                                  5.6MB

                                                • memory/764-2685-0x0000000000560000-0x0000000000A46000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/764-2687-0x0000000000560000-0x0000000000A46000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/2012-21-0x0000000000560000-0x0000000000A46000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/2012-22-0x0000000000560000-0x0000000000A46000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/2012-23-0x0000000000560000-0x0000000000A46000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/2012-19-0x0000000000561000-0x000000000058F000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/2012-20-0x0000000000560000-0x0000000000A46000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/2012-17-0x0000000000560000-0x0000000000A46000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/2012-24-0x0000000000560000-0x0000000000A46000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/2012-91-0x0000000000560000-0x0000000000A46000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/3964-4-0x0000000000EC0000-0x00000000013A6000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/3964-1-0x0000000076F14000-0x0000000076F16000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/3964-3-0x0000000000EC0000-0x00000000013A6000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/3964-0-0x0000000000EC0000-0x00000000013A6000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/3964-18-0x0000000000EC0000-0x00000000013A6000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/3964-2-0x0000000000EC1000-0x0000000000EEF000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/4232-2895-0x0000000000560000-0x0000000000A46000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/4616-731-0x00000000009D0000-0x0000000000E7F000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4616-1849-0x00000000009D0000-0x0000000000E7F000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4948-40-0x0000000000400000-0x000000000066D000-memory.dmp

                                                  Filesize

                                                  2.4MB

                                                • memory/4948-2683-0x0000000000400000-0x000000000066D000-memory.dmp

                                                  Filesize

                                                  2.4MB

                                                • memory/5600-1817-0x0000000000CF0000-0x0000000001386000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/5600-1821-0x0000000000CF0000-0x0000000001386000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/5728-2710-0x0000000000230000-0x00000000004EA000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5728-2707-0x0000000000230000-0x00000000004EA000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5728-2414-0x0000000000230000-0x00000000004EA000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5728-2426-0x0000000000230000-0x00000000004EA000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5728-2427-0x0000000000230000-0x00000000004EA000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5740-1793-0x0000000000400000-0x0000000000410000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/5740-1819-0x0000000005E50000-0x0000000005E5A000-memory.dmp

                                                  Filesize

                                                  40KB