Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 19:49

General

  • Target

    8810efdced51fdea03108e8062441f480727460876660c86ef372a8f7ae5feb4.exe

  • Size

    1.8MB

  • MD5

    3dda196e23d46002e364e5cab7803f7a

  • SHA1

    fba9b6b66fb54d04d82b412e41c61051d72cdabb

  • SHA256

    8810efdced51fdea03108e8062441f480727460876660c86ef372a8f7ae5feb4

  • SHA512

    375396e79fe038f2c91422da9141c51f482b7c832c3e98dc3ebfc663cc42680af9d6c8d236a179c518951b5478c36cb0fce6cc69f43075b2985193ba827cf4da

  • SSDEEP

    49152:hWl8DpZssVM7EYHnwQyZ61IVlAwJMfwAJnkP1Gb0Iga:hsSbG7bHnlyZ61k2kNY

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

xworm

Version

5.0

C2

backto54.duckdns.org:8989

helldog24.duckdns.org:8989

Mutex

7Fvn9wsSHJeXUB5q

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://property-imper.sbs

Extracted

Family

lumma

C2

https://blade-govern.sbs/api

https://story-tense-faz.sbs/api

https://disobey-curly.sbs/api

https://motion-treesz.sbs/api

https://powerful-avoids.sbs/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 1 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 3 IoCs
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 10 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 30 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3456
      • C:\Users\Admin\AppData\Local\Temp\8810efdced51fdea03108e8062441f480727460876660c86ef372a8f7ae5feb4.exe
        "C:\Users\Admin\AppData\Local\Temp\8810efdced51fdea03108e8062441f480727460876660c86ef372a8f7ae5feb4.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3076
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3636
          • C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe
            "C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1732
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
              5⤵
              • Uses browser remote debugging
              • Enumerates system info in registry
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:4808
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff34e7cc40,0x7fff34e7cc4c,0x7fff34e7cc58
                6⤵
                  PID:4668
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,2518015092110016847,5005933095725771241,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1924 /prefetch:2
                  6⤵
                    PID:4956
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,2518015092110016847,5005933095725771241,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2164 /prefetch:3
                    6⤵
                      PID:2916
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,2518015092110016847,5005933095725771241,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2208 /prefetch:8
                      6⤵
                        PID:672
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,2518015092110016847,5005933095725771241,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:1992
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,2518015092110016847,5005933095725771241,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3380 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:444
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4436,i,2518015092110016847,5005933095725771241,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4516 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:4772
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4792,i,2518015092110016847,5005933095725771241,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4804 /prefetch:8
                        6⤵
                          PID:220
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4532,i,2518015092110016847,5005933095725771241,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4844 /prefetch:8
                          6⤵
                            PID:4164
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                          5⤵
                          • Uses browser remote debugging
                          • Enumerates system info in registry
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          PID:5004
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff34e846f8,0x7fff34e84708,0x7fff34e84718
                            6⤵
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5436
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9529474994662730755,11155488848433566617,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:2
                            6⤵
                              PID:4884
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,9529474994662730755,11155488848433566617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:3
                              6⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5344
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,9529474994662730755,11155488848433566617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:8
                              6⤵
                                PID:5328
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2156,9529474994662730755,11155488848433566617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                                6⤵
                                • Uses browser remote debugging
                                PID:5664
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2156,9529474994662730755,11155488848433566617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
                                6⤵
                                • Uses browser remote debugging
                                PID:5656
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2156,9529474994662730755,11155488848433566617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:1
                                6⤵
                                • Uses browser remote debugging
                                PID:5860
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2156,9529474994662730755,11155488848433566617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:1
                                6⤵
                                • Uses browser remote debugging
                                PID:5620
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe" & rd /s /q "C:\ProgramData\EBAAAFBGDBKK" & exit
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:2988
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 10
                                6⤵
                                • System Location Discovery: System Language Discovery
                                • Delays execution with timeout.exe
                                PID:2852
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1009351041\PeRVAzl.ps1"
                            4⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1756
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              5⤵
                              • Checks computer location settings
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of SetWindowsHookEx
                              PID:5456
                              • C:\Users\Admin\AppData\Local\Temp\vhpwff.exe
                                "C:\Users\Admin\AppData\Local\Temp\vhpwff.exe"
                                6⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:3556
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /c copy Accordingly Accordingly.bat & Accordingly.bat
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1816
                                  • C:\Windows\SysWOW64\tasklist.exe
                                    tasklist
                                    8⤵
                                    • Enumerates processes with tasklist
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:376
                                  • C:\Windows\SysWOW64\findstr.exe
                                    findstr /I "wrsa opssvc"
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5200
                                  • C:\Windows\SysWOW64\tasklist.exe
                                    tasklist
                                    8⤵
                                    • Enumerates processes with tasklist
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5620
                                  • C:\Windows\SysWOW64\findstr.exe
                                    findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4136
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c md 714773
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:6012
                                  • C:\Windows\SysWOW64\findstr.exe
                                    findstr /V "WOMENSVERLINEDLL" Replacement
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2880
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c copy /b ..\Within + ..\Print + ..\Albums + ..\Coated + ..\Modern + ..\Lincoln + ..\Nearest + ..\Wider + ..\Cancel + ..\Adoption y
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2980
                                  • C:\Users\Admin\AppData\Local\Temp\714773\For.pif
                                    For.pif y
                                    8⤵
                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1484
                                  • C:\Windows\SysWOW64\choice.exe
                                    choice /d y /t 5
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3316
                          • C:\Users\Admin\AppData\Local\Temp\1009364001\filer.exe
                            "C:\Users\Admin\AppData\Local\Temp\1009364001\filer.exe"
                            4⤵
                            • Drops file in Drivers directory
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of SetWindowsHookEx
                            PID:5820
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\1009364001\filer.exe
                              5⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5184
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                              5⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Suspicious use of AdjustPrivilegeToken
                              PID:6048
                            • C:\Windows\system32\attrib.exe
                              attrib -r C:\Windows\System32\drivers\etc\hosts
                              5⤵
                              • Drops file in Drivers directory
                              • Views/modifies file attributes
                              PID:2664
                            • C:\Windows\system32\attrib.exe
                              attrib +r C:\Windows\System32\drivers\etc\hosts
                              5⤵
                              • Drops file in Drivers directory
                              • Views/modifies file attributes
                              PID:4116
                            • C:\Windows\System32\Wbem\wmic.exe
                              wmic os get Caption
                              5⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1908
                            • C:\Windows\System32\Wbem\wmic.exe
                              wmic cpu get Name
                              5⤵
                                PID:5888
                              • C:\Windows\System32\Wbem\wmic.exe
                                wmic path win32_VideoController get name
                                5⤵
                                • Detects videocard installed
                                PID:1424
                              • C:\Windows\System32\Wbem\wmic.exe
                                wmic csproduct get UUID
                                5⤵
                                  PID:5068
                              • C:\Users\Admin\AppData\Local\Temp\1009365001\b2f442be51.exe
                                "C:\Users\Admin\AppData\Local\Temp\1009365001\b2f442be51.exe"
                                4⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:5656
                              • C:\Users\Admin\AppData\Local\Temp\1009366001\e8d4f2df50.exe
                                "C:\Users\Admin\AppData\Local\Temp\1009366001\e8d4f2df50.exe"
                                4⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:5776
                              • C:\Users\Admin\AppData\Local\Temp\1009367001\d9ec030aa0.exe
                                "C:\Users\Admin\AppData\Local\Temp\1009367001\d9ec030aa0.exe"
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:4148
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM firefox.exe /T
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2608
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM chrome.exe /T
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  PID:3316
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM msedge.exe /T
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  PID:732
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM opera.exe /T
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  PID:5780
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM brave.exe /T
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  PID:1548
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                  5⤵
                                    PID:1912
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                      6⤵
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4776
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1960 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1469ed23-e8ce-4954-a64d-661ea3ef651f} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" gpu
                                        7⤵
                                          PID:6020
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2376 -prefMapHandle 2384 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a48c2c0d-f765-45ab-b6d1-8f04585214a7} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" socket
                                          7⤵
                                            PID:5952
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3260 -childID 1 -isForBrowser -prefsHandle 3252 -prefMapHandle 3248 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f4b2573-eb52-4054-a76b-3a6ba526be5c} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab
                                            7⤵
                                              PID:5988
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3936 -childID 2 -isForBrowser -prefsHandle 2968 -prefMapHandle 2744 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a787e1e-a1b7-4772-854e-b7d49b1b8b49} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab
                                              7⤵
                                                PID:5720
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4508 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4160 -prefMapHandle 4500 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae88f33f-7e50-4ebe-a124-bf1e6feefeeb} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" utility
                                                7⤵
                                                • Checks processor information in registry
                                                PID:3236
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5580 -childID 3 -isForBrowser -prefsHandle 5576 -prefMapHandle 5496 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {51936802-f1b7-4afe-8b69-ebaa6e00d4b2} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab
                                                7⤵
                                                  PID:4936
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5744 -childID 4 -isForBrowser -prefsHandle 5820 -prefMapHandle 5816 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cad71f70-146d-4243-95ef-0dc69c4a091f} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab
                                                  7⤵
                                                    PID:1476
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5940 -childID 5 -isForBrowser -prefsHandle 6020 -prefMapHandle 6016 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b537d7c-0273-45e1-84b3-9188055ea0c4} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab
                                                    7⤵
                                                      PID:5236
                                              • C:\Users\Admin\AppData\Local\Temp\1009368001\1dba1bdcc2.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1009368001\1dba1bdcc2.exe"
                                                4⤵
                                                • Modifies Windows Defender Real-time Protection settings
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Windows security modification
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                PID:5424
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c schtasks.exe /create /tn "Double" /tr "wscript //B 'C:\Users\Admin\AppData\Local\HealthSync Innovations\MediConnect.js'" /sc minute /mo 5 /F
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5204
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks.exe /create /tn "Double" /tr "wscript //B 'C:\Users\Admin\AppData\Local\HealthSync Innovations\MediConnect.js'" /sc minute /mo 5 /F
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:4264
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MediConnect.url" & echo URL="C:\Users\Admin\AppData\Local\HealthSync Innovations\MediConnect.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MediConnect.url" & exit
                                            2⤵
                                            • Drops startup file
                                            • System Location Discovery: System Language Discovery
                                            PID:1596
                                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                          1⤵
                                            PID:2708
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                            1⤵
                                              PID:2580
                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                              1⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4208
                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                              1⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:3032

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\ProgramData\remcos\logs.dat

                                              Filesize

                                              144B

                                              MD5

                                              8447db1c98db7b3c7492791099da98d9

                                              SHA1

                                              3c588ed90332cf80fae1b9c133ceb44b11ca6091

                                              SHA256

                                              7c463294e5736a92e6001e38efcbeaa4260cd56f81e9032a055579fa43ceea17

                                              SHA512

                                              81c8b2184ef0b07415ad1ba5d6235a142fbe85e0d9277392b658b28ac990df5e0808a22727e619297eff535ba255deadf1dbfc72816d1f0ff59ba456f5c179ba

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                              Filesize

                                              649B

                                              MD5

                                              dcebd3658f1f672e534d6b3732e321f7

                                              SHA1

                                              bd37e72ff979a387cee7533660e8e00310a2259f

                                              SHA256

                                              315b73828b06459b270afa595c10c1f8aee2e386baca913454e41329be25f304

                                              SHA512

                                              50fab2b5762916bdd6b3608084d927ac87f1cc0640115aff45e4c7371c0728bbd561cdcda180570aa2ea7c77c7fc44c2ed6663c8a1ddb901eb04576782e0fef7

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                              Filesize

                                              2B

                                              MD5

                                              d751713988987e9331980363e24189ce

                                              SHA1

                                              97d170e1550eee4afc0af065b78cda302a97674c

                                              SHA256

                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                              SHA512

                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                              Filesize

                                              2KB

                                              MD5

                                              440cb38dbee06645cc8b74d51f6e5f71

                                              SHA1

                                              d7e61da91dc4502e9ae83281b88c1e48584edb7c

                                              SHA256

                                              8ef7a682dfd99ff5b7e9de0e1be43f0016d68695a43c33c028af2635cc15ecfe

                                              SHA512

                                              3aab19578535e6ba0f6beb5690c87d970292100704209d2dcebddcdd46c6bead27588ef5d98729bfd50606a54cc1edf608b3d15bef42c13b9982aaaf15de7fd6

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              34d2c4f40f47672ecdf6f66fea242f4a

                                              SHA1

                                              4bcad62542aeb44cae38a907d8b5a8604115ada2

                                              SHA256

                                              b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33

                                              SHA512

                                              50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              8749e21d9d0a17dac32d5aa2027f7a75

                                              SHA1

                                              a5d555f8b035c7938a4a864e89218c0402ab7cde

                                              SHA256

                                              915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304

                                              SHA512

                                              c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              a962e2883df3db210fc17d0d7173560c

                                              SHA1

                                              25bca0788fd438a4f3c755993d4d50a401a10985

                                              SHA256

                                              55bf1584787e4f2fb2229558b403680be52bc8e484351dc2ea44c2fe6837a2be

                                              SHA512

                                              7a33d179c7ae74d9f5d84217beec248a2d8b36c00fcb06e4ce267b04286e49d3a89dd2d64ff38fa06d042dd123061f2b770afe55506f92121159f7fbf8bc6700

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              13KB

                                              MD5

                                              cff8fce404c7f50397b07f5ab068da66

                                              SHA1

                                              a9f2f7de2b351b4973cf82cbaf8024140764f6b2

                                              SHA256

                                              f58d0c2310f069738fe5ba6cb3d6dba3577e5c465ac07ff2bf1a3d267f6a8848

                                              SHA512

                                              13f3d364dfe546cd78c78c1be77444810969ea978ea6aeb183808fe99ffe50aba2a957646a16aa8dc998140a0c24da4a914c72d64f58480502180fc79c39009e

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              a6685e02d4224799097fe9c6627fb607

                                              SHA1

                                              ec2d18e25513a559eed359a82c0d99e81ff41d54

                                              SHA256

                                              a5090285f71bb4d53010b60b446726b9257b54271c6f2e7d708ec78e335e15a9

                                              SHA512

                                              5e3111b2bcd3020d00d793ae3df269737ac3648d6374e18629860c455a023700f53effbc31bd3d6b5f359811de0f51a38eda248e5fd652675e6337b18cf2969e

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json

                                              Filesize

                                              19KB

                                              MD5

                                              13f6bc85c704cccf789b96484f2e9718

                                              SHA1

                                              1f668bc9402939da087bdbca415071470144c541

                                              SHA256

                                              b4a57d65053cfd836f2539b40fcffb48f483a1c4bab1fbb5fde22dbed63fb5b5

                                              SHA512

                                              fc310515ff38fb9b57bba362019e23cfbcd8eacf619afc57da78196a0b87d6cf212b1419123f83b7deeecb6004cfa21903b4611466e6da4bd90f738a4707f399

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                              Filesize

                                              13KB

                                              MD5

                                              e30a93f2522c2099da15648b55d8df0b

                                              SHA1

                                              ee9b0a12f2ae4b60af8a0550d0a39d32a3eb84bf

                                              SHA256

                                              40a76f22468d88ae71acf1cb9a62ca85de361786ca36be41da00ea0a874d3c54

                                              SHA512

                                              005ff6f0a166c80b3a7b6a97b4cfbb44ee5e45ae6a008d8df2c1b3c796e33f6730a46dcce53cb8d912ea106ee456ec159cd5c4c6db2dbab944b10a1b32e6a07a

                                            • C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe

                                              Filesize

                                              409KB

                                              MD5

                                              4ea576c1e8f58201fd4219a86665eaa9

                                              SHA1

                                              efaf3759b04ee0216254cf07095d52b110c7361f

                                              SHA256

                                              d94206d9509cc47cae22c94d32658b31cf65c37b1b15ce035ffaa5ce5872ad2f

                                              SHA512

                                              0c7462bc590d06f0ead37246f189d4d56e1d62ff73f67bf7e2ce9c653d8c56812a5f1306fb504168f7e33b87485c3465ea921a36f1ba5b458d7763e45c649494

                                            • C:\Users\Admin\AppData\Local\Temp\1009351041\PeRVAzl.ps1

                                              Filesize

                                              3.0MB

                                              MD5

                                              2b918bf4566595e88a664111ce48b161

                                              SHA1

                                              e32fbdf64bb71dc870bfad9bbd571f11c6a723f4

                                              SHA256

                                              48492827286d403668996ae3814b2216b3b616f2fb4af2022bf3d2fc3f979a26

                                              SHA512

                                              e3d58adbe13befe91fb950cc52b16d6d2fcb8f6d65bab4020222713207b07ce78b76e2e2532cf3de23149e934ba1e1cb9046a95a18424a668bfa4a355af6f44a

                                            • C:\Users\Admin\AppData\Local\Temp\1009364001\filer.exe

                                              Filesize

                                              25.7MB

                                              MD5

                                              9096f57fa44b8f20eebf2008a9598eec

                                              SHA1

                                              42128a72a214368618f5693df45b901232f80496

                                              SHA256

                                              f4e2eeea7e5db511bfca33ffd1e26bce5d72e2a381e84bf3700938eb404f7934

                                              SHA512

                                              ad29f94040532ab78679ec9e50d58d8ccef3f99d5ab53ef7c654527b9b2634da4c44375b2ca2d54a83d1dd1e0fa9b1d1a13241ffe0328bea07740166927521b2

                                            • C:\Users\Admin\AppData\Local\Temp\1009365001\b2f442be51.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              a8e9a412b9680f5a669fc267b2e699a9

                                              SHA1

                                              a9da906593df158e178a5fc69f4054e1b9d74d6f

                                              SHA256

                                              8c57cf7312440ff96cc26011bf2d5ecf6c89acbb7f086e90b4af99dc9da7c719

                                              SHA512

                                              49d46ed63554079d3e1fe12f2fd99e7a40151cec87a7d17d391d37b02586e0bcb6bb10dfbbff7f122fe8d3d46e04f28912cbd9fa98f5c19da08fb625ead2aa76

                                            • C:\Users\Admin\AppData\Local\Temp\1009366001\e8d4f2df50.exe

                                              Filesize

                                              1.7MB

                                              MD5

                                              9db1d2d5cacb20cc6ff48e135ae00541

                                              SHA1

                                              4c0000c8c9bb9f3cf3eff91f573648a89f2bc5e8

                                              SHA256

                                              4121db764f1ef59ccca1f43acedd27e0e6a086ef49359d75cd41d9c063857ebe

                                              SHA512

                                              fee1aec4dc791ffe349ffb95daba48b6f7e198aa3fe1c69c5be1d68c43faa9cfac6f8f79a18ec4be3b1162903036779188ea2c20bac0e75827752601adc0f937

                                            • C:\Users\Admin\AppData\Local\Temp\1009367001\d9ec030aa0.exe

                                              Filesize

                                              900KB

                                              MD5

                                              19fcdf56ae709a03be8137ad630d1c9b

                                              SHA1

                                              e3f487ed3ab79fc05b892db548da9aa14cd69171

                                              SHA256

                                              73f94f70d57668c306dc97607d38353817bee05d8c220db436ed3c610cfa6ca2

                                              SHA512

                                              da5645416691df32c29851f1f933e60082874145b99d62dd92294fe893e1bf4a67b1926c5b73a69ab10c976a59e019dd6787fe75973c72e464f083bec1522c13

                                            • C:\Users\Admin\AppData\Local\Temp\1009368001\1dba1bdcc2.exe

                                              Filesize

                                              2.7MB

                                              MD5

                                              34c86fde97a82e80250312333150a710

                                              SHA1

                                              636a5d3d2623c35e2b3fa4462d105cfdc3f3f4f5

                                              SHA256

                                              97e5fa31a1a59c88b9fc3b2790bbb3068359b8e09ec9edc1635b8a2efe968aaf

                                              SHA512

                                              63ec0114ea8cceb1f89cec992afe7fb343ff8fb610e5f973c966f0493945d39809c31e4653d5e36c361969ef733f2d5e1dd22c4ffba649cf34a9ffe3aa868e7c

                                            • C:\Users\Admin\AppData\Local\Temp\714773\For.pif

                                              Filesize

                                              872KB

                                              MD5

                                              18ce19b57f43ce0a5af149c96aecc685

                                              SHA1

                                              1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                              SHA256

                                              d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                              SHA512

                                              a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                            • C:\Users\Admin\AppData\Local\Temp\714773\y

                                              Filesize

                                              697KB

                                              MD5

                                              96c47dc37e1d58ad8b3d39ec2636ad68

                                              SHA1

                                              65743f382dfd6b2aab4368e599f68ccccbf457ad

                                              SHA256

                                              9dd46dd37f298b683c039d59458edb4502bd22cdfcf687da9c51cc5c5a22f823

                                              SHA512

                                              1ec95f6db4a541b8c68ef29df6a2dec844e20b27a7c489121a6a07e4b1c943ae74fe3fee27a6c5fa034e3276743891139f23e1572ad81a74bfb7398008f6c3c6

                                            • C:\Users\Admin\AppData\Local\Temp\Accordingly.bat

                                              Filesize

                                              14KB

                                              MD5

                                              3308b4ac40164525bb3be5512f731cbf

                                              SHA1

                                              fd0cf2b34957e6c891cb46af29cbc6ba98544e8d

                                              SHA256

                                              3e26ccd9ab5ec7b5b850bf32207ff2f7d030435bc07c0c7d81e55f8501979dc0

                                              SHA512

                                              3277c89b6a3128910f3de9a74783905ab179c971fb88e188eed0931cd6a049a5faa60eeaec43484b76a073f6cf50fb80f3b3989fc96d3df00f2679c00c6e2b4a

                                            • C:\Users\Admin\AppData\Local\Temp\Adoption

                                              Filesize

                                              6KB

                                              MD5

                                              8c792e91c999ef3f86d146ec4357dfe1

                                              SHA1

                                              fb5cf5b21b94b64e7761c8b955bf307f9f2871b1

                                              SHA256

                                              cef488cd90549e45e91207f2f703642a8fc5f5ec39a2b87391a5dc3dbbc060ea

                                              SHA512

                                              5d182ffa6f0573b8607ed3039cce8120d8a6637aac0443316a0777b7ad384d9bd644d8787ce24b8af7bcd66399e763b591a47dcb0691753fa13a954d12fa122e

                                            • C:\Users\Admin\AppData\Local\Temp\Albums

                                              Filesize

                                              78KB

                                              MD5

                                              c921a93d3d8768393d6fd288ef7d3626

                                              SHA1

                                              826cd8ded83329a124c834d8644d164e656f5830

                                              SHA256

                                              bfd39fe90080c4ad2484061dde6521ab38aaa3a5c4189365c549fd586680c5d3

                                              SHA512

                                              f3f4ef74425844485e237cccca48677fbd391c78e062351e91921e6834269fc12b2f314b1ca5d2df4d53c2ba8f4323b723ba052b9b7b49ca875add8e8acb95c9

                                            • C:\Users\Admin\AppData\Local\Temp\Cancel

                                              Filesize

                                              80KB

                                              MD5

                                              94252e7ea5928c3384fad7a7345ee48c

                                              SHA1

                                              d4c94d10bce143056811ab47a9e64bc3e13d9e0e

                                              SHA256

                                              c28fb31ae80d35e5fe4a72ea0951a8f716b29b006465e7ae09455a92d77b61fc

                                              SHA512

                                              b892d496078d099b17d92401756c6f43ead013eaecef412b09d6ff32a0f32750ece8ab91fee0ac35683ef6758b8c28f7d924c5d55fa7dff1f39edb62f2f10d97

                                            • C:\Users\Admin\AppData\Local\Temp\Coated

                                              Filesize

                                              58KB

                                              MD5

                                              6653fbd98cfcf87d8f39a0107d49ba70

                                              SHA1

                                              4d4ead6802154ba90fa517093205552c156f6408

                                              SHA256

                                              2d1c705a2197d1f37e1ae3591e06370f89bf2c6e35c18d9020559f7fff5a6007

                                              SHA512

                                              c83b7bef5242c31afce44a04f55efc87e1bf1fdac4653cd85fc20733a054dfea93d34d3216808c0e29decff8032f8f3adab72d497922b8c4155d4dc104c61fd1

                                            • C:\Users\Admin\AppData\Local\Temp\Lincoln

                                              Filesize

                                              90KB

                                              MD5

                                              c5bb73e77ced7f6ab691bc6048afc56e

                                              SHA1

                                              abc3c84bc42e70b385b1a19790c5e4a8f05817fb

                                              SHA256

                                              493da51541861815d62a13dc10d81a97b1446bd3805d93652a869ea963a83993

                                              SHA512

                                              870d0413a9f89dc1f5f31dbe007ea2cd10b453963af65fe0e4c32d938aeaf445c6c4c50452a57e52960270dc0732aacceee2e56cb1d90aa96f11d39693e62b5b

                                            • C:\Users\Admin\AppData\Local\Temp\Modern

                                              Filesize

                                              94KB

                                              MD5

                                              a25ea81dd7c11e371df8a950f65f3376

                                              SHA1

                                              536c8dc73cdca582414f62ce0dce642c2af7a266

                                              SHA256

                                              e55aaea71afea173fe27f33913ab858f643708d407dd9952898bc0f25e2d900e

                                              SHA512

                                              f49342a4643b211da25492e99ad396f1a3898217d3d43bd1c47989d81d0537f24c9337e9cfe1cc01b3a3271fb4d308e529fad059b9bad5c14de702c3bf80ea80

                                            • C:\Users\Admin\AppData\Local\Temp\Nearest

                                              Filesize

                                              69KB

                                              MD5

                                              fe1f720ce3a97cfa239177af5075260d

                                              SHA1

                                              2b7146d0203557c8dddf3d0d2a88a51f6cb5fd1e

                                              SHA256

                                              dc09313c346e77488b917f0c71532a8d4575f95379c9f8160473bbcb3175317e

                                              SHA512

                                              a333983b4b3bdfb611b67f87d5be636c9cc0563fc454ee784cbd542042210fbc9d194900631e9dbac871515e49fabe3521cfbc2caeeb57da0a896fb5d1e64efb

                                            • C:\Users\Admin\AppData\Local\Temp\Print

                                              Filesize

                                              90KB

                                              MD5

                                              b54857f700feec0ac4bf74912ec624ce

                                              SHA1

                                              75ebbd85b0fa5e60d42956f2e016a7e25500a57c

                                              SHA256

                                              bf34e48b8be5cf77c4f23803d86a424aae876d8e2d4c1cf86588992b1ae53736

                                              SHA512

                                              5613a86aed053a1241e0164714cd117db83ce48b8d2069de1380558085c48e8c5c90c11c7627d36ae3f61602791fd27264f5cdd838dfc5b76682206320e04b28

                                            • C:\Users\Admin\AppData\Local\Temp\Replacement

                                              Filesize

                                              7KB

                                              MD5

                                              f173d5c8c8846b0a6c530649346ce39b

                                              SHA1

                                              c929ac894dce5a462d9b3d82a701f5f730dd8b27

                                              SHA256

                                              fa4414d47c19a25899eb590a4eeb632cab620e880252cc5acc93661a6f686561

                                              SHA512

                                              7b78f69a32f6d6bcb5b0e6696fcce2e38849b120cba4eabb77895ae8b9f756ff6d34b68a9943cd13f9496d64b7d955f6f3d4b2e91d43171c0c49423aaf441cac

                                            • C:\Users\Admin\AppData\Local\Temp\Verbal

                                              Filesize

                                              865KB

                                              MD5

                                              e8d598224c95801dec480c70543df88e

                                              SHA1

                                              9ab515652e41ee027272af911eb6a54a1de0aa75

                                              SHA256

                                              5474c4b28e94710f60e82ce08033f32dcab71dda811538851a7f9c3604fd95f4

                                              SHA512

                                              a2cd491ea6e63c770f8033dccfdfa2bedfaeb052a520016fd9417a72749c8e88b28b5440aaea19f4313b162b88fcd5d5339496faf6135b1c1e3eb68c35320b1f

                                            • C:\Users\Admin\AppData\Local\Temp\Wider

                                              Filesize

                                              66KB

                                              MD5

                                              06f3bb08e567b1b629a959f85a3aa6eb

                                              SHA1

                                              f2413f66c91b3733f5a32e1afc7e595c1b1056fd

                                              SHA256

                                              7769b5c3388facff4c70dfb60bb5af9060fb11a260825284a192a5537b06946f

                                              SHA512

                                              e19d8d6f4b0f140c7f853f6707febb204c5ca243022796eef927be402b52d8a3e678d81281a468fdf3723ac59f17c66c4a5c2f2affac8eef96df2e6f9eddd9b7

                                            • C:\Users\Admin\AppData\Local\Temp\Within

                                              Filesize

                                              66KB

                                              MD5

                                              6bfa1135bd266eb7f92ce9cf2979179c

                                              SHA1

                                              71655f8fc9a55a70c087d3b5a6063dd12330ccb0

                                              SHA256

                                              02c7089cbe35fa9354c10ab76e399cb0e614163facb9fe254b8e20278eb6057d

                                              SHA512

                                              dde9e0b53be8bd18c838e1ac645c6ca6fe25e2659a254bda5002686f872192ca8ac5b2c6eee3ac613a755d35c6deb677190f8c27049ccacc3811ec3a13ca8899

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ypzhcfqe.vls.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              3dda196e23d46002e364e5cab7803f7a

                                              SHA1

                                              fba9b6b66fb54d04d82b412e41c61051d72cdabb

                                              SHA256

                                              8810efdced51fdea03108e8062441f480727460876660c86ef372a8f7ae5feb4

                                              SHA512

                                              375396e79fe038f2c91422da9141c51f482b7c832c3e98dc3ebfc663cc42680af9d6c8d236a179c518951b5478c36cb0fce6cc69f43075b2985193ba827cf4da

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                              Filesize

                                              479KB

                                              MD5

                                              09372174e83dbbf696ee732fd2e875bb

                                              SHA1

                                              ba360186ba650a769f9303f48b7200fb5eaccee1

                                              SHA256

                                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                              SHA512

                                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                              Filesize

                                              13.8MB

                                              MD5

                                              0a8747a2ac9ac08ae9508f36c6d75692

                                              SHA1

                                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                                              SHA256

                                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                              SHA512

                                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                            • C:\Users\Admin\AppData\Local\Temp\vhpwff.exe

                                              Filesize

                                              2.0MB

                                              MD5

                                              272878833f720819effc3ed1eed0f773

                                              SHA1

                                              e17e4d822165997c463aa21c6efd102185af319d

                                              SHA256

                                              508729820be5115513aea17ba818986181ae0d8b842ef492c2040edab383526a

                                              SHA512

                                              c6904e869e861a9d4c009d23adc153047f210a2dc40b58a91d08c10210913d79fb6efd12c36ddedfdf695d1337d54f85519606eb5f33ddce655444793243b6d4

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                                              Filesize

                                              8KB

                                              MD5

                                              ce32abd8280bc93fae344af14bb5e495

                                              SHA1

                                              9433daf4217ee2a88cfd07233cfa1950a6d5c7a2

                                              SHA256

                                              bc22e00faf9dedd2a0f1d25e08cc3b6aea10eb9b23b608bfe50a41c60e39da5f

                                              SHA512

                                              ac347eb77043146c9175284cb5ebe8e7fb806eb2ef0798d987eff66dd8e12e1ca18cccc6ca15af23de0c60160808c2df2f219fe17509ab6a2855962d4d13d936

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                                              Filesize

                                              13KB

                                              MD5

                                              c1669a0591cb3d2cf9c22cf79d1b0696

                                              SHA1

                                              d00886236c844deda48734e2ca2556c2e38bc913

                                              SHA256

                                              c2a8e5def0226ba6ce7e9e91ba8d151cc7b1e56637080aba1dc4e9fc28b8c9b5

                                              SHA512

                                              63b533c75d75659545926b180375ccf955a5e1c7ba709ee873fde135924b870781f75934c14630189f41987823e52ccaa1d5001d5dfd5f65470d724249d03941

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              5KB

                                              MD5

                                              6bb28f4884195238d3b96fea5fb443b7

                                              SHA1

                                              133a637e3f033b7ea3ff7cc20327bd8b5aef31f7

                                              SHA256

                                              526b2a50e01c87714db25fcde45c9037225dc4898da825e186892f6b557e3344

                                              SHA512

                                              3182f935d2fd50f29d07f67628495e89904fe1e782b3121e271f2c81b79fed6d08466eb6570dbf1102448ef4e94c338627789c10aa50d3d4b36a66b2c528249e

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              15KB

                                              MD5

                                              614f243b4286fd56a63168c18a6dd35c

                                              SHA1

                                              a36bb8a3bdc0db6605547e8499e57b514bc29371

                                              SHA256

                                              765f29475d9576da0c509985f3a52d1f710712f256ccf8a32883b2a699679171

                                              SHA512

                                              a4bd77ecc7a8476e7de73f88094278fcabd5b727341125d1cdf445163d1f9ce19341f5de2ba88e2ac20d7a92842e14c1460159e1b138508489ac0845df5d5c55

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              15KB

                                              MD5

                                              95c9d52c382049667b742cc3fda5da07

                                              SHA1

                                              6f5b7e9b723ff62ad54d5a0191e1fc07d62a7352

                                              SHA256

                                              d802432e4a7ce6c8a947657fac149d1786e96590d60195a16950b6e36d68176a

                                              SHA512

                                              c8be9972a8dc6d8dd2f760cf8b3c407a58bc8d284a177874d2210b27ad972d1e441d38a7896501e2665618cdfcf081e091f937714f24ac0ce36418fec3f59524

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              6KB

                                              MD5

                                              09829d825be177b78d16ccdd1e73027f

                                              SHA1

                                              fca494c38af61c1cdd30e11dd8967304cf8234ff

                                              SHA256

                                              967c4586b32c497c3ce483e0d1329d9a1569eb3ecc300c6596379d260e267900

                                              SHA512

                                              ab692bbed617c42b6cf0fb67902582780a3acff4cb5302c7e3ad74c13bc02672e4e8bdd94289fb0036c30f4fca1244d3fc8dfc490656b00a9fdd2d7a59022d8d

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\6553913c-a202-4564-9c25-713c6606c987

                                              Filesize

                                              671B

                                              MD5

                                              e987fc54dc792fa9d739c9f572f38d21

                                              SHA1

                                              31b9ca6f0657787199fa40f51716b742dfe6a5af

                                              SHA256

                                              ab957526253c39f48c8b8af273bc800684ebb3fcc7f46a3ffb34773e46e07ffd

                                              SHA512

                                              3a76b2de3e566678a1b7689a89cefc46db36d8a288d6661614daf70a3493f651b51901afca173cad5080b227551f43948a63fa761689be3303bfb6384331f94e

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\e7a9955f-cee5-466f-a2d6-fa8992a46909

                                              Filesize

                                              24KB

                                              MD5

                                              dc54434aeb387a76aa2d073335843a0e

                                              SHA1

                                              10318dba7627f60fc55fdf7f8adeaa83e0944cd3

                                              SHA256

                                              82fa780b0474df5cc9cd72297aa5739f358df244345a8172cdf00e99d45e80c3

                                              SHA512

                                              63773ed1fecf2f2b74274ffb6f32b8b9d9ffebd1f76b72e0d2cf204323bd015047bb0709f253d7442b197ca136c856e7e52e64b30244706f60354709c5a7f40b

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\fbe950a2-a4ce-41b0-a6d4-37bbdb9b1014

                                              Filesize

                                              982B

                                              MD5

                                              34deb1ab5330be7608bbe0380a271f13

                                              SHA1

                                              97e6a4da13f2d418bc2d8d696292664c4ffea604

                                              SHA256

                                              1fb538321d93a2a0ce680e708bae100b7f7f856ea2a0a6299b60729e501a3e4e

                                              SHA512

                                              4ffb83acd2e01cb115abd7736e640a8a8afb7455e7a21c35397f92957ba32e7f7c58407a94cd758d3bc83d59593c6cbd5f24133a67bdab62b265fb1850f1edf6

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                              Filesize

                                              1.1MB

                                              MD5

                                              842039753bf41fa5e11b3a1383061a87

                                              SHA1

                                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                              SHA256

                                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                              SHA512

                                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                              Filesize

                                              116B

                                              MD5

                                              2a461e9eb87fd1955cea740a3444ee7a

                                              SHA1

                                              b10755914c713f5a4677494dbe8a686ed458c3c5

                                              SHA256

                                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                              SHA512

                                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                              Filesize

                                              372B

                                              MD5

                                              bf957ad58b55f64219ab3f793e374316

                                              SHA1

                                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                              SHA256

                                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                              SHA512

                                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                              Filesize

                                              17.8MB

                                              MD5

                                              daf7ef3acccab478aaa7d6dc1c60f865

                                              SHA1

                                              f8246162b97ce4a945feced27b6ea114366ff2ad

                                              SHA256

                                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                              SHA512

                                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                                              Filesize

                                              15KB

                                              MD5

                                              86c0af7d1147837594e83284fafa3ebc

                                              SHA1

                                              d550109a52241f343b956f5caa9c2fb4834ecd13

                                              SHA256

                                              8141c7c2c40dbae799bd6911d9216dd3f719523e45259f51d7399e00d0698cd2

                                              SHA512

                                              1fc28e5cd8573a7e0e585d0ff834367806fa94fdfa970394ece19d2fc47ab019aa85ee60d44c22d664469b47655bbecd9c63cd41c1cbacdacbc3a0df39051c80

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                                              Filesize

                                              11KB

                                              MD5

                                              b59f91364961a442b00bb96c96e45a04

                                              SHA1

                                              f4eda91e01522d2955d93c02473747d6197a435e

                                              SHA256

                                              4ee4fc1e5876e391a347788b3eb914f6674412fd443a9b1f14eba9626d52ea1b

                                              SHA512

                                              13eeeaf5044034d60171b37125e347d102dd14234d3b9df7715906221124c9189e0fc7d3584ae0b8458d216253b2c9d83d1d658fcbba3272946dec28b9af323a

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                                              Filesize

                                              10KB

                                              MD5

                                              11b2158fe28e04821b461791a991f76e

                                              SHA1

                                              93f0206211ffc0605657b7ce1d0d15c9e1f4ce3b

                                              SHA256

                                              b26697c9794e13952ebb3faba8f8e264c59ffb9bcd67f11e6e77f72ab5c14246

                                              SHA512

                                              47ed89df9f6b1b816e2c0454a6a554beddec178454e8413fffce2a96494d6aa55ec9e36df5a3098fbd053896a5679b7a78d40292d93c9995a3ca76d4758c7d19

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                                              Filesize

                                              10KB

                                              MD5

                                              1dea7365a9427f4665a016144f8b1051

                                              SHA1

                                              76b321478d8047b2a3fcf0893bd9bdea8ebfd579

                                              SHA256

                                              248ade1ad72973974f72ca3d19fd4ac15979420b64637e3a139c9503c94ddae9

                                              SHA512

                                              a3fb5406920c2f2a0d666eed0abd7535f6317ff8de1c28fef8237d841f08f5a706f1f31a2888e0cb85b8de2e5aef5f1cbd1151067f4f06d6abd37bbd709a4ce7

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                                              Filesize

                                              10KB

                                              MD5

                                              69d08ef1cc2db9299f3ef9ee714919ea

                                              SHA1

                                              fcf95e3fd9db72fc73e42e61099ebe303b2fedbb

                                              SHA256

                                              d81a78041a2242c4e931b7a7c25ea7bab2c242f5cfa451d582d43324671d37db

                                              SHA512

                                              a6a833c26416583f0048581e12d8ec92282e37b91db0584a439014e1766a77d1a6ef736d2d8f09acf7050f47af9c377b837bf8dc81f77d870b3c2fbaf53d3705

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                              Filesize

                                              376KB

                                              MD5

                                              3226d7b806dba0966f29870cf82379f9

                                              SHA1

                                              e8738fbe6f62da9c0218e2bef91553a7a847b455

                                              SHA256

                                              1c4dadf5eb53325ec18c461d1327f2f53bc650f513fc509e667ed2a57b807f90

                                              SHA512

                                              946602ecf2748437c51f1a19714cb86f2dabd8fda61b14f30edd5c6e73b27a19c212bd7f7bb132f743b9ef673e873eec8bce524697b2ac06d803ee2ad99f89d6

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                              Filesize

                                              3.0MB

                                              MD5

                                              2ffff10223164a268705d7244d40eb14

                                              SHA1

                                              82f4386841259ee1b4c7b7f2f01c29b4d9a744da

                                              SHA256

                                              90089bf10f3a87bc4a27c99c24789646b9275db2db372e385d93da2551a3932b

                                              SHA512

                                              abf7813a61b9e9786da97c27b0c73df4ac89bb0c979046dcd1f0b2a66d4483145403079a6b53d47fc45b025384252965b2f6e1ae0ec530789153bcf4e71b5b90

                                            • C:\Windows\System32\drivers\etc\hosts

                                              Filesize

                                              2KB

                                              MD5

                                              6e2386469072b80f18d5722d07afdc0b

                                              SHA1

                                              032d13e364833d7276fcab8a5b2759e79182880f

                                              SHA256

                                              ade1813ae70d7da0bfe63d61af8a4927ed12a0f237b79ce1ac3401c0646f6075

                                              SHA512

                                              e6b96f303935f2bbc76f6723660b757d7f3001e1b13575639fb62d68a734b4ce8c833b991b2d39db3431611dc2cacde879da1aecb556b23c0d78f5ee67967acb

                                            • \??\pipe\crashpad_4808_ITBZOKODCMJQLLJR

                                              MD5

                                              d41d8cd98f00b204e9800998ecf8427e

                                              SHA1

                                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                                              SHA256

                                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                              SHA512

                                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                            • memory/1732-37-0x0000000000400000-0x000000000066D000-memory.dmp

                                              Filesize

                                              2.4MB

                                            • memory/1732-1861-0x0000000000400000-0x000000000066D000-memory.dmp

                                              Filesize

                                              2.4MB

                                            • memory/1732-1858-0x0000000000400000-0x000000000066D000-memory.dmp

                                              Filesize

                                              2.4MB

                                            • memory/1756-156-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-148-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-120-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-1387-0x000000000B550000-0x000000000B5EC000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/1756-73-0x0000000002670000-0x00000000026A6000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/1756-74-0x0000000005310000-0x0000000005938000-memory.dmp

                                              Filesize

                                              6.2MB

                                            • memory/1756-127-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-95-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-96-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-75-0x0000000005000000-0x0000000005022000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/1756-76-0x00000000052A0000-0x0000000005306000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/1756-98-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-100-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-102-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-104-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-106-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-108-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-110-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-112-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-115-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-116-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-118-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-122-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-124-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-128-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-130-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-132-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-134-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-136-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-77-0x0000000005940000-0x00000000059A6000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/1756-87-0x0000000005AE0000-0x0000000005E34000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/1756-138-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-88-0x0000000005FA0000-0x0000000005FBE000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/1756-140-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-142-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-89-0x0000000005FD0000-0x000000000601C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/1756-146-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-1381-0x000000000B480000-0x000000000B512000-memory.dmp

                                              Filesize

                                              584KB

                                            • memory/1756-150-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-154-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-91-0x0000000009FA0000-0x000000000A1E2000-memory.dmp

                                              Filesize

                                              2.3MB

                                            • memory/1756-92-0x0000000006440000-0x00000000064DC000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/1756-94-0x000000000B990000-0x000000000BF34000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/1756-144-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/1756-152-0x0000000006440000-0x00000000064D8000-memory.dmp

                                              Filesize

                                              608KB

                                            • memory/3032-1866-0x00000000003E0000-0x00000000008A3000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3032-1864-0x00000000003E0000-0x00000000008A3000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3076-0-0x0000000000E60000-0x0000000001323000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3076-1-0x00000000778A4000-0x00000000778A6000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/3076-2-0x0000000000E61000-0x0000000000E8F000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/3076-3-0x0000000000E60000-0x0000000001323000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3076-4-0x0000000000E60000-0x0000000001323000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3076-17-0x0000000000E60000-0x0000000001323000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3636-21-0x00000000003E0000-0x00000000008A3000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3636-40-0x00000000003E0000-0x00000000008A3000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3636-18-0x00000000003E0000-0x00000000008A3000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3636-20-0x00000000003E0000-0x00000000008A3000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3636-19-0x00000000003E1000-0x000000000040F000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/3636-36-0x00000000003E0000-0x00000000008A3000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3636-39-0x00000000003E0000-0x00000000008A3000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3636-41-0x00000000003E0000-0x00000000008A3000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4208-1438-0x00000000003E0000-0x00000000008A3000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4208-1443-0x00000000003E0000-0x00000000008A3000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/5184-1901-0x000001E2FE950000-0x000001E2FE972000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/5424-2418-0x00000000006E0000-0x000000000099A000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/5424-2413-0x00000000006E0000-0x000000000099A000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/5424-2386-0x00000000006E0000-0x000000000099A000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/5424-2385-0x00000000006E0000-0x000000000099A000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/5424-2384-0x00000000006E0000-0x000000000099A000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/5456-1389-0x00000000003E0000-0x00000000003F0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/5456-1402-0x0000000005520000-0x000000000552A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/5656-1924-0x0000000000ED0000-0x000000000137F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/5656-1966-0x0000000000ED0000-0x000000000137F000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/5776-1960-0x0000000000100000-0x0000000000796000-memory.dmp

                                              Filesize

                                              6.6MB

                                            • memory/5776-1962-0x0000000000100000-0x0000000000796000-memory.dmp

                                              Filesize

                                              6.6MB