Resubmissions

12-12-2024 18:01

241212-wl692stqej 10

12-12-2024 17:50

241212-wep27a1rdy 10

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 17:50

General

  • Target

    2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe

  • Size

    3.0MB

  • MD5

    f00748070014e907402d3b74efe95914

  • SHA1

    f76796b85089b5265a8ef437317220d407f2e5a4

  • SHA256

    2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c

  • SHA512

    cf4854b3d016767b658baa8eafcf9f0d0737fa65c7595d652c0f684994797a562f79923b5da6b1d8492a68601bf2d4f56a877a53f3f25d9637ce3acadbeeec7f

  • SSDEEP

    24576:et1VZU2MT3LAObhxPYJfmcJiJZYY+o5wHE7TPoK9kJsH3QLx0m3+WfPss9Ax4UkO:2lWkODPeBHGV9lCAeEiIxF

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

https://covery-mover.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • XMRig Miner payload 13 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 27 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe
    "C:\Users\Admin\AppData\Local\Temp\2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3600
      • C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe
        "C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3400
        • C:\Program Files\Windows Media Player\graph\graph.exe
          "C:\Program Files\Windows Media Player\graph\graph.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:4812
      • C:\Users\Admin\AppData\Local\Temp\1014431001\AzVRM7c.exe
        "C:\Users\Admin\AppData\Local\Temp\1014431001\AzVRM7c.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Program Files\Windows Media Player\graph\graph.exe
          "C:\Program Files\Windows Media Player\graph\graph.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:4480
      • C:\Users\Admin\AppData\Local\Temp\1014432001\t5abhIx.exe
        "C:\Users\Admin\AppData\Local\Temp\1014432001\t5abhIx.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        PID:3604
      • C:\Users\Admin\AppData\Local\Temp\1014472001\e7913a27b1.exe
        "C:\Users\Admin\AppData\Local\Temp\1014472001\e7913a27b1.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3360
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 644
          4⤵
          • Program crash
          PID:5208
      • C:\Users\Admin\AppData\Local\Temp\1014473001\7f609a19ac.exe
        "C:\Users\Admin\AppData\Local\Temp\1014473001\7f609a19ac.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3888
          • C:\Windows\system32\mode.com
            mode 65,10
            5⤵
              PID:1376
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e file.zip -p24291711423417250691697322505 -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3524
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_7.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3512
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_6.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:760
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_5.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2208
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_4.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3084
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_3.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2852
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_2.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2864
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_1.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2316
            • C:\Windows\system32\attrib.exe
              attrib +H "in.exe"
              5⤵
              • Views/modifies file attributes
              PID:4572
            • C:\Users\Admin\AppData\Local\Temp\main\in.exe
              "in.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2768
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:5108
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:4472
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1264
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell ping 127.0.0.1; del in.exe
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:3052
                • C:\Windows\system32\PING.EXE
                  "C:\Windows\system32\PING.EXE" 127.0.0.1
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:292
        • C:\Users\Admin\AppData\Local\Temp\1014474001\1602af2572.exe
          "C:\Users\Admin\AppData\Local\Temp\1014474001\1602af2572.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Users\Admin\AppData\Local\Temp\1014474001\1602af2572.exe
            "C:\Users\Admin\AppData\Local\Temp\1014474001\1602af2572.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4496
        • C:\Users\Admin\AppData\Local\Temp\1014475001\5af378e97d.exe
          "C:\Users\Admin\AppData\Local\Temp\1014475001\5af378e97d.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:776
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:392
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:5000
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4932
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1272
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4412
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:2676
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:4724
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e08247f-fea0-45dd-96c2-48c0d02841c2} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" gpu
                  6⤵
                    PID:3984
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {33af2cc9-f242-42bb-87d6-676743af55ea} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" socket
                    6⤵
                      PID:1912
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3008 -childID 1 -isForBrowser -prefsHandle 2804 -prefMapHandle 2728 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {029da3a1-8c05-4584-a17f-487ea7eb9b0f} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" tab
                      6⤵
                        PID:456
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4048 -childID 2 -isForBrowser -prefsHandle 3140 -prefMapHandle 3936 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f913efa5-512d-401f-b902-900dc97d33a5} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" tab
                        6⤵
                          PID:4784
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4900 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4896 -prefMapHandle 4892 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {658e746d-4629-4196-9a0d-51f8a371d9a6} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" utility
                          6⤵
                          • Checks processor information in registry
                          PID:5532
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5328 -childID 3 -isForBrowser -prefsHandle 5372 -prefMapHandle 5364 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8cf6f997-7779-4a8c-a06c-8ea21f407247} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" tab
                          6⤵
                            PID:2624
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 4 -isForBrowser -prefsHandle 5640 -prefMapHandle 5388 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {716db009-c9de-440b-b5d7-a974896c9679} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" tab
                            6⤵
                              PID:392
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 5 -isForBrowser -prefsHandle 5776 -prefMapHandle 5780 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f767ad46-fe48-4316-9297-8c19c2be423e} 4724 "\\.\pipe\gecko-crash-server-pipe.4724" tab
                              6⤵
                                PID:1788
                        • C:\Users\Admin\AppData\Local\Temp\1014476001\e98cf22489.exe
                          "C:\Users\Admin\AppData\Local\Temp\1014476001\e98cf22489.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          PID:4252
                        • C:\Users\Admin\AppData\Local\Temp\1014477001\bdb4a0c65f.exe
                          "C:\Users\Admin\AppData\Local\Temp\1014477001\bdb4a0c65f.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5836
                        • C:\Users\Admin\AppData\Local\Temp\1014478001\d7a3449735.exe
                          "C:\Users\Admin\AppData\Local\Temp\1014478001\d7a3449735.exe"
                          3⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Checks processor information in registry
                          PID:5108
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014478001\d7a3449735.exe" & rd /s /q "C:\ProgramData\B1VKX4WLNYCB" & exit
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:4100
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 10
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Delays execution with timeout.exe
                              PID:2256
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 2092
                            4⤵
                            • Program crash
                            PID:5236
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:2116
                    • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:5316
                      • C:\Windows\explorer.exe
                        explorer.exe
                        2⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5332
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                        2⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4076
                        • C:\Windows\system32\PING.EXE
                          "C:\Windows\system32\PING.EXE" 127.1.10.1
                          3⤵
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Runs ping.exe
                          PID:5648
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5108 -ip 5108
                      1⤵
                        PID:3024
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3360 -ip 3360
                        1⤵
                          PID:5192
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:5512
                        • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          1⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:5632
                          • C:\Windows\explorer.exe
                            explorer.exe
                            2⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:6040
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                            2⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5860
                            • C:\Windows\system32\PING.EXE
                              "C:\Windows\system32\PING.EXE" 127.1.10.1
                              3⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:2164

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f

                          Filesize

                          153KB

                          MD5

                          f89267b24ecf471c16add613cec34473

                          SHA1

                          c3aad9d69a3848cedb8912e237b06d21e1e9974f

                          SHA256

                          21f12abb6de14e72d085bc0bd90d630956c399433e85275c4c144cd9818cbf92

                          SHA512

                          c29176c7e1d58dd4e1deafcbd72956b8c27e923fb79d511ee244c91777d3b3e41d0c3977a8a9fbe094bac371253481dde5b58abf4f2df989f303e5d262e1ce4d

                        • C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip

                          Filesize

                          120KB

                          MD5

                          53e54ac43786c11e0dde9db8f4eb27ab

                          SHA1

                          9c5768d5ee037e90da77f174ef9401970060520e

                          SHA256

                          2f606d24809902af1bb9cb59c16a2c82960d95bff923ea26f6a42076772f1db8

                          SHA512

                          cd1f6d5f4d8cd19226151b6674124ab1e10950af5a049e8c082531867d71bfae9d7bc65641171fd55d203e4fba9756c80d11906d85a30b35ee4e8991adb21950

                        • C:\Program Files\Windows Media Player\graph\graph.exe

                          Filesize

                          245KB

                          MD5

                          7d254439af7b1caaa765420bea7fbd3f

                          SHA1

                          7bd1d979de4a86cb0d8c2ad9e1945bd351339ad0

                          SHA256

                          d6e7ceb5b05634efbd06c3e28233e92f1bd362a36473688fbaf952504b76d394

                          SHA512

                          c3164b2f09dc914066201562be6483f61d3c368675ac5d3466c2d5b754813b8b23fd09af86b1f15ab8cc91be8a52b3488323e7a65198e5b104f9c635ec5ed5cc

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

                          Filesize

                          854B

                          MD5

                          e935bc5762068caf3e24a2683b1b8a88

                          SHA1

                          82b70eb774c0756837fe8d7acbfeec05ecbf5463

                          SHA256

                          a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

                          SHA512

                          bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          717B

                          MD5

                          822467b728b7a66b081c91795373789a

                          SHA1

                          d8f2f02e1eef62485a9feffd59ce837511749865

                          SHA256

                          af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                          SHA512

                          bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                          Filesize

                          2KB

                          MD5

                          2898acd1978994db9a85aaa95fb0f0f2

                          SHA1

                          f5615b7436e357bea3e5c2f67acea81f65b62ffd

                          SHA256

                          557859d9c034e43608dc8a7c295ab02faf4ae295ed46e2129875b1548de7afd1

                          SHA512

                          e7cacf4830d3ed0d2a74d2f7c55adf9b6551bd4932d2bed5747747e2a98764db121fbbf7e226fe84a70123668cc944492ca2e99ca5e0daddd2f204e0ee45962d

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                          Filesize

                          1KB

                          MD5

                          84525ac2c52cedf67aa38131b3f41efb

                          SHA1

                          080afd23b33aabd0285594d580d21acde7229173

                          SHA256

                          ae524d9d757bed48d552b059f951ffd25a7d963ae44a554cb1f3a9641e524080

                          SHA512

                          d898b0913b4005bbbf22a5457ad1e86345860868bc2e53187ad8267c07824d592160a27d850978ebfe78392db784fffb80b73e27418d3a71708383d738ea1d57

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_19CA6F55DA8A3B0AB12F649B745C90D5

                          Filesize

                          471B

                          MD5

                          f82d5aca5ed5100b9c82259f5c97bd5f

                          SHA1

                          c5fe6c4d597a84244e0330d53887d7865bc8d430

                          SHA256

                          8484447947db2ae840af4235ae99c704d8048091b0a71f098d18d755759d7178

                          SHA512

                          5a9f1b0cba4a1c6974a1d3929c4cf4d6c2b11041bc61cdeac68f8f5915bc19bf56e589b1a8739c8ff3cd4a6e7912405b35bd7f6dbd5ce66dfd465163d638ef47

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\830ED50B5D4DDC13B182D34609C771F0_75BA9E25504A3532329AC3680ECDD7FB

                          Filesize

                          2KB

                          MD5

                          d1ecf994eaf6a862a90f5cf0463286ef

                          SHA1

                          a2e7a05b2fd445c96658bfaa2a63d14ebc0c9909

                          SHA256

                          da3c461b3bceaa846eb1a41c5a22638e71401ae47e5f3163f254f858a8782697

                          SHA512

                          50a05adc15cfd930a9b1acec49b0ebd5d7b06243f39742b91227ae5e22287b16e949664ff47c7edb3894b1ea3b9ecb3149b5cf7b286ea38d34aa314196044b3e

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_6F7C58D8F5DC37AD0C4A3BEB81BE1660

                          Filesize

                          472B

                          MD5

                          c63ea05972017bcdd1beb71283b91587

                          SHA1

                          9fa26197d0eff7832e4cb81991713cac35ae5e35

                          SHA256

                          ce02e101910f3b706cd4a36936408bd1cf065a7beae18716d9ce31991b647e10

                          SHA512

                          8d89edc92a6a8d02e6491275e3e5a846f98bef077ca0aea352d4de45a79138d1e8fc26c310a37b50cfb4d746f7864747e3b0c98a89aa195fb58449bd72b7a985

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D73CE810F817D372CC78C5824C36E338

                          Filesize

                          504B

                          MD5

                          7534282617c6278db5ebc9da5b2c673b

                          SHA1

                          4d804a0a0e7c4f0ab1791e9c68c58833d7fc7811

                          SHA256

                          2904a768575e22df734148cd01c687a5dd23a6d2b378ad3a972f6e7f38fa77cc

                          SHA512

                          c45746c38c1e8f0d694a05ef0785070b4f7e3df34a264a3693983d555232bc7b61e78e24187fce8e093448d1724f1226afc3baf262860ad75f076bf57f5929a0

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

                          Filesize

                          1KB

                          MD5

                          84db952034efdd2af0e2869638c749d2

                          SHA1

                          9ed0d93316637cd9f61e991229cba9bfdabec6e7

                          SHA256

                          599734f57fe4ac8c782f546264aa691d954696dc40961b411debebe036634df7

                          SHA512

                          5cae7c4b72f889aa099a55c0c107cb80c6773be030a8f914504633d0f27934eb524191704719cd17718f4172dd4bd059c9f74652c3a395fa250aa4802dffed65

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

                          Filesize

                          170B

                          MD5

                          673a93af93e8dadf088c712b2365fe07

                          SHA1

                          fbfb9e482d362daf2b4be52b5e9f1dfa5da4d2af

                          SHA256

                          705037af2b75696c53b70d9598ef7264d81182a32d532615498ab7181c62828f

                          SHA512

                          8bc529e3675ca789a002e3b436ab017e4bffabd8cd34d9aa78686e70718bf7e9c659720d4f60284dbf77ee9d08e7dbd76fb35d1d9db28d97d473bfd9654591a1

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          192B

                          MD5

                          6d17198e2bd09fc9c4a4f3339f6ff8df

                          SHA1

                          4df205db6adfc39b7ccbbb85af9bddbf7878b297

                          SHA256

                          0ca2b4a99194cf059558c77efc1a9c11790589b8ee63ccbcd982f872a5b68067

                          SHA512

                          d7855cb5b602fca7fff44cb1aa1c5f111ce2ce46804d58389e69a80464ebc4d7f36f7e9db262544271c66a519b57415c08cd3212cdf33eac469ac9f5515588eb

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                          Filesize

                          450B

                          MD5

                          b1e52829ce02ceab5716170f6766af02

                          SHA1

                          429a3461f3405b73369ead946a21cace8069dd92

                          SHA256

                          91570f35f47164637973e3e57574b45efa415df05b3b9fd0f6b795590dec46d1

                          SHA512

                          b1a7522b186c4d79edc214b65ad5bf5ddbc177c87d642accf863a9d26aaa9cb9fff83411dd49964f11f5dd883169bfe6e9a6a02567ce919c8235c8f849b1b7b7

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                          Filesize

                          410B

                          MD5

                          d1d9d27048d3c32fbcfc9537f02b74ca

                          SHA1

                          12acef8279cfc09348d269cb0f32d22e0b1bf990

                          SHA256

                          33688453abe857903c4815059de4a88df9203f95c661c4243609517f04d36dc9

                          SHA512

                          a4af8e36429173858aa8857396c062f5119ed42bf49774f0d6c7afe7b4c5afbe3fb044797cd718c4582aa65f67a8ff0a73a8198e919d6281bd954954656875a5

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_19CA6F55DA8A3B0AB12F649B745C90D5

                          Filesize

                          402B

                          MD5

                          fdc1d0f2b8cd9c6f235836c48a59d496

                          SHA1

                          092759bffd064cec4c08f7eaa13e885624c4e538

                          SHA256

                          a607e5ded0132fc64090dc3f0dee2d8dfbc738fc42a8ca118db28edc7f810051

                          SHA512

                          80a7902942843182f57ed182ab4e921c56510a183c507351b41a60228ce2a10264e89502f7a1eb33e385ef3cb4bd18a5444c78ff8e6a5c28effca8f2d0e75b7d

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\830ED50B5D4DDC13B182D34609C771F0_75BA9E25504A3532329AC3680ECDD7FB

                          Filesize

                          474B

                          MD5

                          914587fba3dcde0fd13ae79474b0e013

                          SHA1

                          e27f77e6ba69d402139d2cddbb1dbc958700c481

                          SHA256

                          bf0e12b048df6a572b4f4373ac48b23a590ed0fb418120cd41445ac0c2b40522

                          SHA512

                          1d1147a647730595d80353cae9d1b00cb8f78ea54e9689e7a48290f381ae2738f8e19e64db8dc99e9bb723c3b232f6a9c3f54407c926de9b69d263c715ca8a4c

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_6F7C58D8F5DC37AD0C4A3BEB81BE1660

                          Filesize

                          398B

                          MD5

                          befa509b0a9a945719288d69afd490a8

                          SHA1

                          4d715cd3390fdd8ee863f5a8e22e4b0ffd5dcc00

                          SHA256

                          5044e0c72f7d5389567d28d9ec917c0c5e4bcb00cc79c5b84a5a194cc52a0992

                          SHA512

                          0ee6270e7c09a1df532eca8a3894a3368ac72ddf8e6c5f45927dea0e9d8ca6a5d8ce344a34eeb03006722d141fb6e32b28559685fdd7506567e6f4c86ee617c9

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D73CE810F817D372CC78C5824C36E338

                          Filesize

                          550B

                          MD5

                          c2950d67d375e7068163ef823accea72

                          SHA1

                          887d4bc107391e45cb36876e84b11b5707602ec7

                          SHA256

                          6fd430d9d6f365be609d4cc1b0e82e03bea5bad7b465e5a7fcc573278c3fcdaf

                          SHA512

                          d6266b46dd48b784621b98c8201b0f17a090851b6c371bcb1e0a07cbe5b06c184c2e08bb3f700bfe0b6bb19f32da8c26f1ab262b16256b6b0c0abd015685d790

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

                          Filesize

                          458B

                          MD5

                          50e6f95dd222b426129ee3a5f6e8dc6a

                          SHA1

                          2d67d7bbd878c700e94af468c768d5f902616028

                          SHA256

                          8fbc8db532e00ac7510d79bf446e6db2be78a919622f3f5400e9563486072c91

                          SHA512

                          0dfbc418aff98c67a7ae2f4023b4495b1f252a22197950f6dbd8737bf083f31a17a022fdd22b1f9400515d27140468baac4d7295e76b488f4ef36598b89cd9de

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\P2UT3MS5\download[1].htm

                          Filesize

                          1B

                          MD5

                          cfcd208495d565ef66e7dff9f98764da

                          SHA1

                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                          SHA256

                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                          SHA512

                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json.tmp

                          Filesize

                          19KB

                          MD5

                          ddfed1630614cbebbc1eaa2eab8a5c51

                          SHA1

                          28069f6acabb37e2120f7591544ce8312e0b7167

                          SHA256

                          d90927a52b16c566a6a68c6184be16663c805d3fd5e5bf7bc825e2623df5f73a

                          SHA512

                          8dc4695ee1effcf8929470b3fca761ccfcd529abf250828513c950921a5623f853de505047686606e6da577b653c32790ec858b3429730d705727ec64aa78a8c

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                          Filesize

                          13KB

                          MD5

                          a56261740c795795a419594f53a43eaa

                          SHA1

                          d045a93c1646f2d63ae7bcd02ce328a7a6ac1350

                          SHA256

                          dd50efed6dab911043dab9750001e855ec89eee5272b4d9c396d88803f0cf3e2

                          SHA512

                          58b4680e5eb3d0a4c0f6c9102355ece76747462b7f2071efd4ca14d3fb57a46a90d3dded88f766e69bc6ffef83ec7287fa458e6d33788ef2052d6766a9d7d5f8

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                          Filesize

                          15KB

                          MD5

                          96c542dec016d9ec1ecc4dddfcbaac66

                          SHA1

                          6199f7648bb744efa58acf7b96fee85d938389e4

                          SHA256

                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                          SHA512

                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                        • C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe

                          Filesize

                          591KB

                          MD5

                          3567cb15156760b2f111512ffdbc1451

                          SHA1

                          2fdb1f235fc5a9a32477dab4220ece5fda1539d4

                          SHA256

                          0285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630

                          SHA512

                          e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba

                        • C:\Users\Admin\AppData\Local\Temp\1014472001\e7913a27b1.exe

                          Filesize

                          1.8MB

                          MD5

                          659b475361502e4bb93cb3978d0d69c6

                          SHA1

                          9b4db8cab515e22350a6de83e9b892e9376fd391

                          SHA256

                          9cd587e74a90f572286c6606c8d0dd40c5053aab867b5347c2499e5338a46b2d

                          SHA512

                          6b31ca314b6c4268703197bdcc093fde7cfa50d2ea8461a9fe83ee7da1d2ea0bfedf13dab4c4cfecddd1bb172990cd19f1d0714324c58ec0d3a61f8ad8f1491f

                        • C:\Users\Admin\AppData\Local\Temp\1014473001\7f609a19ac.exe

                          Filesize

                          4.2MB

                          MD5

                          3a425626cbd40345f5b8dddd6b2b9efa

                          SHA1

                          7b50e108e293e54c15dce816552356f424eea97a

                          SHA256

                          ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                          SHA512

                          a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                        • C:\Users\Admin\AppData\Local\Temp\1014474001\1602af2572.exe

                          Filesize

                          710KB

                          MD5

                          28e568616a7b792cac1726deb77d9039

                          SHA1

                          39890a418fb391b823ed5084533e2e24dff021e1

                          SHA256

                          9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                          SHA512

                          85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                        • C:\Users\Admin\AppData\Local\Temp\1014475001\5af378e97d.exe

                          Filesize

                          948KB

                          MD5

                          774aaeba533c7fbed25569813c934b60

                          SHA1

                          b5b428262354db7555e6b1eb8de765394fa30a4e

                          SHA256

                          3d3cdb426deec40320c790b8ec5d379b530534a81a4c412c356d1578bda747f7

                          SHA512

                          6f64461b7e46fab134476e0eebf0b4f94820eaa7aec911d7452d8fa20b5f4f38e2ea3deb5fc2f7f7a151c3e93dc54a27628c929b72490765eb5e07b92a64ab5e

                        • C:\Users\Admin\AppData\Local\Temp\1014476001\e98cf22489.exe

                          Filesize

                          1.7MB

                          MD5

                          4e1aeb2af7f03489910191a52ca62e9d

                          SHA1

                          19aa302c12320006830d98435904f87dbb6fda37

                          SHA256

                          8542a31a1ac10834026660ffab1ceb88d1cf399a802f63bdca797750b7819004

                          SHA512

                          a7b04afc4dd5943ba821c4daf9ec234a00889a5300bc7726f44df79c163b13b3db579943d1e8629cfd952c89f1e0debd0060e80daab0c1fb5bd0acd15ab34dc1

                        • C:\Users\Admin\AppData\Local\Temp\1014477001\bdb4a0c65f.exe

                          Filesize

                          2.7MB

                          MD5

                          dfa1d74fad6aef6a4c1fd736ccd95585

                          SHA1

                          f4766bee65c0fcaa31b76b8aed2e90f2580eeb5e

                          SHA256

                          2991aa056bee31bcc643575cf2e574785d6a1c326f290a8dd6fd325a3aa9d17b

                          SHA512

                          7a571fdbc53be01191087db37486e93d1d31f300ef17cc8708f2c94d77f26391f7772ade662aac57e64b2bd5df01fdf007c396db4549c79247fe00b9ed650966

                        • C:\Users\Admin\AppData\Local\Temp\1014478001\d7a3449735.exe

                          Filesize

                          384KB

                          MD5

                          dfd5f78a711fa92337010ecc028470b4

                          SHA1

                          1a389091178f2be8ce486cd860de16263f8e902e

                          SHA256

                          da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

                          SHA512

                          a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lamujnab.z2k.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                          Filesize

                          3.0MB

                          MD5

                          f00748070014e907402d3b74efe95914

                          SHA1

                          f76796b85089b5265a8ef437317220d407f2e5a4

                          SHA256

                          2c822ca7c7bd7975474d0d8049a0116f9adbca9edc9af681971aa236a2e0976c

                          SHA512

                          cf4854b3d016767b658baa8eafcf9f0d0737fa65c7595d652c0f684994797a562f79923b5da6b1d8492a68601bf2d4f56a877a53f3f25d9637ce3acadbeeec7f

                        • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                          Filesize

                          1.6MB

                          MD5

                          72491c7b87a7c2dd350b727444f13bb4

                          SHA1

                          1e9338d56db7ded386878eab7bb44b8934ab1bc7

                          SHA256

                          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                          SHA512

                          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                          Filesize

                          458KB

                          MD5

                          619f7135621b50fd1900ff24aade1524

                          SHA1

                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                          SHA256

                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                          SHA512

                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                          Filesize

                          2.2MB

                          MD5

                          579a63bebccbacab8f14132f9fc31b89

                          SHA1

                          fca8a51077d352741a9c1ff8a493064ef5052f27

                          SHA256

                          0ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0

                          SHA512

                          4a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                          Filesize

                          1.7MB

                          MD5

                          5659eba6a774f9d5322f249ad989114a

                          SHA1

                          4bfb12aa98a1dc2206baa0ac611877b815810e4c

                          SHA256

                          e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                          SHA512

                          f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                          Filesize

                          1.7MB

                          MD5

                          5404286ec7853897b3ba00adf824d6c1

                          SHA1

                          39e543e08b34311b82f6e909e1e67e2f4afec551

                          SHA256

                          ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                          SHA512

                          c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                          Filesize

                          1.7MB

                          MD5

                          5eb39ba3698c99891a6b6eb036cfb653

                          SHA1

                          d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                          SHA256

                          e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                          SHA512

                          6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                          Filesize

                          1.7MB

                          MD5

                          7187cc2643affab4ca29d92251c96dee

                          SHA1

                          ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                          SHA256

                          c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                          SHA512

                          27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                          Filesize

                          1.7MB

                          MD5

                          b7d1e04629bec112923446fda5391731

                          SHA1

                          814055286f963ddaa5bf3019821cb8a565b56cb8

                          SHA256

                          4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                          SHA512

                          79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                          Filesize

                          1.7MB

                          MD5

                          0dc4014facf82aa027904c1be1d403c1

                          SHA1

                          5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                          SHA256

                          a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                          SHA512

                          cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                          Filesize

                          3.3MB

                          MD5

                          cea368fc334a9aec1ecff4b15612e5b0

                          SHA1

                          493d23f72731bb570d904014ffdacbba2334ce26

                          SHA256

                          07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                          SHA512

                          bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                        • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                          Filesize

                          3.3MB

                          MD5

                          045b0a3d5be6f10ddf19ae6d92dfdd70

                          SHA1

                          0387715b6681d7097d372cd0005b664f76c933c7

                          SHA256

                          94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                          SHA512

                          58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                        • C:\Users\Admin\AppData\Local\Temp\main\in.exe

                          Filesize

                          1.7MB

                          MD5

                          83d75087c9bf6e4f07c36e550731ccde

                          SHA1

                          d5ff596961cce5f03f842cfd8f27dde6f124e3ae

                          SHA256

                          46db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f

                          SHA512

                          044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a

                        • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                          Filesize

                          440B

                          MD5

                          3626532127e3066df98e34c3d56a1869

                          SHA1

                          5fa7102f02615afde4efd4ed091744e842c63f78

                          SHA256

                          2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                          SHA512

                          dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          479KB

                          MD5

                          09372174e83dbbf696ee732fd2e875bb

                          SHA1

                          ba360186ba650a769f9303f48b7200fb5eaccee1

                          SHA256

                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                          SHA512

                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                          Filesize

                          13.8MB

                          MD5

                          0a8747a2ac9ac08ae9508f36c6d75692

                          SHA1

                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                          SHA256

                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                          SHA512

                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin

                          Filesize

                          18KB

                          MD5

                          81cc613d2c21c82cdfcd7165ace5c510

                          SHA1

                          807b57ed025433eb8902fabb68d2a04b3f204ccb

                          SHA256

                          d456578e43955d6f5c31a49f151482b2b4ef2056c9536fbc53a8b7e182cffeb7

                          SHA512

                          afe7f525839807d7bc4ab8c1f12d31ec8df3d40f2743ba1555babd181d873c2ca3acfe4b874020ff715c2ff8428fe37c1f76f4c123c553f92a0fae3986ae5a49

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin

                          Filesize

                          8KB

                          MD5

                          23bfe872ef446a8a4240e45b389d0f78

                          SHA1

                          9510c8fb00a2301983bdb21d6dc7ce7de598fb50

                          SHA256

                          064d8aa418e2df18283e22d937bb762e41e593cc07194888c44d8d44c7ac1016

                          SHA512

                          aa42f32a129e2239772cdcc271477356e1e303b582230348f2045118f87afaae5088c6692ca923de4c36dab12b8db2e619da4548b12d63c1481e308055bae551

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin

                          Filesize

                          10KB

                          MD5

                          4084f83b7889c34b2b1baf6e2596a01b

                          SHA1

                          a9091cfd2caab67b3141d53bb6da3a9af1e51cec

                          SHA256

                          6dc42a280c097fd43bc850995785081cfe0242376b3460a45e966e9493cbe196

                          SHA512

                          661ba48771bf027e02238d866cc695f9e71d5fe2d5653687ff420e72fde557b3a9bd101ca06061f13e2c224cb007380c390a59b9c866f027de7715373a2d1c24

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          055d1c7af7b8aac662d96171f894297c

                          SHA1

                          29c35e84e2ac4734be8abb050e43f248376efeae

                          SHA256

                          35ec80df817699407dec5f6f3f47bf2645b1e1db9610c63c525aa74af63af318

                          SHA512

                          2c6ea11d4b991df0629d8b8b792e15a01deb6e46a614464711a6c12c29f8997028e7ffdcfca9c4dec2e1f26a4a6c9a711fbfc86edcf7a65bfb0ed2792303403e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          5KB

                          MD5

                          c9e134c9e1275256fb9e4629768287b9

                          SHA1

                          2486bd04c193c4ea9234e97d698a335eae42a02d

                          SHA256

                          b8ef318f27414aa234cb85b9209d071e25c133013129e525ffe9d5452b296780

                          SHA512

                          64c3b5b30792bb7ecaf9392081df8078f71bb38f69cdd5abebfcccdec6ffa89c7a19e5e3c64ee6af4510dc72aaa9aa8ccef4af1ebd1ac70d9db90d01cfe0c5d3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          e7ab7eda5d59f22209b3256e2595c11e

                          SHA1

                          d521ed00516d271d3a23109409b5b8704b8ff0c2

                          SHA256

                          4772e192645c4f1443a997f1c1bb16a142162ea3f2a757596675d4316903ad8b

                          SHA512

                          1ff57a3b84eda2d3a18dcc8179c85fb58cc1d84730afde91d934952575392a4522b806724279b7f58d52d5f0fdaf24f120153ad860da9efb7cc0fdb4a9452925

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          6KB

                          MD5

                          34e7738306f8ae0af8b66256a71da124

                          SHA1

                          87cfc7a163da477dbf50d18e340f0c92567948c0

                          SHA256

                          bffcc92caf6d0e363efe01c96aa5c4cf76bf0d4211c218291b47d66d65998ed4

                          SHA512

                          d10367da3051b4a415555fbe736027c214522177ef7dd146874a13dc9086c891f7822d77554e4e24df32528033598bbb07dd34949f682befc19c6bc77246548f

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\0ae47108-0334-4dd3-8c2a-bdd44c2340e8

                          Filesize

                          26KB

                          MD5

                          3037a1bb65ff1bbca69e9606d89f4f78

                          SHA1

                          b9116d5af9179d324d9e26501be53ffaa371621f

                          SHA256

                          90ec1d04fcb3bddfa1745d35098377a307f9a77c70154d4426b43e3b8e6d1c29

                          SHA512

                          00809d71f9a095ba254b34dac4ac46faba595e47b49659242f11aa0a0a6b4d379b8ac78c303f83c32eee394ffc6a0d86c00d46fdef5b87c10aa16c934c5d4cb0

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\460c2ebe-440b-4866-a894-ae05d3b84e45

                          Filesize

                          671B

                          MD5

                          4694662fc3d357fd45253182c31c50e1

                          SHA1

                          1427d0c1adc0e0e922f95c50175a94a97cb96add

                          SHA256

                          ef1168c57c71aa6d8d8d6d0f15609fbed92099ae255219264638a684f0a0576f

                          SHA512

                          526131f92c1938c25ccec44edb6dec4e43021e4b486a591d4286273a38c56de95a062429d95d9a5c5b773a81009e1ba618faedd0141b557b75fa8d094d2d4f41

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\83f0d422-8b00-4931-b9a8-ace10684470c

                          Filesize

                          982B

                          MD5

                          39ed82e2cd73f15d855dd926dfba12a4

                          SHA1

                          407c29ceba16c10007c168b5db612e6edc1037d0

                          SHA256

                          2193acf2cb1fa1ce5f40c5e6a86214036d63f9e8f6763780392183a579eb9bf9

                          SHA512

                          51b1afc3fe93daad95971c0e272a1105a9499eb81b39360df3263142ae5e7f4e5ff34807bd4afa75380fa4e576da537243bfd1cfebf668cd297a55f98f88414c

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                          Filesize

                          1.1MB

                          MD5

                          842039753bf41fa5e11b3a1383061a87

                          SHA1

                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                          SHA256

                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                          SHA512

                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          2a461e9eb87fd1955cea740a3444ee7a

                          SHA1

                          b10755914c713f5a4677494dbe8a686ed458c3c5

                          SHA256

                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                          SHA512

                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                          Filesize

                          372B

                          MD5

                          bf957ad58b55f64219ab3f793e374316

                          SHA1

                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                          SHA256

                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                          SHA512

                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                          Filesize

                          17.8MB

                          MD5

                          daf7ef3acccab478aaa7d6dc1c60f865

                          SHA1

                          f8246162b97ce4a945feced27b6ea114366ff2ad

                          SHA256

                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                          SHA512

                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                          Filesize

                          10KB

                          MD5

                          44f8623c483bc3939ead6a6bd8edf0fa

                          SHA1

                          6bc47ef2dbb1d696e3018e2e241ecd1742057e1f

                          SHA256

                          b70a5b1058fcf9a7a6557e3d1a83f3dd4f60e394cc03a892344fd0b8b052d775

                          SHA512

                          4fed927558d6880b19d3ef7ae0e14e6872c8509a4f179007efb7dfd47a965fd14585b758950bd4f4af81a88cce12919c6e0c5c57dbb5c477724b0fc050c37085

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                          Filesize

                          15KB

                          MD5

                          b88ca283dc84bdda4181118b7313a4fd

                          SHA1

                          aa862ac6fa83fe0c1fa521b3a009e26e7b71a73f

                          SHA256

                          0e03e0846489b00f85979d708915b976ab0ec3748efad9cf7cfea96c5f7e8d8a

                          SHA512

                          eb8805cdf55c9a5faf42eb97df3cd4a2d2b76b6ef5effb3e735aadb04de2b9833c8f28bca02e41b23cfc37e471730c75ef511e862729fca0239761666454e3ff

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs.js

                          Filesize

                          10KB

                          MD5

                          c24cfa12c04c2a51386b08b08d3d25e8

                          SHA1

                          8ae7b50b15df68892e321b7b599e2bf11a7d65c4

                          SHA256

                          2c44f524ebe8e2b8b3586f57bd9f23f4264528d6758f38b7488199079a66e692

                          SHA512

                          fc06923ffd09b0120563ab4369f7e5794d77b329a761c7434e62a147d85308ec88e2b818240251e82e9f8d9eab17243121ffee1ad25e1f676ba5c0f515fb2176

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs.js

                          Filesize

                          12KB

                          MD5

                          9b19ab059a21e4559f57b37629e447af

                          SHA1

                          44b2e7c66d0ba6797f8e78b5ba80304811864387

                          SHA256

                          212fb9cf6d7f442fe3b5d57ca0ebbe334b175c270b8420f2b83e808a3b03ca3d

                          SHA512

                          2f25a179f509249cf9f29fb56aec877b5123bad0e8d28ec98137688663eb9302d2eeafc8e770ea4344e32d647930ebd37affc7dfd0eae3123009ebda6fec06e2

                        • memory/1056-2-0x0000000000131000-0x0000000000199000-memory.dmp

                          Filesize

                          416KB

                        • memory/1056-19-0x0000000000131000-0x0000000000199000-memory.dmp

                          Filesize

                          416KB

                        • memory/1056-0-0x0000000000130000-0x000000000043E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/1056-18-0x0000000000130000-0x000000000043E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/1056-3-0x0000000000130000-0x000000000043E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/1056-1-0x0000000077584000-0x0000000077586000-memory.dmp

                          Filesize

                          8KB

                        • memory/1056-4-0x0000000000130000-0x000000000043E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2116-699-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2116-706-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2768-286-0x00007FF7003F0000-0x00007FF700880000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/2768-288-0x00007FF7003F0000-0x00007FF700880000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3052-312-0x000001925D130000-0x000001925D152000-memory.dmp

                          Filesize

                          136KB

                        • memory/3360-160-0x0000000000400000-0x0000000000C5D000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/3360-266-0x0000000000400000-0x0000000000C5D000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/3360-685-0x0000000000400000-0x0000000000C5D000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/3360-796-0x0000000000400000-0x0000000000C5D000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/3360-177-0x0000000010000000-0x000000001001C000-memory.dmp

                          Filesize

                          112KB

                        • memory/3360-805-0x0000000000400000-0x0000000000C5D000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/3600-765-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-21-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-3421-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-3420-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-3419-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-3418-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-3416-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-16-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-3385-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-3379-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-2731-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-318-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-1114-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-20-0x0000000000391000-0x00000000003F9000-memory.dmp

                          Filesize

                          416KB

                        • memory/3600-22-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-41-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-72-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-73-0x0000000000391000-0x00000000003F9000-memory.dmp

                          Filesize

                          416KB

                        • memory/3600-808-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-74-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3600-175-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4252-336-0x0000000000560000-0x0000000000BF6000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/4252-352-0x0000000000560000-0x0000000000BF6000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/4496-289-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB

                        • memory/4496-290-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB

                        • memory/5108-799-0x0000000000400000-0x000000000064B000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/5316-728-0x00007FF7B9C30000-0x00007FF7BA0C0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/5316-715-0x00007FF7B9C30000-0x00007FF7BA0C0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/5332-717-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/5332-726-0x0000000002710000-0x0000000002730000-memory.dmp

                          Filesize

                          128KB

                        • memory/5332-716-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/5332-720-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/5332-721-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/5332-722-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/5332-725-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/5332-719-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/5332-729-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/5332-727-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/5332-718-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/5332-723-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/5512-3390-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/5512-3386-0x0000000000390000-0x000000000069E000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/5632-3388-0x00007FF7B9C30000-0x00007FF7BA0C0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/5632-3403-0x00007FF7B9C30000-0x00007FF7BA0C0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/5836-764-0x00000000005D0000-0x0000000000886000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5836-762-0x00000000005D0000-0x0000000000886000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5836-763-0x00000000005D0000-0x0000000000886000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5836-811-0x00000000005D0000-0x0000000000886000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5836-807-0x00000000005D0000-0x0000000000886000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/6040-3404-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/6040-3402-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/6040-3400-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB