Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-12-2024 01:13

General

  • Target

    172e1e49642648745fefdbebd4c76c41049a4f0edd14eeb7904b709f0add5cbc.exe

  • Size

    3.0MB

  • MD5

    4873dec39296c80c3863e04149e492bb

  • SHA1

    4ceb2e1553a82ac5f05cefc8c1b688e768c92de3

  • SHA256

    172e1e49642648745fefdbebd4c76c41049a4f0edd14eeb7904b709f0add5cbc

  • SHA512

    c827eaf7b8910fdc5d5d9a2d51611573b49a4fffb6fc37cc9279d77f1d05071f0b862dd11b65a69b6ca351a4c1876bee77630e5a8a1c05f806cb7e474969e92c

  • SSDEEP

    24576:nmtolFr9W3FS3YTpWs3MSWHyf8CnGSSfXFm7a8D1UeyeI6/Dg6ZPpemIFHxe+ASn:mto783LTVv8y9L7an2gH7txMRcSp+9

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • XMRig Miner payload 10 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 24 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 10 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\172e1e49642648745fefdbebd4c76c41049a4f0edd14eeb7904b709f0add5cbc.exe
    "C:\Users\Admin\AppData\Local\Temp\172e1e49642648745fefdbebd4c76c41049a4f0edd14eeb7904b709f0add5cbc.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Users\Admin\AppData\Local\Temp\1015003001\cd1e07990a.exe
        "C:\Users\Admin\AppData\Local\Temp\1015003001\cd1e07990a.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2200
      • C:\Users\Admin\AppData\Local\Temp\1015004001\36aab54077.exe
        "C:\Users\Admin\AppData\Local\Temp\1015004001\36aab54077.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4880
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2484
          • C:\Windows\system32\mode.com
            mode 65,10
            5⤵
              PID:1848
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e file.zip -p24291711423417250691697322505 -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4684
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_7.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3340
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_6.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4312
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_5.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4036
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_4.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3784
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_3.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:5068
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_2.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1836
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_1.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3556
            • C:\Windows\system32\attrib.exe
              attrib +H "in.exe"
              5⤵
              • Views/modifies file attributes
              PID:3588
            • C:\Users\Admin\AppData\Local\Temp\main\in.exe
              "in.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3740
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:3524
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:4272
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:3912
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell ping 127.0.0.1; del in.exe
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4944
                • C:\Windows\system32\PING.EXE
                  "C:\Windows\system32\PING.EXE" 127.0.0.1
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:856
        • C:\Users\Admin\AppData\Local\Temp\1015005001\83998c9116.exe
          "C:\Users\Admin\AppData\Local\Temp\1015005001\83998c9116.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2896
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4812
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3744
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3656
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4336
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1632
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:624
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:3228
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cdaf91d4-b615-4f9b-a427-28ec8b4646bd} 3228 "\\.\pipe\gecko-crash-server-pipe.3228" gpu
                  6⤵
                    PID:2584
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee48c5ba-bdfa-494f-b967-9f7caf016fb3} 3228 "\\.\pipe\gecko-crash-server-pipe.3228" socket
                    6⤵
                      PID:3440
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2700 -childID 1 -isForBrowser -prefsHandle 3096 -prefMapHandle 3092 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {66fbd5f0-9889-4eb4-bfd5-4dd2c0983f44} 3228 "\\.\pipe\gecko-crash-server-pipe.3228" tab
                      6⤵
                        PID:1452
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3732 -childID 2 -isForBrowser -prefsHandle 3756 -prefMapHandle 3752 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9044bd93-4080-48cf-ab77-dcc8a161dd23} 3228 "\\.\pipe\gecko-crash-server-pipe.3228" tab
                        6⤵
                          PID:2132
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4808 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4800 -prefMapHandle 4796 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2174e464-db2c-42e5-aa3a-8cf0bda84c2e} 3228 "\\.\pipe\gecko-crash-server-pipe.3228" utility
                          6⤵
                          • Checks processor information in registry
                          PID:5484
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5252 -childID 3 -isForBrowser -prefsHandle 5260 -prefMapHandle 5264 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1126e10d-4f98-49b1-808e-956660895a67} 3228 "\\.\pipe\gecko-crash-server-pipe.3228" tab
                          6⤵
                            PID:5836
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5492 -childID 4 -isForBrowser -prefsHandle 5412 -prefMapHandle 5416 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5941a6f9-130a-430f-aed4-9b1d1cc2775a} 3228 "\\.\pipe\gecko-crash-server-pipe.3228" tab
                            6⤵
                              PID:5856
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5696 -childID 5 -isForBrowser -prefsHandle 5688 -prefMapHandle 5684 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ebd633fb-a4c0-40f7-9861-fd03e5b6ddee} 3228 "\\.\pipe\gecko-crash-server-pipe.3228" tab
                              6⤵
                                PID:5964
                        • C:\Users\Admin\AppData\Local\Temp\1015006001\2b3bcef416.exe
                          "C:\Users\Admin\AppData\Local\Temp\1015006001\2b3bcef416.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Loads dropped DLL
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4428
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                            4⤵
                            • Uses browser remote debugging
                            • Enumerates system info in registry
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            PID:2432
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa9802cc40,0x7ffa9802cc4c,0x7ffa9802cc58
                              5⤵
                                PID:5164
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2412,i,6196110511092083159,17062013373505618674,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2408 /prefetch:2
                                5⤵
                                  PID:5740
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1616,i,6196110511092083159,17062013373505618674,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2444 /prefetch:3
                                  5⤵
                                    PID:5720
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1964,i,6196110511092083159,17062013373505618674,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2548 /prefetch:8
                                    5⤵
                                      PID:5756
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,6196110511092083159,17062013373505618674,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1
                                      5⤵
                                      • Uses browser remote debugging
                                      PID:6052
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,6196110511092083159,17062013373505618674,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3328 /prefetch:1
                                      5⤵
                                      • Uses browser remote debugging
                                      PID:6060
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4512,i,6196110511092083159,17062013373505618674,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4572 /prefetch:1
                                      5⤵
                                      • Uses browser remote debugging
                                      PID:3024
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4504,i,6196110511092083159,17062013373505618674,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4764 /prefetch:8
                                      5⤵
                                        PID:1488
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4184,i,6196110511092083159,17062013373505618674,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4856 /prefetch:8
                                        5⤵
                                          PID:5792
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                        4⤵
                                        • Uses browser remote debugging
                                        • Enumerates system info in registry
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                        • Suspicious use of FindShellTrayWindow
                                        PID:5492
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffa980346f8,0x7ffa98034708,0x7ffa98034718
                                          5⤵
                                          • Checks processor information in registry
                                          • Enumerates system info in registry
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5760
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,11733341918723294699,1010614774040508428,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:2
                                          5⤵
                                            PID:5688
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,11733341918723294699,1010614774040508428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:3
                                            5⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5708
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,11733341918723294699,1010614774040508428,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:8
                                            5⤵
                                              PID:6012
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,11733341918723294699,1010614774040508428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:4040
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,11733341918723294699,1010614774040508428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:1004
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,11733341918723294699,1010614774040508428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:5248
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,11733341918723294699,1010614774040508428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:1844
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\HIIDGCGCBF.exe"
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4312
                                            • C:\Users\Admin\Documents\HIIDGCGCBF.exe
                                              "C:\Users\Admin\Documents\HIIDGCGCBF.exe"
                                              5⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5788
                                        • C:\Users\Admin\AppData\Local\Temp\1015007001\de6061bc70.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1015007001\de6061bc70.exe"
                                          3⤵
                                          • Modifies Windows Defender Real-time Protection settings
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Windows security modification
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:6028
                                        • C:\Users\Admin\AppData\Local\Temp\1015008001\3f8381003b.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1015008001\3f8381003b.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          PID:5372
                                          • C:\Users\Admin\AppData\Local\Temp\1015008001\3f8381003b.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1015008001\3f8381003b.exe"
                                            4⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:5628
                                        • C:\Users\Admin\AppData\Local\Temp\1015009001\f7c07c9fa4.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1015009001\f7c07c9fa4.exe"
                                          3⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Checks processor information in registry
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2252
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1015009001\f7c07c9fa4.exe" & rd /s /q "C:\ProgramData\M79RQ1VS0ZU3" & exit
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5364
                                            • C:\Windows\SysWOW64\timeout.exe
                                              timeout /t 10
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              • Delays execution with timeout.exe
                                              PID:4768
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 2096
                                            4⤵
                                            • Program crash
                                            PID:2296
                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      1⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1140
                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                      1⤵
                                        PID:6124
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                        1⤵
                                          PID:6032
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2252 -ip 2252
                                          1⤵
                                            PID:3932
                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5332
                                          • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                            C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5164
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              2⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4776
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                              2⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4828
                                              • C:\Windows\system32\PING.EXE
                                                "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                3⤵
                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                • Runs ping.exe
                                                PID:5948
                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2896
                                          • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                            C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1272
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              2⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3616
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                              2⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4316
                                              • C:\Windows\system32\PING.EXE
                                                "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                3⤵
                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                • Runs ping.exe
                                                PID:5176

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\ProgramData\mozglue.dll

                                            Filesize

                                            593KB

                                            MD5

                                            c8fd9be83bc728cc04beffafc2907fe9

                                            SHA1

                                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                            SHA256

                                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                            SHA512

                                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                          • C:\ProgramData\nss3.dll

                                            Filesize

                                            2.0MB

                                            MD5

                                            1cc453cdf74f31e4d913ff9c10acdde2

                                            SHA1

                                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                            SHA256

                                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                            SHA512

                                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                            Filesize

                                            649B

                                            MD5

                                            55118fa2cd2176e8710976fbf92c5521

                                            SHA1

                                            eed47ad794b8eb878245a7379db3dc1b3da2c2bd

                                            SHA256

                                            1b964f16961857c9716ceb20f925718fbed48081f3821e2cd4d7710395f3f664

                                            SHA512

                                            212f2c744b4d3259366da831c0ac0b362a91c32c938dfba440d9f8a74066b6e3500d937ddff4e4774d2eee748922062f83d7773609cc8a967479616bf6eee20d

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            34d2c4f40f47672ecdf6f66fea242f4a

                                            SHA1

                                            4bcad62542aeb44cae38a907d8b5a8604115ada2

                                            SHA256

                                            b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33

                                            SHA512

                                            50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            8749e21d9d0a17dac32d5aa2027f7a75

                                            SHA1

                                            a5d555f8b035c7938a4a864e89218c0402ab7cde

                                            SHA256

                                            915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304

                                            SHA512

                                            c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            a9637c649be0d621b39178ececd1aecf

                                            SHA1

                                            723cd494bc8ac03f28f80e6990ffc821ee0d7ab7

                                            SHA256

                                            8eff794e55fd54e0efc6d3c44bbacd7d5789dc89511224fb28c912ffe22bb9ba

                                            SHA512

                                            408e702c35361295cbd14ad5c7afe42416713899ea1abeae4e29d7618c3c69396ba60daced4393ab116a1474a11986b425a70499f909a730c41ea469ac455d1a

                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json

                                            Filesize

                                            27KB

                                            MD5

                                            b9bf75f72b2c747f3a096046ad61818d

                                            SHA1

                                            7f126f80d362110b26cc0e75af287ff5e2734261

                                            SHA256

                                            9d0215a9e6574415ca160ca95f1a8ae0c0721fe69a54ee8f504c56674d99e402

                                            SHA512

                                            4a62cca72615b86ad7f91a70a90f9a629c3747f4cd2b34d3b4fd962bcced9272e9edcccead03569e2e14ca298e93f7520e6e5c850176a537d3d4f67e9c372a83

                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                            Filesize

                                            13KB

                                            MD5

                                            64043434d3a91c19e928ad8afb70fab0

                                            SHA1

                                            0f09a23435d7927e350b66b3b578bc3a4d987fe7

                                            SHA256

                                            434f461965999a774ae9e340d0803f9cd80e60ad49d973e9be4b611b2ba74508

                                            SHA512

                                            4a1a275ba5e7c4bcc1c72e940ac01ce51aee367788ec3a6353587e8603c3d1ea66d725768c67f6d80a783e8127d6060307770fde77b88d0b601f64b5ce0606dc

                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                            Filesize

                                            15KB

                                            MD5

                                            96c542dec016d9ec1ecc4dddfcbaac66

                                            SHA1

                                            6199f7648bb744efa58acf7b96fee85d938389e4

                                            SHA256

                                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                            SHA512

                                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                          • C:\Users\Admin\AppData\Local\Temp\1015003001\cd1e07990a.exe

                                            Filesize

                                            2.5MB

                                            MD5

                                            2a78ce9f3872f5e591d643459cabe476

                                            SHA1

                                            9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                                            SHA256

                                            21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                                            SHA512

                                            03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                                          • C:\Users\Admin\AppData\Local\Temp\1015004001\36aab54077.exe

                                            Filesize

                                            4.2MB

                                            MD5

                                            3a425626cbd40345f5b8dddd6b2b9efa

                                            SHA1

                                            7b50e108e293e54c15dce816552356f424eea97a

                                            SHA256

                                            ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                                            SHA512

                                            a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                                          • C:\Users\Admin\AppData\Local\Temp\1015005001\83998c9116.exe

                                            Filesize

                                            946KB

                                            MD5

                                            831100157bc1eb7d172cddac137deaba

                                            SHA1

                                            da463eb8da51c65bf23a9013fba22bdb7f09d2ee

                                            SHA256

                                            7d57fc480be7f35596ca90f7982704cb29f48535881b233bc16ea18a749ba74f

                                            SHA512

                                            20b64cca0eb3652d5a3f44e7ffa567b9570ca60392dfd0b7abf16e33cd577d5ba01e934911063d15ad5618eb6cc4a6f5df3788a34d4008d636233ebe7daed481

                                          • C:\Users\Admin\AppData\Local\Temp\1015006001\2b3bcef416.exe

                                            Filesize

                                            1.7MB

                                            MD5

                                            5a351b604582d466b7aa07d4c8c87697

                                            SHA1

                                            0798ae4ef13ccb5cf1641d45028349c5f72469a4

                                            SHA256

                                            fa35bd6379d6f97611d1738f5dee79c45366d8920a11b6692f1681aae32a76e0

                                            SHA512

                                            8d0d34ce321428ebde3fba9292bea72d9251439079d784d8096a288c33258229804f726bb64fc5c0928ca3bf0af54ffccbb4086f6c371159785fc52ddf8a1fd4

                                          • C:\Users\Admin\AppData\Local\Temp\1015007001\de6061bc70.exe

                                            Filesize

                                            2.6MB

                                            MD5

                                            874821c53b43b061ab641d85eb12a68e

                                            SHA1

                                            b3c1438283aec16499611ab8b30d4cfa3f4c30e5

                                            SHA256

                                            94d201bcf1f4bb9d696bc9fba7390d08d99e4213dd6a10d0441c3c191a78440a

                                            SHA512

                                            cfe86b97b554c129b36ba3c127224ba50a7a39fecabe528755accc673ae7eacad70b08128de681f31ac39f5c3b300a156f7ca10143f9ef7c6900964a30a298e0

                                          • C:\Users\Admin\AppData\Local\Temp\1015008001\3f8381003b.exe

                                            Filesize

                                            710KB

                                            MD5

                                            28e568616a7b792cac1726deb77d9039

                                            SHA1

                                            39890a418fb391b823ed5084533e2e24dff021e1

                                            SHA256

                                            9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                                            SHA512

                                            85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                                          • C:\Users\Admin\AppData\Local\Temp\1015009001\f7c07c9fa4.exe

                                            Filesize

                                            384KB

                                            MD5

                                            dfd5f78a711fa92337010ecc028470b4

                                            SHA1

                                            1a389091178f2be8ce486cd860de16263f8e902e

                                            SHA256

                                            da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

                                            SHA512

                                            a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vbu0ojm3.j0w.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                            Filesize

                                            3.0MB

                                            MD5

                                            4873dec39296c80c3863e04149e492bb

                                            SHA1

                                            4ceb2e1553a82ac5f05cefc8c1b688e768c92de3

                                            SHA256

                                            172e1e49642648745fefdbebd4c76c41049a4f0edd14eeb7904b709f0add5cbc

                                            SHA512

                                            c827eaf7b8910fdc5d5d9a2d51611573b49a4fffb6fc37cc9279d77f1d05071f0b862dd11b65a69b6ca351a4c1876bee77630e5a8a1c05f806cb7e474969e92c

                                          • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                            Filesize

                                            1.6MB

                                            MD5

                                            72491c7b87a7c2dd350b727444f13bb4

                                            SHA1

                                            1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                            SHA256

                                            34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                            SHA512

                                            583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                            Filesize

                                            458KB

                                            MD5

                                            619f7135621b50fd1900ff24aade1524

                                            SHA1

                                            6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                            SHA256

                                            344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                            SHA512

                                            2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                                            Filesize

                                            2.2MB

                                            MD5

                                            579a63bebccbacab8f14132f9fc31b89

                                            SHA1

                                            fca8a51077d352741a9c1ff8a493064ef5052f27

                                            SHA256

                                            0ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0

                                            SHA512

                                            4a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f

                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                                            Filesize

                                            1.7MB

                                            MD5

                                            5659eba6a774f9d5322f249ad989114a

                                            SHA1

                                            4bfb12aa98a1dc2206baa0ac611877b815810e4c

                                            SHA256

                                            e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                                            SHA512

                                            f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                                            Filesize

                                            1.7MB

                                            MD5

                                            5404286ec7853897b3ba00adf824d6c1

                                            SHA1

                                            39e543e08b34311b82f6e909e1e67e2f4afec551

                                            SHA256

                                            ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                                            SHA512

                                            c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                                            Filesize

                                            1.7MB

                                            MD5

                                            5eb39ba3698c99891a6b6eb036cfb653

                                            SHA1

                                            d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                                            SHA256

                                            e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                                            SHA512

                                            6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                                            Filesize

                                            1.7MB

                                            MD5

                                            7187cc2643affab4ca29d92251c96dee

                                            SHA1

                                            ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                                            SHA256

                                            c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                                            SHA512

                                            27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                                            Filesize

                                            1.7MB

                                            MD5

                                            b7d1e04629bec112923446fda5391731

                                            SHA1

                                            814055286f963ddaa5bf3019821cb8a565b56cb8

                                            SHA256

                                            4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                                            SHA512

                                            79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                                            Filesize

                                            1.7MB

                                            MD5

                                            0dc4014facf82aa027904c1be1d403c1

                                            SHA1

                                            5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                                            SHA256

                                            a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                                            SHA512

                                            cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                                            Filesize

                                            3.3MB

                                            MD5

                                            cea368fc334a9aec1ecff4b15612e5b0

                                            SHA1

                                            493d23f72731bb570d904014ffdacbba2334ce26

                                            SHA256

                                            07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                                            SHA512

                                            bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                                          • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                                            Filesize

                                            3.3MB

                                            MD5

                                            045b0a3d5be6f10ddf19ae6d92dfdd70

                                            SHA1

                                            0387715b6681d7097d372cd0005b664f76c933c7

                                            SHA256

                                            94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                                            SHA512

                                            58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                                          • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                            Filesize

                                            440B

                                            MD5

                                            3626532127e3066df98e34c3d56a1869

                                            SHA1

                                            5fa7102f02615afde4efd4ed091744e842c63f78

                                            SHA256

                                            2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                                            SHA512

                                            dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                            Filesize

                                            479KB

                                            MD5

                                            09372174e83dbbf696ee732fd2e875bb

                                            SHA1

                                            ba360186ba650a769f9303f48b7200fb5eaccee1

                                            SHA256

                                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                            SHA512

                                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                            Filesize

                                            13.8MB

                                            MD5

                                            0a8747a2ac9ac08ae9508f36c6d75692

                                            SHA1

                                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                                            SHA256

                                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                            SHA512

                                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                          • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe

                                            Filesize

                                            1.7MB

                                            MD5

                                            83d75087c9bf6e4f07c36e550731ccde

                                            SHA1

                                            d5ff596961cce5f03f842cfd8f27dde6f124e3ae

                                            SHA256

                                            46db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f

                                            SHA512

                                            044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                                            Filesize

                                            6KB

                                            MD5

                                            e5a11ce84d8a0712c47dc9fcb8d3e4c8

                                            SHA1

                                            b727642e5f8577be43777590e58bbe1524713411

                                            SHA256

                                            9217f33ec9e1c49a1ea6f019cc9782a1990999048a09ddc6163729d5448fc650

                                            SHA512

                                            4187ddd14b07334e53d877597d95767d2ec061f0b3d24121c68824b34827625f720e987a11d1c4b38923ce1b0b4dc7e6f48459d16fd8b57c1faa39695bdac97c

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                                            Filesize

                                            10KB

                                            MD5

                                            c678c25cdbd743ac1e4a17d8e11ed0cc

                                            SHA1

                                            5e24d62d6156a1d926ae5827adc01430ed8a44cc

                                            SHA256

                                            4b25d589ba8912835f017ed2c365716b419e2bc875895f806b3bb7b78f681a1e

                                            SHA512

                                            5667e3e7c33aaeeb74fd42829e1c11d7ae6f381177d8977e880e5d82cd6825e7de09e3771bd814ddb647708ebc53d01eabf4d35ed3fed874a08d447fd10997b8

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                                            Filesize

                                            21KB

                                            MD5

                                            7fcc30eef8d947999786dd2c28ff3866

                                            SHA1

                                            979f2547598e9164beee47fd0531477577e9fa55

                                            SHA256

                                            cb39a3677458b628dced422991bb88532c3388f0c40d3d249ac44e0273544d4e

                                            SHA512

                                            dd24c994c556329eb1d7e96c46ad97ae6e7a98933c4d1d2acedb98f03b863ed2b1368f3fd629374a9a19feb6c741490f968a781e177ff656b6bff940dcfe2f27

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                                            Filesize

                                            22KB

                                            MD5

                                            8b363b8882109c633a6aade44289cd6c

                                            SHA1

                                            c831fdc2bb7a200a7743ab9f4dc74477843d418f

                                            SHA256

                                            b40709c2821592629c57667985b3aff43c1d6969c6dd1d17be46c43dfdd3020f

                                            SHA512

                                            0adc887d8711d0d0816a3e53e894d1b5ef360098416474f8b240129508a76973c48b9fa1ab10bf6e3b9a28b84ef42707e2a1f82847de5c65174ec75c4a6cf344

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                                            Filesize

                                            22KB

                                            MD5

                                            ac7e2862666d588426705fcc95c1bcae

                                            SHA1

                                            8dbdabd8006af138b749a12b33e4800c2f0abfce

                                            SHA256

                                            92b8b4db8d09ced223b1c522924dbde40086deb83504ceb1670d1b95c0c81c6c

                                            SHA512

                                            78b3f6ec8be3b314d75baed6ea4a20f39e9fb3502dccf6e2c033975d831f765ef0c48c6b3fe19626dbeb5159422ceec6e89e033b4836038c9728d1b288282ce1

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                                            Filesize

                                            24KB

                                            MD5

                                            62810f169237046125bb195773ea62c1

                                            SHA1

                                            876e9bbc784a81334eb3f4349e721f084ea7595f

                                            SHA256

                                            ba7c7cd07255fde9e97d60c99df4cfbf51f5d4300af55c196a51d9eb9c7c4b41

                                            SHA512

                                            40f66eca81891729a63da912945302f9ea9bf8d9065a7bd2a865fc9c0011e91ce34e2bb5ad5ce71509363d655797c4a0f763fecacde75e173de90e8149336d17

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\775f8a89-33a5-4e93-aaee-5c403469a893

                                            Filesize

                                            982B

                                            MD5

                                            92b65eca668206d70b7d983728cdcfee

                                            SHA1

                                            67024e11c5c413cb10971a7d4e95eba7c2a34e70

                                            SHA256

                                            d8b46b9d66eaedbd30ff9f49db010b991522cbedb8a867546e881c221a0d1aa3

                                            SHA512

                                            950e16e02c5239c7cf2d09d88fe4a76b16de264f121847a31f6b0629b91c39bcef56f71ec5e9d7d9eae56e4732321e5c0268f844e92a7bd4a6006f2c01095637

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\effb1d2b-256d-4f4a-ba73-5a2da8fb43d7

                                            Filesize

                                            659B

                                            MD5

                                            78adbb5f40be27a1e535f70cb43038e3

                                            SHA1

                                            6a4cf62db08b58aa1a02eb8450aa92d7bc55ffe3

                                            SHA256

                                            33d952a4c5ad08bda32585a9f4eb5a69115b0ddf414d3cdf4c73efbb7d625c70

                                            SHA512

                                            1d705561cf27d1711b2624f364e3bcbddcd96545ac3dd98da669a72c8f8ee9b469f4971c1c813e80c9128d5e01dbcfa72517d438dda1f00c1f3a7aecde79954a

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                            Filesize

                                            1.1MB

                                            MD5

                                            842039753bf41fa5e11b3a1383061a87

                                            SHA1

                                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                            SHA256

                                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                            SHA512

                                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                            Filesize

                                            116B

                                            MD5

                                            2a461e9eb87fd1955cea740a3444ee7a

                                            SHA1

                                            b10755914c713f5a4677494dbe8a686ed458c3c5

                                            SHA256

                                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                            SHA512

                                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                            Filesize

                                            372B

                                            MD5

                                            bf957ad58b55f64219ab3f793e374316

                                            SHA1

                                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                            SHA256

                                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                            SHA512

                                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                            Filesize

                                            17.8MB

                                            MD5

                                            daf7ef3acccab478aaa7d6dc1c60f865

                                            SHA1

                                            f8246162b97ce4a945feced27b6ea114366ff2ad

                                            SHA256

                                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                            SHA512

                                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                                            Filesize

                                            10KB

                                            MD5

                                            4e9281b18b003d0a0c01acf255efc505

                                            SHA1

                                            83679fe369a825a8ce31ffb34554cf10140891d7

                                            SHA256

                                            e6c4d49d82ede996c275afb5b0611365c3d574590f5aa02f78250452a75402b4

                                            SHA512

                                            0095b301627d7045084f5d0feb3eb7b69d28c5b1ccf716be7fde3f7d7fb726bea181cd726a3aab52abc5120cea39c2793d3644cea074cc57a3c95a73aa720fcf

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                                            Filesize

                                            12KB

                                            MD5

                                            dc97bead52b9eb90f70d81b3818f5b5c

                                            SHA1

                                            b61386c554bb126cd0e283fae017ef722415bb88

                                            SHA256

                                            848a4bb53e70e46a664bd1648b48e4aa4d9cc9fcb112049ed71bd85e28f4088e

                                            SHA512

                                            7ee1920e0521dd2f99e3e51e14e3bc1bcb2a8f0053587eb53c9f094acd3e7dbd70f6caca722e2398acf12c8889e5377555819251e84db5f6e980675878460b33

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                                            Filesize

                                            15KB

                                            MD5

                                            7516cae827f4f4fbb954ce262abed4a9

                                            SHA1

                                            b886ee39713eb86b8c114a510dc43c4ee87f3ede

                                            SHA256

                                            752fc87affe834468d16b6e47385d2004553462c6048c78e417b037f4e41def1

                                            SHA512

                                            a6b2185edfb343fdecd7ac6024fd408a379746df1045876f487235f8eefed222b22c66c90760ad10541877afbe337319c433475f20aff7f53bbe50a0c0947932

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                                            Filesize

                                            11KB

                                            MD5

                                            c9e436f75beac49c05e6b0a7b133e259

                                            SHA1

                                            7f21ad3c57f3f9ceeeaf4ef34d1d7e67e3c64d02

                                            SHA256

                                            b1dd5f0d56668a9ff2fbca546e6b89375182cec712c948e7351701cc85da923b

                                            SHA512

                                            20aaed9e3f003042edc44f6c8489a21214d81d42eda201f15512a5196ee626f6f0c8f243f39fa38b2e4db845424d359f93285705428e6857f0690570b2a8f537

                                          • memory/1140-28-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/1140-29-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/1140-27-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/1140-26-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/1140-24-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/1272-3308-0x00007FF7C8E10000-0x00007FF7C92A0000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/1272-3324-0x00007FF7C8E10000-0x00007FF7C92A0000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/2200-612-0x0000000000400000-0x0000000000457000-memory.dmp

                                            Filesize

                                            348KB

                                          • memory/2252-733-0x0000000000400000-0x000000000064B000-memory.dmp

                                            Filesize

                                            2.3MB

                                          • memory/2604-3306-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-161-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-25-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-3302-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-3296-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-22-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-3041-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-2109-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-21-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-20-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-3305-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-19-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-702-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-937-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-52-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-559-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-3304-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2604-51-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2896-3307-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/2896-3311-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3740-149-0x00007FF6BDB30000-0x00007FF6BDFC0000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/3740-147-0x00007FF6BDB30000-0x00007FF6BDFC0000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/4032-1-0x0000000077434000-0x0000000077436000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/4032-0-0x00000000006C0000-0x00000000009D0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4032-4-0x00000000006C0000-0x00000000009D0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4032-2-0x00000000006C1000-0x0000000000729000-memory.dmp

                                            Filesize

                                            416KB

                                          • memory/4032-18-0x00000000006C1000-0x0000000000729000-memory.dmp

                                            Filesize

                                            416KB

                                          • memory/4032-17-0x00000000006C0000-0x00000000009D0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4032-3-0x00000000006C0000-0x00000000009D0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4428-621-0x0000000000DD0000-0x0000000001469000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/4428-734-0x0000000000DD0000-0x0000000001469000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/4428-1043-0x0000000000DD0000-0x0000000001469000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/4428-189-0x0000000000DD0000-0x0000000001469000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/4428-466-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                            Filesize

                                            972KB

                                          • memory/4776-2898-0x0000000140000000-0x0000000140770000-memory.dmp

                                            Filesize

                                            7.4MB

                                          • memory/4776-2906-0x0000000140000000-0x0000000140770000-memory.dmp

                                            Filesize

                                            7.4MB

                                          • memory/4776-2864-0x0000000140000000-0x0000000140770000-memory.dmp

                                            Filesize

                                            7.4MB

                                          • memory/4776-2865-0x0000000140000000-0x0000000140770000-memory.dmp

                                            Filesize

                                            7.4MB

                                          • memory/4776-2886-0x0000000140000000-0x0000000140770000-memory.dmp

                                            Filesize

                                            7.4MB

                                          • memory/4776-2882-0x0000000140000000-0x0000000140770000-memory.dmp

                                            Filesize

                                            7.4MB

                                          • memory/4776-2884-0x0000000140000000-0x0000000140770000-memory.dmp

                                            Filesize

                                            7.4MB

                                          • memory/4776-2879-0x0000000140000000-0x0000000140770000-memory.dmp

                                            Filesize

                                            7.4MB

                                          • memory/4776-2874-0x0000000140000000-0x0000000140770000-memory.dmp

                                            Filesize

                                            7.4MB

                                          • memory/4776-2917-0x0000000140000000-0x0000000140770000-memory.dmp

                                            Filesize

                                            7.4MB

                                          • memory/4776-2887-0x0000000140000000-0x0000000140770000-memory.dmp

                                            Filesize

                                            7.4MB

                                          • memory/4776-2905-0x0000000000FD0000-0x0000000000FF0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4944-159-0x000001ADB09D0000-0x000001ADB09F2000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/5164-2897-0x00007FF7C8E10000-0x00007FF7C92A0000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/5164-2855-0x00007FF7C8E10000-0x00007FF7C92A0000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/5332-2734-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/5332-2695-0x00000000004D0000-0x00000000007E0000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/5628-644-0x0000000000400000-0x0000000000457000-memory.dmp

                                            Filesize

                                            348KB

                                          • memory/5628-646-0x0000000000400000-0x0000000000457000-memory.dmp

                                            Filesize

                                            348KB

                                          • memory/5788-1020-0x0000000000560000-0x000000000088C000-memory.dmp

                                            Filesize

                                            3.2MB

                                          • memory/5788-1039-0x0000000000560000-0x000000000088C000-memory.dmp

                                            Filesize

                                            3.2MB

                                          • memory/6028-717-0x00000000000A0000-0x0000000000344000-memory.dmp

                                            Filesize

                                            2.6MB

                                          • memory/6028-713-0x00000000000A0000-0x0000000000344000-memory.dmp

                                            Filesize

                                            2.6MB

                                          • memory/6028-604-0x00000000000A0000-0x0000000000344000-memory.dmp

                                            Filesize

                                            2.6MB

                                          • memory/6028-605-0x00000000000A0000-0x0000000000344000-memory.dmp

                                            Filesize

                                            2.6MB

                                          • memory/6028-601-0x00000000000A0000-0x0000000000344000-memory.dmp

                                            Filesize

                                            2.6MB