Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 17:26

General

  • Target

    a1aa2f3960356ac618995c25c51a91cabb963a878a45ac0213bbe5bc478772ef.exe

  • Size

    2.9MB

  • MD5

    838dfe4fdfe00acd5160ed5f7e5fe620

  • SHA1

    67c679c92a0fed7ebd5669645034988fcfc9c16d

  • SHA256

    a1aa2f3960356ac618995c25c51a91cabb963a878a45ac0213bbe5bc478772ef

  • SHA512

    70c5a95da4687e90e46d55174b854620bc448ee421b1b6007b3768025797dc41a550e9e33628ba146a00945f24c6ad9f220011a5227ee657e7d9b7c3525c7000

  • SSDEEP

    49152:uttBUV5eLR+wRRnPz8AMtO8OTBVqVkBXr35wLo:SwXaR+wRpz8AMtuT3LXT5wL

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

cryptbot

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 3 IoCs
  • Checks BIOS information in registry 2 TTPs 36 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 47 IoCs
  • Identifies Wine through registry keys 2 TTPs 18 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 13 IoCs
  • Modifies system executable filetype association 2 TTPs 4 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 63 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 39 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2972
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2156
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:5720
    • C:\Users\Admin\AppData\Local\Temp\a1aa2f3960356ac618995c25c51a91cabb963a878a45ac0213bbe5bc478772ef.exe
      "C:\Users\Admin\AppData\Local\Temp\a1aa2f3960356ac618995c25c51a91cabb963a878a45ac0213bbe5bc478772ef.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3348
        • C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe
          "C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1668
          • C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe
            "C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"
            4⤵
            • Executes dropped EXE
            PID:2824
          • C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe
            "C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3748
        • C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe
          "C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1632
          • C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe
            "C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4308
            • C:\Users\Admin\AppData\Local\Temp\is-NFLPN.tmp\NordVPNSetup.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-NFLPN.tmp\NordVPNSetup.tmp" /SL5="$A02C8,15409387,73728,C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              PID:4116
              • C:\Windows\system32\rundll32.exe
                "rundll32.exe " SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf
                6⤵
                • Drops file in Drivers directory
                • Adds Run key to start application
                PID:1512
                • C:\Windows\system32\runonce.exe
                  "C:\Windows\system32\runonce.exe" -r
                  7⤵
                  • Checks processor information in registry
                  PID:4124
                  • C:\Windows\System32\grpconv.exe
                    "C:\Windows\System32\grpconv.exe" -o
                    8⤵
                      PID:4724
                • C:\Windows\system32\regsvr32.exe
                  "regsvr32" "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll" /s
                  6⤵
                  • Loads dropped DLL
                  • Modifies system executable filetype association
                  • Modifies registry class
                  PID:880
                • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe
                  "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe" /regserver /NOREDIRECT
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  PID:2300
                • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe
                  "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe" /bc
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2648
                • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe
                  "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:5852
          • C:\Users\Admin\AppData\Local\Temp\1016974001\5bc57734dd.exe
            "C:\Users\Admin\AppData\Local\Temp\1016974001\5bc57734dd.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4092
            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:5028
              • C:\Users\Admin\AppData\Local\Temp\1007247001\bee3ccffef.exe
                "C:\Users\Admin\AppData\Local\Temp\1007247001\bee3ccffef.exe"
                5⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:1712
              • C:\Users\Admin\AppData\Local\Temp\1007248001\3152952fe1.exe
                "C:\Users\Admin\AppData\Local\Temp\1007248001\3152952fe1.exe"
                5⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:4596
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 532
                  6⤵
                  • Program crash
                  PID:1412
              • C:\Users\Admin\AppData\Local\Temp\1007249001\4cbc230c8a.exe
                "C:\Users\Admin\AppData\Local\Temp\1007249001\4cbc230c8a.exe"
                5⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:116
              • C:\Users\Admin\AppData\Local\Temp\1007250001\eba31f44f7.exe
                "C:\Users\Admin\AppData\Local\Temp\1007250001\eba31f44f7.exe"
                5⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2364
          • C:\Users\Admin\AppData\Local\Temp\1016994001\03f0bb1616.exe
            "C:\Users\Admin\AppData\Local\Temp\1016994001\03f0bb1616.exe"
            3⤵
            • Enumerates VirtualBox registry keys
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4340
          • C:\Users\Admin\AppData\Local\Temp\1016995001\ae20f37784.exe
            "C:\Users\Admin\AppData\Local\Temp\1016995001\ae20f37784.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2604
            • C:\Users\Admin\AppData\Local\Temp\PE3E1TNIQC5KVL2Q9CVIQHRL7XJUC.exe
              "C:\Users\Admin\AppData\Local\Temp\PE3E1TNIQC5KVL2Q9CVIQHRL7XJUC.exe"
              4⤵
              • Modifies Windows Defender Real-time Protection settings
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Windows security modification
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:6120
            • C:\Users\Admin\AppData\Local\Temp\DKNR9IYFKARVZO61E44W3AWWIC34.exe
              "C:\Users\Admin\AppData\Local\Temp\DKNR9IYFKARVZO61E44W3AWWIC34.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              PID:1744
          • C:\Users\Admin\AppData\Local\Temp\1016996001\55e6444a73.exe
            "C:\Users\Admin\AppData\Local\Temp\1016996001\55e6444a73.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4960
          • C:\Users\Admin\AppData\Local\Temp\1016997001\af7521a5f1.exe
            "C:\Users\Admin\AppData\Local\Temp\1016997001\af7521a5f1.exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4704
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:624
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2248
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2740
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2276
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4416
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              4⤵
                PID:2112
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  5⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:4108
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {18585b65-f47d-45a5-ac24-1189c9bd6dd1} 4108 "\\.\pipe\gecko-crash-server-pipe.4108" gpu
                    6⤵
                      PID:1632
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a7f9e36-5a63-437e-9a6e-fa67fca83575} 4108 "\\.\pipe\gecko-crash-server-pipe.4108" socket
                      6⤵
                        PID:4072
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3268 -childID 1 -isForBrowser -prefsHandle 3032 -prefMapHandle 3232 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {df784d57-3013-4f6c-97c8-0f6f85156eb1} 4108 "\\.\pipe\gecko-crash-server-pipe.4108" tab
                        6⤵
                          PID:2676
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3676 -childID 2 -isForBrowser -prefsHandle 3668 -prefMapHandle 3664 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7baa54c9-6c75-4079-9415-8a61941e4b92} 4108 "\\.\pipe\gecko-crash-server-pipe.4108" tab
                          6⤵
                            PID:1792
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4504 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4516 -prefMapHandle 3300 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5e6f16a-9d81-4a2a-abfc-2dd01dc22faa} 4108 "\\.\pipe\gecko-crash-server-pipe.4108" utility
                            6⤵
                            • Checks processor information in registry
                            PID:5540
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5088 -childID 3 -isForBrowser -prefsHandle 5028 -prefMapHandle 5072 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e214d317-c457-461e-a571-f56449954640} 4108 "\\.\pipe\gecko-crash-server-pipe.4108" tab
                            6⤵
                              PID:632
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5200 -childID 4 -isForBrowser -prefsHandle 5212 -prefMapHandle 5216 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8af98ffb-5d69-4cee-8138-d68ffa27c13a} 4108 "\\.\pipe\gecko-crash-server-pipe.4108" tab
                              6⤵
                                PID:436
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5540 -childID 5 -isForBrowser -prefsHandle 5524 -prefMapHandle 5536 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7be2f57-833d-4a70-bdd7-ee4814f28f23} 4108 "\\.\pipe\gecko-crash-server-pipe.4108" tab
                                6⤵
                                  PID:5148
                          • C:\Users\Admin\AppData\Local\Temp\1016998001\33d2f2a932.exe
                            "C:\Users\Admin\AppData\Local\Temp\1016998001\33d2f2a932.exe"
                            3⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3424
                          • C:\Users\Admin\AppData\Local\Temp\1016999001\5d2286aacf.exe
                            "C:\Users\Admin\AppData\Local\Temp\1016999001\5d2286aacf.exe"
                            3⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:5652
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                              4⤵
                                PID:6048
                                • C:\Windows\system32\mode.com
                                  mode 65,10
                                  5⤵
                                    PID:5240
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2328
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_7.zip -oextracted
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5052
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_6.zip -oextracted
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3740
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_5.zip -oextracted
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2488
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_4.zip -oextracted
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2824
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_3.zip -oextracted
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2632
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_2.zip -oextracted
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1716
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_1.zip -oextracted
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5884
                                  • C:\Windows\system32\attrib.exe
                                    attrib +H "in.exe"
                                    5⤵
                                    • Views/modifies file attributes
                                    PID:64
                                  • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                    "in.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    PID:4004
                                    • C:\Windows\SYSTEM32\attrib.exe
                                      attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                      6⤵
                                      • Views/modifies file attributes
                                      PID:5628
                                    • C:\Windows\SYSTEM32\attrib.exe
                                      attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                      6⤵
                                      • Views/modifies file attributes
                                      PID:3068
                                    • C:\Windows\SYSTEM32\schtasks.exe
                                      schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                      6⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:4904
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell ping 127.0.0.1; del in.exe
                                      6⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3556
                                      • C:\Windows\System32\Conhost.exe
                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        7⤵
                                          PID:1744
                                        • C:\Windows\system32\PING.EXE
                                          "C:\Windows\system32\PING.EXE" 127.0.0.1
                                          7⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:5468
                                • C:\Users\Admin\AppData\Local\Temp\1017000001\09858939fd.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1017000001\09858939fd.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2424
                                  • C:\Users\Admin\AppData\Local\Temp\1017000001\09858939fd.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1017000001\09858939fd.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    PID:1544
                                  • C:\Users\Admin\AppData\Local\Temp\1017000001\09858939fd.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1017000001\09858939fd.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:1880
                                • C:\Users\Admin\AppData\Local\Temp\1017001001\a7472eae12.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1017001001\a7472eae12.exe"
                                  3⤵
                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  PID:3424
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 464
                                    4⤵
                                    • Program crash
                                    PID:2896
                                • C:\Users\Admin\AppData\Local\Temp\1017002001\bbbc2dc63a.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1017002001\bbbc2dc63a.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:4164
                                  • C:\Windows\System32\Conhost.exe
                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    4⤵
                                      PID:2632
                                    • C:\Users\Admin\AppData\Local\Temp\1017002001\bbbc2dc63a.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1017002001\bbbc2dc63a.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:64
                                  • C:\Users\Admin\AppData\Local\Temp\1017003001\426d598671.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1017003001\426d598671.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    PID:2640
                                    • C:\Users\Admin\AppData\Local\Temp\1017003001\426d598671.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1017003001\426d598671.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      PID:3016
                                    • C:\Users\Admin\AppData\Local\Temp\1017003001\426d598671.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1017003001\426d598671.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      PID:5492
                                    • C:\Users\Admin\AppData\Local\Temp\1017003001\426d598671.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1017003001\426d598671.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:5464
                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1248
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4596 -ip 4596
                                1⤵
                                  PID:4504
                                • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                  C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  PID:4840
                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  PID:4928
                                • C:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exe
                                  C:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exe -Embedding
                                  1⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:5888
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3424 -ip 3424
                                  1⤵
                                    PID:4324

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\PROGRA~1\VSREVO~1\REVOUN~1\revoflt.sys

                                    Filesize

                                    37KB

                                    MD5

                                    ec8e58e6b58b4fcde77431cda3a24c0e

                                    SHA1

                                    ebb474009b2a2fbce648adff4b8b797fcd00c997

                                    SHA256

                                    25667717bf4691957f07a6363585e2c7eaf22e5fd7229bf32c91ea59ef4a2edd

                                    SHA512

                                    e2c667ebe97973ff27c1edf3e45ebf7950bc8d7aad1126da25290a2f590b21808654694cbe6a0ad1d3649566ec7645eb6b3379c7d7c0a650d5381a69e9cdade4

                                  • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll

                                    Filesize

                                    187KB

                                    MD5

                                    8b9964e06195fd375d126b424e236f03

                                    SHA1

                                    6f1741cfeb9fb70c34857dbba3e063c88c3c32fa

                                    SHA256

                                    bda04b693bfdea86a7a3b47f2e4ceae9cd9475c4e81b0aa73b70fd244a65f70f

                                    SHA512

                                    741019523b4c5f4ef9a7952172309b2d304a84cbd98fff99a719105cc1938157edb1691554a21b9dcd2b523c0f1ab0d37879deefc3b2fa5579c0d8c76cade483

                                  • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe

                                    Filesize

                                    24.2MB

                                    MD5

                                    c8c368988a2a4c2a953b7db4bca47961

                                    SHA1

                                    5acc29b51284146a9ff7b1587c3d89416e66acdf

                                    SHA256

                                    f680e0fe00a48f6e3d079c1572682d6664f476b119745d73cb852baba58cc683

                                    SHA512

                                    5fdef1f4e3b471910fe2b12f6f6aa8bfad3f2a9c80954843085c79139823a88e0c7d921b7c01dda56871800afc20de4739682c02e9fa6a94715c64207a671b30

                                  • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf

                                    Filesize

                                    2KB

                                    MD5

                                    edc78deb34de240c787b1011161e9a4e

                                    SHA1

                                    2d31275530dce33d3bc329991c8ad59e1b303577

                                    SHA256

                                    69569b4b111035cd35186da239d8241cf96350f6bb296210368ebc570fa2162b

                                    SHA512

                                    e55eefcc39b7353ef11a778910400c5c85cab9657bb350840988cbbf556dc343a9c1803442643c9255c149f8d93a5c2d2e6c3bea244f67c895e635eaec0a0f7b

                                  • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe

                                    Filesize

                                    9.6MB

                                    MD5

                                    216b49b7eb7be44d7ed7367f3725285f

                                    SHA1

                                    cf0776ecbc163c738fd43767bedcc2a67acef423

                                    SHA256

                                    c6d97857b3b9f26c8e93d7b6e6481f93a16db75cbf9d1756cb29fba0fd9e240e

                                    SHA512

                                    060fb76d91bee1b421f133cae17726a68adc97ddce76a67196d10e735e216d032bee939c905b847c50f29e859dca43cdf1b19e4ae349e00efe88147224d665cb

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Cq6Id6x.exe.log

                                    Filesize

                                    617B

                                    MD5

                                    85306571e7ae6002dd2a0fb3042b7472

                                    SHA1

                                    c897ab7434b118a8ec1fe25205903f5ec8f71241

                                    SHA256

                                    40c98b01052cd95102701b71b4fbe0eda48537435898c413239f5f888a614253

                                    SHA512

                                    0e9853dab46fd5f6f9eea44377d3802e9cc2fff7ba2f9b45c7c8fc37b860ad9c3c4beb6e1572c87964e06144504210e29038cb03e00c7e7af6ad32e6e995c76a

                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json.tmp

                                    Filesize

                                    18KB

                                    MD5

                                    69fe3e65e6ec7c5cf1c15a9d20360dd4

                                    SHA1

                                    7269a9574cce33a09c658ef92ede4b1c355d4d33

                                    SHA256

                                    eb2427e2f510f19d5c546e54f41eca8f5a505f85c6a11418bf2972e4e6237d24

                                    SHA512

                                    a842ce3ad04491cc48f3c3c09577668cf94fbbab557f6a5262f6cdf077e55fdd1cf911e070d0a6b06bd4d5ad5663322d14b831818b2627cc161b615291bf6177

                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\4F56C51307294BF813004769B84D74C65B9D3B45

                                    Filesize

                                    13.8MB

                                    MD5

                                    a54e6ecd56cc1f8a0ce670ee1c93b8c4

                                    SHA1

                                    eb688c78772b76e8ce1b7a1b4f8bcd318018dece

                                    SHA256

                                    66623d7f25f099984cd9eda39ecfd2f3f59f1fa8eac0a75eff7bd2af3eae4f63

                                    SHA512

                                    ae43a6be592852c3c4ef57aab2c6b7ab4dcfdf840cd849b85d4ea0dbf4dda3a0a8e625faeaa1694a1dd384124c0c278c4713765df5a50693b1a51b68925c9add

                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                    Filesize

                                    13KB

                                    MD5

                                    515d60742d6b0d431b6f165f3a9a1427

                                    SHA1

                                    3798d2a524c9968159d8e8b94ba642e00c41905b

                                    SHA256

                                    128f934d4825ac833a24999b2eb4d7defa30bcf0a1d66513f6dd659c43cb554d

                                    SHA512

                                    856a84116ad4ff431b39fe93ba5dac9ff5dd15b01f283b3af3c8cab8a1a3db97baa1bf1e2f1813c653bf77daa9c3462fd57657f131798aaeb6dc0faee09e29c9

                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                    Filesize

                                    15KB

                                    MD5

                                    96c542dec016d9ec1ecc4dddfcbaac66

                                    SHA1

                                    6199f7648bb744efa58acf7b96fee85d938389e4

                                    SHA256

                                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                    SHA512

                                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                  • C:\Users\Admin\AppData\Local\Temp\1007247001\bee3ccffef.exe

                                    Filesize

                                    2.8MB

                                    MD5

                                    53255a4e52bac509d13e48fe99717cb0

                                    SHA1

                                    763d5cf8a29bad2c20eb0270392e02426afe8e82

                                    SHA256

                                    86c5ad704dccd2f1a4175b66e019550a68ebcd538ef9ad6f9aee743a613940af

                                    SHA512

                                    5a1a5fad42a71a6bc795f82ab29a025e5b5076310cbbfa5fb845af5cd9149348c523493bf3d675a9941019a05eddd108a4601cf77ca6b8f8e7fd74cba244fb1d

                                  • C:\Users\Admin\AppData\Local\Temp\1007248001\3152952fe1.exe

                                    Filesize

                                    1.9MB

                                    MD5

                                    7ecfef7f63495c67771664d73a1ee2c6

                                    SHA1

                                    7cacd8627fc5dbcb69b5bf75e427fd0a7f0ae89e

                                    SHA256

                                    6a571ad33069ddc90b3caf80f8748d1b153f4fbdd96e6f2620c4124e22402e12

                                    SHA512

                                    0f4ec72376c6bad245f364cdbddc660ecb2607c18a6e73deca4f6f5960676b30fb9d663f239093ebab9b3dc1793614a84d6c2e6913fcc8c8550b2ebf28e101e9

                                  • C:\Users\Admin\AppData\Local\Temp\1007249001\4cbc230c8a.exe

                                    Filesize

                                    2.8MB

                                    MD5

                                    f353d872b73cab3ad02f2189ae8f4a81

                                    SHA1

                                    e612d67d02fcbd6f1d479557313d71b7c26c9d0b

                                    SHA256

                                    484203047c8a1bd4b212e075a0b116b9998fa1f753a97a1a28c334fe09232af8

                                    SHA512

                                    17f2732f5cc9a5105c97688f2d150695aed8b87cf7f8050efd3b8247cbee6b392ec5b6457f4ccedb9327a6b09d4ee06cd6cbcdbc6ec65bb22d13e4cfcf3f241b

                                  • C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe

                                    Filesize

                                    3.1MB

                                    MD5

                                    f9b9f98592292b5cbf59c7a60e9ebaee

                                    SHA1

                                    59cc872fd0a11b259cc5b70893f35e9b5a7c8cbb

                                    SHA256

                                    5688e9e0becc622c573af2a1af4ee0676ef3907e38a9258a7801b46b7ad64665

                                    SHA512

                                    f27e4a96173aeb064f47d44ff445b1e15f6d4f39a4ad711c019bb29692caea56eb910970d22bc13ac5c57a256d71e77b12aa60c8405335a239781c57cb0eaf8e

                                  • C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe

                                    Filesize

                                    17.6MB

                                    MD5

                                    3c224e3fc892719dc1e302378e533579

                                    SHA1

                                    0a65062e1426a95bfeca355398b6fdc4912fb6b1

                                    SHA256

                                    64cc7f7906fe1ebf0b6977892abd9aa36f5e525cb241964c3986ee9e1a18312d

                                    SHA512

                                    554a26e9654eccce831e4adcee49d5e2507956935e562b134a86f332d867debfcd1f64fdb88fccb2e1eee810975d565dbc6ea1376516817ee38765e4bd733a49

                                  • C:\Users\Admin\AppData\Local\Temp\1016974001\5bc57734dd.exe

                                    Filesize

                                    2.9MB

                                    MD5

                                    adb82f61953bedf4b2eda53ca8e26ed7

                                    SHA1

                                    905dd9713e5dc58f0f4e1a5c36dc76c42823e734

                                    SHA256

                                    7f7d4d11aa9ce238909c3f93f50e46ff9296860da623022a0f3d37d3ca1dd0e8

                                    SHA512

                                    17a427293b613bb4e8f1709e0153528a26aebc608c8b4e2a13e1ca72efa8b7da9c7086a8c7cf5ad416e52125879fb30f87b0232b8b3e2324c663b1f9efe315d8

                                  • C:\Users\Admin\AppData\Local\Temp\1016994001\03f0bb1616.exe

                                    Filesize

                                    4.2MB

                                    MD5

                                    60cb08aff943753c526cf73fd6007489

                                    SHA1

                                    82a65e58388a24fa079f644e574b5a26512d1078

                                    SHA256

                                    5a1e55df322d7f0f410e19bda46827def8374605479fe22d16c921c36751ec96

                                    SHA512

                                    e6cadb0cb30f8c37e8d20f8448952ded9ef9501ad03e059f6140e70f82fc8d3ce12033a7d8887b4793145b2c7d4279d71df02e2ad8ea4a4d973384973e7a1aa9

                                  • C:\Users\Admin\AppData\Local\Temp\1016995001\ae20f37784.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    ab319afa60cadbafd45f46b07484fd03

                                    SHA1

                                    3bba5171e2e000c0e4c3e33ae1b20ba96e28fb0d

                                    SHA256

                                    68f4cfa9038f190598f1e5fe4b2d069ce63e01d1133c2845ee8cacb97798ee2b

                                    SHA512

                                    612ed711a96bfb8dd0c87cfef531bb6bc20aa675194c1403c05f1aa4745e3e3b28bcb8f33d639977367d090cba1948cc211af25df3c8bc09db93bb119eb3aba5

                                  • C:\Users\Admin\AppData\Local\Temp\1016997001\af7521a5f1.exe

                                    Filesize

                                    942KB

                                    MD5

                                    0d8ac576eca10da9277638f730c0bab1

                                    SHA1

                                    be4abb2939e19d612b81d22069c7135f53cc4a75

                                    SHA256

                                    f3675e0c735833e5da3a5d75140713a08f2657232b965d6066bb14a153bc4c7e

                                    SHA512

                                    bf81c40a99037e99f3a57ebc9cd248e60e790cd2c6a68a66e46a288d7131c359e8dcff2392506a1c2e042e680ef374e366d66929ff55c15d51bbde430ae92217

                                  • C:\Users\Admin\AppData\Local\Temp\1016998001\33d2f2a932.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    4b286a4c9eeff77633d1569f9a4def47

                                    SHA1

                                    26a5f3284d3a6226087d9f912f8244842e1aed5e

                                    SHA256

                                    1f8fda9aaebda90ca930eb9a5fda2da3c4d5571acb0ef5bd9ab0af46edd0acc7

                                    SHA512

                                    341eb09b0d0c757f9e85ad392a43a0ad565e02b8b21b0bbd57b1385fb3a9e2965ceb28db5fa65eeb09b09ca8e47e10f4533808d98bb56311fccb1324a79809ae

                                  • C:\Users\Admin\AppData\Local\Temp\1016999001\5d2286aacf.exe

                                    Filesize

                                    4.2MB

                                    MD5

                                    3a425626cbd40345f5b8dddd6b2b9efa

                                    SHA1

                                    7b50e108e293e54c15dce816552356f424eea97a

                                    SHA256

                                    ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                                    SHA512

                                    a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                                  • C:\Users\Admin\AppData\Local\Temp\1017000001\09858939fd.exe

                                    Filesize

                                    3.1MB

                                    MD5

                                    c00a67d527ef38dc6f49d0ad7f13b393

                                    SHA1

                                    7b8f2de130ab5e4e59c3c2f4a071bda831ac219d

                                    SHA256

                                    12226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3

                                    SHA512

                                    9286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca

                                  • C:\Users\Admin\AppData\Local\Temp\1017002001\bbbc2dc63a.exe

                                    Filesize

                                    758KB

                                    MD5

                                    afd936e441bf5cbdb858e96833cc6ed3

                                    SHA1

                                    3491edd8c7caf9ae169e21fb58bccd29d95aefef

                                    SHA256

                                    c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                                    SHA512

                                    928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                                  • C:\Users\Admin\AppData\Local\Temp\1017003001\426d598671.exe

                                    Filesize

                                    747KB

                                    MD5

                                    8a9cb17c0224a01bd34b46495983c50a

                                    SHA1

                                    00296ea6a56f6e10a0f1450a20c5fb329b8856c1

                                    SHA256

                                    3d51b9523b387859bc0d94246dfb216cfa82f9d650c8d11be11ed67f70e7440b

                                    SHA512

                                    1472e4670f469c43227b965984ecc223a526f6284363d8e08a3b5b55e602ccce62df4bc49939ee5bd7df7b0c26e20da896b084eccab767f8728e6bf14d71c840

                                  • C:\Users\Admin\AppData\Local\Temp\NordVPNSetup.exe

                                    Filesize

                                    15.0MB

                                    MD5

                                    00fad648745710b9c4d16c4830416d80

                                    SHA1

                                    fafb219fe26e065cc11d4c12a4960447509b2a84

                                    SHA256

                                    e4561ffd0993938234d207ce56d5fe775c4ddb704f7be63003026d43eae0a337

                                    SHA512

                                    21e7b3965d1f54eb671b46e272161a426dd8a4151208b154c7fbf144725c38d593d513fb6f77cd1cef4df651266fc235a76023102b5fdc85cc8cc67da6ded847

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kcnjxxla.zaw.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                    Filesize

                                    2.9MB

                                    MD5

                                    838dfe4fdfe00acd5160ed5f7e5fe620

                                    SHA1

                                    67c679c92a0fed7ebd5669645034988fcfc9c16d

                                    SHA256

                                    a1aa2f3960356ac618995c25c51a91cabb963a878a45ac0213bbe5bc478772ef

                                    SHA512

                                    70c5a95da4687e90e46d55174b854620bc448ee421b1b6007b3768025797dc41a550e9e33628ba146a00945f24c6ad9f220011a5227ee657e7d9b7c3525c7000

                                  • C:\Users\Admin\AppData\Local\Temp\is-3AM4N.tmp\Installer.png

                                    Filesize

                                    41KB

                                    MD5

                                    48f30e9b874607f974a289c4b9366eac

                                    SHA1

                                    665bc7dd97777c2b28034b4fe9e67aef918638e6

                                    SHA256

                                    36fc3878d46bb626808d005d048b06e047f099ea55e06630e5ca3f770e9d2001

                                    SHA512

                                    b6920c6a3eb231cc7c4ec856f4c1c4244c81828ac8ef755f396d327a9e41c3f26fdea8c7f8ae1df8d9d48dd7840090bb19bcb2f653f84b958cb84cd6e901cc65

                                  • C:\Users\Admin\AppData\Local\Temp\is-3AM4N.tmp\Logo3.png

                                    Filesize

                                    5KB

                                    MD5

                                    9a4195984907c6c86e8f9f3c699c929a

                                    SHA1

                                    4ab99e6e19653e1843c87c9aea071e5e3baef8e8

                                    SHA256

                                    a4c727202170101f55249b0867b24dc8a6ad3098af43c5c2dea7a683f34509bf

                                    SHA512

                                    90dc881faa1b7cfd4e00130f22c433b1558f3a53090edf039a92250f7bb0a1bff213afa16b189f4c314a27658b229a434f2cb0eede1f412768888dc7639a0b9f

                                  • C:\Users\Admin\AppData\Local\Temp\is-3AM4N.tmp\Server.png

                                    Filesize

                                    51KB

                                    MD5

                                    e5064949166150e855113e66df1abc38

                                    SHA1

                                    d24f57301f4d4f3b48081e4c8744e9fc031676f7

                                    SHA256

                                    e73cf0ce497baf7d5b8180143b91a2f42de1d87480cf3f38271f0f2f97aa4080

                                    SHA512

                                    fc3749f2453d8eb7e9b9dc325951543c1640ca1d15ee547c9da117451a10fa5e1605b3a7e783558291ed67d460a712aed938a07681e99a1f203d5f14ae081086

                                  • C:\Users\Admin\AppData\Local\Temp\is-3AM4N.tmp\_isetup\_RegDLL.tmp

                                    Filesize

                                    4KB

                                    MD5

                                    0ee914c6f0bb93996c75941e1ad629c6

                                    SHA1

                                    12e2cb05506ee3e82046c41510f39a258a5e5549

                                    SHA256

                                    4dc09bac0613590f1fac8771d18af5be25a1e1cb8fdbf4031aa364f3057e74a2

                                    SHA512

                                    a899519e78125c69dc40f7e371310516cf8faa69e3b3ff747e0ddf461f34e50a9ff331ab53b4d07bb45465039e8eba2ee4684b3ee56987977ae8c7721751f5f9

                                  • C:\Users\Admin\AppData\Local\Temp\is-3AM4N.tmp\_isetup\_setup64.tmp

                                    Filesize

                                    6KB

                                    MD5

                                    4ff75f505fddcc6a9ae62216446205d9

                                    SHA1

                                    efe32d504ce72f32e92dcf01aa2752b04d81a342

                                    SHA256

                                    a4c86fc4836ac728d7bd96e7915090fd59521a9e74f1d06ef8e5a47c8695fd81

                                    SHA512

                                    ba0469851438212d19906d6da8c4ae95ff1c0711a095d9f21f13530a6b8b21c3acbb0ff55edb8a35b41c1a9a342f5d3421c00ba395bc13bb1ef5902b979ce824

                                  • C:\Users\Admin\AppData\Local\Temp\is-3AM4N.tmp\_isetup\_shfoldr.dll

                                    Filesize

                                    22KB

                                    MD5

                                    92dc6ef532fbb4a5c3201469a5b5eb63

                                    SHA1

                                    3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                    SHA256

                                    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                    SHA512

                                    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                  • C:\Users\Admin\AppData\Local\Temp\is-3AM4N.tmp\b2p.dll

                                    Filesize

                                    22KB

                                    MD5

                                    ab35386487b343e3e82dbd2671ff9dab

                                    SHA1

                                    03591d07aea3309b631a7d3a6e20a92653e199b8

                                    SHA256

                                    c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2

                                    SHA512

                                    b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09

                                  • C:\Users\Admin\AppData\Local\Temp\is-3AM4N.tmp\botva2.dll

                                    Filesize

                                    37KB

                                    MD5

                                    67965a5957a61867d661f05ae1f4773e

                                    SHA1

                                    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

                                    SHA256

                                    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

                                    SHA512

                                    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

                                  • C:\Users\Admin\AppData\Local\Temp\is-3AM4N.tmp\eng.png

                                    Filesize

                                    4KB

                                    MD5

                                    86bee4a15a777e236f1636b57a37b047

                                    SHA1

                                    7c93de14c61603a0573719de1ffa86b7226c0dae

                                    SHA256

                                    17e6f0e88a231e25c1de67a0d4ae308284f407dea77ff8b3ce363b770c5ba8f1

                                    SHA512

                                    af3ebe043048c6dc683408f22e647609d0423fd2fa55cba5d981f978fb1123fd9d5cfca147168d4ff437a09f699fd5d5c1a14b50d66ed4bcae4485adcf0ab8b7

                                  • C:\Users\Admin\AppData\Local\Temp\is-3AM4N.tmp\icon.png

                                    Filesize

                                    4KB

                                    MD5

                                    f5486535c71cd199e6c1f3dc43a8943e

                                    SHA1

                                    366a454cfab4821747d069c2c5de687b84e49323

                                    SHA256

                                    ee5c535dc8f819b31346e1723db1a5aab6bda94ff57c2477e1291fd4f7841bb8

                                    SHA512

                                    ab2bf66480260064075e655746eabd32ea71e1f9b232c03ecb67999825418177c033b224b0f5f5b269d1b86428134e6bf7389c1729a591103d4b74b7497e67b1

                                  • C:\Users\Admin\AppData\Local\Temp\is-3AM4N.tmp\iswin7logo.dll

                                    Filesize

                                    39KB

                                    MD5

                                    1ea948aad25ddd347d9b80bef6df9779

                                    SHA1

                                    0be971e67a6c3b1297e572d97c14f74b05dafed3

                                    SHA256

                                    30eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488

                                    SHA512

                                    f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545

                                  • C:\Users\Admin\AppData\Local\Temp\is-3AM4N.tmp\rus.png

                                    Filesize

                                    2KB

                                    MD5

                                    6e57cda7a4a20382c6033d2458bd676c

                                    SHA1

                                    5524b66fa844db104ce6173f7aa0de625f53a408

                                    SHA256

                                    2b9fb591c534ff41765b9b4eaee88e121501b78cb3bce3bd768c68838a363e5b

                                    SHA512

                                    f33de6f8897e9a756a2d3c86fdb75549b475e7185a8aa4b8d1462a59e2eedc8b48d2acfbef4347584ba23d71cd7aeb0856e737c07f4f82379aab40fe6860974a

                                  • C:\Users\Admin\AppData\Local\Temp\is-NFLPN.tmp\NordVPNSetup.tmp

                                    Filesize

                                    920KB

                                    MD5

                                    ce14f23d9bfc00a3cc5ceb06a25030e7

                                    SHA1

                                    c63991558fb7c45555a1c4e53151bdb518b15eec

                                    SHA256

                                    5bd02d57433581efc6e14f6aefa4d1b5a52051f2ca269bde439b50658fa0bc39

                                    SHA512

                                    6497e85f1009b26fe68317a695467505e6f75270f07308ee7c321abe9b08b7ae563598b11b44629051759f321a39ec7595c0c6e48b9778146ee7f42096ff88ce

                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                    Filesize

                                    458KB

                                    MD5

                                    619f7135621b50fd1900ff24aade1524

                                    SHA1

                                    6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                    SHA256

                                    344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                    SHA512

                                    2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                    Filesize

                                    479KB

                                    MD5

                                    09372174e83dbbf696ee732fd2e875bb

                                    SHA1

                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                    SHA256

                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                    SHA512

                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                                    Filesize

                                    17KB

                                    MD5

                                    d798b7ff7be9168fc39037004039ddee

                                    SHA1

                                    708d7eb05f09215630f51fadd46b855b5b629cc0

                                    SHA256

                                    95bd180cfc34f77d28cdacceb68de82f7aed05702f91516737e1ff9d29780333

                                    SHA512

                                    9abaa198eb6322cf7e26c27af255394ae84505495f5f3caab5cb69b1cbb083d569538376d5fb838c4e86196c1e363977e0cfb07bb66f77b09ca24defac177b92

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                                    Filesize

                                    6KB

                                    MD5

                                    a095f1ca98dc5fb64da8dcd0b68aa628

                                    SHA1

                                    4bcdac3578e65bb4649dd2364cceb599353e58b4

                                    SHA256

                                    a7734edca6911fd8417633896f208fce7705c63139bdbcda5bcb07bd6dcb3574

                                    SHA512

                                    29a7b6e1b306a03403fcc4e8cc37e68d049cab10fc0f9f93a37352b9ad98360047dad63040c6ce781363f79ddd98e6c9448cbfab70f7850ddc42902b5a00fbed

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                                    Filesize

                                    10KB

                                    MD5

                                    04e0269bb4b86d88269f53493d4604af

                                    SHA1

                                    a481020ea451ab508794857b4d365a8f9fc71e33

                                    SHA256

                                    c8d4ba3f74d6ef10fb6b5e501c80e253c24efe3efb9d582e1a8b577182019f59

                                    SHA512

                                    d436ea38c87ee9a4754b7d256da1f8e8563c4a2cd1a654e4ce60894d23fdcb138336a50b143489393b7e470f0fbbe3a9f5511651ab4cfc98598fe6d6e616bf50

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    28KB

                                    MD5

                                    750db6644b61dc232adb2b17e9582a56

                                    SHA1

                                    d05c8e3ba478ed5ebd1ad2c22d8437ee662a1dc7

                                    SHA256

                                    637b38327825f115883906aaf1ab1e2ff091ce4e2285abaf67f50fdc9233c0f5

                                    SHA512

                                    5ed5623c1e94c36d79e3d8f06efe6b05c04b5b4c73f834cf631a1f46aa9fc665fb2d62962bf6509b157edc96da869b96d793f508a6da9d7c423a68db594294d1

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    29KB

                                    MD5

                                    0f82ae25a1821401c272cef408adde02

                                    SHA1

                                    28c4b3f870e92d00012983388c468cbaa4c6ffdd

                                    SHA256

                                    cb733b18e2d8445d401eaa31670c4c94c58286334ca14c554179c68685444efc

                                    SHA512

                                    2201eee574e9f32abc834c741fdc50ab66c972ad45b3c848dd8b62c463640f4c1b091e8edfe3b2e625c1cfb677e95180618cf398d38f60041b42bf74a23f16d0

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    6KB

                                    MD5

                                    642b6221396e06f1aac08f13fe714f64

                                    SHA1

                                    aab1b3b3b149dadb659aaf842b65e7a61bbd2d9a

                                    SHA256

                                    d92a9d87031a3bc2e8c88d235b7fe36f61641fc2499651441eb448e34b99927b

                                    SHA512

                                    aa97bb21056c227e2d841ccf08a3a2110fcdfe911531165b0f7925e96b3fabf5026eaa6a9aea200c06edd6ac490ce2f009ac9f3199ebd042d11606472efd9f89

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    6KB

                                    MD5

                                    8c5e2beb04e27e06b15362e5fdded355

                                    SHA1

                                    99579817f0518d3a21bd4a5e0bfe072876dcb9b3

                                    SHA256

                                    404a9224f654e8e72d50a0a0f4d32781ff97667421759206635d518b0de93653

                                    SHA512

                                    2e397376b9231c0601115eeb2bdb659c9bfd0346e5939368426a181ef691a7bfedbed3c4467f94e05a2776a5a004390b2812d98184f37d7e16f4acfc6bd579bf

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    5KB

                                    MD5

                                    407164d6c9e17e077b92b23f97ee8460

                                    SHA1

                                    7a04cab2511bc1022ab88212b15440bed5c0b153

                                    SHA256

                                    70a2813506d1e32e2efa30267bc57194705b6d84e0f5e827c15a25f773098b57

                                    SHA512

                                    91f5a3decac28bcc6a9a349b059ea82ddc376517feba5ed69602400203de51f5c78410d4f7d7feb8fb8c265f29824c9a570bdb0c9c915a3ae6d23f98a61cff3c

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\2472b6fe-ff42-4064-a459-1cea79e5d4b1

                                    Filesize

                                    982B

                                    MD5

                                    d63503a57c94609e36c700ac52997fbb

                                    SHA1

                                    e6a97ba403b1aeb4eaf9090a58b1c031a29a09f9

                                    SHA256

                                    969eaa941ba89de126209be3490c86819db67f5e2165ccc3e6db373f17f56753

                                    SHA512

                                    66f102fa136e3552431a8b3b509dd80bec62437d08109152365184582143279dd9caef1a5bd052b684839438844ad18ae383efe5795903900b7a4846d2f22fc3

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\3588f803-2b71-4908-899b-9a5b81bb4082

                                    Filesize

                                    671B

                                    MD5

                                    e0afb1141a8dad705db29601abc936c9

                                    SHA1

                                    4aba215276eff48afa95a10aa338d363b378d858

                                    SHA256

                                    a1d01459ea281c37186dbacb77694c949478fa526fc1a6600ce30afbdf72da7f

                                    SHA512

                                    3afe4684a5bfe764b77633f8be5817c1f56f656e9c96babd78d43293519d2e3c6bcf7f4f4148817f8015dbdd8155e7b6b7571863a94e79e8675e0c1c512a221d

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\38e835a1-455b-4a9f-992d-8254b8bcb9f1

                                    Filesize

                                    28KB

                                    MD5

                                    2ccc6521e92fb9a359ee9a9477d4bec4

                                    SHA1

                                    eecb06460b1436c9038e09284a6a5ab8f8723b99

                                    SHA256

                                    dde998a3a9098627aef347c6d1b918c159c9f3c275164df857fc55112c0720b4

                                    SHA512

                                    b874d3c49a1f542994a3225e86e9c00d7f8035c3a25e11506b2f754fbb2122e81211b037291e786c8287d197589b7718e71c4114814a70f8cb07ddd4d871a727

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                    Filesize

                                    1.1MB

                                    MD5

                                    842039753bf41fa5e11b3a1383061a87

                                    SHA1

                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                    SHA256

                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                    SHA512

                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                    Filesize

                                    116B

                                    MD5

                                    2a461e9eb87fd1955cea740a3444ee7a

                                    SHA1

                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                    SHA256

                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                    SHA512

                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp

                                    Filesize

                                    479B

                                    MD5

                                    49ddb419d96dceb9069018535fb2e2fc

                                    SHA1

                                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                    SHA256

                                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                    SHA512

                                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                    Filesize

                                    372B

                                    MD5

                                    bf957ad58b55f64219ab3f793e374316

                                    SHA1

                                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                    SHA256

                                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                    SHA512

                                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                    Filesize

                                    17.8MB

                                    MD5

                                    daf7ef3acccab478aaa7d6dc1c60f865

                                    SHA1

                                    f8246162b97ce4a945feced27b6ea114366ff2ad

                                    SHA256

                                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                    SHA512

                                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                                    Filesize

                                    10KB

                                    MD5

                                    8e2b7dc162d34b8a30057e23c988bc40

                                    SHA1

                                    2680b249598e77ce3e2c290400f7206282f26d5a

                                    SHA256

                                    dd573a40a61b10b99cc6342e8514862683ae33d9183c6aa411b79a0a43597b7a

                                    SHA512

                                    75e60289705fdd0180d4f8f0e7d3d11d416b6f58ad46663b0d1b438180099d5ab66efa3b099f5fcf24049ac0817392a6bd6748b68894775d6488f457d6512492

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                                    Filesize

                                    13KB

                                    MD5

                                    f6e84cbef32d26b3da21e78de9b7e5fe

                                    SHA1

                                    c7441f33c1adb892acc02a4985de8afe48c5e611

                                    SHA256

                                    b743d4b3951a11da68918f58f4f7f72cd15eca3993b08ed631d3a97f05e81ebb

                                    SHA512

                                    e1091071ed140d86978e3ceffd405d792c59ff20131a3f324117d57ce337b4b0cc0a24b77a2db5d318f6485b37c05824f43423e4a401aaae39d737d47bdc96ec

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                                    Filesize

                                    10KB

                                    MD5

                                    2647e25d4438bf09d5c8a5f7dd7be9ad

                                    SHA1

                                    f00480efe0adac035047783eda9563725a3dd491

                                    SHA256

                                    d479caea65fd34a9752b19f1a8012ced9b67ba33c3999eab69176b2ede928a2d

                                    SHA512

                                    89eda7ec56e558aa769f4b30485030154beb3853f984d8b5aaf8cfe874cdc7424c2e563713d60f6ab4c51958756658e2fa670838f11825a1eb784e57d95c05c3

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                    Filesize

                                    584KB

                                    MD5

                                    1a91379f7899f78b137f935b01fd8214

                                    SHA1

                                    faf82af50303ac32d3fbdf4878642b8b321d3aaa

                                    SHA256

                                    8d5801d9b1ce0d696811a4e0807453e64adfd3a6a5a43411f161ca8d4cac8bcb

                                    SHA512

                                    82a95a8fa902469c33a155d73d55f62d0a0eba549067f9d44f17bd011dcd4fcccde8923dbf4b836c865538c62ce4107a801e4dd634b909b1a92ccfbfcceeda94

                                  • memory/116-331-0x00000000005F0000-0x0000000000905000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/116-312-0x00000000005F0000-0x0000000000905000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/1248-59-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/1248-60-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/1632-93-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-176-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-168-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-169-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-149-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-109-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-110-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-111-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-112-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-115-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-171-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-173-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-174-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-114-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-184-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-148-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-116-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-79-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-88-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-147-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-170-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-90-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-91-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-95-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-113-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-94-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-92-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1632-89-0x0000000000400000-0x000000000064F000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/1668-49-0x0000000005120000-0x0000000005276000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1668-51-0x0000000004CD0000-0x0000000004CF2000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/1668-50-0x0000000005820000-0x0000000005DC4000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/1668-46-0x000000007392E000-0x000000007392F000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1668-40-0x000000007392E000-0x000000007392F000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1668-42-0x0000000004E80000-0x0000000004F1C000-memory.dmp

                                    Filesize

                                    624KB

                                  • memory/1668-41-0x00000000000A0000-0x00000000003C0000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/1712-240-0x0000000000AC0000-0x0000000000FC4000-memory.dmp

                                    Filesize

                                    5.0MB

                                  • memory/1712-242-0x0000000000AC0000-0x0000000000FC4000-memory.dmp

                                    Filesize

                                    5.0MB

                                  • memory/1744-951-0x00000000006E0000-0x0000000000BE4000-memory.dmp

                                    Filesize

                                    5.0MB

                                  • memory/1744-949-0x00000000006E0000-0x0000000000BE4000-memory.dmp

                                    Filesize

                                    5.0MB

                                  • memory/2116-3-0x0000000000410000-0x000000000072B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/2116-0-0x0000000000410000-0x000000000072B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/2116-1-0x0000000077D14000-0x0000000077D16000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/2116-2-0x0000000000411000-0x000000000043F000-memory.dmp

                                    Filesize

                                    184KB

                                  • memory/2116-15-0x0000000000410000-0x000000000072B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/2116-4-0x0000000000410000-0x000000000072B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/2364-329-0x0000000000D30000-0x0000000001889000-memory.dmp

                                    Filesize

                                    11.3MB

                                  • memory/2364-349-0x0000000000D30000-0x0000000001889000-memory.dmp

                                    Filesize

                                    11.3MB

                                  • memory/2424-2486-0x0000000005810000-0x0000000005832000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/2424-1066-0x0000000000C40000-0x0000000000F68000-memory.dmp

                                    Filesize

                                    3.2MB

                                  • memory/2604-948-0x0000000000FB0000-0x0000000001441000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/2604-347-0x0000000000FB0000-0x0000000001441000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/2604-540-0x0000000000FB0000-0x0000000001441000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/3348-18-0x0000000000B41000-0x0000000000B6F000-memory.dmp

                                    Filesize

                                    184KB

                                  • memory/3348-61-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3348-44-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3348-63-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3348-62-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3348-47-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3348-48-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3348-16-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3348-57-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3348-20-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3348-19-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3348-43-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3348-45-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3348-21-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/3424-548-0x0000000000280000-0x00000000006EC000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/3424-549-0x0000000000280000-0x00000000006EC000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/3424-542-0x0000000000280000-0x00000000006EC000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/3424-953-0x0000000000280000-0x00000000006EC000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/3424-1103-0x0000000000660000-0x0000000000B06000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/3424-987-0x0000000000280000-0x00000000006EC000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/3424-1085-0x0000000000660000-0x0000000000B06000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/3556-1033-0x000001631ADF0000-0x000001631AE12000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3748-53-0x0000000000400000-0x0000000000456000-memory.dmp

                                    Filesize

                                    344KB

                                  • memory/3748-56-0x0000000000400000-0x0000000000456000-memory.dmp

                                    Filesize

                                    344KB

                                  • memory/4004-1030-0x00007FF752EC0000-0x00007FF753350000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/4004-1032-0x00007FF752EC0000-0x00007FF753350000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/4092-209-0x0000000000760000-0x0000000000A8B000-memory.dmp

                                    Filesize

                                    3.2MB

                                  • memory/4092-223-0x0000000000760000-0x0000000000A8B000-memory.dmp

                                    Filesize

                                    3.2MB

                                  • memory/4116-141-0x00000000071C0000-0x00000000071CF000-memory.dmp

                                    Filesize

                                    60KB

                                  • memory/4116-143-0x00000000736A0000-0x00000000736B1000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/4116-121-0x0000000073960000-0x000000007397B000-memory.dmp

                                    Filesize

                                    108KB

                                  • memory/4308-98-0x0000000000400000-0x0000000000419000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/4340-282-0x00000000005E0000-0x0000000001139000-memory.dmp

                                    Filesize

                                    11.3MB

                                  • memory/4340-544-0x00000000005E0000-0x0000000001139000-memory.dmp

                                    Filesize

                                    11.3MB

                                  • memory/4340-471-0x00000000005E0000-0x0000000001139000-memory.dmp

                                    Filesize

                                    11.3MB

                                  • memory/4596-264-0x0000000000020000-0x00000000004C6000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/4596-295-0x0000000000020000-0x00000000004C6000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/4840-792-0x00000000006D0000-0x00000000009FB000-memory.dmp

                                    Filesize

                                    3.2MB

                                  • memory/4840-769-0x00000000006D0000-0x00000000009FB000-memory.dmp

                                    Filesize

                                    3.2MB

                                  • memory/4928-798-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/4928-770-0x0000000000B40000-0x0000000000E5B000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/4960-462-0x0000000000200000-0x0000000000704000-memory.dmp

                                    Filesize

                                    5.0MB

                                  • memory/4960-366-0x0000000000200000-0x0000000000704000-memory.dmp

                                    Filesize

                                    5.0MB

                                  • memory/5028-296-0x00000000006D0000-0x00000000009FB000-memory.dmp

                                    Filesize

                                    3.2MB

                                  • memory/5028-221-0x00000000006D0000-0x00000000009FB000-memory.dmp

                                    Filesize

                                    3.2MB

                                  • memory/6120-1069-0x0000000000440000-0x00000000008AC000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/6120-876-0x0000000000440000-0x00000000008AC000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/6120-875-0x0000000000440000-0x00000000008AC000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/6120-796-0x0000000000440000-0x00000000008AC000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/6120-1028-0x0000000000440000-0x00000000008AC000-memory.dmp

                                    Filesize

                                    4.4MB