Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 20:58

General

  • Target

    c2bee3616cf5c0f19ecc5738ee39a8c3d0d0523c2178177b86563d5a3d758d0f_Sigmanly.exe

  • Size

    2.8MB

  • MD5

    61cb850896f4b6aac18c72e82eb9ac90

  • SHA1

    c1fcdd242b13e4c5ad99f7e76da886288622b6dc

  • SHA256

    c2bee3616cf5c0f19ecc5738ee39a8c3d0d0523c2178177b86563d5a3d758d0f

  • SHA512

    d156751d3d9e353a116e55cbc9a9e87da03a4d29efe529344ce996324ec361f0472724bb8162c2be7ea6f291aaf2f7cbbc8659672777e182e40283fa661a2043

  • SSDEEP

    49152:nZNt60MWKf4ZmSXyOQqcxSdj04drGcnaj0GpmeogTOpGg:nZNt66Kf4Zm4yOraSd44ZGEaoGpkzGg

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 4 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 32 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 52 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Uses the VBS compiler for execution 1 TTPs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 54 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2bee3616cf5c0f19ecc5738ee39a8c3d0d0523c2178177b86563d5a3d758d0f_Sigmanly.exe
    "C:\Users\Admin\AppData\Local\Temp\c2bee3616cf5c0f19ecc5738ee39a8c3d0d0523c2178177b86563d5a3d758d0f_Sigmanly.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe
        "C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c move App App.cmd & App.cmd
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1624
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "opssvc wrsa"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1460
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1800
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:588
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 245347
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2036
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "profiles" Organizing
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2028
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Judy + ..\Sheets + ..\Another + ..\Wanting b
            5⤵
            • System Location Discovery: System Language Discovery
            PID:900
          • C:\Users\Admin\AppData\Local\Temp\245347\Dry.com
            Dry.com b
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2592
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\245347\Dry.com" & rd /s /q "C:\ProgramData\KFUAIWTJM7GV" & exit
              6⤵
              • System Location Discovery: System Language Discovery
              PID:540
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                7⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:1644
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            5⤵
            • System Location Discovery: System Language Discovery
            PID:648
      • C:\Users\Admin\AppData\Local\Temp\1018838001\77d4503e2c.exe
        "C:\Users\Admin\AppData\Local\Temp\1018838001\77d4503e2c.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2108
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\wjyicueda"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1592
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2076
      • C:\Users\Admin\AppData\Local\Temp\1018850001\e1184f44c7.exe
        "C:\Users\Admin\AppData\Local\Temp\1018850001\e1184f44c7.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:1676
      • C:\Users\Admin\AppData\Local\Temp\1018851001\bbb95df60e.exe
        "C:\Users\Admin\AppData\Local\Temp\1018851001\bbb95df60e.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:2056
        • C:\Users\Admin\AppData\Local\Temp\1018851001\bbb95df60e.exe
          "C:\Users\Admin\AppData\Local\Temp\1018851001\bbb95df60e.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          PID:2444
      • C:\Users\Admin\AppData\Local\Temp\1018852001\003.exe
        "C:\Users\Admin\AppData\Local\Temp\1018852001\003.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:2860
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
          4⤵
          • Sets service image path in registry
          • Suspicious behavior: LoadsDriver
          • Suspicious use of AdjustPrivilegeToken
          PID:1948
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Add-MpPreference -ExclusionPath C:\
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2392
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Remove-MpPreference -ExclusionPath C:\
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2600
      • C:\Users\Admin\AppData\Local\Temp\1018853001\4cc76774f9.exe
        "C:\Users\Admin\AppData\Local\Temp\1018853001\4cc76774f9.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:2952
        • C:\Users\Admin\AppData\Local\Temp\1018853001\4cc76774f9.exe
          "C:\Users\Admin\AppData\Local\Temp\1018853001\4cc76774f9.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2868
      • C:\Users\Admin\AppData\Local\Temp\1018854001\8fd6d530e2.exe
        "C:\Users\Admin\AppData\Local\Temp\1018854001\8fd6d530e2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:980
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c move App App.cmd & App.cmd
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1788
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:332
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "opssvc wrsa"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2276
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2856
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3008
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 245347
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2156
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "profiles" Organizing
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2352
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Judy + ..\Sheets + ..\Another + ..\Wanting b
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2144
          • C:\Users\Admin\AppData\Local\Temp\245347\Dry.com
            Dry.com b
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:648
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\245347\Dry.com" & rd /s /q "C:\ProgramData\6F3E3ECTRI5F" & exit
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2808
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                7⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:2280
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2292
      • C:\Users\Admin\AppData\Local\Temp\1018855001\269ef1738b.exe
        "C:\Users\Admin\AppData\Local\Temp\1018855001\269ef1738b.exe"
        3⤵
        • Enumerates VirtualBox registry keys
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1596
      • C:\Users\Admin\AppData\Local\Temp\1018856001\37d625c12a.exe
        "C:\Users\Admin\AppData\Local\Temp\1018856001\37d625c12a.exe"
        3⤵
        • Executes dropped EXE
        PID:2068
      • C:\Users\Admin\AppData\Local\Temp\1018857001\3fc259db12.exe
        "C:\Users\Admin\AppData\Local\Temp\1018857001\3fc259db12.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2248
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\alxqovhwb"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1492
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2412
      • C:\Users\Admin\AppData\Local\Temp\1018858001\83ef3ddb90.exe
        "C:\Users\Admin\AppData\Local\Temp\1018858001\83ef3ddb90.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:9720
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
          4⤵
          • Loads dropped DLL
          PID:9836
          • C:\Windows\system32\mode.com
            mode 65,10
            5⤵
              PID:9860
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e file.zip -p24291711423417250691697322505 -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:9868
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_7.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:9892
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_6.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:9924
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_5.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:9948
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_4.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:9976
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_3.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:10000
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_2.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:10024
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_1.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:10048
            • C:\Windows\system32\attrib.exe
              attrib +H "in.exe"
              5⤵
              • Views/modifies file attributes
              PID:10072
            • C:\Users\Admin\AppData\Local\Temp\main\in.exe
              "in.exe"
              5⤵
              • Executes dropped EXE
              PID:10080
              • C:\Windows\system32\attrib.exe
                attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:10096
              • C:\Windows\system32\attrib.exe
                attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:10104
              • C:\Windows\system32\schtasks.exe
                schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:10112
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell ping 127.0.0.1; del in.exe
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:10120
                • C:\Windows\system32\PING.EXE
                  "C:\Windows\system32\PING.EXE" 127.0.0.1
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:2196
        • C:\Users\Admin\AppData\Local\Temp\1018859001\ce6479e041.exe
          "C:\Users\Admin\AppData\Local\Temp\1018859001\ce6479e041.exe"
          3⤵
          • Enumerates VirtualBox registry keys
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2824
        • C:\Users\Admin\AppData\Local\Temp\1018860001\c19fb1cf27.exe
          "C:\Users\Admin\AppData\Local\Temp\1018860001\c19fb1cf27.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3204
        • C:\Users\Admin\AppData\Local\Temp\1018861001\42de031164.exe
          "C:\Users\Admin\AppData\Local\Temp\1018861001\42de031164.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3620
        • C:\Users\Admin\AppData\Local\Temp\1018862001\997a977ce3.exe
          "C:\Users\Admin\AppData\Local\Temp\1018862001\997a977ce3.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4280
        • C:\Users\Admin\AppData\Local\Temp\1018863001\c4278bf154.exe
          "C:\Users\Admin\AppData\Local\Temp\1018863001\c4278bf154.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:4828
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4888
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:5080
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1608
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:5188
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:5296
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:5400
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:5416
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5416.0.1472492145\1072974306" -parentBuildID 20221007134813 -prefsHandle 1240 -prefMapHandle 1112 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a692cfa8-d550-4585-b552-7c55a6c121e9} 5416 "\\.\pipe\gecko-crash-server-pipe.5416" 1316 fdd6858 gpu
                  6⤵
                    PID:5824
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5416.1.1750633816\1142666440" -parentBuildID 20221007134813 -prefsHandle 1532 -prefMapHandle 1512 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8984e3a7-0918-4b5f-a0f9-32f74ed8358f} 5416 "\\.\pipe\gecko-crash-server-pipe.5416" 1544 45eb558 socket
                    6⤵
                      PID:5956
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5416.2.1059554617\643214167" -childID 1 -isForBrowser -prefsHandle 2108 -prefMapHandle 2104 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ba24772-3d76-4e25-aad2-7bd328c82285} 5416 "\\.\pipe\gecko-crash-server-pipe.5416" 2120 fd6af58 tab
                      6⤵
                        PID:2924
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5416.3.1306741425\477967643" -childID 2 -isForBrowser -prefsHandle 2764 -prefMapHandle 2760 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3970b27f-0406-42d6-b2d7-25b0ac3f26b6} 5416 "\\.\pipe\gecko-crash-server-pipe.5416" 2776 e64b58 tab
                        6⤵
                          PID:6824
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5416.4.567946377\1794090261" -childID 3 -isForBrowser -prefsHandle 3732 -prefMapHandle 3728 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c4107188-abc5-4965-b9c8-f0ac82b88bab} 5416 "\\.\pipe\gecko-crash-server-pipe.5416" 3744 1eee0858 tab
                          6⤵
                            PID:8120
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5416.5.1910908395\486371038" -childID 4 -isForBrowser -prefsHandle 3852 -prefMapHandle 3856 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {840e5402-b2a9-4cce-88ab-8818ccc2984a} 5416 "\\.\pipe\gecko-crash-server-pipe.5416" 3840 1f014658 tab
                            6⤵
                              PID:8136
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5416.6.187343884\188185146" -childID 5 -isForBrowser -prefsHandle 4016 -prefMapHandle 4020 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2eb8da3-acfb-4f4b-9488-28c1b2551221} 5416 "\\.\pipe\gecko-crash-server-pipe.5416" 4004 1f015558 tab
                              6⤵
                                PID:8156
                        • C:\Users\Admin\AppData\Local\Temp\1018864001\8ec60caf49.exe
                          "C:\Users\Admin\AppData\Local\Temp\1018864001\8ec60caf49.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:8056
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {44AEB977-1F33-4659-BE02-46A24818A8F5} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]
                      1⤵
                      • Loads dropped DLL
                      PID:4784
                      • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                        C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4832
                        • C:\Windows\explorer.exe
                          explorer.exe
                          3⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4848
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                          3⤵
                          • Drops file in System32 directory
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4936
                          • C:\Windows\system32\PING.EXE
                            "C:\Windows\system32\PING.EXE" 127.1.10.1
                            4⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:5084

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\download[1].htm

                      Filesize

                      1B

                      MD5

                      cfcd208495d565ef66e7dff9f98764da

                      SHA1

                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                      SHA256

                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                      SHA512

                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\activity-stream.discovery_stream.json.tmp

                      Filesize

                      23KB

                      MD5

                      a9297a09ff6ddffb65a4a6463e46f807

                      SHA1

                      5e7ffe884b0fc44a9e6ecc68112802e605976837

                      SHA256

                      42842f83af564b6781d2098f8461f6a46a5f9af808334edf63fbd142215f8650

                      SHA512

                      cdba1524baefab4bb14c87582af1e5a8e239578e523ce5717b573a669dfaf4794cfe420dbb0388a5c38faa4b557d4387b8dfa9530b88406baa83e83a2813769d

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                      Filesize

                      15KB

                      MD5

                      96c542dec016d9ec1ecc4dddfcbaac66

                      SHA1

                      6199f7648bb744efa58acf7b96fee85d938389e4

                      SHA256

                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                      SHA512

                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                    • C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe

                      Filesize

                      842KB

                      MD5

                      8eb4f92605e35c57a42b0917c221d65c

                      SHA1

                      0e64d77ef1b917b3afe512b49710250c71369175

                      SHA256

                      b57d78d93f74f7ae840ab03d3fda4f22a24ad35afcf9a53128cf82a92a67a085

                      SHA512

                      4cc5db426c8de3d7afdcfa26440d5bd9a885f5148e4307b8d04c5d56c96672d5c82ed9989bf346ce7aecea07d980735c46a930b885f824ba53738ac76dbb05bf

                    • C:\Users\Admin\AppData\Local\Temp\1018838001\77d4503e2c.exe

                      Filesize

                      21KB

                      MD5

                      14becdf1e2402e9aa6c2be0e6167041e

                      SHA1

                      72cbbae6878f5e06060a0038b25ede93b445f0df

                      SHA256

                      7a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a

                      SHA512

                      16b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a

                    • C:\Users\Admin\AppData\Local\Temp\1018850001\e1184f44c7.exe

                      Filesize

                      1.8MB

                      MD5

                      27c1f96d7e1b72b6817b6efeff037f90

                      SHA1

                      2972cc112fc7e20cbf5952abe07407b8c1fbb2a2

                      SHA256

                      aec3ec473de321d123e939985579227ee62b53b3b3edb7ab96e2a66c17e9696d

                      SHA512

                      9a31dc9945889d35aea8710df2f42806c72c422b7b5f4aa8acba6986cbd9ea6a49181a41a50ee21ccbed86cbff87c98a742e681ac3f6a87e2bd4436c9112eb32

                    • C:\Users\Admin\AppData\Local\Temp\1018851001\bbb95df60e.exe

                      Filesize

                      758KB

                      MD5

                      afd936e441bf5cbdb858e96833cc6ed3

                      SHA1

                      3491edd8c7caf9ae169e21fb58bccd29d95aefef

                      SHA256

                      c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                      SHA512

                      928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                    • C:\Users\Admin\AppData\Local\Temp\1018852001\003.exe

                      Filesize

                      2.9MB

                      MD5

                      cee335f824bab75bbc98d04def73e013

                      SHA1

                      b6cabea09cb1d37e1919aaf6813d11904e951114

                      SHA256

                      b8d24eeb78cf1b5a25f35e724a6ed3a444dae5aa1f47df344ff224a9d5d9eefa

                      SHA512

                      9568270173dd0c10f015584226514c112449988a4d2d6bca60297f47ef7c3ee44d3ac6bc3a287b7ae920c5ee1a2a1285561864882484d719b155eacb65994634

                    • C:\Users\Admin\AppData\Local\Temp\1018853001\4cc76774f9.exe

                      Filesize

                      1.1MB

                      MD5

                      ef08a45833a7d881c90ded1952f96cb4

                      SHA1

                      f04aeeb63a1409bd916558d2c40fab8a5ed8168b

                      SHA256

                      33c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501

                      SHA512

                      74e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97

                    • C:\Users\Admin\AppData\Local\Temp\1018855001\269ef1738b.exe

                      Filesize

                      4.2MB

                      MD5

                      ece3b1a61f2977c90820f0601637020e

                      SHA1

                      36ec33851c696b440730b3d9c8b59e2ab2e1b0b6

                      SHA256

                      239eb2c35896d73e83b650bf4c5637188e9bb1a5a85c74a2202cd50c2382d6e6

                      SHA512

                      e8fbbe975f739a40a97055bdda605bdf72210d6bfaaf7e0f1a78083238dfd816317de56a21590f5e05c1dd1e170b45e2610415c0b7ca3c27c12d037173161df7

                    • C:\Users\Admin\AppData\Local\Temp\1018856001\37d625c12a.exe

                      Filesize

                      1.3MB

                      MD5

                      669ed3665495a4a52029ff680ec8eba9

                      SHA1

                      7785e285365a141e307931ca4c4ef00b7ecc8986

                      SHA256

                      2d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6

                      SHA512

                      bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6

                    • C:\Users\Admin\AppData\Local\Temp\1018857001\3fc259db12.exe

                      Filesize

                      21KB

                      MD5

                      04f57c6fb2b2cd8dcc4b38e4a93d4366

                      SHA1

                      61770495aa18d480f70b654d1f57998e5bd8c885

                      SHA256

                      51e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2

                      SHA512

                      53f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd

                    • C:\Users\Admin\AppData\Local\Temp\1018858001\83ef3ddb90.exe

                      Filesize

                      4.2MB

                      MD5

                      3a425626cbd40345f5b8dddd6b2b9efa

                      SHA1

                      7b50e108e293e54c15dce816552356f424eea97a

                      SHA256

                      ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                      SHA512

                      a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                    • C:\Users\Admin\AppData\Local\Temp\1018859001\ce6479e041.exe

                      Filesize

                      4.2MB

                      MD5

                      6087d5a01774d89431f633d9b2d1d705

                      SHA1

                      5c3b075e194fa131fdffdab37ffb4936db50a0d7

                      SHA256

                      51121d1b988327e1845be7351022f85370a19154989ed3079cf7c202f45a428f

                      SHA512

                      4acc1431638ad5b1b66137ec1a253ef2eec1655f111fd7edd22692d7e5edadef61dd40ed69180d13b7627822da827e3cdece77d7f868f72e6e0fa28a38b34a91

                    • C:\Users\Admin\AppData\Local\Temp\1018860001\c19fb1cf27.exe

                      Filesize

                      1.9MB

                      MD5

                      81c164e0c2d7d36e812fe860548569a1

                      SHA1

                      97825c34e950ed01f6111b524c114f209a1b9819

                      SHA256

                      f88321d520c20b67f4fba3b0dcc89003e30d1aabf2e728e5c50773badd64632e

                      SHA512

                      e13101abd29bc203bfc553056741cc9fadc239350230f92397c74697dd069cc5f6540e1979063b35c18aaab913682104dbe24b17430d359adaaa583e6ef6c548

                    • C:\Users\Admin\AppData\Local\Temp\1018861001\42de031164.exe

                      Filesize

                      1.8MB

                      MD5

                      184cee9b3f334e2cee2ccc95977e5335

                      SHA1

                      3c13283ed8c4e0e09ae0e5f361da46f073cd2386

                      SHA256

                      188e74bab6540e25c1cc694264d96ed609f113267f747be27e09a2420ef90577

                      SHA512

                      adbe8c840684e0d56f2ab56677548a4dd47a8c8f0810557cbdfd21c27829b7ecf4950bd8ff7008a3c2e6d6ecbac84a368542109d103d493c412751f56748ef6e

                    • C:\Users\Admin\AppData\Local\Temp\1018862001\997a977ce3.exe

                      Filesize

                      2.7MB

                      MD5

                      d7593c78ec8bf3f98603559b67cb3ccd

                      SHA1

                      4db5fb73dfc7d2067058437eb1e8b6d8da90f742

                      SHA256

                      5ffb2e33be22c35585ffe74f82986dcd542e9b89fdc9e0e9243c804f17c32521

                      SHA512

                      69b1b4c1d2691a3fa85d6e04557761b28d8c0f57c1db5f4500a7166717323b1920a429e4c700dca6b5c0badeb40023bb1dfbcbed20040c72b185e0aaba0c8f1a

                    • C:\Users\Admin\AppData\Local\Temp\1018863001\c4278bf154.exe

                      Filesize

                      947KB

                      MD5

                      92755c6663e0aa7af1dd7aaa7abcfcbd

                      SHA1

                      53097d488facff9896f2adff5399f783314a8cc0

                      SHA256

                      8a7034c6750914f3a966287a9e97307cf3f83eaca584fec77d7ebf5b2665d4ad

                      SHA512

                      9a49a39acf2840acbce159401964c4542f81c237259901f57aa45d78fbb2b7f9a9abc046ca20107bf12ca0f8c2afaaa4275c00283df47d9fe8812450e23c6803

                    • C:\Users\Admin\AppData\Local\Temp\1018864001\8ec60caf49.exe

                      Filesize

                      2.6MB

                      MD5

                      f7330ca504d0f0551eff459cd9a4f461

                      SHA1

                      e3eb3a4d8a7ba4204dd57c95bacc2bcbe425aa1f

                      SHA256

                      7c2b8c5ec1e07f8b267d81a67e1af69f09a129373d81ca07c8633c5dbefd66c4

                      SHA512

                      641394e9b238e830d04737e3a898f1c238660b2ebea140ebc95e7647a65f2db2e6a519de357f6c621d124b285e720df7069a24e71456ccf2cecc3a3b57bf96c3

                    • C:\Users\Admin\AppData\Local\Temp\245347\Dry.com

                      Filesize

                      2B

                      MD5

                      ac6ad5d9b99757c3a878f2d275ace198

                      SHA1

                      439baa1b33514fb81632aaf44d16a9378c5664fc

                      SHA256

                      9b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d

                      SHA512

                      bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b

                    • C:\Users\Admin\AppData\Local\Temp\245347\b

                      Filesize

                      267KB

                      MD5

                      0c7d5f0db7d1be49fc2285c64d3c45aa

                      SHA1

                      942803613a17b0735f80d32dab9be6b87a0e472f

                      SHA256

                      d49d834cb452343c64c7b9716f5b6d6032ce8b81e04995ccd1af130ff863143d

                      SHA512

                      52c3cacdd5a798243bdf191d0f673c63befd5297284e2841de8ef0588b103b1192e60d50e22e5572fa160834be7d052aa328556ed182a1cc56c9be55ab76ccc8

                    • C:\Users\Admin\AppData\Local\Temp\Another

                      Filesize

                      96KB

                      MD5

                      5535aa11bb8a32622dadb4cb7d45071c

                      SHA1

                      76b4b6221174f1b11370d7aa2a89a5996624c7f8

                      SHA256

                      ead59f9d65f7830e35a9c213b07938b7bc57513692ecbcf66b4be4ac82350eba

                      SHA512

                      b14a53ea33b6f44ef4fffb76060955f9ae85bfed79ca206359ffcdf80aa33d21abff41d526e43ba55bc33048fd8a237a2c854e92856f292cb4825304acfbe3bd

                    • C:\Users\Admin\AppData\Local\Temp\App

                      Filesize

                      17KB

                      MD5

                      15687a16a1310bb6dfcb1fb9b8d052b3

                      SHA1

                      bda139691a5c3f90f7059d84dbad98354748832f

                      SHA256

                      08f36da3d5e25c26d14e49bc46995aa1a5842ad368a9e02244db850f77d4a70f

                      SHA512

                      9dfafa0cf6e7a54037cc53c155c7214580a90b4066d3b469a966f53d363ae63a6a4d9bb08a8de64796e8c6b36e6a5e8374069952628a81b13ebfe93abbc51574

                    • C:\Users\Admin\AppData\Local\Temp\Cab284A.tmp

                      Filesize

                      70KB

                      MD5

                      49aebf8cbd62d92ac215b2923fb1b9f5

                      SHA1

                      1723be06719828dda65ad804298d0431f6aff976

                      SHA256

                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                      SHA512

                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                    • C:\Users\Admin\AppData\Local\Temp\Critics

                      Filesize

                      103KB

                      MD5

                      8496cef888ee804f2b8a44171481e40a

                      SHA1

                      90fcde8c353d79ae02bfc946d708d35fedfea64f

                      SHA256

                      0d8671285841832d972ca2576cdb83f412af8433cf33c511f652912e7fd7e29b

                      SHA512

                      158c70a8804e73dfb25a1265328fadc26903c5b035a991aaa570f0ef98f89d616c635e4820e926fb8e00e1c20cfcf3fd441dcc0ca5eefa109dd5bc23e0e4c61d

                    • C:\Users\Admin\AppData\Local\Temp\Doug

                      Filesize

                      114KB

                      MD5

                      37f28bccbcaea4719409c72aa6385586

                      SHA1

                      083ad006b92745c976989bc5fb76e7187d81a597

                      SHA256

                      7101d14a5fcf7b47a9c6b809155bea70121c61d2df7e2244573204c2190ccf45

                      SHA512

                      105de3a0358c0e95b573dd1fc590b27c33f8033158b28a523a5ef9bdbfaa1f488e6b0f7556d6e46d96e23f00392f4eebded0dcea31926a05823ea1b5d4fff22f

                    • C:\Users\Admin\AppData\Local\Temp\Eleven

                      Filesize

                      125KB

                      MD5

                      3b84985152cd93f2bd04bd909d7c902e

                      SHA1

                      4bd3d6af1e4ed7efe357e707ec7e6ab2e3ff4eee

                      SHA256

                      9df8e69068b9ce01749fe0a515db1554c05d491c3a5a4f80f8aba060ea89950f

                      SHA512

                      051d3b9fa3d463d78d1ac971396dcb00d930a9e9c3f7a1278a7dd8027d1ab159f688f912d65d78ada9f059d73526f987a36cac0d5100cae5491959dd059f89dd

                    • C:\Users\Admin\AppData\Local\Temp\Eligibility

                      Filesize

                      88KB

                      MD5

                      3efe58b3be584c2afe3d64a453f70dac

                      SHA1

                      ba151bdfa43145dc0e3a495ac5382638cfb0a2c1

                      SHA256

                      7054a53ce5187d3470517170af3138dc28cec4ed1793574a91cca795fb7e3e10

                      SHA512

                      929b0a9af43360af0f820fab936650b211978523b9fdef00ee563930e03f2a9830e5c2246be9ace7f95ab78cfb075e82347cafb02472b8a09dc4859c9a5232f3

                    • C:\Users\Admin\AppData\Local\Temp\Judy

                      Filesize

                      70KB

                      MD5

                      f5c4ea189e763c79767bb2f4bc471f08

                      SHA1

                      6abe10f27aeb64cb3583ec3549d8f84eb23b05eb

                      SHA256

                      49b1a81a6965071db23fe804a6293b87fd2ab96cfda6e28d806c1e76a53e723e

                      SHA512

                      31e79f7a7fc0a5eea3c4d70b152f75573c43c324b317667f41a824ebb2913d7bf4bacbf08a85d6281ec33ada2f2babe2a26d251008288cb6a4ce85e38dbe51d7

                    • C:\Users\Admin\AppData\Local\Temp\Organizing

                      Filesize

                      239B

                      MD5

                      28a97febfc5cd391bec1e2a3d9d938bf

                      SHA1

                      adea302b1d73d65c4c2a64f4f10955d5e4d728aa

                      SHA256

                      2528cd8d1353e6c4dbcc6d2226b5b50ef14027a962a49c4001d2c8c072904773

                      SHA512

                      7bbb7f7781c77740efc6361c5195a01f854c3ca1afd9ec7870c4f87c5a28432af97d61a41e4af0d2d3cea45fa3565e297fc08cd7aca91831792df0a81efe0f82

                    • C:\Users\Admin\AppData\Local\Temp\Origin

                      Filesize

                      63KB

                      MD5

                      7bbdcf2829f157f4178ad1a4ea31bfe6

                      SHA1

                      afc7c5852f104d94fc2726b3230039b696f17fc2

                      SHA256

                      bac794ee8129a6edaa06fed424a8839d24b6b8e6a75c4f23bc8c3e7735498818

                      SHA512

                      d2dd73e8f2b965b9bf9bb806c639af654646d76628e5c707f29ede16a1634dd5a699fb239c83c4bcf492b03e2941129affc777c39b9851f948a96f537dc844ff

                    • C:\Users\Admin\AppData\Local\Temp\Saved

                      Filesize

                      66KB

                      MD5

                      53ab895bb726a4933dd1dc3f2fa2e5f8

                      SHA1

                      3933c015286de1871305ac17679d7244e0c73a07

                      SHA256

                      230c6c15bb57bcb9566d03a0940eb2d8cbb52fd2807cb195982c2541ef7ebbc2

                      SHA512

                      3ffb82fb40e8ff1d98d395601de10beb59af9f77af6300dba79e2436ea787ee7dce026dd43cdda324515f81ec7b5f48e1df396cfc3568128468c3cc5e663682b

                    • C:\Users\Admin\AppData\Local\Temp\Sensor

                      Filesize

                      116KB

                      MD5

                      3b125d59ce5a2cf242a621511a0fb164

                      SHA1

                      3ccba09f214b941931d6169ca9959ace2a72aba7

                      SHA256

                      e4c1fbedc713173bcef5c724f3d64283add852a64f65c87eb3ec8d86c55833aa

                      SHA512

                      c026f9aa8e83f2c888e2b8336c7ec8380d34873956407e32fae31fd72bda741b72c649b7162587435e3d13b9b9fae8e0552330d710831c774264724c8589f36c

                    • C:\Users\Admin\AppData\Local\Temp\Sheets

                      Filesize

                      61KB

                      MD5

                      d947e72346c4ac1aba8bbde8bb791f6f

                      SHA1

                      f6dc2cffbc0b29502cba42d9adee2263a7ff4835

                      SHA256

                      a6e6fc90d3c04e2461e3017e9f1dbaa27abb9278f5db7bb09a218a3a969feb41

                      SHA512

                      61e4a6bfb253d4fcf21781324c6dd7b2dff0750075bfe4ccaffff07a4d2fa552016dfb343bb835bfc7e7d6fd80b2b35b9519f2d6958885502758138bab764e9c

                    • C:\Users\Admin\AppData\Local\Temp\Show

                      Filesize

                      54KB

                      MD5

                      35469ff6842a57bd9788db58a1e1c0cc

                      SHA1

                      47b76f8ae04aeff8cde18e15a6ab9d072214a54a

                      SHA256

                      7006a277a8b2ab82ae4409df94e227083287b7678b9ffe79e2e19d534f1335ec

                      SHA512

                      3b97531e8d41c069dd9a8a6f3fe0fbc498facbb6df823525a726499cf5a4ea40879b7d02138c6d020520df2d59c28efc2f51470bf9aac9f00b6f40101fe51ad0

                    • C:\Users\Admin\AppData\Local\Temp\Silent

                      Filesize

                      50KB

                      MD5

                      04df53fd74b69c92dba8cd83eafa1180

                      SHA1

                      275765d9c7e3300c0b7579ae3de32f658e12945c

                      SHA256

                      db246122e92d7c13ae1050c65c1e1f722f4e98375c9875d719f775cfe1478ee9

                      SHA512

                      44dfa1ccf0c3b054dac3fadba5a87c7c56f318c74dff83810310e349b80029f19a08133c502dd7b65e543b882e567ac19de54f8a520ff073774894f6f8320ef5

                    • C:\Users\Admin\AppData\Local\Temp\Symptoms

                      Filesize

                      52KB

                      MD5

                      7847e23cce3770257dd905024cdc5020

                      SHA1

                      2d2070cb134ccde38544814a1e1e35a08ab95ea6

                      SHA256

                      75f0206860b962d3636015d98c420ec5ebf4023ca7b75b747aeb388aafe9049a

                      SHA512

                      97f5b6924c23343f732ab470b8006ef2b25c92fadb3560fd56db6e53b8daf0c65ce66eb416bd03126c3b1ae6fa2cf66178a487c0eabad24263a3de7253c236b0

                    • C:\Users\Admin\AppData\Local\Temp\Tar285D.tmp

                      Filesize

                      181KB

                      MD5

                      4ea6026cf93ec6338144661bf1202cd1

                      SHA1

                      a1dec9044f750ad887935a01430bf49322fbdcb7

                      SHA256

                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                      SHA512

                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                    • C:\Users\Admin\AppData\Local\Temp\Volunteer

                      Filesize

                      93KB

                      MD5

                      d9ebae5a1b2f513852f89fdc3d31672d

                      SHA1

                      dfa418e6fd3c5b16b685ea0e09cc159a5ff6ed14

                      SHA256

                      b9a3c8e95d261cc9c6b28b58518554120aa2cfa09c2be81c609c0f01b26b313d

                      SHA512

                      d5a9226ea1152566872669c4072bea6498c930e405db45fb6b7b63cd7a807be814c7a71e983851f5d7a66b131319a850ddb10e1d4661d4cacd3082cb5c1caeac

                    • C:\Users\Admin\AppData\Local\Temp\Wanting

                      Filesize

                      40KB

                      MD5

                      6f1a940a0159306f679ff4d03524ae0b

                      SHA1

                      2b48523d0bf3828abd8590e13a03b5946b3d442d

                      SHA256

                      7e294dd8f93a9a7d79fb118070f548d1e8fda62fa96af973e1a950f150b0331e

                      SHA512

                      4ddf0afa24b981bac3ca60cb52af73e39bf7155972f49968c8fc85a17f561208d76158cd117948467176696a0ba87b9ac33658c5e7ef1ef3d4201139e959f932

                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                      Filesize

                      2.8MB

                      MD5

                      61cb850896f4b6aac18c72e82eb9ac90

                      SHA1

                      c1fcdd242b13e4c5ad99f7e76da886288622b6dc

                      SHA256

                      c2bee3616cf5c0f19ecc5738ee39a8c3d0d0523c2178177b86563d5a3d758d0f

                      SHA512

                      d156751d3d9e353a116e55cbc9a9e87da03a4d29efe529344ce996324ec361f0472724bb8162c2be7ea6f291aaf2f7cbbc8659672777e182e40283fa661a2043

                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                      Filesize

                      458KB

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                      Filesize

                      440B

                      MD5

                      3626532127e3066df98e34c3d56a1869

                      SHA1

                      5fa7102f02615afde4efd4ed091744e842c63f78

                      SHA256

                      2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                      SHA512

                      dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                      Filesize

                      442KB

                      MD5

                      85430baed3398695717b0263807cf97c

                      SHA1

                      fffbee923cea216f50fce5d54219a188a5100f41

                      SHA256

                      a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                      SHA512

                      06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                      Filesize

                      8.0MB

                      MD5

                      a01c5ecd6108350ae23d2cddf0e77c17

                      SHA1

                      c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                      SHA256

                      345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                      SHA512

                      b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HYO4U0EWWR5ZVCTBOKD2.temp

                      Filesize

                      7KB

                      MD5

                      1c6b6661b063e2c5b0c1528bf36c389b

                      SHA1

                      e1882ed8e6b92798cacc4129881a1cfd70d8d764

                      SHA256

                      cb029956dc2575030cee42257b731dace4ac9cbab2bbe7dea2c73ebfc01ad97d

                      SHA512

                      98b579d5c49c0de4a8b6a7070a09de57d94a6cce01345173617f30d7563b56062a8051a83317717f9b480438af5c96fa8a5242639f5645db0cb7cd1008b242ec

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                      Filesize

                      7KB

                      MD5

                      e5b9f93a94e7a18b5de73da7bef4d099

                      SHA1

                      36be69d507a83685eb8aaad7b9132d3bb7317740

                      SHA256

                      29d25314cde6babde67bf7687968a695981b567133c9e943d97b4f590edd7fd6

                      SHA512

                      651fdaf7ceb80844b5e48cd9bc8a74b714b1f2fc02f016b651cea19e6b56c489440688e1944a60517a26f84d3bb1fd432c1bfb0c8be93b604b60ecd254fb62f8

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      2KB

                      MD5

                      a0e086cda52f358c52a35c8f3fd395da

                      SHA1

                      3d5a13c5f4c28ecbdb55a9fee334e54870f219b0

                      SHA256

                      fa3674aa2c93d81a05f4a168d58adeb121f017b035c6e8a4f93b4244990cf586

                      SHA512

                      0b94c088633b760946b11c70692de82f60b639a52bac16d94d1260c5fad7ebc1b53b899bc5a755eaa412b739d6aef9678cdbc204b59af550acab4d37e8cbaa74

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      2KB

                      MD5

                      1c974e7612a2c7b00b5ec491b1a410a9

                      SHA1

                      d59a855484909e163d91321541db97bd2770c253

                      SHA256

                      9ce98bfb7411f8a951081823edd373ad58ae71696bbd7b93d11a97158f04b77a

                      SHA512

                      54ed14e3e3f250362561100b9126d9010eb3796f871f18065b6417a190b3d4fb73dcc93b5d2b2d979cac0c4c1c01486f64ecb31adc953cec4e53677fe7903a86

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\07a84688-1faa-47f6-969a-f0f6d53f88e4

                      Filesize

                      745B

                      MD5

                      ede0feb02a25ab23dc1f707885c3d60d

                      SHA1

                      ebd3eb8b95a701d3d447b36947e2606caac99196

                      SHA256

                      cb6055bd5523346a0396bb81c5b8546fc2240d1af1e66a8fa620a7f7a7097ad8

                      SHA512

                      c498f06da7c42a70c4b9ade7f026aeaa8bf60ba267fd7c12a93d193bcd5d61741379ab47790d4b3be765261b7b9eba7ce9be6301ebd4a7c49226c7363d7b5f57

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\f6b0da92-980c-42c2-95c5-d3d2dec94f12

                      Filesize

                      13KB

                      MD5

                      b2896762fce197df41505701494364a7

                      SHA1

                      286966e8d47aab688ba695b7c054d9f9218c0a00

                      SHA256

                      bb13d100df6f027476fbd1c5951904f1f212f8356c11919604640dad94b4fb8e

                      SHA512

                      35879466267e111e697c3afb0a3768631a6d330f3452a0e3ba5dbfcd082ed0f5216caf3a372d407c5d1b0ebe7ff3b25ac8f1043f5c09176bc46019a8428217f3

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                      Filesize

                      997KB

                      MD5

                      fe3355639648c417e8307c6d051e3e37

                      SHA1

                      f54602d4b4778da21bc97c7238fc66aa68c8ee34

                      SHA256

                      1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                      SHA512

                      8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                      Filesize

                      116B

                      MD5

                      3d33cdc0b3d281e67dd52e14435dd04f

                      SHA1

                      4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                      SHA256

                      f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                      SHA512

                      a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                      Filesize

                      479B

                      MD5

                      49ddb419d96dceb9069018535fb2e2fc

                      SHA1

                      62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                      SHA256

                      2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                      SHA512

                      48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                      Filesize

                      372B

                      MD5

                      8be33af717bb1b67fbd61c3f4b807e9e

                      SHA1

                      7cf17656d174d951957ff36810e874a134dd49e0

                      SHA256

                      e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                      SHA512

                      6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                      Filesize

                      11.8MB

                      MD5

                      33bf7b0439480effb9fb212efce87b13

                      SHA1

                      cee50f2745edc6dc291887b6075ca64d716f495a

                      SHA256

                      8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                      SHA512

                      d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                      Filesize

                      1KB

                      MD5

                      688bed3676d2104e7f17ae1cd2c59404

                      SHA1

                      952b2cdf783ac72fcb98338723e9afd38d47ad8e

                      SHA256

                      33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                      SHA512

                      7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                      Filesize

                      1KB

                      MD5

                      937326fead5fd401f6cca9118bd9ade9

                      SHA1

                      4526a57d4ae14ed29b37632c72aef3c408189d91

                      SHA256

                      68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                      SHA512

                      b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs-1.js

                      Filesize

                      7KB

                      MD5

                      425664400002a51c4456372b8264810c

                      SHA1

                      0f4dcce953c29f9fa4201aa719d0ac99342e17c5

                      SHA256

                      b434575adc443f14975b95c13d66573f10cb6f4b49dd1a1c2a12eb6e40f8674d

                      SHA512

                      d2a7c0ea7483c2c89ea404417406ab8281556d8f722b72b2d3a5c908286acb3e84a0df72ba338ab02f64f516316b40745b2e1b69757d476bceb03964ab6d3af0

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs-1.js

                      Filesize

                      6KB

                      MD5

                      99bf221fc93e7fdab1ea7b6859e6c13b

                      SHA1

                      537e76e13c0784c8ddea2e76d477abf36fdb29ec

                      SHA256

                      f3592ea73eb7508dc23b18c597ef92b57cbe914adba16aa184b3eb38414a288b

                      SHA512

                      27841b719685a990d76793217f121f7901ea8d840f38cf1416e1b1d7d95e1e392aa9fe76081fddca58f9c30a8f00804aede27c0b7de8bfcff9d4f5577c00c07f

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs-1.js

                      Filesize

                      7KB

                      MD5

                      ee4ca30f475db544f899a470ebd21c7f

                      SHA1

                      4c85aedceebedc346a04b93688ecefaeffa77db9

                      SHA256

                      2dfa26a8763877f564e1bd596b80cc741d7bdb05090355d221ca8ebdb3d92d29

                      SHA512

                      2a9d0a8cd179be99250c17a74d4c805c85613774f7f053ddddd7599f9efd701de51d8d50528f3f6ec42f3fc7355803e20fc85ac535e3ba6654baf7e8bf2fe195

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs.js

                      Filesize

                      6KB

                      MD5

                      d6141b99b0c34501bf4e40363a4072c7

                      SHA1

                      94d1a7e251cc05946b2a05786a6788904f18c8fe

                      SHA256

                      fc29682e49a1ba6f5ff679f445d435dff0026e8770b083a019b5cdec5c5668bc

                      SHA512

                      673914fe9fd9d1b652799a0d4e7b844c2c6c6fd3d034f368f7d598be77a32f14e9c7b3913efc38e99565db16cd02d7892ddc4430fec5503d7dd73f30adad1007

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionstore-backups\recovery.jsonlz4

                      Filesize

                      4KB

                      MD5

                      cbe2a7d721656d1bed86c72726ef2d51

                      SHA1

                      a9cbe99513a30f0843b997ea5b73bced37b52533

                      SHA256

                      b5fa0ada77af52b39bb11b8dc03da5cf2cd205468088d572ef7380ff6a2ab680

                      SHA512

                      6b91fd484ed1c64f1f63c4da67b276c5e8fee12d2e64b64381d322bd0141812bd1bd9e545520000186cd11a2d283d6a380ec4b6a0491e41f925d06989e91772c

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                      Filesize

                      184KB

                      MD5

                      bde04b604a1580dd7229a5a5ef7a0149

                      SHA1

                      614b55bd1e65593c6481d6286b3d55bba8405b18

                      SHA256

                      52f549fe2e0968ac2bd70b297a50ce229525344f0c61a1fef4916ac658283117

                      SHA512

                      bafe35a581f5ac4f460dfbeb21f95b44076d1d3b9c60396a717bc9a55f36757ce2df2533c795de50c372f1ab77b865e899a2c55510d293871a3452c9b6dc7737

                    • \Users\Admin\AppData\Local\Temp\245347\Dry.com

                      Filesize

                      925KB

                      MD5

                      62d09f076e6e0240548c2f837536a46a

                      SHA1

                      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                      SHA256

                      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                      SHA512

                      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                    • memory/848-1-0x0000000077AC0000-0x0000000077AC2000-memory.dmp

                      Filesize

                      8KB

                    • memory/848-2-0x00000000011C1000-0x00000000011EF000-memory.dmp

                      Filesize

                      184KB

                    • memory/848-3-0x00000000011C0000-0x00000000014D4000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/848-5-0x00000000011C0000-0x00000000014D4000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/848-15-0x00000000011C0000-0x00000000014D4000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/848-0-0x00000000011C0000-0x00000000014D4000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1136-2887-0x0000000006BD0000-0x000000000782E000-memory.dmp

                      Filesize

                      12.4MB

                    • memory/1136-100-0x0000000000B70000-0x0000000000E84000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1136-20-0x0000000000B70000-0x0000000000E84000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1136-124-0x0000000006390000-0x000000000682A000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1136-500-0x0000000006BD0000-0x0000000007855000-memory.dmp

                      Filesize

                      12.5MB

                    • memory/1136-18-0x0000000000B70000-0x0000000000E84000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1136-319-0x0000000006390000-0x000000000682A000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1136-17-0x0000000000B71000-0x0000000000B9F000-memory.dmp

                      Filesize

                      184KB

                    • memory/1136-16-0x0000000000B70000-0x0000000000E84000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1136-2850-0x0000000006BD0000-0x000000000782E000-memory.dmp

                      Filesize

                      12.4MB

                    • memory/1136-320-0x0000000006390000-0x000000000682A000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1136-486-0x0000000000B70000-0x0000000000E84000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1136-501-0x0000000006BD0000-0x0000000007855000-memory.dmp

                      Filesize

                      12.5MB

                    • memory/1136-21-0x0000000000B70000-0x0000000000E84000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1136-101-0x0000000000B70000-0x0000000000E84000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1136-97-0x0000000000B70000-0x0000000000E84000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1136-318-0x0000000000B70000-0x0000000000E84000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1136-71-0x0000000000B70000-0x0000000000E84000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/1136-688-0x0000000006BD0000-0x0000000007855000-memory.dmp

                      Filesize

                      12.5MB

                    • memory/1136-123-0x0000000006390000-0x000000000682A000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1596-689-0x0000000000970000-0x00000000015F5000-memory.dmp

                      Filesize

                      12.5MB

                    • memory/1596-502-0x0000000000970000-0x00000000015F5000-memory.dmp

                      Filesize

                      12.5MB

                    • memory/1596-2838-0x0000000000970000-0x00000000015F5000-memory.dmp

                      Filesize

                      12.5MB

                    • memory/1676-125-0x0000000000D20000-0x00000000011BA000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1676-417-0x0000000000D20000-0x00000000011BA000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1676-342-0x0000000000D20000-0x00000000011BA000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/1948-370-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-420-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-343-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-440-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-313-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-439-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-314-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-438-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-423-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-315-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-310-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-305-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-308-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-422-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-421-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-312-0x000007FFFFFD8000-0x000007FFFFFD9000-memory.dmp

                      Filesize

                      4KB

                    • memory/1948-306-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/1948-419-0x0000000140000000-0x0000000140527000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/2108-96-0x00000000000E0000-0x00000000000EC000-memory.dmp

                      Filesize

                      48KB

                    • memory/2248-622-0x0000000001370000-0x000000000137C000-memory.dmp

                      Filesize

                      48KB

                    • memory/2392-378-0x000000001B780000-0x000000001BA62000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2392-380-0x0000000002690000-0x0000000002698000-memory.dmp

                      Filesize

                      32KB

                    • memory/2444-147-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2444-149-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2444-151-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2444-153-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2444-155-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                      Filesize

                      4KB

                    • memory/2444-156-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2444-158-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2444-145-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/2592-163-0x00000000034C0000-0x00000000036F9000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/2592-160-0x00000000034C0000-0x00000000036F9000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/2592-322-0x00000000034C0000-0x00000000036F9000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/2592-321-0x00000000034C0000-0x00000000036F9000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/2592-164-0x00000000034C0000-0x00000000036F9000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/2592-159-0x00000000034C0000-0x00000000036F9000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/2592-162-0x00000000034C0000-0x00000000036F9000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/2592-161-0x00000000034C0000-0x00000000036F9000-memory.dmp

                      Filesize

                      2.2MB

                    • memory/2600-484-0x000000001B570000-0x000000001B852000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2600-485-0x0000000002340000-0x0000000002348000-memory.dmp

                      Filesize

                      32KB

                    • memory/2824-2888-0x00000000002F0000-0x0000000000F4E000-memory.dmp

                      Filesize

                      12.4MB

                    • memory/2824-2851-0x00000000002F0000-0x0000000000F4E000-memory.dmp

                      Filesize

                      12.4MB

                    • memory/2824-2918-0x00000000002F0000-0x0000000000F4E000-memory.dmp

                      Filesize

                      12.4MB

                    • memory/2860-285-0x0000000000260000-0x0000000000544000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2868-703-0x0000000001250000-0x00000000012E8000-memory.dmp

                      Filesize

                      608KB

                    • memory/2868-2769-0x0000000000B70000-0x0000000000B9C000-memory.dmp

                      Filesize

                      176KB

                    • memory/2868-2770-0x0000000001360000-0x00000000013AC000-memory.dmp

                      Filesize

                      304KB

                    • memory/2868-702-0x0000000000400000-0x0000000000464000-memory.dmp

                      Filesize

                      400KB

                    • memory/2952-415-0x00000000013B0000-0x00000000014C6000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/2952-418-0x0000000000990000-0x00000000009B6000-memory.dmp

                      Filesize

                      152KB

                    • memory/2952-555-0x0000000001240000-0x0000000001302000-memory.dmp

                      Filesize

                      776KB

                    • memory/4936-3234-0x00000000020C0000-0x00000000020C8000-memory.dmp

                      Filesize

                      32KB

                    • memory/4936-3233-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/8056-3026-0x0000000001340000-0x00000000015E6000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/8056-3027-0x0000000001340000-0x00000000015E6000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/9836-2829-0x000000013F790000-0x000000013FC20000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/9836-2852-0x000000013F790000-0x000000013FC20000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/9836-2864-0x000000013F790000-0x000000013FC20000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/9836-2825-0x000000013F790000-0x000000013FC20000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/10080-2828-0x000000013F790000-0x000000013FC20000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/10120-2835-0x0000000002240000-0x0000000002248000-memory.dmp

                      Filesize

                      32KB

                    • memory/10120-2834-0x000000001B5A0000-0x000000001B882000-memory.dmp

                      Filesize

                      2.9MB