Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 21:39

General

  • Target

    4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe

  • Size

    6.7MB

  • MD5

    2c2efd78ad966e9b8c5036fe66741d12

  • SHA1

    747e4f8059c1a755aae3c0b49253fcdf3372849f

  • SHA256

    4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1

  • SHA512

    155ad2d8b2e4b281725f577a85c801d65b76cb55c225fd9f712ab4ea1138b3783f751f8cc8a247e4b4fbd8c41fb028b5793793dac99a1891fb8d1f03c53c28e5

  • SSDEEP

    196608:b3Xe7vMTVy5sEni8LXX+zdKTB6OWRuOm56jico4mvg0tvbQm:b3nVyfbqzEF6Bun0oJvjvb

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 24 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 32 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 52 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe
    "C:\Users\Admin\AppData\Local\Temp\4107f62478184974c7e684e816a93517258584c9203080a046d81dc45a5de3b1.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6p23.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6p23.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\I5N76.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\I5N76.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3232
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x97m3.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x97m3.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2348
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3648
            • C:\Users\Admin\AppData\Local\Temp\1019563001\hYW0tgm.exe
              "C:\Users\Admin\AppData\Local\Temp\1019563001\hYW0tgm.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2792
            • C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe
              "C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4988
              • C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe
                "C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1848
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 596
                7⤵
                • Program crash
                PID:1532
            • C:\Users\Admin\AppData\Local\Temp\1019680001\831c04635c.exe
              "C:\Users\Admin\AppData\Local\Temp\1019680001\831c04635c.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:868
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" Add-MpPreference -ExclusionPath "C:\negagdrc"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:964
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2400
              • C:\negagdrc\348ded35c79042098f08b8760054002f.exe
                "C:\negagdrc\348ded35c79042098f08b8760054002f.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:2992
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\negagdrc\348ded35c79042098f08b8760054002f.exe" & rd /s /q "C:\ProgramData\NYC2NO8Q1DJE" & exit
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4120
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 10
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Delays execution with timeout.exe
                    PID:2976
              • C:\negagdrc\74ad719341b747dcad13446df9bf57e8.exe
                "C:\negagdrc\74ad719341b747dcad13446df9bf57e8.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:5000
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://apps.microsoft.com/store/detail/9MSZ40SLW145?ocid=&referrer=psi
                  8⤵
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:2836
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff85e1346f8,0x7ff85e134708,0x7ff85e134718
                    9⤵
                      PID:1164
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:2
                      9⤵
                        PID:4964
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:3
                        9⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3664
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:8
                        9⤵
                          PID:2456
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                          9⤵
                            PID:1340
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
                            9⤵
                              PID:680
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:8
                              9⤵
                                PID:4020
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:8
                                9⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:412
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:1
                                9⤵
                                  PID:2116
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1
                                  9⤵
                                    PID:3516
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:1
                                    9⤵
                                      PID:3284
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2548761848897452503,7139016617685959761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:1
                                      9⤵
                                        PID:2792
                                • C:\Users\Admin\AppData\Local\Temp\1019681001\c8556a5cc0.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019681001\c8556a5cc0.exe"
                                  6⤵
                                  • Enumerates VirtualBox registry keys
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1896
                                • C:\Users\Admin\AppData\Local\Temp\1019682001\14e1cb6e5b.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019682001\14e1cb6e5b.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:3940
                                • C:\Users\Admin\AppData\Local\Temp\1019683001\ea4c7f0885.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019683001\ea4c7f0885.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:2364
                                  • C:\Users\Admin\AppData\Local\Temp\1019683001\ea4c7f0885.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1019683001\ea4c7f0885.exe"
                                    7⤵
                                    • Executes dropped EXE
                                    PID:2448
                                  • C:\Users\Admin\AppData\Local\Temp\1019683001\ea4c7f0885.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1019683001\ea4c7f0885.exe"
                                    7⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:2396
                                • C:\Users\Admin\AppData\Local\Temp\1019684001\aff6b2837f.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019684001\aff6b2837f.exe"
                                  6⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1608
                                • C:\Users\Admin\AppData\Local\Temp\1019685001\85c7556220.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019685001\85c7556220.exe"
                                  6⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1224
                                • C:\Users\Admin\AppData\Local\Temp\1019686001\9ed3e140c7.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019686001\9ed3e140c7.exe"
                                  6⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3392
                                • C:\Users\Admin\AppData\Local\Temp\1019687001\d1cd124251.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019687001\d1cd124251.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:1896
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM firefox.exe /T
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4296
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM chrome.exe /T
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4520
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM msedge.exe /T
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3932
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM opera.exe /T
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1364
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM brave.exe /T
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2396
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                    7⤵
                                      PID:760
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                        8⤵
                                        • Checks processor information in registry
                                        • Modifies registry class
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2292
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1948 -parentBuildID 20240401114208 -prefsHandle 1864 -prefMapHandle 1856 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {404fb3b9-1e67-4ee5-b210-6fc9ea00fcb8} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" gpu
                                          9⤵
                                            PID:2880
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2408 -prefMapHandle 2404 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf2191f6-edaf-43ae-9dec-85a525878953} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" socket
                                            9⤵
                                              PID:2300
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3356 -childID 1 -isForBrowser -prefsHandle 3352 -prefMapHandle 3348 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55977ba9-61cd-40f6-9665-6d1ed54e1130} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab
                                              9⤵
                                                PID:4012
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4168 -childID 2 -isForBrowser -prefsHandle 4160 -prefMapHandle 4156 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {33d2bdc4-f88e-4d2d-aaf4-ff2bf8264026} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab
                                                9⤵
                                                  PID:3536
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4780 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4572 -prefMapHandle 4612 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c05d1d7d-2b93-4a5c-8cba-610756040157} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" utility
                                                  9⤵
                                                    PID:6356
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5100 -childID 3 -isForBrowser -prefsHandle 5092 -prefMapHandle 5084 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {34d8f4af-6944-4d75-b355-290df42cb04b} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab
                                                    9⤵
                                                      PID:5480
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5224 -childID 4 -isForBrowser -prefsHandle 5232 -prefMapHandle 5236 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1bcd79f-b761-47c0-89c0-43e23c8650be} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab
                                                      9⤵
                                                        PID:7116
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5452 -childID 5 -isForBrowser -prefsHandle 5532 -prefMapHandle 5528 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11f3851b-a1e9-4f76-9031-b5c8773f0ab8} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" tab
                                                        9⤵
                                                          PID:6656
                                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q5928.exe
                                                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q5928.exe
                                                4⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3556
                                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3b12z.exe
                                              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3b12z.exe
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4700
                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4M575t.exe
                                            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4M575t.exe
                                            2⤵
                                            • Modifies Windows Defender Real-time Protection settings
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Windows security modification
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4372
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4988 -ip 4988
                                          1⤵
                                            PID:2864
                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:3696
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:2492
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:3696
                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3788

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                Filesize

                                                2KB

                                                MD5

                                                968cb9309758126772781b83adb8a28f

                                                SHA1

                                                8da30e71accf186b2ba11da1797cf67f8f78b47c

                                                SHA256

                                                92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                                SHA512

                                                4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                ba6ef346187b40694d493da98d5da979

                                                SHA1

                                                643c15bec043f8673943885199bb06cd1652ee37

                                                SHA256

                                                d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73

                                                SHA512

                                                2e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                b8880802fc2bb880a7a869faa01315b0

                                                SHA1

                                                51d1a3fa2c272f094515675d82150bfce08ee8d3

                                                SHA256

                                                467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812

                                                SHA512

                                                e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                120B

                                                MD5

                                                e1188378dc4ca93963e4d7e205ee0579

                                                SHA1

                                                e0b36b8168abd924d1fac70b5692ab83ec4513bf

                                                SHA256

                                                847cbedb1363405cbe83e850732d53940d6948268959cad275350b986548fb7d

                                                SHA512

                                                ed82a52e1405c502cb4616115bcbbbb22cfbf70cce59f129f107e2f182522d2a3f53ab0dac5ecef8724440e80be4ffb305c7dc81067b32c96d3f3d5187d735dd

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                3a433d4145a78b733c10a0bf468d66b3

                                                SHA1

                                                9958a546a9a3e12b286c92ff369255c31c0eac59

                                                SHA256

                                                fd2876da1f74045f752a33cabd9b966bf09482958f606d729b8dfc1d72b557a8

                                                SHA512

                                                16e331559212d99bdd49204d57f0a6bb570d4f74850039a9a9d9b0d2d14dee18b3183bd71b938a20283f007cc5c50cbb6c019a06a020e4a14c6fa36927c778bf

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                9ac39beceff5e3539933b2b4cb7a3300

                                                SHA1

                                                90d09c000d12286c32c1a9b6f91dba10596cef64

                                                SHA256

                                                2d8c4aba569b69cfdfde6c40872265f2e8aca0123b721f44336ffa29cb9a3665

                                                SHA512

                                                f31a434bc3e3f71bb7a2b448428b74760317eb4d688ce26a248854d8886b6c4f942510b956497dfaefc24669fc3a348ec186e7ac77fcb3ef4841678d54c25a7f

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\3c00339e-82de-41f7-9005-811c38ce2344\index-dir\the-real-index

                                                Filesize

                                                72B

                                                MD5

                                                72656320746a2d31495e4aa1d640938d

                                                SHA1

                                                44a31ec3dd81c98428f5f35a8d4a059ed4ad7768

                                                SHA256

                                                d3d522094e8fe4ff98fb42f44371ed8021975634fa739dd725f7888ff2075b74

                                                SHA512

                                                18d8b9ae954ee3c3531a3ca88d3ad0ef6681c4e20a18dcede54dfbcc8cd7c9b5f3ee8d940337c43b8098096a30ff7e9b63d06c9db96602b735eff15ad4348e6a

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\3c00339e-82de-41f7-9005-811c38ce2344\index-dir\the-real-index~RFe596fe7.TMP

                                                Filesize

                                                48B

                                                MD5

                                                a72f7cc1a6122bae0d81afb3bff82517

                                                SHA1

                                                2d8e4dbf56a5a70f1e2457260675b0bf6a0512a9

                                                SHA256

                                                03bb5f7a0e5141b78a64ac644e4f80b9acd68a86512026dbe288ed065e1f9685

                                                SHA512

                                                bb2a7fa37b103c5f072368c88912a181c8c57fecf81d190340cdf3e1e60b4b1e76f2285b62139b8d0e81e4aee024e87feeaafccbc00aaf9c375bf30d4cfb8cca

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\3ef969ea-b273-4f1b-9b23-c25503918f12\index-dir\the-real-index

                                                Filesize

                                                1KB

                                                MD5

                                                4cf80b192ab01275903034e0476bed6b

                                                SHA1

                                                7d8ea5643908872d5d8779bc95cebb7a5ec216cf

                                                SHA256

                                                b39f4fede852fcb66a9f638fb55921ef2e6e83a45bc95d9e0a021ae105a3f7b3

                                                SHA512

                                                b206bfece064f63ecaa5f064226d27429bebb2a33f311c1d0d9d93bfde2df30b4b7c419c6f3d6117a9be3ecad7aaae964dc23c581efefd277e10b9401afb7eff

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\3ef969ea-b273-4f1b-9b23-c25503918f12\index-dir\the-real-index~RFe597e00.TMP

                                                Filesize

                                                48B

                                                MD5

                                                a71fff0de06ad0ce1951a8263c66b47f

                                                SHA1

                                                9c3b9e87aec048415df5cdee21f3b3bf4de1b658

                                                SHA256

                                                f18ac8cfd22b93dea5df379b1868fa69df3631accfa4e6149de11c9e1dcb33df

                                                SHA512

                                                2be51417b3b028d46cf42df9aa809ce867a4524a1e278b3bcdedd37f490e31f66a504d5b37964719db928971e10afb738714a38d171644837696ee53badd37da

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt

                                                Filesize

                                                201B

                                                MD5

                                                4709d974ff290e1a1091dc02b451d2ac

                                                SHA1

                                                6f1dcd7825566d86eee8454c71b4ca2cdc6339e1

                                                SHA256

                                                e2fd5bb5201dd657097c85c8eb2fd34186bc57f55bb9a2aa66f7d998ad141c10

                                                SHA512

                                                bf74aec33e11017919f3cc9cbcda19ff592fa82a66ab77251791176116a597b77900e404fd0aa978c984ce7ccfafad911900e7ae3e4f0a011b4a73e9b93ed22d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt

                                                Filesize

                                                109B

                                                MD5

                                                af541b2109bd2f8370c14131c3c96076

                                                SHA1

                                                8eb56c6014f4127cb6607adc9c7e4f6c358967b4

                                                SHA256

                                                3be086b3799d086548859209265bfe57bd5a7b2e8b523e3a3e525a6f8b0e86fb

                                                SHA512

                                                dcbe0627ac31b383d4d4fd55a41acafe19fd5b66bc7663b8588b0d0e21103cbf08d7938d56efcf77cfde35e193418ba3ed9bac353b2a5b0b7912e2ce2e1e7bdd

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt

                                                Filesize

                                                204B

                                                MD5

                                                e512c9af5ed94822b1fc41c4a72cc419

                                                SHA1

                                                7a2a1d984a0191348f45690e54d374776d6ff1b3

                                                SHA256

                                                99ebece388ac48d5c9f1dc635fcc160a9f0457e1a8345786b75d7e665579ead4

                                                SHA512

                                                8c0cae56353a3f909314423b18d43701bfd3c87e41fca908cd3b97b59b5e6cb4633c22dadcbb69b7973c1c4fc8900268adbd2f8000f1415168666002752257e5

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                Filesize

                                                72B

                                                MD5

                                                7ed13a0ac4530fcfce0bfc19e5773a3c

                                                SHA1

                                                0381ef5949f48459f3d40783ef4205b6c80d767a

                                                SHA256

                                                bad6fbe22b41d59b2bca6055013f2e7664ad9e5ca82e06a3e261422f7ddade5e

                                                SHA512

                                                162d4dfb5f73ebb717137fd63f9de0639832ec169553fb27cf9a732c0d68f6b93f3b941ca92a423169bd1ac571e53003c1f6a18ebc5deb50a7143733e0760a79

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe596fa8.TMP

                                                Filesize

                                                48B

                                                MD5

                                                4c2f7026e619fa0649931eea0bafd8f9

                                                SHA1

                                                663e42fdd239a6d7803bbb2d869f24bc16baa7dd

                                                SHA256

                                                c032a211d4e3aa716cdd3b48119474c075691b0a2eeb0ff06d1869791238e175

                                                SHA512

                                                28e2d9b17dbe6888faaa4a216bb5e31e6d3a8b4f24a97a9d83433678dbff8dc91aa1866b488f9bccee21c47ca5b25078527f3721ee9904f2a7680f922105a1f5

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                6752a1d65b201c13b62ea44016eb221f

                                                SHA1

                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                SHA256

                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                SHA512

                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                10KB

                                                MD5

                                                2f49c047f6ce59647f283b9cd4b632c0

                                                SHA1

                                                6aae1bf7c3291f8464055b46515127ca2446d578

                                                SHA256

                                                e9a3f2e6b4e3bbe4243210ecbd4f3f95edfaeb856e63e998d3a038bd0bc1e14c

                                                SHA512

                                                04e519af1276e75acead8fad6906919c2ac844aa5783fd9dd26b14b74c225b0ee2726bc7c8264c7f45b92c10433e2dc81dd94ddadcd8c22bc3e8663e8035bbb9

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0TSRVAPX\download[1].htm

                                                Filesize

                                                1B

                                                MD5

                                                cfcd208495d565ef66e7dff9f98764da

                                                SHA1

                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                SHA256

                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                SHA512

                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                18KB

                                                MD5

                                                bdc17a639e02e46e08f997666a7ef73c

                                                SHA1

                                                f93dbb3c801a612ac306e94f43f67a31bf597f3d

                                                SHA256

                                                67d6177c70c7af5c85943242e50e092a281819ee13d9189cfb1891f26339aaa5

                                                SHA512

                                                3752ab63d4d4f583e69a469057d52b0e5f8d662cb31f6740bd7a46e9db0ca1f335e05d50f0a058c0f295f43c107b48029855aeec8b6fd0647bfc0e4e1ae323c8

                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json

                                                Filesize

                                                18KB

                                                MD5

                                                756b652a1ed8dc95bc84e2a6363c1cbc

                                                SHA1

                                                4ec056f448827fa44db716fad85eb98c0be268f2

                                                SHA256

                                                70f12ba19b08e133c68a0fd37df546d325ea905b135b1e1d887eeb0b941dd501

                                                SHA512

                                                7dd96fa740a0cd828e87ca6989babc11555cb4d25eb84a24f09da889121149c0085effd59a05e8f3db125ee2a7d14f4607dbeceba07a324e95f5e9101b95d5a6

                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                Filesize

                                                15KB

                                                MD5

                                                96c542dec016d9ec1ecc4dddfcbaac66

                                                SHA1

                                                6199f7648bb744efa58acf7b96fee85d938389e4

                                                SHA256

                                                7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                SHA512

                                                cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                              • C:\Users\Admin\AppData\Local\Temp\1019563001\hYW0tgm.exe

                                                Filesize

                                                295KB

                                                MD5

                                                b251cf9e14aa07b1a2e506ad4ee0028c

                                                SHA1

                                                3bafd765233c9bc50ba3945446b4153d6f10a41a

                                                SHA256

                                                be4ae482b0ca161f7d52dcfecc38e55af4b0a0342b0c1b854329da4f42b6c1cb

                                                SHA512

                                                660313d8286535b3acab03c8894d069d7fcb65eb4b5e75026529a096c2337cd68d8a291abf78f612d75b5aec2a413e0936eb16c8c1a94bfda0568dd41312c2c7

                                              • C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe

                                                Filesize

                                                543KB

                                                MD5

                                                4f36d38adf1aa27764e834263b790397

                                                SHA1

                                                c38cd4f1bc7762951225d35e06578b8bd91606d5

                                                SHA256

                                                d6a9fcd0a2fccd03908113ac2febc012c36cd007c30ff2e8903e3dd26e189bbd

                                                SHA512

                                                76d100555bb8a3ef8529b4dcb9391696b440e5b349f38c36ee1fb1ad8a46aa9289b805511d91597ceaa8dccf8fe64c6130111dcfe09cab0651428c83bd0bce23

                                              • C:\Users\Admin\AppData\Local\Temp\1019679001\299cdf9365.exe

                                                Filesize

                                                32KB

                                                MD5

                                                5bf12c86aab1724fdabcb6a94843095e

                                                SHA1

                                                cca23aa0cbcfccf5511e14fb0c8ecedef48c6353

                                                SHA256

                                                476e155f9c0e525d09af60af121ff650c55861fc77fad89c963b5e8002349e03

                                                SHA512

                                                63a3bcbd821a76ae79735f797bd343ab0f7254267869d2ae39db644327d006160cfe3f1b93b36d6cd5ca730c164f5248e7cb7ceba3bd1d9966542de468e1484d

                                              • C:\Users\Admin\AppData\Local\Temp\1019680001\831c04635c.exe

                                                Filesize

                                                21KB

                                                MD5

                                                04f57c6fb2b2cd8dcc4b38e4a93d4366

                                                SHA1

                                                61770495aa18d480f70b654d1f57998e5bd8c885

                                                SHA256

                                                51e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2

                                                SHA512

                                                53f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd

                                              • C:\Users\Admin\AppData\Local\Temp\1019681001\c8556a5cc0.exe

                                                Filesize

                                                4.2MB

                                                MD5

                                                0ff2001aeabb55d9ac0bfeb28c577633

                                                SHA1

                                                e5f37210806ae7b9cacd40a52dc1e20ceea5b89b

                                                SHA256

                                                dc1e0f683dabb770d3b77040889f5a189e6e5de7040a9625f688a8c240624d3a

                                                SHA512

                                                936cdfc268ec50b7c4df7d53ccbc45a8626a6c52869a1c5a1e0f944f8ab051700e53e0466c328e123e6797c865a329186bfaaba1d075d69c250f72e2f7326d54

                                              • C:\Users\Admin\AppData\Local\Temp\1019682001\14e1cb6e5b.exe

                                                Filesize

                                                2.5MB

                                                MD5

                                                87330f1877c33a5a6203c49075223b16

                                                SHA1

                                                55b64ee8b2d1302581ab1978e9588191e4e62f81

                                                SHA256

                                                98f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0

                                                SHA512

                                                7c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f

                                              • C:\Users\Admin\AppData\Local\Temp\1019683001\ea4c7f0885.exe

                                                Filesize

                                                758KB

                                                MD5

                                                afd936e441bf5cbdb858e96833cc6ed3

                                                SHA1

                                                3491edd8c7caf9ae169e21fb58bccd29d95aefef

                                                SHA256

                                                c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                                                SHA512

                                                928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                                              • C:\Users\Admin\AppData\Local\Temp\1019684001\aff6b2837f.exe

                                                Filesize

                                                1.9MB

                                                MD5

                                                87448823dab50a9edd9f481b99aca4ee

                                                SHA1

                                                2711209da94d4e33d7a6636fe1a797fba552002c

                                                SHA256

                                                4c813bff7644e8b3db0c1f15db3eae43ba2ca5badf089ec028607c888164e539

                                                SHA512

                                                37085c98ca976ef91631cc7d6b81bfcbf64f72443205d1df2a35105a504878b0795d45057a3c82a1cbddf0895d11dba9ffc234fb13aff14eb2def33ea449bf43

                                              • C:\Users\Admin\AppData\Local\Temp\1019685001\85c7556220.exe

                                                Filesize

                                                1.8MB

                                                MD5

                                                1c76387d2784b116b9f532b8b0a48c8b

                                                SHA1

                                                9b977e6b1404a5e4f1b3f3254a1c025fa996ab0d

                                                SHA256

                                                ec07d0613f3d6cf3ba318445c88e2cc77c06065cdf8a1f61a402236c0687f1d9

                                                SHA512

                                                0fcf85db4a716b7f2da97304c70b0f7bed88d6fe448be5bff6d657df8f87cd6b57b007484017128a8c4b28c61ad5352949dba774f67d6afe8b94e701019fcaa9

                                              • C:\Users\Admin\AppData\Local\Temp\1019686001\9ed3e140c7.exe

                                                Filesize

                                                2.7MB

                                                MD5

                                                5f8d93018394ecd9f599aa2c10147a5f

                                                SHA1

                                                2d8e3a0d25f83fd723861b5d6cca4e1ca98ac3eb

                                                SHA256

                                                681176f836e4a1921854c9aa2ae0fc6929b850c589beb81ccb45be4b355f2044

                                                SHA512

                                                66a5d018dec2b2353f0048113ced96e55870d78b9253b0704f625e9003293c60e03de56cf534613ece08f183701226b4f71a7ff3adafe3128e79fcadcc1359eb

                                              • C:\Users\Admin\AppData\Local\Temp\1019687001\d1cd124251.exe

                                                Filesize

                                                944KB

                                                MD5

                                                c62f6307b430705a222d91251c64a3fd

                                                SHA1

                                                2e02770695aa07c45ccdc17160f7d57588d938e7

                                                SHA256

                                                bf00151c4e9ccb994891b277adca7ffb6dbb5f1e8704c9f877fabdf81653912b

                                                SHA512

                                                698a75e35b8466252357c46ac7089ce1d52289320a125c7f431a0befa80752cc5a75dc2d959935e0a9baa61848913801fb1d24e4cebe857c7754b7ae676bada6

                                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4M575t.exe

                                                Filesize

                                                2.6MB

                                                MD5

                                                db8279f509cf23115dbc23bc8056f9d4

                                                SHA1

                                                6901b119db6dacd98fbe87a26ee38362fc0a0c15

                                                SHA256

                                                0d690caf770498064bcf0faf8637dff5aba40ae2c3a077e181ebdca530e9b731

                                                SHA512

                                                6d105c2fbf1019e7c75f271e68eedbaa1ba3ad5f0f98cf58e147b477ef860c55939fe82ed9b8c848a054ffe9b5bf4e45afc8117967cea5b4c53bf75a1a5cc65b

                                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6p23.exe

                                                Filesize

                                                5.1MB

                                                MD5

                                                c7c77f6691922d0cd1bcad085ee9a720

                                                SHA1

                                                ebd93699a1dbffe37eeeaf400a83ce99c93bdb19

                                                SHA256

                                                93b83fb112a6fae1b8caf81eaf40100c03fbc1bebd0ffaceeb455ba32321370a

                                                SHA512

                                                0780237f8dc99d49af712fc08309071839adceb7194872cecda8b986e4be1cc302516e3cbb356212177694cd0c3d81524973c0a2f2c693e8aab83fd02f9f1d55

                                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3b12z.exe

                                                Filesize

                                                2.7MB

                                                MD5

                                                2bb062ebb6577aa03e0b4e74ac575033

                                                SHA1

                                                3127a7a6d17e96a51abd71f46777311b89c6d4c4

                                                SHA256

                                                7e883b18aa917862d0d4e3ffb50ffc39cda38d27011f0572bf6415a06d6860c6

                                                SHA512

                                                5b2332c7b68ef25f7fe04183cd4b34e98ac4fbb73720349ef726e7b20ebadeed43bc985ddeb08745c215aac303e49d422496e7f6cd3274183dc8efe11e523fcb

                                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\I5N76.exe

                                                Filesize

                                                3.5MB

                                                MD5

                                                206adafd14fae5aa6f21379845147f9a

                                                SHA1

                                                066fea4b6ce4cf52c489ee46737e56510cafdf56

                                                SHA256

                                                29ba7deae0846b03d9db547802db678591cf9bc1f6b09750b4731cf1068382e4

                                                SHA512

                                                c1b69163123a90dfcf970557c1514c1c656bffbfdf4d62dadb89e59f8997d23b5c081ffc84d8e57a2bc226a48d31e0004f8ce01f0f2a1cca822a3c8824da3bde

                                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x97m3.exe

                                                Filesize

                                                2.9MB

                                                MD5

                                                bca5ec4ffd71fa455f22d475ba23abc0

                                                SHA1

                                                b2959885fd4196bddd1d4fac61ef4753d1fd6a4e

                                                SHA256

                                                561d2aaa8e31fe8fbbb460d098b1bb901df3d0837199edcdd34134652d3f9210

                                                SHA512

                                                f1613fc12260c82eca27dd4e3486d5ac42551f6a739352282be01c67e4e81918bbf34c943825102d8c635506010da60c873075b14b238f6c227d9e74497124f7

                                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q5928.exe

                                                Filesize

                                                1.7MB

                                                MD5

                                                8f424389dc0145ef31a9c1fe29d094a4

                                                SHA1

                                                93c2ab3b283592b348fc0e191737ca1648c157ac

                                                SHA256

                                                5c3ca64f802808abeb22934c6d2a1f201e38c897ff3cdf2bc53a10d4eabf191c

                                                SHA512

                                                16846de47cc609a7e131557dfb4a13e0e564378f2a6384915c6a782ddf50f12c36aae437080fc72c8e4acc908868ca7445a9902d3b84b419fe8add8384eabb62

                                              • C:\Users\Admin\AppData\Local\Temp\Tmp863.tmp

                                                Filesize

                                                1KB

                                                MD5

                                                a10f31fa140f2608ff150125f3687920

                                                SHA1

                                                ec411cc7005aaa8e3775cf105fcd4e1239f8ed4b

                                                SHA256

                                                28c871238311d40287c51dc09aee6510cac5306329981777071600b1112286c6

                                                SHA512

                                                cf915fb34cd5ecfbd6b25171d6e0d3d09af2597edf29f9f24fa474685d4c5ec9bc742ade9f29abac457dd645ee955b1914a635c90af77c519d2ada895e7ecf12

                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bogrbsgh.xjw.ps1

                                                Filesize

                                                60B

                                                MD5

                                                d17fe0a3f47be24a6453e9ef58c94641

                                                SHA1

                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                SHA256

                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                SHA512

                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                                Filesize

                                                10KB

                                                MD5

                                                19cb59a0e4631a3e618cdd4ae46976c0

                                                SHA1

                                                07f2c2a142e37f33b42ac6bf2d3780151afc47f1

                                                SHA256

                                                8aae675ad8b2b8f05a11aab4a3040c587f3f53a5a82e3d2469293301c256d2cc

                                                SHA512

                                                351f4ff2438706a12922a429417839e412ec61201c77ce0397f12d16ed6c89295c003749809df435873c66fbe210e65d05ea23ce96f77c2b54e12135a5b16ec9

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                                Filesize

                                                6KB

                                                MD5

                                                18d8bc2379b0e9dee4ef19012d3edc0b

                                                SHA1

                                                dcf66c353e22f17199f493c159a3626ffb5cd0c0

                                                SHA256

                                                e9246302552bb59515b59913e0bedb48c49f212dd16c2973c5239eec388e00fa

                                                SHA512

                                                a3a2b039ab502aeaee7af2827fb982ac8d1ecc277777953444aea582bd48b091710763288ee13b12dbe744aee8d6dcc5a4bd5500acf1bb660e9004f69607de8d

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                                                Filesize

                                                23KB

                                                MD5

                                                749e1cba6d4c8948a47ebccabe8e8f5b

                                                SHA1

                                                af8088ab0a1ac0955564e04946ad59ffe894b620

                                                SHA256

                                                fc643f2bca2d69cce492bc50b2226fe592f90a2d0a0150b42ae551bd5f2976bd

                                                SHA512

                                                65fe119a0980e3158fa7d63a26acddda03e83a1ee59fbd3aa9b0fe8fe661e7579bad90253887849cc1b8f3c9006a3fe1326f13338867725f35c762d4bd856eec

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                                                Filesize

                                                5KB

                                                MD5

                                                61e257679d0c0be9d11c261a3bb810a2

                                                SHA1

                                                1a6f50a49a9d7387673c3b129969ebda75643c50

                                                SHA256

                                                04e61de7b35928adc1675c0cf9220be7acdbe5d80bab689296144ee32ad6f024

                                                SHA512

                                                284cd3b76b1431db8892ef6944d0992c8395bb25dc1a2d6eaeeb7f586025343143139362e1b0502f7fdf80579378b8dbd1c638c7d39822bf095dd65716600b60

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                Filesize

                                                5KB

                                                MD5

                                                5307124b6f791bd2121fa593fa7a79f8

                                                SHA1

                                                7c99a0347aa99be6d9f25d4110de0e416abdf818

                                                SHA256

                                                9ab39d8c41c93f94bb0fdef279bb476c7e9037e4dc87b50feb810b95a1da0157

                                                SHA512

                                                0e3a1448cee1acfdeab32a41254ee9571fe9631cc451a8b79b16f05a8f57ba8887c09ae676e5212700e1c1b1df749a9cb48314035ee3fde02729b1d80e0a4acf

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                Filesize

                                                5KB

                                                MD5

                                                ff3fefb04f9f231c584f90ada0834259

                                                SHA1

                                                3a081750e8a13d1b255a31b21dde5475b9f97c90

                                                SHA256

                                                7c05172a257c6cf60d24da48b5e9032a684092c641cd0e7deda2527738cc6826

                                                SHA512

                                                a9758af1d5019048e187b89f44def60cb99705509a4edab553b3039bcba6c5cfdd152ddc6d6608433cf6cfc8cdbad2f217628500fee494b206ac539f23c84631

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                Filesize

                                                6KB

                                                MD5

                                                8b0a31c96df61e74ebe5582575763de7

                                                SHA1

                                                6df4e29af760f9fee71c4544d92757068e2f3ccf

                                                SHA256

                                                1d58b0013f508eb36a71d5e163353121481f949b202a88fb79f7d861c5470bc0

                                                SHA512

                                                f4f0529815a25904bec0e77cb56824ba1cc2d22d9ca828ba1264e1eea9b8f48da8341df6c8c7bd3afe18b4e7ba3deba6dba70a96181bdf78de3102a862bf4448

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                Filesize

                                                6KB

                                                MD5

                                                ff7d3337bcff587fcb5626b047c1362f

                                                SHA1

                                                5b3c77b075788294898e9a1b65100ffaf086cdd7

                                                SHA256

                                                9354b5a6757318558e1e69081ef46138fdb9a2f76c7be4e8adbb3915e975dec4

                                                SHA512

                                                d6a49f0459abf231e05ea0033ceff6a120f486c571366e12b9c5be5703d1960ac51a57bbadb772e3ad4e1662cc98477211a9ab6ade08e40769cec38ee0b03ecb

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                Filesize

                                                6KB

                                                MD5

                                                f92cd1a11439eb5625b1ed14f50880dd

                                                SHA1

                                                65c4dd17034d1d88617e1fb7ddfe0746bb369ac8

                                                SHA256

                                                864d88619a255122eccdea3f1d7634409df0c5e31bded6f310a4184d1fc6e36d

                                                SHA512

                                                c52792a239c4009755c6aecb8c65d5cbfdb2ccac14692aedb8c7047469cdd655e66f574e8326e5fff44c78444ff661491c9f826ac32879f5139d85dac8067314

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\7377a32f-c2dc-4ab6-9bb8-c3a4315c4bc9

                                                Filesize

                                                671B

                                                MD5

                                                901d19b5adfbdeadac36c90581731bcc

                                                SHA1

                                                adf3b2a6273a024522484cc49eba66a9a1fa1b04

                                                SHA256

                                                0b1e90f100fd0ee8052e12b31bc9311727de8231c407e6ab2a84d7271e863ba9

                                                SHA512

                                                3deeaaf6541501577631af8a5ef0a205605b55a79ee148f24d57ccce40209250c8db8bb277724473f35c155fd8b6dfee06a867f99d546d9e845d54c951170d50

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\be7816c7-d769-45fc-8af4-879e346531b3

                                                Filesize

                                                982B

                                                MD5

                                                d19362457e1bce882b659c3957e204a3

                                                SHA1

                                                6361637e9f1e81b31384c6fed7e4d9144430685c

                                                SHA256

                                                43b1575fd8093afd4f7f2af1c68d71436ca20b2c8da57cd4cb36a26769835017

                                                SHA512

                                                7e6b58b36e8ca27803433cd7fdf35cce53d8f764f8bc0974ed8b91cd973c8da20c2d5afb6a80e8f527064167d2a701ab6835fa8618ff37c8fb4f272e822db87e

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\feefb3fe-8ef4-4192-9557-edd806b9c409

                                                Filesize

                                                27KB

                                                MD5

                                                6fe1bab605a8f6850a754a320057d0c7

                                                SHA1

                                                123171db916c49c0877fac00cacc0c25781a9875

                                                SHA256

                                                7a3d8b288de2abbcaa543d37325e72f36188719aae3d9e24af91115b0eb76bbe

                                                SHA512

                                                2074f4aeebe1407090b895ca99dbe89fe4fc2276a014529fafbe9cc74bea7e62777c22045b21e47b30f251aece9de6aeb0c2c6c2fab249922e363da66ec84f07

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                                Filesize

                                                10KB

                                                MD5

                                                3c76366c58ed7d5b086fa79bebef26cc

                                                SHA1

                                                c9441cc74faf507d8503ecb8fe4c985911d41f04

                                                SHA256

                                                8416112f82a9e06d629aeb60281e4ebdfaf55aace5fab3679d97e6af50a0267e

                                                SHA512

                                                9e076c0dce9f559c04aff0e7e2c834a92036719ab8092e3a4027b81bae4caf709b5c37f4b49caa38ff3a64c6c5c999d62fcfd1f1683c79d1d35fbd725197b8e0

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                                                Filesize

                                                10KB

                                                MD5

                                                7664f002bdcca63b4cec5970f81a13f2

                                                SHA1

                                                524a6ec91d6bffb8b8278b989d3cf7163a88687b

                                                SHA256

                                                40b79e5fd59e4c869ae3bf4d5ebf8599f2f09e2f7c8ba878256adb5f5b8bf87b

                                                SHA512

                                                f062f8244b2df4f694d451e343b608ff1d08c4358805bd0c535417aee6ee2ce8401636c0c558bb063879077d88e5bdd015eea790e8ba7376714c53ee09ec3a79

                                              • C:\negagdrc\348ded35c79042098f08b8760054002f.exe

                                                Filesize

                                                144KB

                                                MD5

                                                cc36e2a5a3c64941a79c31ca320e9797

                                                SHA1

                                                50c8f5db809cfec84735c9f4dcd6b55d53dfd9f5

                                                SHA256

                                                6fec179c363190199c1dcdf822be4d6b1f5c4895ebc7148a8fc9fa9512eeade8

                                                SHA512

                                                fcea6d62dc047e40182dc4ff1e0522ca935f9aeefdb1517957977bc5d9ac654285a973261401f3b98abf1f6ed62638b9e31306fd7aaeb67214ca42dfc2888af0

                                              • C:\negagdrc\74ad719341b747dcad13446df9bf57e8.exe

                                                Filesize

                                                1.0MB

                                                MD5

                                                971b0519b1c0461db6700610e5e9ca8e

                                                SHA1

                                                9a262218310f976aaf837e54b4842e53e73be088

                                                SHA256

                                                47cf75570c1eca775b2dd1823233d7c40924d3a8d93e0e78c943219cf391d023

                                                SHA512

                                                d234a9c5a1da8415cd4d2626797197039f2537e98f8f43d155f815a7867876cbc1bf466be58677c79a9199ea47d146a174998d21ef0aebc29a4b0443f8857cb9

                                              • memory/868-143-0x0000000000A80000-0x0000000000A8C000-memory.dmp

                                                Filesize

                                                48KB

                                              • memory/964-162-0x0000000073A70000-0x0000000073ABC000-memory.dmp

                                                Filesize

                                                304KB

                                              • memory/964-172-0x0000000006740000-0x000000000675E000-memory.dmp

                                                Filesize

                                                120KB

                                              • memory/964-183-0x0000000007780000-0x0000000007788000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/964-144-0x0000000002810000-0x0000000002846000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/964-181-0x00000000076A0000-0x00000000076B4000-memory.dmp

                                                Filesize

                                                80KB

                                              • memory/964-145-0x0000000005320000-0x0000000005948000-memory.dmp

                                                Filesize

                                                6.2MB

                                              • memory/964-180-0x0000000007690000-0x000000000769E000-memory.dmp

                                                Filesize

                                                56KB

                                              • memory/964-179-0x0000000007660000-0x0000000007671000-memory.dmp

                                                Filesize

                                                68KB

                                              • memory/964-178-0x00000000076E0000-0x0000000007776000-memory.dmp

                                                Filesize

                                                600KB

                                              • memory/964-177-0x00000000074D0000-0x00000000074DA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/964-146-0x0000000005180000-0x00000000051A2000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/964-147-0x0000000005A80000-0x0000000005AE6000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/964-175-0x0000000007460000-0x000000000747A000-memory.dmp

                                                Filesize

                                                104KB

                                              • memory/964-174-0x0000000007AA0000-0x000000000811A000-memory.dmp

                                                Filesize

                                                6.5MB

                                              • memory/964-173-0x0000000007350000-0x00000000073F3000-memory.dmp

                                                Filesize

                                                652KB

                                              • memory/964-182-0x00000000077A0000-0x00000000077BA000-memory.dmp

                                                Filesize

                                                104KB

                                              • memory/964-148-0x0000000005AF0000-0x0000000005B56000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/964-158-0x0000000005C60000-0x0000000005FB4000-memory.dmp

                                                Filesize

                                                3.3MB

                                              • memory/964-159-0x0000000006130000-0x000000000614E000-memory.dmp

                                                Filesize

                                                120KB

                                              • memory/964-160-0x0000000006170000-0x00000000061BC000-memory.dmp

                                                Filesize

                                                304KB

                                              • memory/964-161-0x00000000066F0000-0x0000000006722000-memory.dmp

                                                Filesize

                                                200KB

                                              • memory/1224-691-0x0000000000FF0000-0x0000000001489000-memory.dmp

                                                Filesize

                                                4.6MB

                                              • memory/1224-695-0x0000000000FF0000-0x0000000001489000-memory.dmp

                                                Filesize

                                                4.6MB

                                              • memory/1608-1325-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                Filesize

                                                8.4MB

                                              • memory/1608-672-0x0000000010000000-0x000000001001C000-memory.dmp

                                                Filesize

                                                112KB

                                              • memory/1608-664-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                Filesize

                                                8.4MB

                                              • memory/1608-698-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                Filesize

                                                8.4MB

                                              • memory/1848-79-0x0000000000400000-0x0000000000457000-memory.dmp

                                                Filesize

                                                348KB

                                              • memory/1848-83-0x0000000000400000-0x0000000000457000-memory.dmp

                                                Filesize

                                                348KB

                                              • memory/1848-81-0x0000000000400000-0x0000000000457000-memory.dmp

                                                Filesize

                                                348KB

                                              • memory/1896-634-0x0000000000180000-0x0000000000DDC000-memory.dmp

                                                Filesize

                                                12.4MB

                                              • memory/1896-576-0x0000000000180000-0x0000000000DDC000-memory.dmp

                                                Filesize

                                                12.4MB

                                              • memory/1896-668-0x0000000000180000-0x0000000000DDC000-memory.dmp

                                                Filesize

                                                12.4MB

                                              • memory/1896-670-0x0000000000180000-0x0000000000DDC000-memory.dmp

                                                Filesize

                                                12.4MB

                                              • memory/2348-20-0x0000000000BD0000-0x0000000000EEE000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/2348-35-0x0000000000BD0000-0x0000000000EEE000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/2396-643-0x0000000000400000-0x0000000000456000-memory.dmp

                                                Filesize

                                                344KB

                                              • memory/2396-647-0x0000000000400000-0x0000000000456000-memory.dmp

                                                Filesize

                                                344KB

                                              • memory/2396-646-0x0000000000400000-0x0000000000456000-memory.dmp

                                                Filesize

                                                344KB

                                              • memory/2400-197-0x0000000073A70000-0x0000000073ABC000-memory.dmp

                                                Filesize

                                                304KB

                                              • memory/2992-520-0x0000000000400000-0x0000000000639000-memory.dmp

                                                Filesize

                                                2.2MB

                                              • memory/2992-217-0x0000000000400000-0x0000000000639000-memory.dmp

                                                Filesize

                                                2.2MB

                                              • memory/3392-714-0x0000000000820000-0x0000000000D13000-memory.dmp

                                                Filesize

                                                4.9MB

                                              • memory/3392-726-0x0000000000820000-0x0000000000D13000-memory.dmp

                                                Filesize

                                                4.9MB

                                              • memory/3556-38-0x00000000007E0000-0x0000000000C5C000-memory.dmp

                                                Filesize

                                                4.5MB

                                              • memory/3556-58-0x00000000007E0000-0x0000000000C5C000-memory.dmp

                                                Filesize

                                                4.5MB

                                              • memory/3556-85-0x00000000007E0000-0x0000000000C5C000-memory.dmp

                                                Filesize

                                                4.5MB

                                              • memory/3556-91-0x00000000007E0000-0x0000000000C5C000-memory.dmp

                                                Filesize

                                                4.5MB

                                              • memory/3556-90-0x00000000007E0000-0x0000000000C5C000-memory.dmp

                                                Filesize

                                                4.5MB

                                              • memory/3648-648-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-252-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-89-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-84-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-604-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-56-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-55-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-176-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-110-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-519-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-693-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-537-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-104-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-99-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-747-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3648-33-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3696-87-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3696-88-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/3788-437-0x0000000000150000-0x000000000046E000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/4372-100-0x00000000006B0000-0x000000000095C000-memory.dmp

                                                Filesize

                                                2.7MB

                                              • memory/4372-102-0x00000000006B0000-0x000000000095C000-memory.dmp

                                                Filesize

                                                2.7MB

                                              • memory/4372-103-0x00000000006B0000-0x000000000095C000-memory.dmp

                                                Filesize

                                                2.7MB

                                              • memory/4372-106-0x00000000006B0000-0x000000000095C000-memory.dmp

                                                Filesize

                                                2.7MB

                                              • memory/4372-109-0x00000000006B0000-0x000000000095C000-memory.dmp

                                                Filesize

                                                2.7MB

                                              • memory/4700-96-0x00000000001A0000-0x0000000000694000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/4700-94-0x00000000001A0000-0x0000000000694000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/5000-229-0x000001EE54F30000-0x000001EE55032000-memory.dmp

                                                Filesize

                                                1.0MB

                                              • memory/5000-230-0x000001EE56DD0000-0x000001EE56DDA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/5000-231-0x000001EE56F10000-0x000001EE56FCA000-memory.dmp

                                                Filesize

                                                744KB

                                              • memory/5000-246-0x000001EE56E40000-0x000001EE56E52000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/5000-247-0x000001EE56EA0000-0x000001EE56EDC000-memory.dmp

                                                Filesize

                                                240KB

                                              • memory/5000-248-0x000001EE708F0000-0x000001EE708F8000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/5000-250-0x000001EE71110000-0x000001EE7111E000-memory.dmp

                                                Filesize

                                                56KB

                                              • memory/5000-249-0x000001EE732B0000-0x000001EE732E8000-memory.dmp

                                                Filesize

                                                224KB

                                              • memory/5000-251-0x000001EE74400000-0x000001EE74586000-memory.dmp

                                                Filesize

                                                1.5MB

                                              • memory/5000-253-0x000001EE745C0000-0x000001EE745E6000-memory.dmp

                                                Filesize

                                                152KB