Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 10:11

General

  • Target

    0f1d1aed639362ce37edde5b4c278555bec835b1a5d3d5b90a7b8bbce0d83b86_Sigmanly.exe

  • Size

    3.1MB

  • MD5

    b54cf9188652a3bfe166d33c542f8ac6

  • SHA1

    4335fa4d75ab3ba85613d163f8f930d9adf087ce

  • SHA256

    0f1d1aed639362ce37edde5b4c278555bec835b1a5d3d5b90a7b8bbce0d83b86

  • SHA512

    b6ef0f5c0db58bed81c3c8c5f506942503c00d7c97099ac52b290567fe2578b88b8d5589715583b1b7b80f6a30e344e870f416eda0a241ed002b8fea0171892f

  • SSDEEP

    49152:k4HtEx2aA9j9Gst1RPlc6eqEgbcVCaY8MBVkBiS5wRwnij4Pk:5e9Ujgst1RPlc6eubCCaBPhWRBE

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

cryptbot

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • XMRig Miner payload 13 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 39 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 8 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f1d1aed639362ce37edde5b4c278555bec835b1a5d3d5b90a7b8bbce0d83b86_Sigmanly.exe
    "C:\Users\Admin\AppData\Local\Temp\0f1d1aed639362ce37edde5b4c278555bec835b1a5d3d5b90a7b8bbce0d83b86_Sigmanly.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Users\Admin\AppData\Local\Temp\1020057001\SurveillanceWalls.exe
        "C:\Users\Admin\AppData\Local\Temp\1020057001\SurveillanceWalls.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3348
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c move Campbell Campbell.cmd & Campbell.cmd
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1700
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:920
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "opssvc wrsa"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3664
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4044
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3616
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 370821
            5⤵
            • System Location Discovery: System Language Discovery
            PID:852
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "Anchor" Veterinary
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3912
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Genre + ..\Mj + ..\Discs + ..\Receiving + ..\Mysterious + ..\Aka w
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3444
          • C:\Users\Admin\AppData\Local\Temp\370821\Sale.com
            Sale.com w
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:1808
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2068
      • C:\Users\Admin\AppData\Local\Temp\1020060001\11d0356ee7.exe
        "C:\Users\Admin\AppData\Local\Temp\1020060001\11d0356ee7.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3036
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3972
          • C:\Windows\system32\mode.com
            mode 65,10
            5⤵
              PID:3256
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e file.zip -p24291711423417250691697322505 -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3648
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_7.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4852
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_6.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2688
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_5.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4532
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_4.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4472
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_3.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3352
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_2.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3848
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_1.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2928
            • C:\Windows\system32\attrib.exe
              attrib +H "in.exe"
              5⤵
              • Views/modifies file attributes
              PID:228
            • C:\Users\Admin\AppData\Local\Temp\main\in.exe
              "in.exe"
              5⤵
              • Executes dropped EXE
              PID:4500
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:4272
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:956
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:4352
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell ping 127.0.0.1; del in.exe
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2276
                • C:\Windows\system32\PING.EXE
                  "C:\Windows\system32\PING.EXE" 127.0.0.1
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:4196
        • C:\Users\Admin\AppData\Local\Temp\1020066001\c7719e2bf1.exe
          "C:\Users\Admin\AppData\Local\Temp\1020066001\c7719e2bf1.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:1352
          • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
            "C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:336
        • C:\Users\Admin\AppData\Local\Temp\1020067001\d8b7ea187f.exe
          "C:\Users\Admin\AppData\Local\Temp\1020067001\d8b7ea187f.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          PID:4540
          • C:\Program Files\Windows Media Player\graph\graph.exe
            "C:\Program Files\Windows Media Player\graph\graph.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:64
        • C:\Users\Admin\AppData\Local\Temp\1020068001\O8FeZRE.exe
          "C:\Users\Admin\AppData\Local\Temp\1020068001\O8FeZRE.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3444
        • C:\Users\Admin\AppData\Local\Temp\1020070001\5c4922c925.exe
          "C:\Users\Admin\AppData\Local\Temp\1020070001\5c4922c925.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2276
        • C:\Users\Admin\AppData\Local\Temp\1020071001\d253a2fb68.exe
          "C:\Users\Admin\AppData\Local\Temp\1020071001\d253a2fb68.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:4044
          • C:\Users\Admin\AppData\Local\Temp\1020071001\d253a2fb68.exe
            "C:\Users\Admin\AppData\Local\Temp\1020071001\d253a2fb68.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3948
        • C:\Users\Admin\AppData\Local\Temp\1020072001\c936a4c00c.exe
          "C:\Users\Admin\AppData\Local\Temp\1020072001\c936a4c00c.exe"
          3⤵
          • Enumerates VirtualBox registry keys
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4848
        • C:\Users\Admin\AppData\Local\Temp\1020073001\cde9c0f8d5.exe
          "C:\Users\Admin\AppData\Local\Temp\1020073001\cde9c0f8d5.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2824
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 636
            4⤵
            • Program crash
            PID:4424
        • C:\Users\Admin\AppData\Local\Temp\1020074001\01c308c748.exe
          "C:\Users\Admin\AppData\Local\Temp\1020074001\01c308c748.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          PID:4104
        • C:\Users\Admin\AppData\Local\Temp\1020075001\c2ac86d5d4.exe
          "C:\Users\Admin\AppData\Local\Temp\1020075001\c2ac86d5d4.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          PID:4956
        • C:\Users\Admin\AppData\Local\Temp\1020076001\25da397fd5.exe
          "C:\Users\Admin\AppData\Local\Temp\1020076001\25da397fd5.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          PID:112
        • C:\Users\Admin\AppData\Local\Temp\1020077001\9d222cdc8b.exe
          "C:\Users\Admin\AppData\Local\Temp\1020077001\9d222cdc8b.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:4048
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4788
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4652
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3076
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4688
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4552
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:1016
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:4780
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1972 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9166c5bd-907c-4890-8613-e6fb3af891d1} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" gpu
                  6⤵
                    PID:320
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2380 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2b0002d0-0ea1-4717-b1e3-745fa96982ed} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" socket
                    6⤵
                      PID:544
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3160 -childID 1 -isForBrowser -prefsHandle 3152 -prefMapHandle 2692 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {40dfcccb-e08c-42ba-b8fd-89a8d0a6091f} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" tab
                      6⤵
                        PID:3956
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4068 -childID 2 -isForBrowser -prefsHandle 4084 -prefMapHandle 4080 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2066456-982e-4fbb-8ef2-abe3c28e464b} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" tab
                        6⤵
                          PID:3416
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4792 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4844 -prefMapHandle 4840 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed3ebbb0-b02f-412d-afca-e46ec14600dc} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" utility
                          6⤵
                          • Checks processor information in registry
                          PID:5772
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 3 -isForBrowser -prefsHandle 4956 -prefMapHandle 5312 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72fdbecf-b634-42cf-b63b-315c92e8e030} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" tab
                          6⤵
                            PID:5280
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 4 -isForBrowser -prefsHandle 5524 -prefMapHandle 5520 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {88e60f5f-e7c3-4758-8c76-90a088a0c3f3} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" tab
                            6⤵
                              PID:5292
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5640 -childID 5 -isForBrowser -prefsHandle 5720 -prefMapHandle 5716 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9f1a6f44-0df5-4370-a4e5-0389367dac5d} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" tab
                              6⤵
                                PID:5304
                        • C:\Users\Admin\AppData\Local\Temp\1020078001\ddb4079e72.exe
                          "C:\Users\Admin\AppData\Local\Temp\1020078001\ddb4079e72.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1060
                        • C:\Users\Admin\AppData\Local\Temp\1020079001\fbd7b35da7.exe
                          "C:\Users\Admin\AppData\Local\Temp\1020079001\fbd7b35da7.exe"
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:5768
                        • C:\Users\Admin\AppData\Local\Temp\1020080001\d819320956.exe
                          "C:\Users\Admin\AppData\Local\Temp\1020080001\d819320956.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          PID:5356
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 1460
                            4⤵
                            • Program crash
                            PID:6012
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 1496
                            4⤵
                            • Program crash
                            PID:5128
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3416
                    • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                      C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                      1⤵
                      • Executes dropped EXE
                      PID:4532
                    • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5008
                      • C:\Windows\explorer.exe
                        explorer.exe
                        2⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3840
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                        2⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3012
                        • C:\Windows\system32\PING.EXE
                          "C:\Windows\system32\PING.EXE" 127.1.10.1
                          3⤵
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Runs ping.exe
                          PID:4728
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5356 -ip 5356
                      1⤵
                        PID:5908
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5356 -ip 5356
                        1⤵
                          PID:6084
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2824 -ip 2824
                          1⤵
                            PID:5236
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:5764
                          • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                            C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                            1⤵
                            • Executes dropped EXE
                            PID:696
                          • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            1⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:5640
                            • C:\Windows\explorer.exe
                              explorer.exe
                              2⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5828
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                              2⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:6004
                              • C:\Windows\system32\PING.EXE
                                "C:\Windows\system32\PING.EXE" 127.1.10.1
                                3⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:5540
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:5748
                          • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                            C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                            1⤵
                            • Executes dropped EXE
                            PID:5212
                          • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            1⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:3904
                            • C:\Windows\explorer.exe
                              explorer.exe
                              2⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5272
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                              2⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5984
                              • C:\Windows\system32\PING.EXE
                                "C:\Windows\system32\PING.EXE" 127.1.10.1
                                3⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:6076

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GRYMSCZU\download[1].htm

                            Filesize

                            1B

                            MD5

                            cfcd208495d565ef66e7dff9f98764da

                            SHA1

                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                            SHA256

                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                            SHA512

                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json.tmp

                            Filesize

                            18KB

                            MD5

                            6368042115b8e10fd34a5140d7653ba0

                            SHA1

                            743122c3e70f6a2724b18a004904cf237675467d

                            SHA256

                            3c1d1be2014de4b88c667c1d492310642216064752a1c427eddb81e7d7b5f88d

                            SHA512

                            3ff9dd3f93f1f942f1d665dee53742c0a8b5d34ba35def2ec4cc8b66c8868bbe3f1699af3f9aeda427df81dafcc0bc90532e78757df9a630d54f9c25b13f7221

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\6653BC7BE242C21AA1988A4A42D1DEDA18231C31

                            Filesize

                            13KB

                            MD5

                            4b8f842eededa9506412823d5a68ecac

                            SHA1

                            249b498e1bf008b18b952239caf232893bbf359f

                            SHA256

                            ba644f4ec5e5a74344d58478c68e8124c9362b3c1a0b972012bce1339324d474

                            SHA512

                            48e375d3b20da463cc85bc39b8b97d45d7bc729ffd340ea3cb2ccf6d2f83e6f81f9958fd0a6a7672b5ab0cc4cc5d7e902d4e52d7d5e1ce4133784e4e239d8347

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                            Filesize

                            13KB

                            MD5

                            3f37af4a328c5dad3899d78fbf3b9bcd

                            SHA1

                            5b2b1b5ec7f38623785e45c9cf084ec404e14162

                            SHA256

                            1e1b365df39956b4c8cd481e354ae83cbb229226e68a50ae52058557939e509a

                            SHA512

                            0809d1640ce0e4b425de048c8f8f7347dcd5db7cb4175a886b06c631ece44d269ccb3db9191d8bc5094873e5f593080739a1f86c85e4d891e227ffd44382062f

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                            Filesize

                            15KB

                            MD5

                            96c542dec016d9ec1ecc4dddfcbaac66

                            SHA1

                            6199f7648bb744efa58acf7b96fee85d938389e4

                            SHA256

                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                            SHA512

                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                          • C:\Users\Admin\AppData\Local\Temp\1020057001\SurveillanceWalls.exe

                            Filesize

                            1.2MB

                            MD5

                            5a909c9769920208ed3d4d7279f08de5

                            SHA1

                            656f447088626150e252cbf7df6f8cd0de596fa0

                            SHA256

                            5f2c26e780639a76f10c549e7dea1421c4f06093c1facbf4dd8cf0a8b2fee8cb

                            SHA512

                            c6038048bd09c8f704246a6ba176ea63b1c8d23f2e127600c50bac50f3032c1b751ea8e405a2fe1ea707f75f21cf6516447345a84751bc677d94874d4b91090b

                          • C:\Users\Admin\AppData\Local\Temp\1020060001\11d0356ee7.exe

                            Filesize

                            4.2MB

                            MD5

                            3a425626cbd40345f5b8dddd6b2b9efa

                            SHA1

                            7b50e108e293e54c15dce816552356f424eea97a

                            SHA256

                            ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                            SHA512

                            a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                          • C:\Users\Admin\AppData\Local\Temp\1020066001\c7719e2bf1.exe

                            Filesize

                            429KB

                            MD5

                            51ff79b406cb223dd49dd4c947ec97b0

                            SHA1

                            b9b0253480a1b6cbdd673383320fecae5efb3dce

                            SHA256

                            2e3a5dfa44d59681a60d78b8b08a1af3878d8e270c02d7e31a0876a85eb42a7e

                            SHA512

                            c2b8d15b0dc1b0846f39ce007be2deb41d5b6ae76af90d618f29da8691ed987c42f3c270f0ea7f4d10cbd2d3877118f4133803c9c965b6ff236ff8cfafd9367c

                          • C:\Users\Admin\AppData\Local\Temp\1020067001\d8b7ea187f.exe

                            Filesize

                            591KB

                            MD5

                            3567cb15156760b2f111512ffdbc1451

                            SHA1

                            2fdb1f235fc5a9a32477dab4220ece5fda1539d4

                            SHA256

                            0285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630

                            SHA512

                            e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba

                          • C:\Users\Admin\AppData\Local\Temp\1020068001\O8FeZRE.exe

                            Filesize

                            295KB

                            MD5

                            ef9b9ffab9d91e590c6bda0280686d52

                            SHA1

                            bcbdca605606f483e76ae821b7bf81ca3e1b529a

                            SHA256

                            1345ad4c782c91049a16ec9f01b04bfc83a4f0e1e259cfed2b535f8ec6b75590

                            SHA512

                            3b362b306ba8357ac2eecd7354799e203d42fdee849584b26ee2c4c7b2c632c64558fd84f22c1dff35957f6950e333d005a225a54bdab4b3f53812041ea6345c

                          • C:\Users\Admin\AppData\Local\Temp\1020070001\5c4922c925.exe

                            Filesize

                            2.5MB

                            MD5

                            87330f1877c33a5a6203c49075223b16

                            SHA1

                            55b64ee8b2d1302581ab1978e9588191e4e62f81

                            SHA256

                            98f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0

                            SHA512

                            7c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f

                          • C:\Users\Admin\AppData\Local\Temp\1020071001\d253a2fb68.exe

                            Filesize

                            758KB

                            MD5

                            afd936e441bf5cbdb858e96833cc6ed3

                            SHA1

                            3491edd8c7caf9ae169e21fb58bccd29d95aefef

                            SHA256

                            c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                            SHA512

                            928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                          • C:\Users\Admin\AppData\Local\Temp\1020072001\c936a4c00c.exe

                            Filesize

                            4.2MB

                            MD5

                            1dd231261455675567ba86411a9c2308

                            SHA1

                            273e7ce353ccb01e349139cd618ec8ac01636f78

                            SHA256

                            fdbaa388833e09a78a4e17621d7ee25506c8e1f100720c8fdf3332d3d772b5a3

                            SHA512

                            93f5b98d6ee7b200108b7d67cb31abbc7296fe53cdd23f058e167a3de8e6fc494293f6d59357ce6d2e3235520a965fe75183e26b51caf26e5a0c5fe347f7c7cd

                          • C:\Users\Admin\AppData\Local\Temp\1020073001\cde9c0f8d5.exe

                            Filesize

                            1.9MB

                            MD5

                            3ee3b92f92a6ab549bcb9615e197253c

                            SHA1

                            66f1e8647e51f77ed5f66c3db23ec01909aad4ce

                            SHA256

                            2ca68fefe5cbf9d595e1dde3b0ebc1447441be518af3bceca9312d93c91dca37

                            SHA512

                            d987837fef5a0a00b1401b9c171ba794df78412ee3444a9c17c617f2344c5a71fa3f4286c1f68438db43170ded1079502c0b406ea7c051a868edc78ddb6ca088

                          • C:\Users\Admin\AppData\Local\Temp\1020074001\01c308c748.exe

                            Filesize

                            4.3MB

                            MD5

                            c68297282df3b519f90b07be11d5b2c3

                            SHA1

                            b458d00cab0449a1c9f0f9225cc5c326199425f6

                            SHA256

                            b33d993baf0f52b1f0e01b6d6d4f568c37c21a641f41c8f6fb72c493f80a91a7

                            SHA512

                            b70746441c6cf4c6df94cd1171e3bb1737462cec5eb5739ef5e75a52d9209fdb32bb3c85ed632c0a68834e22fc21476233aa706f37c0f7f74d701147c0a05d22

                          • C:\Users\Admin\AppData\Local\Temp\1020075001\c2ac86d5d4.exe

                            Filesize

                            1.8MB

                            MD5

                            3a5696def6e0a20dfeb8786eadff60a0

                            SHA1

                            e0a623473fdab0dd57963f4f621f90c04e7ba412

                            SHA256

                            96768826305ca9bfb18ec1d67156f09094acc6aa2afea7dcd9ffa954585c5618

                            SHA512

                            9594fb613a41e1f4f29ab836d6b8058ae1ddfa916e2b1f20ddffa96fc2814e3aac521563382f9a2041362204e7b0cccd8e5f6557365d53f095811a92ff435455

                          • C:\Users\Admin\AppData\Local\Temp\1020076001\25da397fd5.exe

                            Filesize

                            2.8MB

                            MD5

                            9cc29de2181140ba98ecba7376a5a1b2

                            SHA1

                            8462b882592aac26862dc0da719250ce0bda695d

                            SHA256

                            fb60321eb9cb9b74ffe05e0ad8de162167c22761d9faeee55fcd5e6146bbb614

                            SHA512

                            17f8bc94dd499c8e0c8f646e8e3645459ae70a436d442e8783b4d9cf456927900daf71a455cc7860c8c45c870d31eeb533aa15ba2631ce01ec5c9b91c96cc1bc

                          • C:\Users\Admin\AppData\Local\Temp\1020077001\9d222cdc8b.exe

                            Filesize

                            945KB

                            MD5

                            d80e065afa40bf1adae2ec53276e3ff5

                            SHA1

                            29ce06353e5f63ec3a3ad9cfd5a2449560717f1b

                            SHA256

                            63033f51d09aa7aaea7d3c17f2984b8b3c9b197ff7e26cf490ad6552252d26b8

                            SHA512

                            15f50130a2b22ce01239993b7c8309948e48f09373a02afe26f7b344922db097ea932cd121b0bb1d3a738a33385d29bb980c83ed70ef0b52b22fe727ed4423f1

                          • C:\Users\Admin\AppData\Local\Temp\1020078001\ddb4079e72.exe

                            Filesize

                            2.7MB

                            MD5

                            5af496bd2248afafd2e591225ebc239e

                            SHA1

                            faf5100b80ace71f195d7bec83c7fc8aa7fab002

                            SHA256

                            a699d1b0cccf9fd3fabbde3185afb64c1fc0a5f60c055a19663e37bb1ac1f856

                            SHA512

                            808d0b3739ed59a562601588941fdda0e4efed01221e9fedb5af82162106de418aeb8af466c191cecb5f18c3489b528d6ca4eef68757ffa9bd3c46065a7cc374

                          • C:\Users\Admin\AppData\Local\Temp\1020080001\d819320956.exe

                            Filesize

                            1.8MB

                            MD5

                            15709eba2afaf7cc0a86ce0abf8e53f1

                            SHA1

                            238ebf0d386ecf0e56d0ddb60faca0ea61939bb6

                            SHA256

                            10bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a

                            SHA512

                            65edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9

                          • C:\Users\Admin\AppData\Local\Temp\370821\Sale.com

                            Filesize

                            925KB

                            MD5

                            62d09f076e6e0240548c2f837536a46a

                            SHA1

                            26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                            SHA256

                            1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                            SHA512

                            32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                          • C:\Users\Admin\AppData\Local\Temp\370821\w

                            Filesize

                            445KB

                            MD5

                            d02f356cc528bf6eaa89051942a0b1be

                            SHA1

                            dfecb4ae80274697f0d86e497cd566020ea23739

                            SHA256

                            5ed7e1f92a6bb08458ca99fdc83236095845f5939c6b9f7e423c6db70869b95c

                            SHA512

                            91ec78343e91db20edf97f39c293a5a8a45851c510ad6499c85b26738dfd9e918edda14e8710ece22d855d51d1417e722f19530ce3979e491c2b0dccb5198e57

                          • C:\Users\Admin\AppData\Local\Temp\Aka

                            Filesize

                            42KB

                            MD5

                            14422967d2c4b9a9a8a90e398b24f500

                            SHA1

                            7031018af43bcc5550a8b0a55680596d693334dc

                            SHA256

                            93db8e88945b7de88e98a7c50d64bffa8b73c3b002c744c8d62c2eadf767cf6f

                            SHA512

                            4b5795f15774a7768a42aa3a2308b9366f47b30c92babf688a67d2abeca0037b63762f3e21154212dc5c8a31bcdd69f029e849e1d4def5676a04b64e2ae90c75

                          • C:\Users\Admin\AppData\Local\Temp\Anybody

                            Filesize

                            121KB

                            MD5

                            c89fd1314a2184d5d7b4a66de377d5b2

                            SHA1

                            f0ebbc2c8c6f9ebadc6ace713aec1b06f3f841e8

                            SHA256

                            9d1e82e2e430b87b28867ff9745a74e53a128671e9d300f111b1904786c2f856

                            SHA512

                            4b0b16e99d0cacab0b7af1d65cbf9226988752d8fa020b955bf54c634d9d64a05bb036ef590fa0d852d513621a84f4c3dc3c341aa8feffdf350dd8a5dbc75778

                          • C:\Users\Admin\AppData\Local\Temp\Campbell

                            Filesize

                            11KB

                            MD5

                            e7567ec4057933fa6e06322b7c08b72a

                            SHA1

                            4e733e77915c7dfb7d25e31738e9d596962d4177

                            SHA256

                            1896ef25a6223f19f770da125a4b1bc7c90815ccb682ec7ca780d231a01c28b0

                            SHA512

                            d8a14e5c8225ad8bdbb45317fd41588c12e9e60f1c9ff819d0d15cbc35801b82e7c7981b7dbc815666354950a7f5362fc00765f8a67c9478bd95dc5a31b12c83

                          • C:\Users\Admin\AppData\Local\Temp\Conferencing

                            Filesize

                            130KB

                            MD5

                            638e7812c5e9c55c5f339cc64d197b28

                            SHA1

                            5ef8a953ef65ab7d0620a5d144f2c410e2a77a2f

                            SHA256

                            347a3459dd74aea0a6b2f62955d1bc9bdb091bb66ca8a42274f7ebf310527fd8

                            SHA512

                            194b0d8799a83210968746c4d3e364ee512669e6080c6b3d215d97c141e8ef7f09152ea524691efcd2276acb1dc158ffd484e3f595ddf2cceb690bd1996c8266

                          • C:\Users\Admin\AppData\Local\Temp\Debug

                            Filesize

                            112KB

                            MD5

                            d9daf89d86b32df3d7da7ec1cfbf7212

                            SHA1

                            59e1ba3dd32168a3d79a9da2626c99c52970a53e

                            SHA256

                            06f48747a4acb2ee437d03a9e8331cca5c76ee5684e118f491e4faf7799adcc4

                            SHA512

                            24d26b6112417d75915f08562af53eb1bb7ddef2e89e779db52ae0f674ea8ce102984fa2628cee5588c7dc34df00a32497e49ee18f7259c51e4d1c855ab69a6c

                          • C:\Users\Admin\AppData\Local\Temp\Discs

                            Filesize

                            68KB

                            MD5

                            00646a2066d51d9790f52bae3c446c87

                            SHA1

                            ebda2b25b5a46cc6d9d5494050cc4b3a0bf81984

                            SHA256

                            57afab1cec987da27f5e92baa6dc21d83f8c83edf734fc590313102e75844c3a

                            SHA512

                            a74c02ed1b704912a8945e60cacc892f7e832e5cf15c87632b0fd3cbf9ddd8f36b01a5ba87fd7ef87d6becbb297161bb69dc750b8dac6f952892d45cd95f46f0

                          • C:\Users\Admin\AppData\Local\Temp\Dod

                            Filesize

                            3KB

                            MD5

                            682d77b5a6d22691a869ab4bea11ad53

                            SHA1

                            f56fab8959a05c77570652f5f8e9e4103489e676

                            SHA256

                            c269725998f8f5acdab6a0067457065cc9059326ee0a38ff353c2939a0190c1b

                            SHA512

                            c42d04178ed59683fc4597b83496d7b3c61c1a075b4542abb491c9639531f9737d70ae4172186fd6a3450c26701d794496bd4ae0f5e50db8a3818cd78ed7fd27

                          • C:\Users\Admin\AppData\Local\Temp\Ejaculation

                            Filesize

                            148KB

                            MD5

                            2e9e29f8ed97f2de8ebb1652bdbd545a

                            SHA1

                            5577d360b25daffa0af907fc5d852894b784f81d

                            SHA256

                            aeb399054cff321f752d4f93143815ff1a2cc2398668c2e1110065a2c6f502f1

                            SHA512

                            f4f925daf3f576441d2b7a0e250a51400b23e714d76870a640734912da783d83ac113586f121161d96d7f06eb70b8d89eb4e0524d591232b0b2a342063e8bcb6

                          • C:\Users\Admin\AppData\Local\Temp\Execution

                            Filesize

                            112KB

                            MD5

                            42fb34ddb94507c5a125bf02c2983904

                            SHA1

                            4e400c020121235e3de490f5cbb38c4a25e686dc

                            SHA256

                            d59efea25d1e316b8a9248f52081ab14113c97603f3e90d533f4f373f743b3c7

                            SHA512

                            639d90cd1cd451ebcb9e5e1c165f7eebb62b30d6bf24c596990ca40e08bce5d0b5864e7a4f0a83624c7cf9ac4ec5c1e7385f59602b206f3346554d62721cd71d

                          • C:\Users\Admin\AppData\Local\Temp\Genre

                            Filesize

                            88KB

                            MD5

                            5ce4409c4aaa9fd5a27ec4974734f1df

                            SHA1

                            bf7ee5465ef96ee0186388b5b0685ad727ed9493

                            SHA256

                            a401b4cd0afbaee57d8025bf4fce12583c825cbc2e3d3f308eb0627cd5bba412

                            SHA512

                            1155b1c58221ba1c809d9d60cd440ebd8788dcd3169ee87bda72fb7061b1e2f849f8bc79ac7053df5de8bc7955db088df778af66900d6f303bde6d61925014e6

                          • C:\Users\Admin\AppData\Local\Temp\Marijuana

                            Filesize

                            58KB

                            MD5

                            d830821fe60d6cd810fb9ec7102838f3

                            SHA1

                            9264b78903fa373e0a1b697cc056decc1dfafb5f

                            SHA256

                            00a96ac0e8600a9fa0a00ef1f939b58be93618c4fe4e3be9d0bfab0a4a0ff57d

                            SHA512

                            2a8e2bb9d599964ca112aacbb0fda37c01466898a7af5d7c8543013949b0bc6e5665402692a1072845b1a72211d350963c608a81a7c3450c19a56a948ced5d4d

                          • C:\Users\Admin\AppData\Local\Temp\Mj

                            Filesize

                            97KB

                            MD5

                            ff77a17e4cade79760f0f8b87c857c6c

                            SHA1

                            b05075d65229af0063e6e85da14ab940062818dd

                            SHA256

                            cc8a9523b67f764e447cd5042751e1de77b04ffc5664e6f5c41d1c3cce0ec60d

                            SHA512

                            6df97dcb14736d2f0ce9762b7246050b488e054375c78f42294119d80cacedcf53f4b3868b7a4c948dd7b1f9545b4135f5bd5ed69611424129cae63a372994d0

                          • C:\Users\Admin\AppData\Local\Temp\Mysterious

                            Filesize

                            89KB

                            MD5

                            beef30c9a0c6a41985e081cd4ff23049

                            SHA1

                            4e09ffaf608baf3a98cd94794cb7cc23e41c3086

                            SHA256

                            fc64f325cdd473adb5b7c15221f7b2773a064395612eff9ad1c76fa973a6738a

                            SHA512

                            ec71cdb716b684b241a2fa2bca84cbced9aa86ba0954009dc003ef1f80640c01d49911ec6e031e9f8e8139d30bf5a77d7a79ee38f66b8fd43a6e4f957cb8e1ca

                          • C:\Users\Admin\AppData\Local\Temp\Producing

                            Filesize

                            71KB

                            MD5

                            aa4d881ea35979e4eab13c982d3d0898

                            SHA1

                            cf301086d6e43e603571762fbc7d754f0246fb74

                            SHA256

                            31d85bebe7949c9b7b40af007fbbe61c8cd6c25f8e4fc7dcfe9b7dcd8a1d79e7

                            SHA512

                            f64491753f2cf57b72740ca91f10c2bd677219bc89bf86d2476a8567cf83955f986a481c92d19bef9c466438af97d071686ea2fc496c5e477c900568f129b5f6

                          • C:\Users\Admin\AppData\Local\Temp\Receiving

                            Filesize

                            61KB

                            MD5

                            8d5cf0056a8be7ca1485969fc23f72a5

                            SHA1

                            5727bc17cd958d06b1e7d52c8d38a761a1ae2bf2

                            SHA256

                            bd1b00dea1cddb3345443a35ae3b71883443722edbb48016f829ac500f5f505b

                            SHA512

                            b0f5fb69a565fc9690f307175c606ce9f9484bc309ac00b8a359cb6b77d19a938052ec584919a256fdb7c0b1557e155b414090b771432acb9419102f794b61ec

                          • C:\Users\Admin\AppData\Local\Temp\Solely

                            Filesize

                            105KB

                            MD5

                            2fadd2bf6f3cdc055416baa1528652e9

                            SHA1

                            342d96c7ce7b431e76c15c9a7386c2a75e3dc511

                            SHA256

                            8df18d17c715e689b9cb222beb699120b592464460fd407dbb14f59ccec5fdb3

                            SHA512

                            08bc19703dad1441e1da8fb011c42241a4c90d8355575b7f41d465e3e84d797ecac7d6bf9af6163e6f4ef506cd98561f62d06446f861aeba2d7644beb7f6abb8

                          • C:\Users\Admin\AppData\Local\Temp\Sunrise

                            Filesize

                            62KB

                            MD5

                            9e4fe1f2538c08f75ae16a3e349c9ef2

                            SHA1

                            559879228568b2f405400b34dfb19e59f139fa2c

                            SHA256

                            22ce756672aca3a4ba015903b4c36e7667e15c73157759e5a2212e7d4e727cc0

                            SHA512

                            a1f6bf183c590cc62000dddb0fea63bae2bdc30fce8ebfa24286b9fb8b2415c67b2363f739d36b32cc7b477e608397efbe45173173aa3f27ed44e9b75448b9ec

                          • C:\Users\Admin\AppData\Local\Temp\Veterinary

                            Filesize

                            2KB

                            MD5

                            6f07c56590cb57e03b68f9e2f994390c

                            SHA1

                            aee254034b1f3394a97304c8dfbae1911440e2c0

                            SHA256

                            1772cfd25c5deb74dacc6fc88aa8793a74c89a81452b27e886ca49557ba32d84

                            SHA512

                            0af18e6d07c161a5088cec9a56654c9f661ac003f0e22b68b6dbfe2920bb344f4d9a1326c261957c2309bb44dcb39453630f33068a057a1a6c2960edfbd39001

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jhpgkbt0.xcf.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                            Filesize

                            3.1MB

                            MD5

                            b54cf9188652a3bfe166d33c542f8ac6

                            SHA1

                            4335fa4d75ab3ba85613d163f8f930d9adf087ce

                            SHA256

                            0f1d1aed639362ce37edde5b4c278555bec835b1a5d3d5b90a7b8bbce0d83b86

                            SHA512

                            b6ef0f5c0db58bed81c3c8c5f506942503c00d7c97099ac52b290567fe2578b88b8d5589715583b1b7b80f6a30e344e870f416eda0a241ed002b8fea0171892f

                          • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                            Filesize

                            1.6MB

                            MD5

                            72491c7b87a7c2dd350b727444f13bb4

                            SHA1

                            1e9338d56db7ded386878eab7bb44b8934ab1bc7

                            SHA256

                            34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                            SHA512

                            583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                            Filesize

                            458KB

                            MD5

                            619f7135621b50fd1900ff24aade1524

                            SHA1

                            6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                            SHA256

                            344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                            SHA512

                            2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                            Filesize

                            2.2MB

                            MD5

                            579a63bebccbacab8f14132f9fc31b89

                            SHA1

                            fca8a51077d352741a9c1ff8a493064ef5052f27

                            SHA256

                            0ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0

                            SHA512

                            4a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f

                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                            Filesize

                            1.7MB

                            MD5

                            5659eba6a774f9d5322f249ad989114a

                            SHA1

                            4bfb12aa98a1dc2206baa0ac611877b815810e4c

                            SHA256

                            e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                            SHA512

                            f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                            Filesize

                            1.7MB

                            MD5

                            5404286ec7853897b3ba00adf824d6c1

                            SHA1

                            39e543e08b34311b82f6e909e1e67e2f4afec551

                            SHA256

                            ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                            SHA512

                            c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                            Filesize

                            1.7MB

                            MD5

                            5eb39ba3698c99891a6b6eb036cfb653

                            SHA1

                            d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                            SHA256

                            e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                            SHA512

                            6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                            Filesize

                            1.7MB

                            MD5

                            7187cc2643affab4ca29d92251c96dee

                            SHA1

                            ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                            SHA256

                            c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                            SHA512

                            27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                            Filesize

                            1.7MB

                            MD5

                            b7d1e04629bec112923446fda5391731

                            SHA1

                            814055286f963ddaa5bf3019821cb8a565b56cb8

                            SHA256

                            4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                            SHA512

                            79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                            Filesize

                            1.7MB

                            MD5

                            0dc4014facf82aa027904c1be1d403c1

                            SHA1

                            5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                            SHA256

                            a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                            SHA512

                            cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                          • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                            Filesize

                            3.3MB

                            MD5

                            cea368fc334a9aec1ecff4b15612e5b0

                            SHA1

                            493d23f72731bb570d904014ffdacbba2334ce26

                            SHA256

                            07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                            SHA512

                            bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                          • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                            Filesize

                            3.3MB

                            MD5

                            045b0a3d5be6f10ddf19ae6d92dfdd70

                            SHA1

                            0387715b6681d7097d372cd0005b664f76c933c7

                            SHA256

                            94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                            SHA512

                            58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                          • C:\Users\Admin\AppData\Local\Temp\main\in.exe

                            Filesize

                            1.7MB

                            MD5

                            83d75087c9bf6e4f07c36e550731ccde

                            SHA1

                            d5ff596961cce5f03f842cfd8f27dde6f124e3ae

                            SHA256

                            46db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f

                            SHA512

                            044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a

                          • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                            Filesize

                            440B

                            MD5

                            3626532127e3066df98e34c3d56a1869

                            SHA1

                            5fa7102f02615afde4efd4ed091744e842c63f78

                            SHA256

                            2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                            SHA512

                            dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                            Filesize

                            479KB

                            MD5

                            09372174e83dbbf696ee732fd2e875bb

                            SHA1

                            ba360186ba650a769f9303f48b7200fb5eaccee1

                            SHA256

                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                            SHA512

                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-2

                            Filesize

                            13.8MB

                            MD5

                            0a8747a2ac9ac08ae9508f36c6d75692

                            SHA1

                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                            SHA256

                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                            SHA512

                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                            Filesize

                            17KB

                            MD5

                            e6820302babf5a3b7608886ea5841100

                            SHA1

                            7c65a0ff913a65df67b3f159d43ba9b95d9b1881

                            SHA256

                            b666ff7cad46be9dd7b51f5364a1e8797e7a59a87c12ec2ee6e84235d0b9641c

                            SHA512

                            536a1aa4cd492d267a72449db0f2d94d275aaeb7ffccc8d21dc145ebb4c116bfae656ea0b19dc6031d241633129f7e901724667b418d55ae3d8e4ca60aea9f3f

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                            Filesize

                            6KB

                            MD5

                            896299706f10cf5983c0f18633784c92

                            SHA1

                            289e357197da1e6acd7b7069ef5ff99a1b23690a

                            SHA256

                            47bfa6b906123ebb102494c8e17fe974b6728c8a7606bc1669721a3c91e240a1

                            SHA512

                            2f8c27910040e911bdac43cb96ec5f7d9d37e3dbfdecc2b10700023e95d7c3912eebeba24b0fd7b8e7cddae8d7c9d1c7fa607f32b79bf6278d818bd314e5b98e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                            Filesize

                            7KB

                            MD5

                            71464614a12766d502c08256b1f5b482

                            SHA1

                            9d16e3a3d7ff03e6ea0c9919597281aa27cf0832

                            SHA256

                            80264c670e6afc0459ea7f71944b732c5d7c8ff4cee4c99511930f3500eea0ab

                            SHA512

                            9a469a25e85c95d9cf53f3201d97848ba1e943984112a1cee7f7af3baedec4ba9b7de845ae6847a5712ecf79fd9e0bf08ba7f7f1362c23627768c9d973394c1c

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                            Filesize

                            12KB

                            MD5

                            52b1d24cfb0d2d6ba3242bdfb400ff6a

                            SHA1

                            97ddbcde2369be7953595f128195db81313f5d58

                            SHA256

                            934d217caff95ff9594caa1811ba7532c84f84aaeab583b1bdb72737d26390b5

                            SHA512

                            7082548f02bbda0a662a3f5fb8d2462587e0d0a930989fd0f5dbe4bc0d33d7f06d1e38686e2227d5f479553fc563517f5b188cfc452741f6a17e80b745108d56

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            5KB

                            MD5

                            c37bb210b7a104b3d2e3d1c49b13b685

                            SHA1

                            db764b2afff63ba932c759197fe5c2479e8264cf

                            SHA256

                            c24088d3c90992960910e0894790b6170323c9e2beae322b6535693622b49e17

                            SHA512

                            9dd205a46ef352afb26a54226592e1a6fa080f725cef2cbc8c4f7f406cc24ae106ee79f67ee0e34fed4a5e4a342628ef4bf1f108b3338147c92eb56d8ba6dbd3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            16KB

                            MD5

                            9e78f8601bbc47c1e24802c0b4bf569f

                            SHA1

                            a8f4edba4df19d46b1c5f809708a1532f027d059

                            SHA256

                            56369e3c28f001c3a6ed7444bf37816f858941ad99535d40fac00f81ef88b4b8

                            SHA512

                            21ae42c93fafcec95d4126c5dfe87802cc978fa07ba229cb9bf1dc95bb92e3cd0b345f2fc5d64d0633683fb705abb21ffe28e1fd35e0e78905ef453db888d7a2

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            16KB

                            MD5

                            5f97b5f55628a51b04a66d2b07a6db45

                            SHA1

                            b1e4f1f1a37591c17b836c2c759033f88e1935a8

                            SHA256

                            06098efb0abaf4c631d4418c3aee4d1dc1fcfcab45112981eb93a401546d1a18

                            SHA512

                            81298e84a16f336c5c135c2b06b3fc9a5f27cf0a4b69b2b8d8588ef7caca8de6e4e1f8267f07ab97caaa29dc638b52ff357b80175a1d8c1238758386d9776a7a

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\08b6a812-bc3e-4cb0-a61b-142d90b65f5f

                            Filesize

                            671B

                            MD5

                            7ebe07604701792cbcbe46b294c5d343

                            SHA1

                            308f065ff990bd148498fd45af2009d31ed33f46

                            SHA256

                            0ed06043da9f76fdce9b9d8069dc2e64b74061fc1318316f87d05c31d19a326d

                            SHA512

                            ae7c17a5562c4d6f459cdb958a7f42d72150df9ddcbeedb0953684d1deccca3e6e42b1fa8b068888822b68583c5b746bff630d58623acf07dcffbbf8fcca1069

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\1214fa83-0892-456b-9c63-92f83919a170

                            Filesize

                            982B

                            MD5

                            6354e02f2dbbc7ecb05d3d9e878c9565

                            SHA1

                            09ba261a911e218f076b015e195d8b5042d32027

                            SHA256

                            f690db99c0f87bab0713cce062f5fdc916221dc311114da8d283088e2b84e8c3

                            SHA512

                            f9d8e2d480a06f4f5c7fa01634c9a1839a0b30b11c06cbf004f19b22400ee574add4ff303c6740fa94cc5dbc6e7cc8ed2c6a0b3778a78a32dc128f75d584aae0

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\45a27ef3-decc-429b-8f64-e3771e6c2c4b

                            Filesize

                            26KB

                            MD5

                            44d4cecaa91f504e4c10ee22ca5acf9b

                            SHA1

                            8593cbd8fd6b219b45a5f8cd8816d31c1a595c89

                            SHA256

                            4d827e1244184fb2350afa98fe95014d4315cdead70abb773803a00fb3838d49

                            SHA512

                            cec8efe07c6eb26152eef3a9fc935f0bcea47271f976056e361279bdf7bb2c64a7220908b140bf0a90bcf5fad639615607642c68feef5aa274fc0c23fc0e1666

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                            Filesize

                            1.1MB

                            MD5

                            842039753bf41fa5e11b3a1383061a87

                            SHA1

                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                            SHA256

                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                            SHA512

                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                            Filesize

                            116B

                            MD5

                            2a461e9eb87fd1955cea740a3444ee7a

                            SHA1

                            b10755914c713f5a4677494dbe8a686ed458c3c5

                            SHA256

                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                            SHA512

                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp

                            Filesize

                            479B

                            MD5

                            49ddb419d96dceb9069018535fb2e2fc

                            SHA1

                            62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                            SHA256

                            2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                            SHA512

                            48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                            Filesize

                            372B

                            MD5

                            bf957ad58b55f64219ab3f793e374316

                            SHA1

                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                            SHA256

                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                            SHA512

                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                            Filesize

                            17.8MB

                            MD5

                            daf7ef3acccab478aaa7d6dc1c60f865

                            SHA1

                            f8246162b97ce4a945feced27b6ea114366ff2ad

                            SHA256

                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                            SHA512

                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs.js

                            Filesize

                            10KB

                            MD5

                            959dbdb0aa7b613f5ecd0ec6487b54f4

                            SHA1

                            b5e436a3c1a514064c35f93670d0dbbeb04fd3fe

                            SHA256

                            70eb9f8fa994d0a63aa508bfcd163c65e9d0a46332e2e97e1c8c9ab994c1ea34

                            SHA512

                            e807847ef378b0536cf4b1b5a6070a9bb250e7401d1b14db8425299a74755740afc36b6210c204b116c855e16e0465319b798dbf2fed74a90f7902c22e21b5e3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs.js

                            Filesize

                            12KB

                            MD5

                            4d331ad7b333300cdf7454638d117751

                            SHA1

                            b7592f7ebb95a002eefa3757cfec7003ee7c6f30

                            SHA256

                            a6fce9d2b28a5680ed768f9cd98dfa1f1bee8094f6b93ddbcc3e89ab51c96ba6

                            SHA512

                            693b1ec48f07bf67086b8f59e1ec6191ff7d412276cbe4f912b50256d2801efb113404175e627433c3013e98bd101df880c768c8e5e321d56f683dfe54dc19c3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs.js

                            Filesize

                            10KB

                            MD5

                            e6ed548d17aa5ba43e8d980702cbae5f

                            SHA1

                            0c50ac95c5c1578e448e0c14ddea703b13c3ec85

                            SHA256

                            0cf1d493593f7ce065df049386434ff9e5d71b4d79f22eeeac4f0865512a8c55

                            SHA512

                            ebf016b3a05240b2637a92b8bad55836b8dc13c36e015fa3b4a0120559446fc11bf68d937c10bf6355947ee0cfb1c8a8d7133a2bc3a416c7c694dfe611e792e8

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                            Filesize

                            1.4MB

                            MD5

                            21a99905478650129de9f246964b0f5e

                            SHA1

                            72ac79cc1f2e176204bf95a0a38d9a704aa52fac

                            SHA256

                            6894a9e730930fdd4749a2a941d831be7bfd3c3e8af7af24ce6579eb82793784

                            SHA512

                            5f475ec9d477bbbdc92f5f795d6bde5c384cb2d6b51f22fd8a387d03f1eae9e2dadf32b2d6d0e8dece898492258b8c99125e29e318d9b1d39c80886e6f27419c

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                            Filesize

                            2.4MB

                            MD5

                            095ab042fe037daaf325ea5f24017d21

                            SHA1

                            f5a1a389dd655df496e28f7a1ddd3394a9e28dd2

                            SHA256

                            425d4b198f974902c4f492891e73b60af0ba8c7da2d094813801dca1b99a9e3d

                            SHA512

                            14bc2fab8e4cc4361d265422303d507bafbf53745ebd8b57138be1dc52af81b191312b9735d84a3ee0ed4f5d4e8f5b982e31c8c09e98b05ca562bdfa68afadfa

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                            Filesize

                            9.4MB

                            MD5

                            d7c71ff215d13e9a876747def5d21b10

                            SHA1

                            a7acc961a0615083e7310b34069bad2b8636e65e

                            SHA256

                            173dc5bb7a2b93d24844d1a3616a683c446ae3846390cea9ce98b06912caa6eb

                            SHA512

                            df16e3c7517057b4e657567244210f6582f1ac9ac2e444d1c44fc918aaf4132a34d013345f29abada2628dac0c4cce167f97a89d891b7049980645f598f6e927

                          • memory/112-464-0x0000000000410000-0x0000000000914000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/112-467-0x0000000000410000-0x0000000000914000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/1036-3-0x0000000000980000-0x0000000000CA6000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1036-0-0x0000000000980000-0x0000000000CA6000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1036-2-0x0000000000981000-0x00000000009E9000-memory.dmp

                            Filesize

                            416KB

                          • memory/1036-18-0x0000000000981000-0x00000000009E9000-memory.dmp

                            Filesize

                            416KB

                          • memory/1036-1-0x00000000775E4000-0x00000000775E6000-memory.dmp

                            Filesize

                            8KB

                          • memory/1036-17-0x0000000000980000-0x0000000000CA6000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1036-4-0x0000000000980000-0x0000000000CA6000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1060-509-0x0000000000CF0000-0x0000000000FB0000-memory.dmp

                            Filesize

                            2.8MB

                          • memory/1060-916-0x0000000000CF0000-0x0000000000FB0000-memory.dmp

                            Filesize

                            2.8MB

                          • memory/1060-508-0x0000000000CF0000-0x0000000000FB0000-memory.dmp

                            Filesize

                            2.8MB

                          • memory/1060-504-0x0000000000CF0000-0x0000000000FB0000-memory.dmp

                            Filesize

                            2.8MB

                          • memory/1060-921-0x0000000000CF0000-0x0000000000FB0000-memory.dmp

                            Filesize

                            2.8MB

                          • memory/1808-373-0x0000000004A70000-0x0000000004AC5000-memory.dmp

                            Filesize

                            340KB

                          • memory/1808-374-0x0000000004A70000-0x0000000004AC5000-memory.dmp

                            Filesize

                            340KB

                          • memory/1808-372-0x0000000004A70000-0x0000000004AC5000-memory.dmp

                            Filesize

                            340KB

                          • memory/1808-370-0x0000000004A70000-0x0000000004AC5000-memory.dmp

                            Filesize

                            340KB

                          • memory/1808-371-0x0000000004A70000-0x0000000004AC5000-memory.dmp

                            Filesize

                            340KB

                          • memory/2276-223-0x000001353C860000-0x000001353C882000-memory.dmp

                            Filesize

                            136KB

                          • memory/2400-19-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-102-0x0000000000CE1000-0x0000000000D49000-memory.dmp

                            Filesize

                            416KB

                          • memory/2400-354-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-103-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-106-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-21-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-20-0x0000000000CE1000-0x0000000000D49000-memory.dmp

                            Filesize

                            416KB

                          • memory/2400-22-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-943-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-104-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-105-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-971-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-41-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-503-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-914-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-443-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-248-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-1538-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-389-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2400-76-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2824-935-0x0000000000400000-0x0000000000C61000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/2824-403-0x0000000000400000-0x0000000000C61000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/2824-516-0x0000000000400000-0x0000000000C61000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/2824-446-0x0000000000400000-0x0000000000C61000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/2824-449-0x0000000000400000-0x0000000000C61000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/2824-922-0x0000000000400000-0x0000000000C61000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/2824-408-0x0000000010000000-0x000000001001C000-memory.dmp

                            Filesize

                            112KB

                          • memory/3416-253-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3416-255-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3840-261-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/3840-262-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/3840-271-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/3840-273-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/3840-266-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/3840-263-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/3840-267-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/3840-270-0x0000000000950000-0x0000000000970000-memory.dmp

                            Filesize

                            128KB

                          • memory/3840-265-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/3840-269-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/3840-260-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/3840-264-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/3904-3182-0x00007FF603D00000-0x00007FF604190000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/3948-368-0x0000000000400000-0x0000000000456000-memory.dmp

                            Filesize

                            344KB

                          • memory/3948-369-0x0000000000400000-0x0000000000456000-memory.dmp

                            Filesize

                            344KB

                          • memory/4104-426-0x0000000000AB0000-0x0000000001714000-memory.dmp

                            Filesize

                            12.4MB

                          • memory/4104-425-0x0000000000AB0000-0x0000000001714000-memory.dmp

                            Filesize

                            12.4MB

                          • memory/4500-208-0x00007FF78A730000-0x00007FF78ABC0000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4500-210-0x00007FF78A730000-0x00007FF78ABC0000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4848-936-0x0000000000C10000-0x0000000001857000-memory.dmp

                            Filesize

                            12.3MB

                          • memory/4848-388-0x0000000000C10000-0x0000000001857000-memory.dmp

                            Filesize

                            12.3MB

                          • memory/4848-911-0x0000000000C10000-0x0000000001857000-memory.dmp

                            Filesize

                            12.3MB

                          • memory/4848-485-0x0000000000C10000-0x0000000001857000-memory.dmp

                            Filesize

                            12.3MB

                          • memory/4848-427-0x0000000000C10000-0x0000000001857000-memory.dmp

                            Filesize

                            12.3MB

                          • memory/4956-448-0x00000000006B0000-0x0000000000B65000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/4956-444-0x00000000006B0000-0x0000000000B65000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/5008-257-0x00007FF603D00000-0x00007FF604190000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/5008-272-0x00007FF603D00000-0x00007FF604190000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/5356-904-0x0000000000730000-0x0000000000BC8000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/5356-913-0x0000000000730000-0x0000000000BC8000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/5640-959-0x00007FF603D00000-0x00007FF604190000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/5748-3181-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/5748-3166-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/5764-944-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/5764-946-0x0000000000CE0000-0x0000000001006000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/5828-958-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/5828-956-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB

                          • memory/5828-960-0x0000000140000000-0x0000000140770000-memory.dmp

                            Filesize

                            7.4MB