Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 15:26

General

  • Target

    8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe

  • Size

    2.9MB

  • MD5

    5bcc85cf578615240ebb1808bb7a05c0

  • SHA1

    271e542f554ea879dbffc67a83262ce63dfa5a22

  • SHA256

    8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fc

  • SHA512

    f675e2fbc5e86cb8d649016b24bfbe343416ce71012d257670f4d18d1bafea26658aace3ea9c2fa014b3dd8bd81030b8182fa16d601f02920c1171bb3597d715

  • SSDEEP

    49152:7+aAxr1Ly/YE4/nOllylqGrpegcw3jCB+4oi:7+aAxRNElylqGrpegDs+4oi

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://pollution-raker.cyou/api

https://hosue-billowy.cyou/api

https://ripe-blade.cyou/api

https://smash-boiling.cyou/api

https://supporse-comment.cyou/api

https://greywe-snotty.cyou/api

https://steppriflej.xyz/api

https://sendypaster.xyz/api

https://cuddlyready.xyz/api

Extracted

Family

cryptbot

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 38 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 14 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 24 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 58 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 7 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 44 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3548
    • C:\Users\Admin\AppData\Local\Temp\8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe
      "C:\Users\Admin\AppData\Local\Temp\8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fcN.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3756
        • C:\Users\Admin\AppData\Local\Temp\1020057001\SurveillanceWalls.exe
          "C:\Users\Admin\AppData\Local\Temp\1020057001\SurveillanceWalls.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1688
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c move Campbell Campbell.cmd & Campbell.cmd
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1860
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              6⤵
              • Enumerates processes with tasklist
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1248
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "opssvc wrsa"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1820
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              6⤵
              • Enumerates processes with tasklist
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:4004
            • C:\Windows\SysWOW64\findstr.exe
              findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:5008
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c md 370821
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1684
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V "Anchor" Veterinary
              6⤵
              • System Location Discovery: System Language Discovery
              PID:476
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c copy /b ..\Genre + ..\Mj + ..\Discs + ..\Receiving + ..\Mysterious + ..\Aka w
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4180
            • C:\Users\Admin\AppData\Local\Temp\370821\Sale.com
              Sale.com w
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:4412
            • C:\Windows\SysWOW64\choice.exe
              choice /d y /t 5
              6⤵
              • System Location Discovery: System Language Discovery
              PID:932
        • C:\Users\Admin\AppData\Local\Temp\1020068001\O8FeZRE.exe
          "C:\Users\Admin\AppData\Local\Temp\1020068001\O8FeZRE.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2876
        • C:\Users\Admin\AppData\Local\Temp\1020155001\90ee94e1df.exe
          "C:\Users\Admin\AppData\Local\Temp\1020155001\90ee94e1df.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:464
          • C:\Users\Public\Netstat\FuturreApp.exe
            "C:\Users\Public\Netstat\FuturreApp.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:4452
        • C:\Users\Admin\AppData\Local\Temp\1020227001\7bxDRZV.exe
          "C:\Users\Admin\AppData\Local\Temp\1020227001\7bxDRZV.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1476
        • C:\Users\Admin\AppData\Local\Temp\1020240001\905b8634af.exe
          "C:\Users\Admin\AppData\Local\Temp\1020240001\905b8634af.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3016
        • C:\Users\Admin\AppData\Local\Temp\1020241001\8d7e1cb185.exe
          "C:\Users\Admin\AppData\Local\Temp\1020241001\8d7e1cb185.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:808
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c move Campbell Campbell.cmd & Campbell.cmd
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2272
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              6⤵
              • Enumerates processes with tasklist
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:228
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "opssvc wrsa"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:232
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              6⤵
              • Enumerates processes with tasklist
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:3596
            • C:\Windows\SysWOW64\findstr.exe
              findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1000
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c md 370821
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4168
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V "Anchor" Veterinary
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3768
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c copy /b ..\Genre + ..\Mj + ..\Discs + ..\Receiving + ..\Mysterious + ..\Aka w
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3296
            • C:\Users\Admin\AppData\Local\Temp\370821\Sale.com
              Sale.com w
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:3764
            • C:\Windows\SysWOW64\choice.exe
              choice /d y /t 5
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4104
        • C:\Users\Admin\AppData\Local\Temp\1020242001\28a108414e.exe
          "C:\Users\Admin\AppData\Local\Temp\1020242001\28a108414e.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4056
          • C:\Users\Admin\AppData\Local\Temp\1020242001\28a108414e.exe
            "C:\Users\Admin\AppData\Local\Temp\1020242001\28a108414e.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:860
        • C:\Users\Admin\AppData\Local\Temp\1020243001\619e140bce.exe
          "C:\Users\Admin\AppData\Local\Temp\1020243001\619e140bce.exe"
          4⤵
          • Enumerates VirtualBox registry keys
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:416
        • C:\Users\Admin\AppData\Local\Temp\1020244001\ecc8d83cc9.exe
          "C:\Users\Admin\AppData\Local\Temp\1020244001\ecc8d83cc9.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4180
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 648
            5⤵
            • Program crash
            PID:5044
        • C:\Users\Admin\AppData\Local\Temp\1020245001\19cf9e75a5.exe
          "C:\Users\Admin\AppData\Local\Temp\1020245001\19cf9e75a5.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4056
        • C:\Users\Admin\AppData\Local\Temp\1020246001\3a12e9051c.exe
          "C:\Users\Admin\AppData\Local\Temp\1020246001\3a12e9051c.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1816
        • C:\Users\Admin\AppData\Local\Temp\1020247001\36f2b11c63.exe
          "C:\Users\Admin\AppData\Local\Temp\1020247001\36f2b11c63.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3280
        • C:\Users\Admin\AppData\Local\Temp\1020248001\3c9fd2d9c7.exe
          "C:\Users\Admin\AppData\Local\Temp\1020248001\3c9fd2d9c7.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:876
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:472
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3768
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:5020
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4568
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1944
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            5⤵
              PID:2120
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                6⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:3692
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1948 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c687345f-5ad6-46e9-a236-3fc60cb1265b} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" gpu
                  7⤵
                    PID:3244
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6ed2da62-ee48-4391-a19b-f68b7b6c638f} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" socket
                    7⤵
                      PID:1688
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3068 -childID 1 -isForBrowser -prefsHandle 3028 -prefMapHandle 3104 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa866968-22a3-4e7e-b841-f45752288fab} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab
                      7⤵
                        PID:2608
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3784 -childID 2 -isForBrowser -prefsHandle 3776 -prefMapHandle 3736 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccd905ea-4cee-4466-8b92-864a2f9694e4} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab
                        7⤵
                          PID:1812
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4552 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4488 -prefMapHandle 4520 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6051d54e-0258-4106-ae07-5ed3d147a874} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" utility
                          7⤵
                          • Checks processor information in registry
                          PID:5784
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5112 -childID 3 -isForBrowser -prefsHandle 5104 -prefMapHandle 5100 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e393eb1e-1cf9-45f1-bfcf-3daf927e1d7a} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab
                          7⤵
                            PID:6124
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5248 -childID 4 -isForBrowser -prefsHandle 5256 -prefMapHandle 5260 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cca12d3d-1e8a-49f5-9404-2d48f51d3dd7} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab
                            7⤵
                              PID:6136
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5568 -childID 5 -isForBrowser -prefsHandle 5584 -prefMapHandle 5580 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9571a4a-ce03-4eb8-85ea-386a281b68c4} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab
                              7⤵
                                PID:5088
                        • C:\Users\Admin\AppData\Local\Temp\1020249001\5dc852c8de.exe
                          "C:\Users\Admin\AppData\Local\Temp\1020249001\5dc852c8de.exe"
                          4⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4824
                        • C:\Users\Admin\AppData\Local\Temp\1020250001\8cae34b486.exe
                          "C:\Users\Admin\AppData\Local\Temp\1020250001\8cae34b486.exe"
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:3532
                        • C:\Users\Admin\AppData\Local\Temp\1020251001\4cbb0b5dd0.exe
                          "C:\Users\Admin\AppData\Local\Temp\1020251001\4cbb0b5dd0.exe"
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5632
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 5632 -s 1400
                            5⤵
                            • Program crash
                            PID:5472
                        • C:\Users\Admin\AppData\Local\Temp\1020252001\39437bb677.exe
                          "C:\Users\Admin\AppData\Local\Temp\1020252001\39437bb677.exe"
                          4⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:1232
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                            5⤵
                              PID:5516
                              • C:\Windows\system32\mode.com
                                mode 65,10
                                6⤵
                                  PID:3076
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2580
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_7.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3812
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_6.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3612
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_5.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5824
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_4.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3720
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_3.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2096
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_2.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:856
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_1.zip -oextracted
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3940
                                • C:\Windows\system32\attrib.exe
                                  attrib +H "in.exe"
                                  6⤵
                                  • Views/modifies file attributes
                                  PID:4180
                                • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                  "in.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  PID:2092
                                  • C:\Windows\SYSTEM32\attrib.exe
                                    attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                    7⤵
                                    • Views/modifies file attributes
                                    PID:2876
                                  • C:\Windows\SYSTEM32\attrib.exe
                                    attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                    7⤵
                                    • Views/modifies file attributes
                                    PID:1496
                                  • C:\Windows\SYSTEM32\schtasks.exe
                                    schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                    7⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:764
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell ping 127.0.0.1; del in.exe
                                    7⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5008
                                    • C:\Windows\system32\PING.EXE
                                      "C:\Windows\system32\PING.EXE" 127.0.0.1
                                      8⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:1320
                            • C:\Users\Admin\AppData\Local\Temp\1020253001\ef115d73f2.exe
                              "C:\Users\Admin\AppData\Local\Temp\1020253001\ef115d73f2.exe"
                              4⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:2736
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c copy Podcasts Podcasts.cmd & Podcasts.cmd
                                5⤵
                                • System Location Discovery: System Language Discovery
                                PID:1920
                                • C:\Windows\SysWOW64\tasklist.exe
                                  tasklist
                                  6⤵
                                  • Enumerates processes with tasklist
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4904
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr /I "opssvc wrsa"
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4636
                                • C:\Windows\SysWOW64\tasklist.exe
                                  tasklist
                                  6⤵
                                  • Enumerates processes with tasklist
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4068
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:456
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c md 99123
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5324
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr /V "follow" Traveller
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:6020
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c copy /b ..\Sky + ..\Images + ..\Similarly + ..\Mp + ..\Investigators + ..\Accompanying + ..\Provincial J
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3448
                                • C:\Users\Admin\AppData\Local\Temp\99123\Laptops.com
                                  Laptops.com J
                                  6⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:968
                                • C:\Windows\SysWOW64\choice.exe
                                  choice /d y /t 5
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5872
                            • C:\Users\Admin\AppData\Local\Temp\1020254001\476f7080ac.exe
                              "C:\Users\Admin\AppData\Local\Temp\1020254001\476f7080ac.exe"
                              4⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Drops file in Program Files directory
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5180
                              • C:\Program Files\Windows Media Player\graph\graph.exe
                                "C:\Program Files\Windows Media Player\graph\graph.exe"
                                5⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2092
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3588
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5632 -ip 5632
                        1⤵
                          PID:5440
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4180 -ip 4180
                          1⤵
                            PID:5828
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 5632 -ip 5632
                            1⤵
                              PID:4152
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:4284
                            • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                              C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                              1⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:4600
                              • C:\Windows\explorer.exe
                                explorer.exe
                                2⤵
                                  PID:4872
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                  2⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  PID:1756

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TTJXD3SW\download[1].htm

                                Filesize

                                1B

                                MD5

                                cfcd208495d565ef66e7dff9f98764da

                                SHA1

                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                SHA256

                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                SHA512

                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json

                                Filesize

                                18KB

                                MD5

                                93e9088abb490234697fcbeb64b3ffc5

                                SHA1

                                641b518111c36995b2829c36cf5377055f593f15

                                SHA256

                                6d05ad0231e980e5eb002a3576fb7e21cc87d0aefa671dc14389e4c5f969b3d9

                                SHA512

                                2169633b862e25b114ba48f0732461956c85393c93c43be5d28ca445603c218a5589958ef2d031a895c1f0e7ed537a3cb1b5340851bd905bd82b78c74d3d1214

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                Filesize

                                15KB

                                MD5

                                96c542dec016d9ec1ecc4dddfcbaac66

                                SHA1

                                6199f7648bb744efa58acf7b96fee85d938389e4

                                SHA256

                                7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                SHA512

                                cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                              • C:\Users\Admin\AppData\Local\Temp\1020057001\SurveillanceWalls.exe

                                Filesize

                                1.2MB

                                MD5

                                5a909c9769920208ed3d4d7279f08de5

                                SHA1

                                656f447088626150e252cbf7df6f8cd0de596fa0

                                SHA256

                                5f2c26e780639a76f10c549e7dea1421c4f06093c1facbf4dd8cf0a8b2fee8cb

                                SHA512

                                c6038048bd09c8f704246a6ba176ea63b1c8d23f2e127600c50bac50f3032c1b751ea8e405a2fe1ea707f75f21cf6516447345a84751bc677d94874d4b91090b

                              • C:\Users\Admin\AppData\Local\Temp\1020068001\O8FeZRE.exe

                                Filesize

                                295KB

                                MD5

                                ef9b9ffab9d91e590c6bda0280686d52

                                SHA1

                                bcbdca605606f483e76ae821b7bf81ca3e1b529a

                                SHA256

                                1345ad4c782c91049a16ec9f01b04bfc83a4f0e1e259cfed2b535f8ec6b75590

                                SHA512

                                3b362b306ba8357ac2eecd7354799e203d42fdee849584b26ee2c4c7b2c632c64558fd84f22c1dff35957f6950e333d005a225a54bdab4b3f53812041ea6345c

                              • C:\Users\Admin\AppData\Local\Temp\1020155001\90ee94e1df.exe

                                Filesize

                                2.0MB

                                MD5

                                e5f8753995c0b30b827aa2b17f3e1d22

                                SHA1

                                b268ee165073321cb893fc6dc682adbe38af87b5

                                SHA256

                                c3a4ec523039d5969745279b8909fbb82bfc999d9241e24b5cefea23a3f2c04f

                                SHA512

                                dba6104720c45c3201878c515dac487b0f66522e85db56cf19b4378d4da94d38e640eb48259a6ca3fd8602b083283915bdebdc8bb57039f1cdd2fe84792ba2fa

                              • C:\Users\Admin\AppData\Local\Temp\1020227001\7bxDRZV.exe

                                Filesize

                                2.2MB

                                MD5

                                f0389b89fc65d7c8cc98e40f1412796e

                                SHA1

                                7ecd48c055f89880299a3b10ee45bd522b402f05

                                SHA256

                                cd6c119a7ae1dee28a0d68f136b76cd05ae3486ce47788aa77af5dc3d4a44798

                                SHA512

                                11a68183ae94e34d5fdce3175aeae90193b1b02056627be7bbd81739900cc295ae01a202832cc4da88691345f4248a04ce73fc447aaceb26296541dc712384b4

                              • C:\Users\Admin\AppData\Local\Temp\1020240001\905b8634af.exe

                                Filesize

                                2.5MB

                                MD5

                                87330f1877c33a5a6203c49075223b16

                                SHA1

                                55b64ee8b2d1302581ab1978e9588191e4e62f81

                                SHA256

                                98f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0

                                SHA512

                                7c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f

                              • C:\Users\Admin\AppData\Local\Temp\1020242001\28a108414e.exe

                                Filesize

                                758KB

                                MD5

                                afd936e441bf5cbdb858e96833cc6ed3

                                SHA1

                                3491edd8c7caf9ae169e21fb58bccd29d95aefef

                                SHA256

                                c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                                SHA512

                                928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                              • C:\Users\Admin\AppData\Local\Temp\1020243001\619e140bce.exe

                                Filesize

                                4.3MB

                                MD5

                                10e8ef90835832169a076d05e774f142

                                SHA1

                                c51471d93ba9f63141f9c31d77ec8d856d4e0e56

                                SHA256

                                e0fe5fa47cd60c499a3c082fdb3a6fbfae1eb2637ac133a7ffa317c334c62735

                                SHA512

                                1ec9511b56bcf1f000f006cb522659787c7a10842f3febfc5b9afe86b425285ee1bd2e182f9bf1eefcf911de3236e8dfa5dc380b7cfd64bf0f4b6aa78fc81fe9

                              • C:\Users\Admin\AppData\Local\Temp\1020244001\ecc8d83cc9.exe

                                Filesize

                                1.9MB

                                MD5

                                861b745db7e76f79321206c575f97a58

                                SHA1

                                dd44a9f4a25d1989c814707d5b2601ea04773b82

                                SHA256

                                e509643de2b13bda23ded3f0c8ad5c2d8bf275abd5ad74b4e4232e71f432f4db

                                SHA512

                                f580677341ad4e680125562cd03625529a3a93f111017cfcefd9844319c48c718f7ecb1356b2e8d772c739bb37a52bffcb6a14933a6effd1ac02ea2b76ba1a65

                              • C:\Users\Admin\AppData\Local\Temp\1020245001\19cf9e75a5.exe

                                Filesize

                                4.3MB

                                MD5

                                5fcf1c70847c8d629264384d6d6c8acf

                                SHA1

                                d9edad7806c30dd9b980d4705a0891339621cf7a

                                SHA256

                                e78ed16dc1488e89f074a3b7f92683910d50f3849c7e94531b13cccf5eface73

                                SHA512

                                5f317afdee88fadd924f2f3f3eb95226a627ccf8061357fe0a3fb7e2d8ace5da2bf5fc383038c2b191eea94a804e36611bcc2226b565955fa6e3d6f8510f4175

                              • C:\Users\Admin\AppData\Local\Temp\1020246001\3a12e9051c.exe

                                Filesize

                                1.8MB

                                MD5

                                221c8ac3ed6f410d8b286790034f8e4e

                                SHA1

                                ccc959a9b59cd3f3d3505dc2f3d8c0c3749f3bd5

                                SHA256

                                35324932e2366dc2e417a8aea865d24f7362a88352b7d52438e80e30acbbbe85

                                SHA512

                                ff46a974790419a30e1016610dc7f65003b3ad14e19373cba7cb72084268267578eb7cd9b4eeb540e2c3c05df41a67892781ebbdf3a75aded59da5ca0d55e629

                              • C:\Users\Admin\AppData\Local\Temp\1020247001\36f2b11c63.exe

                                Filesize

                                2.8MB

                                MD5

                                68fab06e4f20b7a872f7aa9e3ad2e76a

                                SHA1

                                4d552946d82b350575404c92cb799422391921e9

                                SHA256

                                aa830882b145a484d6d757ade5ad9383e776f03fde938247502bd7511123bab5

                                SHA512

                                dcbce64fbe36af9af032485be6a4677cdbb1dc4c8289d2847f208129e0f19e9b006843b119d1c990b5cc3449bbcef56da0a7f556570ff056ffadb1c252ca469a

                              • C:\Users\Admin\AppData\Local\Temp\1020248001\3c9fd2d9c7.exe

                                Filesize

                                945KB

                                MD5

                                da03f31b1c239d86aeedac211f956c3e

                                SHA1

                                3a57fdcdb6564e94627d2eb994d702d667ac8d11

                                SHA256

                                30ca2eb5ee5ea6ba00f9132aa15e9a039055e79d9c45dc56cafe5b93edbb78e8

                                SHA512

                                9855fb55f55bf078239c1ed88548e02a8f6d053170184e17414020334c76d239f9ba083008723f37172bff12f5c91764701eb3eb3ce176986217e5036c716c4a

                              • C:\Users\Admin\AppData\Local\Temp\1020249001\5dc852c8de.exe

                                Filesize

                                2.7MB

                                MD5

                                0fb966c44b9a8e6b449daed2f52abdff

                                SHA1

                                02a546f8166b823106bb8205d37fd103ee366356

                                SHA256

                                23838ab1c4b4b708a37b7e5c6790ebfdd116dbb3b8a1acbe1b5c98254a5b4a79

                                SHA512

                                0b1e022c3faed6ac958ca8596d7ab6a661e9a4993d1d0baba048bb219535644935ba878fa6ecd2e6c2d0c3137b0b685df9d3955fda0ef635e30e89bb471fcc38

                              • C:\Users\Admin\AppData\Local\Temp\1020251001\4cbb0b5dd0.exe

                                Filesize

                                1.8MB

                                MD5

                                15709eba2afaf7cc0a86ce0abf8e53f1

                                SHA1

                                238ebf0d386ecf0e56d0ddb60faca0ea61939bb6

                                SHA256

                                10bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a

                                SHA512

                                65edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9

                              • C:\Users\Admin\AppData\Local\Temp\1020252001\39437bb677.exe

                                Filesize

                                4.2MB

                                MD5

                                3a425626cbd40345f5b8dddd6b2b9efa

                                SHA1

                                7b50e108e293e54c15dce816552356f424eea97a

                                SHA256

                                ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                                SHA512

                                a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                              • C:\Users\Admin\AppData\Local\Temp\1020253001\ef115d73f2.exe

                                Filesize

                                1017KB

                                MD5

                                af97661ca877fa1c644ead6567388945

                                SHA1

                                6ecb6d1a317e72a39a88f86c1f47b4e00427b8fc

                                SHA256

                                f88e4323299b2af453ce04ef6f5dc55b753d9210d7e598a0085bf3c21a5a4f0a

                                SHA512

                                9f99c8f1f4c343fc920146dd3c8d130d724b838a80ed2b4514172bbdfea2e5bc98fd27d42a2748cfec73a5680861bcf170c70ae9e45a2fed86ad6ec621899713

                              • C:\Users\Admin\AppData\Local\Temp\1020254001\476f7080ac.exe

                                Filesize

                                591KB

                                MD5

                                3567cb15156760b2f111512ffdbc1451

                                SHA1

                                2fdb1f235fc5a9a32477dab4220ece5fda1539d4

                                SHA256

                                0285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630

                                SHA512

                                e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba

                              • C:\Users\Admin\AppData\Local\Temp\370821\Sale.com

                                Filesize

                                925KB

                                MD5

                                62d09f076e6e0240548c2f837536a46a

                                SHA1

                                26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                SHA256

                                1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                SHA512

                                32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                              • C:\Users\Admin\AppData\Local\Temp\370821\w

                                Filesize

                                445KB

                                MD5

                                d02f356cc528bf6eaa89051942a0b1be

                                SHA1

                                dfecb4ae80274697f0d86e497cd566020ea23739

                                SHA256

                                5ed7e1f92a6bb08458ca99fdc83236095845f5939c6b9f7e423c6db70869b95c

                                SHA512

                                91ec78343e91db20edf97f39c293a5a8a45851c510ad6499c85b26738dfd9e918edda14e8710ece22d855d51d1417e722f19530ce3979e491c2b0dccb5198e57

                              • C:\Users\Admin\AppData\Local\Temp\Aka

                                Filesize

                                42KB

                                MD5

                                14422967d2c4b9a9a8a90e398b24f500

                                SHA1

                                7031018af43bcc5550a8b0a55680596d693334dc

                                SHA256

                                93db8e88945b7de88e98a7c50d64bffa8b73c3b002c744c8d62c2eadf767cf6f

                                SHA512

                                4b5795f15774a7768a42aa3a2308b9366f47b30c92babf688a67d2abeca0037b63762f3e21154212dc5c8a31bcdd69f029e849e1d4def5676a04b64e2ae90c75

                              • C:\Users\Admin\AppData\Local\Temp\Anybody

                                Filesize

                                121KB

                                MD5

                                c89fd1314a2184d5d7b4a66de377d5b2

                                SHA1

                                f0ebbc2c8c6f9ebadc6ace713aec1b06f3f841e8

                                SHA256

                                9d1e82e2e430b87b28867ff9745a74e53a128671e9d300f111b1904786c2f856

                                SHA512

                                4b0b16e99d0cacab0b7af1d65cbf9226988752d8fa020b955bf54c634d9d64a05bb036ef590fa0d852d513621a84f4c3dc3c341aa8feffdf350dd8a5dbc75778

                              • C:\Users\Admin\AppData\Local\Temp\Campbell

                                Filesize

                                11KB

                                MD5

                                e7567ec4057933fa6e06322b7c08b72a

                                SHA1

                                4e733e77915c7dfb7d25e31738e9d596962d4177

                                SHA256

                                1896ef25a6223f19f770da125a4b1bc7c90815ccb682ec7ca780d231a01c28b0

                                SHA512

                                d8a14e5c8225ad8bdbb45317fd41588c12e9e60f1c9ff819d0d15cbc35801b82e7c7981b7dbc815666354950a7f5362fc00765f8a67c9478bd95dc5a31b12c83

                              • C:\Users\Admin\AppData\Local\Temp\Conferencing

                                Filesize

                                130KB

                                MD5

                                638e7812c5e9c55c5f339cc64d197b28

                                SHA1

                                5ef8a953ef65ab7d0620a5d144f2c410e2a77a2f

                                SHA256

                                347a3459dd74aea0a6b2f62955d1bc9bdb091bb66ca8a42274f7ebf310527fd8

                                SHA512

                                194b0d8799a83210968746c4d3e364ee512669e6080c6b3d215d97c141e8ef7f09152ea524691efcd2276acb1dc158ffd484e3f595ddf2cceb690bd1996c8266

                              • C:\Users\Admin\AppData\Local\Temp\Debug

                                Filesize

                                112KB

                                MD5

                                d9daf89d86b32df3d7da7ec1cfbf7212

                                SHA1

                                59e1ba3dd32168a3d79a9da2626c99c52970a53e

                                SHA256

                                06f48747a4acb2ee437d03a9e8331cca5c76ee5684e118f491e4faf7799adcc4

                                SHA512

                                24d26b6112417d75915f08562af53eb1bb7ddef2e89e779db52ae0f674ea8ce102984fa2628cee5588c7dc34df00a32497e49ee18f7259c51e4d1c855ab69a6c

                              • C:\Users\Admin\AppData\Local\Temp\Discs

                                Filesize

                                68KB

                                MD5

                                00646a2066d51d9790f52bae3c446c87

                                SHA1

                                ebda2b25b5a46cc6d9d5494050cc4b3a0bf81984

                                SHA256

                                57afab1cec987da27f5e92baa6dc21d83f8c83edf734fc590313102e75844c3a

                                SHA512

                                a74c02ed1b704912a8945e60cacc892f7e832e5cf15c87632b0fd3cbf9ddd8f36b01a5ba87fd7ef87d6becbb297161bb69dc750b8dac6f952892d45cd95f46f0

                              • C:\Users\Admin\AppData\Local\Temp\Dod

                                Filesize

                                3KB

                                MD5

                                682d77b5a6d22691a869ab4bea11ad53

                                SHA1

                                f56fab8959a05c77570652f5f8e9e4103489e676

                                SHA256

                                c269725998f8f5acdab6a0067457065cc9059326ee0a38ff353c2939a0190c1b

                                SHA512

                                c42d04178ed59683fc4597b83496d7b3c61c1a075b4542abb491c9639531f9737d70ae4172186fd6a3450c26701d794496bd4ae0f5e50db8a3818cd78ed7fd27

                              • C:\Users\Admin\AppData\Local\Temp\Ejaculation

                                Filesize

                                148KB

                                MD5

                                2e9e29f8ed97f2de8ebb1652bdbd545a

                                SHA1

                                5577d360b25daffa0af907fc5d852894b784f81d

                                SHA256

                                aeb399054cff321f752d4f93143815ff1a2cc2398668c2e1110065a2c6f502f1

                                SHA512

                                f4f925daf3f576441d2b7a0e250a51400b23e714d76870a640734912da783d83ac113586f121161d96d7f06eb70b8d89eb4e0524d591232b0b2a342063e8bcb6

                              • C:\Users\Admin\AppData\Local\Temp\Execution

                                Filesize

                                112KB

                                MD5

                                42fb34ddb94507c5a125bf02c2983904

                                SHA1

                                4e400c020121235e3de490f5cbb38c4a25e686dc

                                SHA256

                                d59efea25d1e316b8a9248f52081ab14113c97603f3e90d533f4f373f743b3c7

                                SHA512

                                639d90cd1cd451ebcb9e5e1c165f7eebb62b30d6bf24c596990ca40e08bce5d0b5864e7a4f0a83624c7cf9ac4ec5c1e7385f59602b206f3346554d62721cd71d

                              • C:\Users\Admin\AppData\Local\Temp\Genre

                                Filesize

                                88KB

                                MD5

                                5ce4409c4aaa9fd5a27ec4974734f1df

                                SHA1

                                bf7ee5465ef96ee0186388b5b0685ad727ed9493

                                SHA256

                                a401b4cd0afbaee57d8025bf4fce12583c825cbc2e3d3f308eb0627cd5bba412

                                SHA512

                                1155b1c58221ba1c809d9d60cd440ebd8788dcd3169ee87bda72fb7061b1e2f849f8bc79ac7053df5de8bc7955db088df778af66900d6f303bde6d61925014e6

                              • C:\Users\Admin\AppData\Local\Temp\Marijuana

                                Filesize

                                58KB

                                MD5

                                d830821fe60d6cd810fb9ec7102838f3

                                SHA1

                                9264b78903fa373e0a1b697cc056decc1dfafb5f

                                SHA256

                                00a96ac0e8600a9fa0a00ef1f939b58be93618c4fe4e3be9d0bfab0a4a0ff57d

                                SHA512

                                2a8e2bb9d599964ca112aacbb0fda37c01466898a7af5d7c8543013949b0bc6e5665402692a1072845b1a72211d350963c608a81a7c3450c19a56a948ced5d4d

                              • C:\Users\Admin\AppData\Local\Temp\Mj

                                Filesize

                                97KB

                                MD5

                                ff77a17e4cade79760f0f8b87c857c6c

                                SHA1

                                b05075d65229af0063e6e85da14ab940062818dd

                                SHA256

                                cc8a9523b67f764e447cd5042751e1de77b04ffc5664e6f5c41d1c3cce0ec60d

                                SHA512

                                6df97dcb14736d2f0ce9762b7246050b488e054375c78f42294119d80cacedcf53f4b3868b7a4c948dd7b1f9545b4135f5bd5ed69611424129cae63a372994d0

                              • C:\Users\Admin\AppData\Local\Temp\Mysterious

                                Filesize

                                89KB

                                MD5

                                beef30c9a0c6a41985e081cd4ff23049

                                SHA1

                                4e09ffaf608baf3a98cd94794cb7cc23e41c3086

                                SHA256

                                fc64f325cdd473adb5b7c15221f7b2773a064395612eff9ad1c76fa973a6738a

                                SHA512

                                ec71cdb716b684b241a2fa2bca84cbced9aa86ba0954009dc003ef1f80640c01d49911ec6e031e9f8e8139d30bf5a77d7a79ee38f66b8fd43a6e4f957cb8e1ca

                              • C:\Users\Admin\AppData\Local\Temp\Podcasts.cmd

                                Filesize

                                19KB

                                MD5

                                270e797dcc891238ecb4753b12ad9740

                                SHA1

                                2714eaaf585411ca91ee2ffb905d6271bfee6d9e

                                SHA256

                                2b87d3a5678436374f66000bc263763f35d1662b675f004b55002cb4f473a3d0

                                SHA512

                                409f2d91ea614e28a6a966cc52769bedd8786d1e655629da544d93a9d0547c8d151798f3f5010e11cd4308d58a419616dc35a4273df17afb94022a29f6f26a64

                              • C:\Users\Admin\AppData\Local\Temp\Producing

                                Filesize

                                71KB

                                MD5

                                aa4d881ea35979e4eab13c982d3d0898

                                SHA1

                                cf301086d6e43e603571762fbc7d754f0246fb74

                                SHA256

                                31d85bebe7949c9b7b40af007fbbe61c8cd6c25f8e4fc7dcfe9b7dcd8a1d79e7

                                SHA512

                                f64491753f2cf57b72740ca91f10c2bd677219bc89bf86d2476a8567cf83955f986a481c92d19bef9c466438af97d071686ea2fc496c5e477c900568f129b5f6

                              • C:\Users\Admin\AppData\Local\Temp\Receiving

                                Filesize

                                61KB

                                MD5

                                8d5cf0056a8be7ca1485969fc23f72a5

                                SHA1

                                5727bc17cd958d06b1e7d52c8d38a761a1ae2bf2

                                SHA256

                                bd1b00dea1cddb3345443a35ae3b71883443722edbb48016f829ac500f5f505b

                                SHA512

                                b0f5fb69a565fc9690f307175c606ce9f9484bc309ac00b8a359cb6b77d19a938052ec584919a256fdb7c0b1557e155b414090b771432acb9419102f794b61ec

                              • C:\Users\Admin\AppData\Local\Temp\Solely

                                Filesize

                                105KB

                                MD5

                                2fadd2bf6f3cdc055416baa1528652e9

                                SHA1

                                342d96c7ce7b431e76c15c9a7386c2a75e3dc511

                                SHA256

                                8df18d17c715e689b9cb222beb699120b592464460fd407dbb14f59ccec5fdb3

                                SHA512

                                08bc19703dad1441e1da8fb011c42241a4c90d8355575b7f41d465e3e84d797ecac7d6bf9af6163e6f4ef506cd98561f62d06446f861aeba2d7644beb7f6abb8

                              • C:\Users\Admin\AppData\Local\Temp\Sunrise

                                Filesize

                                62KB

                                MD5

                                9e4fe1f2538c08f75ae16a3e349c9ef2

                                SHA1

                                559879228568b2f405400b34dfb19e59f139fa2c

                                SHA256

                                22ce756672aca3a4ba015903b4c36e7667e15c73157759e5a2212e7d4e727cc0

                                SHA512

                                a1f6bf183c590cc62000dddb0fea63bae2bdc30fce8ebfa24286b9fb8b2415c67b2363f739d36b32cc7b477e608397efbe45173173aa3f27ed44e9b75448b9ec

                              • C:\Users\Admin\AppData\Local\Temp\Veterinary

                                Filesize

                                2KB

                                MD5

                                6f07c56590cb57e03b68f9e2f994390c

                                SHA1

                                aee254034b1f3394a97304c8dfbae1911440e2c0

                                SHA256

                                1772cfd25c5deb74dacc6fc88aa8793a74c89a81452b27e886ca49557ba32d84

                                SHA512

                                0af18e6d07c161a5088cec9a56654c9f661ac003f0e22b68b6dbfe2920bb344f4d9a1326c261957c2309bb44dcb39453630f33068a057a1a6c2960edfbd39001

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_a52h55am.dxs.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                Filesize

                                2.9MB

                                MD5

                                5bcc85cf578615240ebb1808bb7a05c0

                                SHA1

                                271e542f554ea879dbffc67a83262ce63dfa5a22

                                SHA256

                                8370e88ac5befe61ac995afffad27892681dc44a854a50a028a977cdc945f1fc

                                SHA512

                                f675e2fbc5e86cb8d649016b24bfbe343416ce71012d257670f4d18d1bafea26658aace3ea9c2fa014b3dd8bd81030b8182fa16d601f02920c1171bb3597d715

                              • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                Filesize

                                458KB

                                MD5

                                619f7135621b50fd1900ff24aade1524

                                SHA1

                                6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                SHA256

                                344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                SHA512

                                2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                Filesize

                                479KB

                                MD5

                                09372174e83dbbf696ee732fd2e875bb

                                SHA1

                                ba360186ba650a769f9303f48b7200fb5eaccee1

                                SHA256

                                c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                SHA512

                                b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                Filesize

                                13.8MB

                                MD5

                                0a8747a2ac9ac08ae9508f36c6d75692

                                SHA1

                                b287a96fd6cc12433adb42193dfe06111c38eaf0

                                SHA256

                                32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                SHA512

                                59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                                Filesize

                                17KB

                                MD5

                                306306c4b45fbf9953fc2884fa32b95e

                                SHA1

                                8bd960b0d500fe9f83fd173ff899c3d47c0e2958

                                SHA256

                                144fa27ff60eca4493c3cdbb93ac9426b42e447bbd0d08af1768cb1650754ddb

                                SHA512

                                5acea4a9591d324140409a1e16f0a1fa0e9a15e802f78553a26cbdad1d43827a6418706ec7f5773950612e4db62b08d538b632082d68d07d565a4da75fcdc6ca

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                                Filesize

                                6KB

                                MD5

                                1492deaabb9ab30bd6ec2265932a60bc

                                SHA1

                                eb23d7a019ff400670f8eb05e19db71a8a626cf3

                                SHA256

                                9426d7271ba6942ec0b497536b57e598597bd7844974b365400741d81779369e

                                SHA512

                                1b122f2c20b084eb3e5aed5b2160a9ff998d6a98d1969a6bd9dbab4b598886950cb35836648c0d4690c9c8e8d072adce4869951b54fd654d8152ccfffa8f8860

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                                Filesize

                                10KB

                                MD5

                                6a9f3082086d7908c07cffb66fb4045b

                                SHA1

                                e2b532e2c075cacade82299eaac89875c0282201

                                SHA256

                                5f7df087ffc95c1fef8a204cb4fbf30075550cd06923dd3f4f51300550ae7e53

                                SHA512

                                4b01cbfeb6e8b6abb7c4facd945f9bc084f1e122b3819eb714cb90dcba8a8565c606fcc6ac58980962065fa23a72969d72474538dabd8335905d62f803ced9d0

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                5KB

                                MD5

                                21641433a4ec6cc24b58e0fae3e2361b

                                SHA1

                                fa60dbbd3352ab934a061ba295c39e593b3f8a67

                                SHA256

                                c00ee4a5348e64dbd58330be579416e37ee3f0ef505c8dacb4eaec4b5cf5b073

                                SHA512

                                c511a78d969ae1e8df2cb495960f0b00be952b072d64e1ef34db24b305cb3de7146064fd9633edf5cb421408227c0fe9950472236365dcadef4b468ca048e27e

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                6KB

                                MD5

                                6b393eec1867f00ed2083d9998aca427

                                SHA1

                                3e32d6351ea032b42e579cea897f748e2f289c61

                                SHA256

                                aa80b13eb497dee615d81d36f7fa60503bf2236f6df6138eafe9d93d4b621fd0

                                SHA512

                                2752e5e5c92fc3dc63484a1ed39a632f9fc5c9b0eb9d3d884d19e801877d301ce4dfdb2d3ae9754bd3c93acd83270d306d97e82dca7b2771c457381f6b97235b

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                14KB

                                MD5

                                eff3daadf1e771416515b0b0ec8aa3c8

                                SHA1

                                988f5993d27be874b06c2573a4fd7d62dbcea43d

                                SHA256

                                31f97c05ab76a1aaecc31e7b11f0be1175945c4bfc63ac5ca72d8a498b557a43

                                SHA512

                                5009d03388730e18ccc4b4bd9eea382166f248c1dc42e6547544a9663bec1f5b6725a3b804a1da65e8e27d9b4e70834a4fc5a3760eef979e5a1dad5cc56c463c

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                28KB

                                MD5

                                4e70a6114dabd9cc586156bb8e6e530d

                                SHA1

                                d26bbe2ea5ba15016a6ce0b22b64df53ec7dcb06

                                SHA256

                                41787d119ef45c6f6dc30f892f19da2472de2f0725966b118d8102c826147a12

                                SHA512

                                b89e467288bade3f170726c313bc91f3dc0c00b0e6c9f0002ec01f6e821491f90106cd3fb419b1df1a88038d66bd9e55030aefd2397ce988079a71f8b6801b69

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\a08f1e83-edf5-4dce-8ff1-ed2f2dbd42de

                                Filesize

                                671B

                                MD5

                                feff87a73f7093e3b091e9fc37fada25

                                SHA1

                                aecc281647309e6339b872ee46e95e532dc45479

                                SHA256

                                beb3af0af07253341a85a97299e64ccd21cff39d656964542482897367deac4e

                                SHA512

                                decf402d5d6ff59dc238baca1b8bd1e9b4e21d12c5c783d03103a57a143f04c6f09ca3840aebd410d4a9b62de510b7211e135a9e29f2408fe6d162993d9709c2

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\c522d6f9-8b62-48a9-83f8-cddd0096cfe7

                                Filesize

                                982B

                                MD5

                                7664086640277321f333f58f20704c4e

                                SHA1

                                374f061dce0306cbcbb4fce49c1043f351203da9

                                SHA256

                                7aad9bf49e767edd79a6650eed53ee0bcd0acd9178100d51eba6742276f7db8e

                                SHA512

                                114649d041b60a69f5a8df432480b9f2d05c05e79108237a18699e49c5c58e2ad2a309472755630ee218e872ef73d69805a795f76f2f8d51a3075874907aa75e

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\eb7b1ff9-313e-4536-b60b-0fe9ef17f105

                                Filesize

                                27KB

                                MD5

                                f771873a736c054d581a2ab10dee3e9b

                                SHA1

                                a9225f107b43b8d953120af672a6f7bf10394c19

                                SHA256

                                f8c04536794f5210b3b53c0e6453c3a83404a5b8421004a01121612953367948

                                SHA512

                                3ff2a91a6a2996d7c5307f9b4d205a38db7e1157f1f4e5b865acf11343b0644d681052e946ba33acde4168946ada032cb91bba12c00d92cd124235b9ee5a8b48

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                Filesize

                                1.1MB

                                MD5

                                842039753bf41fa5e11b3a1383061a87

                                SHA1

                                3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                SHA256

                                d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                SHA512

                                d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                Filesize

                                116B

                                MD5

                                2a461e9eb87fd1955cea740a3444ee7a

                                SHA1

                                b10755914c713f5a4677494dbe8a686ed458c3c5

                                SHA256

                                4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                SHA512

                                34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp

                                Filesize

                                479B

                                MD5

                                49ddb419d96dceb9069018535fb2e2fc

                                SHA1

                                62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                SHA256

                                2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                SHA512

                                48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                Filesize

                                372B

                                MD5

                                bf957ad58b55f64219ab3f793e374316

                                SHA1

                                a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                SHA256

                                bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                SHA512

                                79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                Filesize

                                17.8MB

                                MD5

                                daf7ef3acccab478aaa7d6dc1c60f865

                                SHA1

                                f8246162b97ce4a945feced27b6ea114366ff2ad

                                SHA256

                                bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                SHA512

                                5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp

                                Filesize

                                1KB

                                MD5

                                688bed3676d2104e7f17ae1cd2c59404

                                SHA1

                                952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                SHA256

                                33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                SHA512

                                7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp

                                Filesize

                                1KB

                                MD5

                                36e5ee071a6f2f03c5d3889de80b0f0d

                                SHA1

                                cf6e8ddb87660ef1ef84ae36f97548a2351ac604

                                SHA256

                                6be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683

                                SHA512

                                99b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                                Filesize

                                10KB

                                MD5

                                e2ec6f63a52398a006651d70e1516aa7

                                SHA1

                                9b4998705b5c31d2df34bd6d35b5c0b29d4536ef

                                SHA256

                                f1ddc76324121a997a0a47ad68331432d1cf1100cb50354e81b1f2abf1eb9346

                                SHA512

                                6e405b7da8a29bffd6b032c754598e15376941df16987cdb688cae5fbfab08d641a8d3f03632de401910d7814663a197c4282050d4fb0608fd5ec5a1115326e3

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                                Filesize

                                11KB

                                MD5

                                f72391681a348197dab09571e4cdbe8d

                                SHA1

                                8f85c59c158eaf6fba26ff0a326dc64926a93e2a

                                SHA256

                                113c17d386eeee320052ecce1f52870e48327686b05db2f6ddc2da37746634c7

                                SHA512

                                d63687d89ae9cd0dcf84b85c1dab2ef2d8ea2bd714b8c7c2b5c7f89f90bbceb5f69ca058a84005425332abe2f653f020644686174af5c6f3ee7448d70cd3affb

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                                Filesize

                                10KB

                                MD5

                                20b965f7c9552498cba68a5d2a3b2012

                                SHA1

                                9d610fa2ce5a37d877110fa44a3a99fb71b27392

                                SHA256

                                557ad72052bdda230720862b9bf8a7fb76c58f71def6114db2773af2ed7600d0

                                SHA512

                                f342677e8a474cc66d15ff4fa1919345c59e944dccf709d445ffdd94afd733c50bb31cd8fabdb74d0f8f76757c71ff11b62656ad2b881edf0aae4d7c052bfbad

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                                Filesize

                                10KB

                                MD5

                                8125d9c2d8762dd9685881387163f1b2

                                SHA1

                                9eee1d5ae34be219e8f6fcf66e5369cd7967438e

                                SHA256

                                49395b23920263561becdc77a2fe76c79b465e9e24052c60522dcfb8f2e61789

                                SHA512

                                afdb0e5604b6448f05ff894679738c627b7bd2964dbbe4929b72fadbe63c08b9265073c5d0fd8f06b1a54f5ae8025fd134692b1c6adf45be87369184fbeb36f7

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                                Filesize

                                11KB

                                MD5

                                1e1f46852f8e2a18f90685e30d843964

                                SHA1

                                f70b3c476e8e80e9d96776fbd9308fd1326eb6f5

                                SHA256

                                dfc98d67861d1a33eb31b97c8b9955695ecb39ce4d97104f662feed99053f97a

                                SHA512

                                56a24bd651db3ff80a40a174b457761f3beb7d91f4817a135d19bdf0b428353336618115a5b48505a67b7f3ba0a3e9c24f510dd76b523500970482edca786236

                              • C:\Users\Public\Netstat\FuturreApp.exe

                                Filesize

                                103KB

                                MD5

                                8d9709ff7d9c83bd376e01912c734f0a

                                SHA1

                                e3c92713ce1d7eaa5e2b1fabeb06cdc0bb499294

                                SHA256

                                49a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3

                                SHA512

                                042ad89ed2e15671f5df67766d11e1fa7ada8241d4513e7c8f0d77b983505d63ebfb39fefa590a2712b77d7024c04445390a8bf4999648f83dbab6b0f04eb2ee

                              • C:\Users\Public\Netstat\HTCTL32.DLL

                                Filesize

                                320KB

                                MD5

                                2d3b207c8a48148296156e5725426c7f

                                SHA1

                                ad464eb7cf5c19c8a443ab5b590440b32dbc618f

                                SHA256

                                edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796

                                SHA512

                                55c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c

                              • C:\Users\Public\Netstat\MSVCR100.dll

                                Filesize

                                755KB

                                MD5

                                0e37fbfa79d349d672456923ec5fbbe3

                                SHA1

                                4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                                SHA256

                                8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                                SHA512

                                2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                              • C:\Users\Public\Netstat\NSM.LIC

                                Filesize

                                257B

                                MD5

                                7067af414215ee4c50bfcd3ea43c84f0

                                SHA1

                                c331d410672477844a4ca87f43a14e643c863af9

                                SHA256

                                2050cc232710a2ea6a207bc78d1eac66a4042f2ee701cdfeee5de3ddcdc31d12

                                SHA512

                                17b888087192bcea9f56128d0950423b1807e294d1c4f953d1bf0f5bd08e5f8e35afeee584ebf9233bfc44e0723db3661911415798159ac118c8a42aaf0b902f

                              • C:\Users\Public\Netstat\PCICHEK.DLL

                                Filesize

                                18KB

                                MD5

                                a0b9388c5f18e27266a31f8c5765b263

                                SHA1

                                906f7e94f841d464d4da144f7c858fa2160e36db

                                SHA256

                                313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a

                                SHA512

                                6051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd

                              • C:\Users\Public\Netstat\PCICL32.dll

                                Filesize

                                3.6MB

                                MD5

                                00587238d16012152c2e951a087f2cc9

                                SHA1

                                c4e27a43075ce993ff6bb033360af386b2fc58ff

                                SHA256

                                63aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8

                                SHA512

                                637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226

                              • C:\Users\Public\Netstat\client32.ini

                                Filesize

                                702B

                                MD5

                                a4aa9219becdeec09159270bb041bb35

                                SHA1

                                2d08305017efb0a1ff7defdf66db80191ed9ccf8

                                SHA256

                                277b9bcb5778cd5dc167ed75528818b06ed12f3fd427339f3085f4db8a39ed2e

                                SHA512

                                4f7ce001da009fcba0c5beab572a16306d56fd91253c45d5196892142da78ec805982a4e1c136ad61471b5a951697eed76f9ee63d8b94eb64024a11e0fd0de42

                              • C:\Users\Public\Netstat\pcicapi.dll

                                Filesize

                                32KB

                                MD5

                                dcde2248d19c778a41aa165866dd52d0

                                SHA1

                                7ec84be84fe23f0b0093b647538737e1f19ebb03

                                SHA256

                                9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917

                                SHA512

                                c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166

                              • memory/416-347-0x0000000000F00000-0x0000000001B79000-memory.dmp

                                Filesize

                                12.5MB

                              • memory/416-386-0x0000000000F00000-0x0000000001B79000-memory.dmp

                                Filesize

                                12.5MB

                              • memory/416-342-0x0000000000F00000-0x0000000001B79000-memory.dmp

                                Filesize

                                12.5MB

                              • memory/416-285-0x0000000000F00000-0x0000000001B79000-memory.dmp

                                Filesize

                                12.5MB

                              • memory/860-268-0x0000000000400000-0x0000000000456000-memory.dmp

                                Filesize

                                344KB

                              • memory/860-266-0x0000000000400000-0x0000000000456000-memory.dmp

                                Filesize

                                344KB

                              • memory/1816-853-0x0000000000350000-0x00000000007E2000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/1816-363-0x0000000000350000-0x00000000007E2000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/1816-407-0x0000000000350000-0x00000000007E2000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/1816-410-0x0000000000350000-0x00000000007E2000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/1816-1635-0x0000000000350000-0x00000000007E2000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/2064-1-0x0000000077DE4000-0x0000000077DE6000-memory.dmp

                                Filesize

                                8KB

                              • memory/2064-2-0x0000000000C71000-0x0000000000C9F000-memory.dmp

                                Filesize

                                184KB

                              • memory/2064-3-0x0000000000C70000-0x0000000000F88000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2064-4-0x0000000000C70000-0x0000000000F88000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2064-18-0x0000000000C70000-0x0000000000F88000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2064-0-0x0000000000C70000-0x0000000000F88000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2092-987-0x00007FF6FDAA0000-0x00007FF6FDF30000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/2092-990-0x00007FF6FDAA0000-0x00007FF6FDF30000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/3280-381-0x0000000000680000-0x0000000000B77000-memory.dmp

                                Filesize

                                5.0MB

                              • memory/3280-383-0x0000000000680000-0x0000000000B77000-memory.dmp

                                Filesize

                                5.0MB

                              • memory/3548-919-0x0000000140000000-0x00000001400A6000-memory.dmp

                                Filesize

                                664KB

                              • memory/3548-949-0x0000000140000000-0x00000001400A6000-memory.dmp

                                Filesize

                                664KB

                              • memory/3548-912-0x0000000140000000-0x00000001400A6000-memory.dmp

                                Filesize

                                664KB

                              • memory/3548-911-0x0000000140000000-0x00000001400A6000-memory.dmp

                                Filesize

                                664KB

                              • memory/3548-916-0x0000000140000000-0x00000001400A6000-memory.dmp

                                Filesize

                                664KB

                              • memory/3548-907-0x0000000140000000-0x00000001400A6000-memory.dmp

                                Filesize

                                664KB

                              • memory/3548-918-0x0000000140000000-0x00000001400A6000-memory.dmp

                                Filesize

                                664KB

                              • memory/3548-910-0x0000000140000000-0x00000001400A6000-memory.dmp

                                Filesize

                                664KB

                              • memory/3548-905-0x000000000A470000-0x000000000A5C8000-memory.dmp

                                Filesize

                                1.3MB

                              • memory/3588-406-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3588-404-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-366-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-114-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-16-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-20-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-196-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-19-0x0000000000481000-0x00000000004AF000-memory.dmp

                                Filesize

                                184KB

                              • memory/3756-118-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-116-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-431-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-75-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-21-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-73-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-879-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-269-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/3756-321-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/4056-345-0x0000000000240000-0x0000000000EB4000-memory.dmp

                                Filesize

                                12.5MB

                              • memory/4056-343-0x0000000000240000-0x0000000000EB4000-memory.dmp

                                Filesize

                                12.5MB

                              • memory/4180-364-0x0000000000400000-0x0000000000C6C000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/4180-325-0x0000000010000000-0x000000001001C000-memory.dmp

                                Filesize

                                112KB

                              • memory/4180-362-0x0000000000400000-0x0000000000C6C000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/4180-319-0x0000000000400000-0x0000000000C6C000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/4180-409-0x0000000000400000-0x0000000000C6C000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/4180-852-0x0000000000400000-0x0000000000C6C000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/4180-877-0x0000000000400000-0x0000000000C6C000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/4284-1673-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/4284-1675-0x0000000000480000-0x0000000000798000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/4412-286-0x00000000049A0000-0x00000000049F5000-memory.dmp

                                Filesize

                                340KB

                              • memory/4412-290-0x00000000049A0000-0x00000000049F5000-memory.dmp

                                Filesize

                                340KB

                              • memory/4412-289-0x00000000049A0000-0x00000000049F5000-memory.dmp

                                Filesize

                                340KB

                              • memory/4412-288-0x00000000049A0000-0x00000000049F5000-memory.dmp

                                Filesize

                                340KB

                              • memory/4412-287-0x00000000049A0000-0x00000000049F5000-memory.dmp

                                Filesize

                                340KB

                              • memory/4600-1719-0x00007FF736C20000-0x00007FF7370B0000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/4600-1705-0x00007FF736C20000-0x00007FF7370B0000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/4824-429-0x0000000000130000-0x00000000003E8000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/4824-428-0x0000000000130000-0x00000000003E8000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/4824-869-0x0000000000130000-0x00000000003E8000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/4824-886-0x0000000000130000-0x00000000003E8000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/4824-427-0x0000000000130000-0x00000000003E8000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/5008-1003-0x0000020824A20000-0x0000020824A42000-memory.dmp

                                Filesize

                                136KB

                              • memory/5632-824-0x00000000003C0000-0x0000000000858000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/5632-888-0x00000000003C0000-0x0000000000858000-memory.dmp

                                Filesize

                                4.6MB