Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-07-2024 04:11

General

  • Target

    ada7eb93045e17444d5d8d107e53ed7ecaca8133cce46b485a38ba3e28bfe43a.exe

  • Size

    1.8MB

  • MD5

    c216cc28dabf4588a811777d1502044f

  • SHA1

    06a63965a845f70559b59a378aba700a66b7b769

  • SHA256

    ada7eb93045e17444d5d8d107e53ed7ecaca8133cce46b485a38ba3e28bfe43a

  • SHA512

    2ff4fe075c77f278fec014c2a5bddc9ebf35ad61d82ba68b8bcce3e4262940196a1ea8f6db7ff8f0e7cae97c1064db437baca9fb57f57f8a17db0a1351a0b870

  • SSDEEP

    49152:6EMRlUB2ioe2KCq/WapF5ZXX3YZfm9L5slRO:6EOUB2iorKCjsnoielo

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

valenciga

C2

http://45.158.12.58

Attributes
  • url_path

    /e47233787df7c9a6.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ada7eb93045e17444d5d8d107e53ed7ecaca8133cce46b485a38ba3e28bfe43a.exe
    "C:\Users\Admin\AppData\Local\Temp\ada7eb93045e17444d5d8d107e53ed7ecaca8133cce46b485a38ba3e28bfe43a.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Users\Admin\AppData\Local\Temp\1000020001\7cf87aaf7e.exe
        "C:\Users\Admin\AppData\Local\Temp\1000020001\7cf87aaf7e.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4436
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\DE79.tmp\DE7A.tmp\DE7B.bat C:\Users\Admin\AppData\Local\Temp\1000020001\7cf87aaf7e.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1448
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
            5⤵
            • Drops file in Windows directory
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3684
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff9fe88cc40,0x7ff9fe88cc4c,0x7ff9fe88cc58
              6⤵
                PID:4248
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1820,i,5645168045859723699,13636648164487464123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1816 /prefetch:2
                6⤵
                  PID:3740
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2052,i,5645168045859723699,13636648164487464123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2332 /prefetch:3
                  6⤵
                    PID:1224
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2084,i,5645168045859723699,13636648164487464123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2340 /prefetch:8
                    6⤵
                      PID:3308
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,5645168045859723699,13636648164487464123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3168 /prefetch:1
                      6⤵
                        PID:1828
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,5645168045859723699,13636648164487464123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3200 /prefetch:1
                        6⤵
                          PID:4436
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3604,i,5645168045859723699,13636648164487464123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3608 /prefetch:3
                          6⤵
                            PID:5916
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=872,i,5645168045859723699,13636648164487464123,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4356 /prefetch:8
                            6⤵
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            PID:6080
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
                          5⤵
                          • Enumerates system info in registry
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of WriteProcessMemory
                          PID:3992
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ff9fe743cb8,0x7ff9fe743cc8,0x7ff9fe743cd8
                            6⤵
                              PID:2668
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1720,6368985203281873292,12920468196987995369,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1788 /prefetch:2
                              6⤵
                                PID:4664
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1720,6368985203281873292,12920468196987995369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:3
                                6⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1372
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1720,6368985203281873292,12920468196987995369,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:8
                                6⤵
                                  PID:2672
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,6368985203281873292,12920468196987995369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
                                  6⤵
                                    PID:1760
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,6368985203281873292,12920468196987995369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
                                    6⤵
                                      PID:3460
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,6368985203281873292,12920468196987995369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:1
                                      6⤵
                                        PID:4440
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1720,6368985203281873292,12920468196987995369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:8
                                        6⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:6288
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,6368985203281873292,12920468196987995369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1
                                        6⤵
                                          PID:696
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,6368985203281873292,12920468196987995369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3772 /prefetch:1
                                          6⤵
                                            PID:3488
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1720,6368985203281873292,12920468196987995369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:8
                                            6⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:6588
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,6368985203281873292,12920468196987995369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:1
                                            6⤵
                                              PID:6608
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,6368985203281873292,12920468196987995369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:1
                                              6⤵
                                                PID:6604
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1720,6368985203281873292,12920468196987995369,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4492 /prefetch:2
                                                6⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5696
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
                                              5⤵
                                              • Suspicious use of WriteProcessMemory
                                              PID:5032
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
                                                6⤵
                                                • Checks processor information in registry
                                                • Modifies registry class
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                PID:3320
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1944 -parentBuildID 20240401114208 -prefsHandle 1860 -prefMapHandle 1852 -prefsLen 25749 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b97525e7-50a3-4db6-b9e3-2b6972adc99e} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" gpu
                                                  7⤵
                                                    PID:3764
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2384 -prefMapHandle 2380 -prefsLen 26669 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {da73aade-d36f-4984-b773-add37f687638} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" socket
                                                    7⤵
                                                      PID:1944
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3200 -childID 1 -isForBrowser -prefsHandle 2844 -prefMapHandle 3188 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {083caa30-e936-4e36-a5f5-6a95364559ef} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab
                                                      7⤵
                                                        PID:4240
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2832 -childID 2 -isForBrowser -prefsHandle 3904 -prefMapHandle 3900 -prefsLen 31159 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0cc8888e-7759-4af2-b327-93d5ca51298f} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab
                                                        7⤵
                                                          PID:5132
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4476 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4468 -prefMapHandle 3084 -prefsLen 31159 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {13d0cfb1-82cb-4c43-844e-5951261f45a2} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" utility
                                                          7⤵
                                                          • Checks processor information in registry
                                                          PID:5764
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 3 -isForBrowser -prefsHandle 5556 -prefMapHandle 5548 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {912dacda-ce6b-4ecb-8c51-b54553c4f397} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab
                                                          7⤵
                                                            PID:1044
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5688 -childID 4 -isForBrowser -prefsHandle 5696 -prefMapHandle 5700 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fc22f2f-bf8a-46f3-a609-59691e6f0a92} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab
                                                            7⤵
                                                              PID:2204
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5976 -childID 5 -isForBrowser -prefsHandle 5968 -prefMapHandle 5964 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c4e1ce4f-d728-4cfc-9903-b34faff5198b} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab
                                                              7⤵
                                                                PID:6056
                                                      • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
                                                        3⤵
                                                          PID:6360
                                                        • C:\Users\Admin\1000029002\9b4c211774.exe
                                                          "C:\Users\Admin\1000029002\9b4c211774.exe"
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:5776
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 5776 -s 1412
                                                            4⤵
                                                            • Program crash
                                                            PID:6020
                                                        • C:\Users\Admin\AppData\Local\Temp\1000030001\15e5034fc1.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\1000030001\15e5034fc1.exe"
                                                          3⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • Drops file in Windows directory
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:6640
                                                          • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                            4⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:6800
                                                            • C:\Users\Admin\AppData\Local\Temp\1000045001\stealc_valenciga.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1000045001\stealc_valenciga.exe"
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • System Location Discovery: System Language Discovery
                                                              • Checks processor information in registry
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5660
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:4180
                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                        1⤵
                                                          PID:4784
                                                        • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                                                          "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                                                          1⤵
                                                            PID:6300
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5776 -ip 5776
                                                            1⤵
                                                              PID:5992
                                                            • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                              C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                              1⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:6524
                                                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                              C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                              1⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5500
                                                            • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                              C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                              1⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:1752
                                                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                              C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                              1⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:780

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\ProgramData\mozglue.dll

                                                              Filesize

                                                              593KB

                                                              MD5

                                                              c8fd9be83bc728cc04beffafc2907fe9

                                                              SHA1

                                                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                              SHA256

                                                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                              SHA512

                                                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                            • C:\ProgramData\nss3.dll

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              1cc453cdf74f31e4d913ff9c10acdde2

                                                              SHA1

                                                              6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                              SHA256

                                                              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                              SHA512

                                                              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                            • C:\Users\Admin\1000029002\9b4c211774.exe

                                                              Filesize

                                                              2.5MB

                                                              MD5

                                                              b7677aad5399636a95eb6994e115916d

                                                              SHA1

                                                              e2d4dcd2ebc1027245d2103a0fd9606f9bd2c5d6

                                                              SHA256

                                                              88edcb330179b6d28b755308b2c06b9a9ee4adb10ea7e4185d0af1697ad89761

                                                              SHA512

                                                              d0b8024ade74ccd107d3e85cb3bcb1d164121097f75fbea5b74c657763d01ae58275a860e39f32fa2cc7e7064c551cce6e68c7bec2ce4f81ffd4b4f74dceca87

                                                            • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                                              Filesize

                                                              64KB

                                                              MD5

                                                              b5ad5caaaee00cb8cf445427975ae66c

                                                              SHA1

                                                              dcde6527290a326e048f9c3a85280d3fa71e1e22

                                                              SHA256

                                                              b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8

                                                              SHA512

                                                              92f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f

                                                            • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                                              Filesize

                                                              4B

                                                              MD5

                                                              f49655f856acb8884cc0ace29216f511

                                                              SHA1

                                                              cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                                              SHA256

                                                              7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                                              SHA512

                                                              599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                                            • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                                              Filesize

                                                              1008B

                                                              MD5

                                                              d222b77a61527f2c177b0869e7babc24

                                                              SHA1

                                                              3f23acb984307a4aeba41ebbb70439c97ad1f268

                                                              SHA256

                                                              80dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747

                                                              SHA512

                                                              d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0

                                                              Filesize

                                                              44KB

                                                              MD5

                                                              f99a5ee2b4262b5a5e1996f6f11fe79b

                                                              SHA1

                                                              0336861565072ebd1f04ac82e1533c34522b2fb3

                                                              SHA256

                                                              887a2c6993dc722a9c60e15dd9381b92e4a34d65e5fff9510822b4463aeab155

                                                              SHA512

                                                              3d851fbad44b389b639e362809f35c75f3abba8947cd26c66232e7860d575f735b271cc3870700e363e1b6d92a7ae778b37d48e98e6abe4971347dc7c6d00aeb

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1

                                                              Filesize

                                                              264KB

                                                              MD5

                                                              e74151f8c317f9ba5584911c9addbf38

                                                              SHA1

                                                              0eb667d2e82eb6cadcdd7a59c6a44c96bd03773c

                                                              SHA256

                                                              77c3813d78517c55124f7775243350712f4d80bc95d0ccfa42a66041a2a8c420

                                                              SHA512

                                                              c2b667fcb8b2591a4715449f9cc80bffaf0d867236954dbc1256fa7becd25895804b2055f8ee1b1881d9611941bb73d9ef4ee7fd0bd5f21e1782af26e0552031

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_2

                                                              Filesize

                                                              1.0MB

                                                              MD5

                                                              bf7601c66d1ec739fa324b1ce8f3cc27

                                                              SHA1

                                                              0c37f1eaf7b38b3503e844d818009f0a1c4e704b

                                                              SHA256

                                                              0c7f75886d5361cc961c479523e098014f04662f25a6a005d1a4173b9d4b3d94

                                                              SHA512

                                                              1e531c65045729f53bfb0a8de4dde4ddfd2b47537592c017ad5d63202a82e6aa81ea6ccb305413e505ec89e3fc14c772d84b0700fa7617cc804a251c5bb03662

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3

                                                              Filesize

                                                              4.0MB

                                                              MD5

                                                              4235bfa8b4b5a2aac9b198cb0505e960

                                                              SHA1

                                                              0b6158834e3c574aeee2204931aac0896a31b368

                                                              SHA256

                                                              af3bf91c17f46f1919a5f571599cd8c03499e0bea43a3b3dc0411edecb5dfeff

                                                              SHA512

                                                              c50a8147316f4233f0ffe580e73e4539a93033932c5fe4dc173ad8e6887893ce6626b9cb608d71186663385e67a3f9375fcd562da88e29c117ecaabd8c66afaa

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                                                              Filesize

                                                              68KB

                                                              MD5

                                                              fbf0911ebe4f2e508ac2ed235d00e55e

                                                              SHA1

                                                              bc4c28796a860bfd36c99e64b495682518f86896

                                                              SHA256

                                                              60a59803330f9e762c90793daf5ea396085b794d2f51ed1a730a838a4ad49767

                                                              SHA512

                                                              72f39b423285cec8f462995459c05a9a30e408652f72f06477ddef0f504c06d6cf8a0336cf0ac0984b9cbee85e611eb1c785d9e75dfe6b961c880bc943a8de1e

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000002

                                                              Filesize

                                                              51KB

                                                              MD5

                                                              f61f0d4d0f968d5bba39a84c76277e1a

                                                              SHA1

                                                              aa3693ea140eca418b4b2a30f6a68f6f43b4beb2

                                                              SHA256

                                                              57147f08949ababe7deef611435ae418475a693e3823769a25c2a39b6ead9ccc

                                                              SHA512

                                                              6c3bd90f709bcf9151c9ed9ffea55c4f6883e7fda2a4e26bf018c83fe1cfbe4f4aa0db080d6d024070d53b2257472c399c8ac44eefd38b9445640efa85d5c487

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000004

                                                              Filesize

                                                              85KB

                                                              MD5

                                                              533028bc88b8c919df8015a5530b2619

                                                              SHA1

                                                              d0525738835505ff9d73ba26e3f7d3fe67805221

                                                              SHA256

                                                              174bc924860e66e957fce675f42e342f3ea8c16daa14854d4a33cdaf592fbbe9

                                                              SHA512

                                                              3a51ad22fc22beb0e7ccb8ee000c9ab4146e81f91791c59e6134572ba51ec543382bd3f17456ee9aec3ecefecb11f3dfd41ae2660ae3b06723f135f4ccfb23bc

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                              Filesize

                                                              264B

                                                              MD5

                                                              da6ba9c2bffbf3bcb31cef7d14b629cf

                                                              SHA1

                                                              ccbcca62a3ababa9220510d429654c50ae64b2b6

                                                              SHA256

                                                              33950641c8681993e38eca09b0569fb355e7855144802ffc236ce05e9bad5f8f

                                                              SHA512

                                                              797aebd989e10330eb4331e4d5f1a4835d5773ce17b6ae95f2cb1cd52b7e7c1ec6ef4888fc2961d1cbd9981b5321ad5bc717222eccf0b5e187f857664a0d5816

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History

                                                              Filesize

                                                              160KB

                                                              MD5

                                                              1cfaf7418ddf10c6aa1547c30d233bc6

                                                              SHA1

                                                              2541ea19398b8dde5ec38d2ecd0038e827d7e23f

                                                              SHA256

                                                              ee0608989f0e8f566b494adadfea046bcf619df5a55be0422c306178d5f2f960

                                                              SHA512

                                                              97b90f6120b86dc664f15074fba30e16175d962bdf761e29c1710b567bd4ff34f36f7c38ab036914215b2d138545b1da2aa0a830401c39ffffb60a844bfad759

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              a06ef8b28c374c0cfeb0c58e10125018

                                                              SHA1

                                                              6cf104e358b1be17e61fd774f7bcc0c6376afab7

                                                              SHA256

                                                              1ce46344cbdc606bf0c66b15a8aa6d255d31662b484de32d87e3f2ce112785d5

                                                              SHA512

                                                              22f4133d9d8022b291342a9920c8da8a1e98156f80cef8df50d37fa40d3bc967af1ef2a43174a90e8d5e3d1eac7a9e1e6d0b8e425aeab67eaebcf2258b275a3d

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                              Filesize

                                                              2B

                                                              MD5

                                                              d751713988987e9331980363e24189ce

                                                              SHA1

                                                              97d170e1550eee4afc0af065b78cda302a97674c

                                                              SHA256

                                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                              SHA512

                                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                              Filesize

                                                              356B

                                                              MD5

                                                              e7e27c80ccf7c64e163c40c7cc6444e0

                                                              SHA1

                                                              1a3e730cc10802d5423b35e163b87776f3d47805

                                                              SHA256

                                                              803cd10496f5821a7af59c31f6006083f6c15886af8ac186abcba07bba06d4fa

                                                              SHA512

                                                              b5afefbb249ba72056bf580be0ecce7f1e9bdb24de7b919c008b950cc6dfd3cc2e896007b66fa71dbe5346c60cfc4c86e5b53ddab81ba5a8510a0baa2565f521

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              90b119126652f708c1467d10e7e276d6

                                                              SHA1

                                                              4ce5892093c7d147ad8b6a9bb3b010eb4867a05d

                                                              SHA256

                                                              103d4e16c0c503c7bb3616b409eaf1d4473bdf6aedabadb8abc9daca00237f5d

                                                              SHA512

                                                              4cf2f08e79a2467439b0e9ded7dd06a0c663de9fafb1d3c1ea7e04c699f3d5a2c6876810047ef134065aafa7cf11095c2e5984b9c2c14fe326e6fcd8bf7f460a

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              eac4130145328ea5269949ca3133aeff

                                                              SHA1

                                                              8e3ddbd37154ad4b6ff8a6b2087ec9d7e5633f13

                                                              SHA256

                                                              5fab3dc451e5da4069fc7dd37d428dc345b2d2cf7d71322ce34f2436bc3e8665

                                                              SHA512

                                                              6618a28c75c95922e2673631e224e55206eb9a380811a6e7767231249c6520acad97d57e472132242ea6d1cc90ac9768d8b26650fc6e53a7066fa954e666d0a1

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              b8472fb66808561982f42013c8604a6d

                                                              SHA1

                                                              28fe15cecae40f50a89643781a9e9a27817a231a

                                                              SHA256

                                                              f21e28c27dc7c36821b311c6ce0f63068e1769faa4434a5a2b6c72ea34c90591

                                                              SHA512

                                                              16a43329df415cf28201582ad953efcd92cd1b3c8fb669a4f2c1dd72b6a0710b9dfd039c79d6edf58c7901ed74fdaf7f92ab9010c6551fd2193c862fbfcd0407

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              92ff4e5103e6e47d6070be3bfb3849db

                                                              SHA1

                                                              6f72bf3db843d196e7366951fdba0c936ba80aa5

                                                              SHA256

                                                              0f0f3da1cacf3e3ed3f1bf77bdcd71bfebbd7b7981d1f8d280001ab1dfd1e560

                                                              SHA512

                                                              99ab8af9993b14e3ee85b56c503adf36ebeaaa346076afd838ca0265e1d571d8ab3d02a1fa63498a4e3bd52c18adb17a2758a8e078643e183c7fc2ccd94d54df

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              3a8aabacb6b30498fa569cba4c8ea128

                                                              SHA1

                                                              33f0f2f7be4e50aebec91e441c859291b0db7d74

                                                              SHA256

                                                              0d9240b6ea21b577a04521dcbfc917c0eb711a670d45cdddbaa41de4aa0df478

                                                              SHA512

                                                              b392416d2e22589c1771cabfebc64f837a8d47c3f53f7c38bfe26d985507c0b2cd7dec104d8417929e7896d9ed6d5c22cb24fe0923c806f57d413243da331ac0

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              1ddcc43af3e4ced34218a43f64a3ac2a

                                                              SHA1

                                                              f1af984797ea729f77720bdc1f4c480f2aa7fb0f

                                                              SHA256

                                                              248d592c6d8c15fc3e7fb4b01ebe0e352260a9dad175dc297388239d43e30f30

                                                              SHA512

                                                              f39cca1c70410f19838e0186aa403557114434ae06403d1c4e7eefd0f7c592fbc01710879b119d05ca5a91b9790aeab1cfb32a6be3ae4f69601391ea17d50084

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              19affcc857ed7cf8e9dee8b9f68fab6e

                                                              SHA1

                                                              7f42b5646144a7d20dcb65b27a3b9b9f03334e6e

                                                              SHA256

                                                              082f664c5a691ae8d09925cfa3ece00e77f24860977c7df4bde776c6dcf610d5

                                                              SHA512

                                                              810458f2909f866c75db25da52c8fbb01365426f43dd458f800a3854bb3540d02c9e86bbfabd472264ac2c91d4e3b7d712a66580c38c630d10f2d1371dbfa8e1

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              bf25adc12588288e8f7ba7a235925715

                                                              SHA1

                                                              d7330e83b77b4302b5c043e8e18b6dea28440919

                                                              SHA256

                                                              a3e9ebeeee97c590b3ce213b01232c1ad9c1ee4be2eb0cb52c787e01772f4fb2

                                                              SHA512

                                                              128d2230b271731f5237775f527131658560519f2fd83af2984c169d8a969b51f91e9eb43b9e309028229bea5c765c952549ef5494965fbe3edbe1dd536e24d0

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              e5d3b4601b067e4fd765a3f843677037

                                                              SHA1

                                                              95b01752ba5eb97fc6d558bce8bd41aebc112178

                                                              SHA256

                                                              e7c83a0f8b39a84644a7e57070d480b2912a5069d060fa1fbbaf0b21cbf70299

                                                              SHA512

                                                              84f65b3c75295a96edbb178a45197b1ea0deae821a3755cc5c843a2edb88a44583f82deb078c19c24db2afc255d47212cd4985fea4473b8f5ff57e6c4d5d5bd9

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                              Filesize

                                                              92KB

                                                              MD5

                                                              d96456218147493b5979df1e7f5427e0

                                                              SHA1

                                                              40b3b0b9db4c89949e204689553b96bb6aefade7

                                                              SHA256

                                                              2b5a3ae62332a21506ae12792b7c7f20691699160e074f0383ce8eb24c245a2f

                                                              SHA512

                                                              608fb4ca4746ff7886eee4f7b13f04204e0dd9dc6cd957d9a8dca6d45d2b00bca48fc9faf778d6dc34102709d353517ff0b0c1b03cfd9a2604f3e29b8534ab80

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                              Filesize

                                                              92KB

                                                              MD5

                                                              adb741a011b61692d4bf5b4ac46f6fdc

                                                              SHA1

                                                              c680013804e1f922b521cc453727416faba1b12e

                                                              SHA256

                                                              8f6d7ac1ec32986d09c074a4f3e38632dcd2eb66b01a48d98f85d114c684ed8c

                                                              SHA512

                                                              cc9d52ce922c7b4f363fe4118eac619426ffd0b871b12065a3d71ee0a24e54e958b8eab79084b5074bf782f5595d88b20fac5b8bd3aea642dd11870899f15dfd

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              152B

                                                              MD5

                                                              f53eb880cad5acef8c91684b1a94eed6

                                                              SHA1

                                                              afab2b1015fecbc986c1f4a8a6d27adff6f6fde9

                                                              SHA256

                                                              5cb8554e763313f3d46766ab868f9d481e3644bfc037f7b8fe43d75d87405a27

                                                              SHA512

                                                              d53f3965428f73c0dfed1d941a9ff06eb70b254732410b815bc759b8c7904e11292ad7e9624c12cccaed6763e7bea68208bc0b67fc70b7616d25bda143833794

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              152B

                                                              MD5

                                                              b0499f1feacbab5a863b23b1440161a5

                                                              SHA1

                                                              37a982ece8255b9e0baadb9c596112395caf9c12

                                                              SHA256

                                                              41799b5bbdb95da6a57ae553b90de65b80264ca65406f11eea46bcb87a5882a7

                                                              SHA512

                                                              4cf9a8547a1527b1df13905c2a206a6e24e706e0bc174550caeefabfc8c1c8a40030e8958680cd7d34e815873a7a173abe40c03780b1c4c2564382f1ceed9260

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                              Filesize

                                                              33KB

                                                              MD5

                                                              daa6948a37ac312342600f2b96db15ea

                                                              SHA1

                                                              0bfa2e04bf51480baf1fc7e7819f65cd3b0c90ba

                                                              SHA256

                                                              de7cf820e8eb0aa51d82aff3a848fd853dfa878674cc67094aee0ac115c85fee

                                                              SHA512

                                                              5af3ceb0a4c56b767792ad349b83a179191d9fe6dca8e3795cb48edb87ae6a8b89e51a64ebedd68857c674befd71dc1664a2e8380ac21abacc9566329d8c2e14

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                              Filesize

                                                              38KB

                                                              MD5

                                                              a1cbc8600fb0e0b668df61bb5d1737f9

                                                              SHA1

                                                              65aaea9cf40ee7aafcf033f35980aac172b0a267

                                                              SHA256

                                                              b0324009cc7d496245d763710959284dbc9eb3c4aa93227cd6fa82772ff5a2bb

                                                              SHA512

                                                              c731cbc3fd2397fea0afdb98ad7e0a2624dfdd9da00da2032cbb425ff653291bd3e9290514d6aac2761923a055c0666b521a61524595c5ab1aa2b56ce18b2338

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                              Filesize

                                                              216B

                                                              MD5

                                                              fda94464219f3799b137a28c8015cd32

                                                              SHA1

                                                              a69c3ea53746384312c90ca54b14ada441c8b6b8

                                                              SHA256

                                                              6a6913d5b6622004d5a2ab5598bc2bb207d461f7ded8263deeaed1310188ac72

                                                              SHA512

                                                              0360e873fc46fb24bbd10b930f30278a5cf764d05ccce2211027cfa4a033a3e1d5099af53a7d9508969b0e881feaff8bb427a8e973dfdbcbe03f02cb63d58f0c

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                                              Filesize

                                                              116KB

                                                              MD5

                                                              2f4529df8eb7423a2ce33a178067efe8

                                                              SHA1

                                                              98dd7974688390024bf08a4e611e1b0c14a9cdbc

                                                              SHA256

                                                              3d753035d8fa7519615cc6c9957bd021c3df8e2c9e47f20df655d30440fb6080

                                                              SHA512

                                                              8238dbb30b60225e86a8f870e4fd49ea8964a75ee012e37ea1d08dde54ae113ff25ec499c4e256ce08cc495a810bb3bef3cce724dad48cde3b9f20a2c78e890c

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              d4b705874e208d379ed1f21024b05676

                                                              SHA1

                                                              24aedae9f63beda458859849624e9243c6adb0ab

                                                              SHA256

                                                              20de8b69c2f165cc6e7590b730c4790ae6f7d959ece56e0510a9ca3575e9adf2

                                                              SHA512

                                                              c4e1209932d372a8be7dc73cd6f2d3ca432281ddf06f73e4ffb56b403143b6e01f75789ae66b47de96965bd3a53f4c195cc5296510f443ee70b0779ea9fecd57

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              5KB

                                                              MD5

                                                              ba301c82960fd84f0000deeac1239808

                                                              SHA1

                                                              9fb0d485a025c26ca4e33ebb6e32885f1491c4f2

                                                              SHA256

                                                              cf294ef55c90ca639ec7706a16963ed207f7633bdd5893b7b60e8a697452d9a0

                                                              SHA512

                                                              3f1cb8f0acab9d0be9d83bbb6f39ee78ec862cf612a8da733d7b9661c21661b701e39416e4a5e436c9a97f34017579b80e1c0bf0ab0bcb943d1e609ec5720106

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              e470088708c7197065bc5b1b838a7a8b

                                                              SHA1

                                                              febe6ce42a1420decee678d8765aa7759018f448

                                                              SHA256

                                                              5206c0eacaa64606a52c4f5fa76c320f22479dc4a1b6f305d3a9b3487c59c893

                                                              SHA512

                                                              156b6f9b44d214465f375742d6734611fdef2754ed7fb1ea623bdfd678723a9453b650b7fcc7fd08727ca48f0fb5f82b3b946be45d17cb46d9ac10808a1e3bcc

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                              Filesize

                                                              16B

                                                              MD5

                                                              6752a1d65b201c13b62ea44016eb221f

                                                              SHA1

                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                              SHA256

                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                              SHA512

                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              abc951032b38b9d9a4b7865f8450d5ff

                                                              SHA1

                                                              a1d7e90c484a2c8e3104b8357173c75d92dc9e46

                                                              SHA256

                                                              f1f930673d19d8679490829c54a5e27c00cba8e55b25197944de991a2048e72b

                                                              SHA512

                                                              c564ff32837c28b0e58cc86219b15904fffb338d1f0f2330703128f5ef6c28701786c279360c8f2d516849a11fed35904dd8886b023f84dec8ceca1dd9a565b4

                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n9orreff.default-release\activity-stream.discovery_stream.json

                                                              Filesize

                                                              19KB

                                                              MD5

                                                              6110e76ee7e0b334bd887f9873b760e0

                                                              SHA1

                                                              13c25937e23971150f69a21297ddb108aee070ae

                                                              SHA256

                                                              0a9bc739790efdc8efc2eefbb173d92e0edea278f15632fc01c7861489ca29c1

                                                              SHA512

                                                              95103e16795f8a74e9338b1313c7bf6c6b7357923c4b050291d818081a6e402cef568e512cbffc877c9aea3a221c3286499cf9680cbc0350ad2837bf587dc17c

                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n9orreff.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D

                                                              Filesize

                                                              13KB

                                                              MD5

                                                              b05dceb0e5816dccbcd82ae66738c6e0

                                                              SHA1

                                                              332bea605c0eb8e31bd260425cf5d558fc65c302

                                                              SHA256

                                                              796c916c49901f0e7ddad026f1fa695a5c27538a3dc3ace6cb5becc9ace72232

                                                              SHA512

                                                              9f6947d82bdc5f61c474414c88b3354e6434b62dc39141fdb09d0f78a87d6bc6a92a7978aa671a1636f26ff6f467a1ccaa0e6087e12ab62b88f5308bc8364479

                                                            • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              c216cc28dabf4588a811777d1502044f

                                                              SHA1

                                                              06a63965a845f70559b59a378aba700a66b7b769

                                                              SHA256

                                                              ada7eb93045e17444d5d8d107e53ed7ecaca8133cce46b485a38ba3e28bfe43a

                                                              SHA512

                                                              2ff4fe075c77f278fec014c2a5bddc9ebf35ad61d82ba68b8bcce3e4262940196a1ea8f6db7ff8f0e7cae97c1064db437baca9fb57f57f8a17db0a1351a0b870

                                                            • C:\Users\Admin\AppData\Local\Temp\1000020001\7cf87aaf7e.exe

                                                              Filesize

                                                              89KB

                                                              MD5

                                                              1158aec23726a7fe06c632342592a21c

                                                              SHA1

                                                              d84df59a153ffc1de96d3d7749f6c93baee4ab64

                                                              SHA256

                                                              1d696f51505b1bcc395b457ccefe5fd1ef9e0daad629a3dbcb62f03ea1d4df39

                                                              SHA512

                                                              4ee4b77aee7d6224db1f88806e750fdc35a7cb787b7a8b70de241dcba86190958664d13de245b188fed220920ad234245f347ab0ba4b3b6da3bb57d084bae6c3

                                                            • C:\Users\Admin\AppData\Local\Temp\1000030001\15e5034fc1.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              f66bf79e1f14f6568eba43ca241d00f3

                                                              SHA1

                                                              be651f0d681635b84ffaa76fd3618f6545f817d1

                                                              SHA256

                                                              08aee2a865528a1bb95f565c81f15666877bc470694a8c26100402b19495ae15

                                                              SHA512

                                                              587faa7c17c4fb5eee3552138d610c585e9eebcdd6a353a3408fc0cc40ccfa8037f993dcdd7fa4f65a0ffe226069c4a5aee8023c241f9475ba6d9b4e373a25c8

                                                            • C:\Users\Admin\AppData\Local\Temp\1000045001\stealc_valenciga.exe

                                                              Filesize

                                                              187KB

                                                              MD5

                                                              dc4df67829d076c9c33c0d728a9a6ddb

                                                              SHA1

                                                              8362b7c722fcd493a473c0ad12c38c381f0c3e90

                                                              SHA256

                                                              b11d77860541c64edc90ba2b3841ce41913aada626bc56d6c10a9214f3040da8

                                                              SHA512

                                                              03da0637bf30b8d01591629b501b339b77e57b920e0cfd406222b0b28d81399e950da58f0088b7b7cf80cda49084b611056812618a586328232f9697f56e2ea2

                                                            • C:\Users\Admin\AppData\Local\Temp\DE79.tmp\DE7A.tmp\DE7B.bat

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              de9423d9c334ba3dba7dc874aa7dbc28

                                                              SHA1

                                                              bf38b137b8d780b3d6d62aee03c9d3f73770d638

                                                              SHA256

                                                              a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698

                                                              SHA512

                                                              63f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401

                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                              Filesize

                                                              479KB

                                                              MD5

                                                              09372174e83dbbf696ee732fd2e875bb

                                                              SHA1

                                                              ba360186ba650a769f9303f48b7200fb5eaccee1

                                                              SHA256

                                                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                              SHA512

                                                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                              Filesize

                                                              13.8MB

                                                              MD5

                                                              0a8747a2ac9ac08ae9508f36c6d75692

                                                              SHA1

                                                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                              SHA256

                                                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                              SHA512

                                                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\AlternateServices.bin

                                                              Filesize

                                                              7KB

                                                              MD5

                                                              79158000cf3108480ca2f624ea9467b1

                                                              SHA1

                                                              4296c04bcb0abe1790b233421588d3de68f4bdbb

                                                              SHA256

                                                              06a975ec7ad978d1eba635bf2ea337d4a5af1bbf137058d86415ae2cb8f2596d

                                                              SHA512

                                                              0626f68c066943f05041a94afcc90163b371d57d0f6184ed9efa9a6a2314aaaf981035c428d7b21c204d1cb8ee9e049dc70b8816d5bce552a4fb736b045e93af

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\AlternateServices.bin

                                                              Filesize

                                                              12KB

                                                              MD5

                                                              da2f585ae03b43b292268f0d61606ff2

                                                              SHA1

                                                              29c66d32ed6b149017e47e7e8ed4b93d6068d7ee

                                                              SHA256

                                                              cb05ea365852f5e6d21ef7840c7ec058e940311e0e6bf4420960c6438e00da57

                                                              SHA512

                                                              06a6c403db573b73bf9e91bf0c5fa034a10269816b2902d7b4de7276afa36c58085487e982fbccb7ac0e3468174fb66a165a37e8a83cabc56c8ff8d0121d0476

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\AlternateServices.bin

                                                              Filesize

                                                              12KB

                                                              MD5

                                                              c41ccd5b508b6f933e405ce544eb09e4

                                                              SHA1

                                                              32eca0e5c3d2fe1aba5b48d1052ba4e03f6df2cc

                                                              SHA256

                                                              843e13582d8a0941aa1455ad10bfd7bda6a21a8cf3a9c9996aa5091420dadc42

                                                              SHA512

                                                              92082dc12f18af628c1f70f9a10cf83109ea9682bbb5ac2510919d5d3bfbbd4cb8a109aea45ba39e5a11936acbd156ce62aeec8f826dc3b93216dbbea73ce9d4

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\AlternateServices.bin

                                                              Filesize

                                                              17KB

                                                              MD5

                                                              4d114e5253d4788c6ee5dd637dde64b4

                                                              SHA1

                                                              09dac5667125eff0b40b0db8955a6d3f5714c73c

                                                              SHA256

                                                              985d704842edeca7a20d30ed92b8c455675957e4e3e11a873f1d6bd36fc62049

                                                              SHA512

                                                              e4dcf32ea28ba023cc9608c587251fc2cf5864d5840a9fdfa88e0e5b66cd97ee334b9baa63388fffa57f4db667b841fe7ed27a71d84c27883073be2bea908a66

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\cookies.sqlite-wal

                                                              Filesize

                                                              256KB

                                                              MD5

                                                              47bcc42e6a44abbb438ff0599d83892a

                                                              SHA1

                                                              e7e14477d2c8f1008802d10ef9350cb6aa416955

                                                              SHA256

                                                              b19a53d6fa6d194a6c0fa40d3da05f7ed4cac1e229cd113ef7af67447a0558e8

                                                              SHA512

                                                              c5bb618cb8da0d6caffc5d5be8c6af43578399d5e9dccd3f85aa584ff0c9a8ad7b1a11da0013de3fe91a7f360a16e3dad6fa571154d9ef6894fe7d1e237e126c

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\datareporting\glean\db\data.safe.tmp

                                                              Filesize

                                                              15KB

                                                              MD5

                                                              a98352c2c7979d5d553748c40465a4f1

                                                              SHA1

                                                              38dcbcd43ab4187e6efd2439636fb17b56fb3445

                                                              SHA256

                                                              90024cb494975d1ed3db9a35446593a2c2ef127b9a3fedae60575219f253dbac

                                                              SHA512

                                                              153f654c735620166a0ac27978668f9b8da637467ba9474ee8e0e66741235ecce088435be911d9f86ab90b5e5e65cfdd414b0501433ba576b4c793b79efc13f1

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\datareporting\glean\db\data.safe.tmp

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              477cd21bfdb629731061c1f5fe7ae3c8

                                                              SHA1

                                                              0e9ec24677e3319d70329499f15114b58a8eab71

                                                              SHA256

                                                              d182fff7a956acf0b32041496e6b867244c9949161b22a96f12832d6aa6268e7

                                                              SHA512

                                                              250f0b42ef76c95f0bd0f0989ea5eea4f4b4b540f2210e5770bcc300c2a169020114899d207ad42b52f192de0591177f67202409c425c5b694b05171f2ba6b85

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\datareporting\glean\db\data.safe.tmp

                                                              Filesize

                                                              5KB

                                                              MD5

                                                              b5150dcec45c6933480455091318ab70

                                                              SHA1

                                                              d1f37562494b4c313e782fda0809fb9d3b7b9fa4

                                                              SHA256

                                                              3940ced2193f08c7fdb75dc335454cc7877fcb209ed4467fe542f8a05b21f006

                                                              SHA512

                                                              e9f4b02e92843f407ffc8f722d4e1ae7fd0b0723dde6dc23aae03fce0694ac6cac4b8973077f34c85254d2e8aca3c660c692b38e57641b408998fc6c7184d38c

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\datareporting\glean\pending_pings\0744109e-1b4f-4ecb-b0da-80845bef61c4

                                                              Filesize

                                                              671B

                                                              MD5

                                                              a6a8afecce336d73ae44b6987e27fd73

                                                              SHA1

                                                              eb7024437c5a23c6b0335ad7ec9105e4b4ce4655

                                                              SHA256

                                                              89c16edd1fb076f90469d548579ad0e3f790abad34edc362bcedb2b1470eb829

                                                              SHA512

                                                              c5c15671dd87e8654d415e1a4c8b703e1afe0bda139b34fa265d6d0ebdd5573967a5e878817090783525494374166d727935a95c5e166121ae1f733cfc573029

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\datareporting\glean\pending_pings\68b69a44-a693-4e9d-aa4e-b0e7f4243d36

                                                              Filesize

                                                              982B

                                                              MD5

                                                              2362ec75f88cedf8b0e277e1f7899f4d

                                                              SHA1

                                                              d87df954dbc59c40d3c01ce7910e5068afbe380c

                                                              SHA256

                                                              6799dc0a496aac76669979fb0900a16fec310ce420e5d719ca586c05f6ad197e

                                                              SHA512

                                                              214bcb31dc25cc15de5f3e32796473db1967a62eb0eeec751f5ec173fcdabbee138d13e44159c39a93a01a510b87b240c0d779c56b5017e94b56a1be273e9dac

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\datareporting\glean\pending_pings\d903f0e9-a2b6-4cac-b64c-d43e75e8cd57

                                                              Filesize

                                                              26KB

                                                              MD5

                                                              c24bb5996c90a23a693126a303240234

                                                              SHA1

                                                              73d24a5125e7ff2ed56db56def1fb41f1b6126b9

                                                              SHA256

                                                              273a798df8d9cb07ab1e2d10b58257a183dc7d6b8391ffd9bdaed5d741bf5cb7

                                                              SHA512

                                                              83e8b085f9f42fea0259a439995d24ad8d8187d79548e963ff57e36298541711204bf7c222ec37ba60ce7a334f7cab27924155b0418b5c70e591921a771660f4

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                              Filesize

                                                              1.1MB

                                                              MD5

                                                              842039753bf41fa5e11b3a1383061a87

                                                              SHA1

                                                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                              SHA256

                                                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                              SHA512

                                                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                              Filesize

                                                              116B

                                                              MD5

                                                              2a461e9eb87fd1955cea740a3444ee7a

                                                              SHA1

                                                              b10755914c713f5a4677494dbe8a686ed458c3c5

                                                              SHA256

                                                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                              SHA512

                                                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                              Filesize

                                                              372B

                                                              MD5

                                                              bf957ad58b55f64219ab3f793e374316

                                                              SHA1

                                                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                              SHA256

                                                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                              SHA512

                                                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                              Filesize

                                                              17.8MB

                                                              MD5

                                                              daf7ef3acccab478aaa7d6dc1c60f865

                                                              SHA1

                                                              f8246162b97ce4a945feced27b6ea114366ff2ad

                                                              SHA256

                                                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                              SHA512

                                                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\places.sqlite-wal

                                                              Filesize

                                                              1.1MB

                                                              MD5

                                                              dbcd7fcbe05f0096cbd13d4f513f2f9c

                                                              SHA1

                                                              a7c1f3aee77c24b39df8544bb819377cf29b387b

                                                              SHA256

                                                              6248c27a34661cc66c88382474dc888e40076721517170b7e40b351eb2a7061e

                                                              SHA512

                                                              fa718d16a4e9c3e156c987bb80cd62a61e814643ddc7ecd2134e7b37e159c866f75ceb1c6b4c9c879e409633f3a5ef435c4330068e64c1f497bed893e024f2cb

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\prefs-1.js

                                                              Filesize

                                                              15KB

                                                              MD5

                                                              3779cbd0ee025aba331778905ff2b7d8

                                                              SHA1

                                                              4dafb970c42beed363254af07ab2337771194d57

                                                              SHA256

                                                              5834080381e83df28635554d2d35484d60f4c38bfdc7ebe4f48100104303b377

                                                              SHA512

                                                              20789c69c114f95b85316dfb69dbdc15c8963dba622b61d529c3a2ce79a4b6fbd1292eb23e3a93dfc2e171214bb51b223d967ad44976d43d936b6365973beaac

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\prefs.js

                                                              Filesize

                                                              8KB

                                                              MD5

                                                              1607145715c463290edfd0e61b11308a

                                                              SHA1

                                                              f773481f8dc9dc7e8466654ec4fabc52f8c7db88

                                                              SHA256

                                                              6e3a50171483a6fba71bca8533d9fb7bf2b084197a4394284322c80c2ab99aa2

                                                              SHA512

                                                              88e67c5cd4b992f1a0719cb993aee149e466a55417ff449dff5c971618cbaa672780a568701683b4da003ce2b52bb67c0f7538ea14bbe053ea1c318f73abb6fd

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\prefs.js

                                                              Filesize

                                                              10KB

                                                              MD5

                                                              3424ea2c58601c6af8a949ef1ad6a8dc

                                                              SHA1

                                                              3611ab936348f042ab8336e058618bd02818b8c6

                                                              SHA256

                                                              993589393bbd64a25e47310760b0334da8a702140aee763857de8090d24e3388

                                                              SHA512

                                                              858b7374118131cb4dc9a97e9f0810ebe6a06fcd580add41e37c14b7e8bd04b71ccef9f4a54ae1d38c273b4e2ebe473bec9dcf0f0c1018db6a3603c81b5954f6

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9orreff.default-release\prefs.js

                                                              Filesize

                                                              12KB

                                                              MD5

                                                              b680e14cf385a9a0727232bde416edd5

                                                              SHA1

                                                              e229c40447823d3d95f9c476a1a4671196c508f9

                                                              SHA256

                                                              e9a80625e5d352c033b54b1cbb79895c6b38f54bb7b5becad4c958e4afdbaef3

                                                              SHA512

                                                              0f824e8478ee8fd39950b5479e7b343c5137325a09fe34f39273650625fa4070e006c75a7cdcef0392fa05e3248571f4c4b7872641719d87ac8e7fac55655c66

                                                            • memory/780-3542-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/780-3539-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1752-3541-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1752-3537-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-20-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-3488-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-3611-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-544-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-3597-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-1252-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-16-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-3569-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-3558-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-19-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-2914-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-656-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-652-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-627-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-3535-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-485-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-3533-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-3453-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-21-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-3522-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1996-3478-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2816-18-0x00000000009B0000-0x0000000000E80000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2816-1-0x0000000077A06000-0x0000000077A08000-memory.dmp

                                                              Filesize

                                                              8KB

                                                            • memory/2816-2-0x00000000009B1000-0x00000000009DF000-memory.dmp

                                                              Filesize

                                                              184KB

                                                            • memory/2816-3-0x00000000009B0000-0x0000000000E80000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2816-4-0x00000000009B0000-0x0000000000E80000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2816-0-0x00000000009B0000-0x0000000000E80000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/5500-2998-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/5500-2989-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/5660-938-0x0000000000C10000-0x0000000000E53000-memory.dmp

                                                              Filesize

                                                              2.3MB

                                                            • memory/5660-580-0x0000000000C10000-0x0000000000E53000-memory.dmp

                                                              Filesize

                                                              2.3MB

                                                            • memory/5660-583-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                              Filesize

                                                              972KB

                                                            • memory/5776-467-0x0000000000400000-0x00000000031D3000-memory.dmp

                                                              Filesize

                                                              45.8MB

                                                            • memory/5776-484-0x0000000000400000-0x00000000031D3000-memory.dmp

                                                              Filesize

                                                              45.8MB

                                                            • memory/6524-2990-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/6524-2923-0x0000000000650000-0x0000000000B20000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/6640-521-0x00000000003E0000-0x0000000000890000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6640-543-0x00000000003E0000-0x0000000000890000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-3486-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-798-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-3559-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-3552-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-2323-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-3534-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-3463-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-2332-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-3593-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-3516-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-545-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-3430-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-3608-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-3523-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/6800-3612-0x0000000000280000-0x0000000000730000-memory.dmp

                                                              Filesize

                                                              4.7MB