Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2024 20:05

General

  • Target

    52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exe

  • Size

    5.7MB

  • MD5

    bf1880424137bb4f4953ae6dd6600309

  • SHA1

    48df32badd49c835b4ea075ff1dafcb8df9452cf

  • SHA256

    52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181

  • SHA512

    780fc2b8da38815fe4d31d9a20c3bdf4bed49effefc8792110415681671be32af7b1f085a6d553e3f74534baaf1c5437370ea6bdc75e033f2cffb171f49b1dc6

  • SSDEEP

    98304:oRoJaep2/Zs+AKXEUovMEp1O8LkDJp9PDbxb8SJlaSdD0TtbzlaZAkKjiJgAkb:o6Jaep5KXE/vMzdJPpdaSp05bzlhkkYU

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 17 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exe
    "C:\Users\Admin\AppData\Local\Temp\52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N2A33.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N2A33.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e2p28.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e2p28.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u96i1.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u96i1.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4604
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4252
            • C:\Users\Admin\AppData\Local\Temp\1005956001\31a8afa0d1.exe
              "C:\Users\Admin\AppData\Local\Temp\1005956001\31a8afa0d1.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:3492
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                7⤵
                • Uses browser remote debugging
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                PID:6068
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x168,0x144,0x16c,0x7fff6cf5cc40,0x7fff6cf5cc4c,0x7fff6cf5cc58
                  8⤵
                    PID:1484
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2044,i,3458052108166903279,16064809248295458153,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2040 /prefetch:2
                    8⤵
                      PID:4504
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1840,i,3458052108166903279,16064809248295458153,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:3
                      8⤵
                        PID:6056
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2328,i,3458052108166903279,16064809248295458153,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2476 /prefetch:8
                        8⤵
                          PID:3152
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,3458052108166903279,16064809248295458153,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:3596
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3224,i,3458052108166903279,16064809248295458153,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:5572
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4520,i,3458052108166903279,16064809248295458153,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4436 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:6156
                      • C:\Users\Admin\AppData\Local\Temp\service123.exe
                        "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                        7⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:6040
                      • C:\Windows\SysWOW64\schtasks.exe
                        "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:5968
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 1924
                        7⤵
                        • Program crash
                        PID:4932
                    • C:\Users\Admin\AppData\Local\Temp\1006034001\mk.exe
                      "C:\Users\Admin\AppData\Local\Temp\1006034001\mk.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:1144
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pbra.lnk'); $s.TargetPath = 'C:\Users\Admin\AppData\Local\Temp\1006034001\mk.exe'; $s.Save()"
                        7⤵
                        • Drops startup file
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2432
                    • C:\Users\Admin\AppData\Local\Temp\1006043001\71f1bcf274.exe
                      "C:\Users\Admin\AppData\Local\Temp\1006043001\71f1bcf274.exe"
                      6⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2904
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=71f1bcf274.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                        7⤵
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of SendNotifyMessage
                        PID:1236
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x7fff7fd646f8,0x7fff7fd64708,0x7fff7fd64718
                          8⤵
                            PID:3336
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:2
                            8⤵
                              PID:6020
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3
                              8⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6028
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:8
                              8⤵
                                PID:6112
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
                                8⤵
                                  PID:6884
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                                  8⤵
                                    PID:6880
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:1
                                    8⤵
                                      PID:7488
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:8
                                      8⤵
                                        PID:7700
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:8
                                        8⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:7708
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:1
                                        8⤵
                                          PID:7812
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:1
                                          8⤵
                                            PID:7824
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:1
                                            8⤵
                                              PID:1304
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:1
                                              8⤵
                                                PID:5612
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:1
                                                8⤵
                                                  PID:6352
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:1
                                                  8⤵
                                                    PID:6308
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=71f1bcf274.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                                                  7⤵
                                                    PID:7988
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7fff7fd646f8,0x7fff7fd64708,0x7fff7fd64718
                                                      8⤵
                                                        PID:8000
                                                  • C:\Users\Admin\AppData\Local\Temp\1006044001\bff84504fa.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1006044001\bff84504fa.exe"
                                                    6⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5520
                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                                    6⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5860
                                                  • C:\Users\Admin\AppData\Local\Temp\1006046001\2ed488aec4.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1006046001\2ed488aec4.exe"
                                                    6⤵
                                                    • Modifies Windows Defender Real-time Protection settings
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Windows security modification
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:6512
                                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G1337.exe
                                                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G1337.exe
                                                4⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of WriteProcessMemory
                                                PID:2684
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=2G1337.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                                                  5⤵
                                                  • Enumerates system info in registry
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:1884
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7fff70ac46f8,0x7fff70ac4708,0x7fff70ac4718
                                                    6⤵
                                                      PID:468
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
                                                      6⤵
                                                        PID:3176
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
                                                        6⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:4620
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:8
                                                        6⤵
                                                          PID:4432
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1
                                                          6⤵
                                                            PID:872
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
                                                            6⤵
                                                              PID:4368
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:1
                                                              6⤵
                                                                PID:3760
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:8
                                                                6⤵
                                                                  PID:5732
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:8
                                                                  6⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:5884
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1
                                                                  6⤵
                                                                    PID:5896
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:1
                                                                    6⤵
                                                                      PID:5904
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:1
                                                                      6⤵
                                                                        PID:5080
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:1
                                                                        6⤵
                                                                          PID:232
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:1
                                                                          6⤵
                                                                            PID:2296
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:1
                                                                            6⤵
                                                                              PID:5724
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=2G1337.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                                                                            5⤵
                                                                              PID:4992
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7fff70ac46f8,0x7fff70ac4708,0x7fff70ac4718
                                                                                6⤵
                                                                                  PID:208
                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3F58S.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3F58S.exe
                                                                            3⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:3444
                                                                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U203o.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U203o.exe
                                                                          2⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:4600
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM firefox.exe /T
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:868
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM chrome.exe /T
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:6544
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM msedge.exe /T
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:6720
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM opera.exe /T
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:6792
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /F /IM brave.exe /T
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:6852
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                            3⤵
                                                                              PID:6916
                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                4⤵
                                                                                • Checks processor information in registry
                                                                                • Modifies registry class
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:6932
                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2004 -prefMapHandle 2000 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f97010e5-1cd3-4ed5-a0fe-942f2fcc0eed} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" gpu
                                                                                  5⤵
                                                                                    PID:7108
                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82550509-8c64-4dd2-a296-96f2b9928174} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" socket
                                                                                    5⤵
                                                                                      PID:5328
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3052 -childID 1 -isForBrowser -prefsHandle 2848 -prefMapHandle 2996 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ff695d3-1dd6-478f-ae5b-293a1611f585} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" tab
                                                                                      5⤵
                                                                                        PID:5072
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2792 -childID 2 -isForBrowser -prefsHandle 3992 -prefMapHandle 3988 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1cf1c63-2656-4b93-97b2-23877714d4a6} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" tab
                                                                                        5⤵
                                                                                          PID:3596
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4736 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4728 -prefMapHandle 4724 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9942644a-a097-4b1a-9cf1-55ee62d8af57} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" utility
                                                                                          5⤵
                                                                                          • Checks processor information in registry
                                                                                          PID:7392
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5276 -childID 3 -isForBrowser -prefsHandle 5284 -prefMapHandle 5288 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {95ce1160-9be0-4d72-88d3-e972ce9f3636} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" tab
                                                                                          5⤵
                                                                                            PID:8128
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 4 -isForBrowser -prefsHandle 5456 -prefMapHandle 5464 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bde2e771-0409-44f1-8dab-bb0fb2d02ee3} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" tab
                                                                                            5⤵
                                                                                              PID:8188
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5720 -childID 5 -isForBrowser -prefsHandle 5640 -prefMapHandle 5644 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e8197447-aec5-4195-9e1f-2ac80d226468} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" tab
                                                                                              5⤵
                                                                                                PID:5584
                                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                        1⤵
                                                                                          PID:1040
                                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                          1⤵
                                                                                            PID:4300
                                                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                            1⤵
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:5260
                                                                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                            1⤵
                                                                                              PID:6148
                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                              1⤵
                                                                                                PID:7200
                                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:7268
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3492 -ip 3492
                                                                                                  1⤵
                                                                                                    PID:6752
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                    1⤵
                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                    • Checks BIOS information in registry
                                                                                                    • Executes dropped EXE
                                                                                                    • Identifies Wine through registry keys
                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:6204
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Loads dropped DLL
                                                                                                    PID:1828

                                                                                                  Network

                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                  Replay Monitor

                                                                                                  Loading Replay Monitor...

                                                                                                  Downloads

                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                    Filesize

                                                                                                    2B

                                                                                                    MD5

                                                                                                    d751713988987e9331980363e24189ce

                                                                                                    SHA1

                                                                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                    SHA256

                                                                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                    SHA512

                                                                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                    Filesize

                                                                                                    152B

                                                                                                    MD5

                                                                                                    ba6ef346187b40694d493da98d5da979

                                                                                                    SHA1

                                                                                                    643c15bec043f8673943885199bb06cd1652ee37

                                                                                                    SHA256

                                                                                                    d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73

                                                                                                    SHA512

                                                                                                    2e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                    Filesize

                                                                                                    152B

                                                                                                    MD5

                                                                                                    7cd657689252f6e187103461e20f5b3c

                                                                                                    SHA1

                                                                                                    b7d25c41cf8647eed146807514ccd3e1a0346925

                                                                                                    SHA256

                                                                                                    de848323f395a0ebaff3073ac825f9b84aeb4855d95197f27881377d13cff032

                                                                                                    SHA512

                                                                                                    0245dd348ed45fd9fe1419868ae5c44a561cbf6d2f17ba8d51100951910c0c861d4e6d80b00e3d784e25472e48d7be11c9000b75e3a1d91af1b7dd68afb30a24

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                    Filesize

                                                                                                    152B

                                                                                                    MD5

                                                                                                    92b7ee90cb6ee71d3e49153ff23c6ed6

                                                                                                    SHA1

                                                                                                    868fae0e4d4169e57991c90123d7ac17dffbb0d7

                                                                                                    SHA256

                                                                                                    ed23a79b8fd86a47c392d5426b2377d01e2c653d8a0af6f8b6310be230ffd6f5

                                                                                                    SHA512

                                                                                                    74ec22f8beef2c0feefc4b3f9e261f69816b690e214d757fbffd830d51552284daa513fff83eddb60d066ac8dea7b7382e4b90f44b12aaf7461da204f7857cab

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                    Filesize

                                                                                                    152B

                                                                                                    MD5

                                                                                                    b8880802fc2bb880a7a869faa01315b0

                                                                                                    SHA1

                                                                                                    51d1a3fa2c272f094515675d82150bfce08ee8d3

                                                                                                    SHA256

                                                                                                    467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812

                                                                                                    SHA512

                                                                                                    e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\78753b88-bc8b-4703-8a90-c8333a7b49fd.tmp

                                                                                                    Filesize

                                                                                                    1B

                                                                                                    MD5

                                                                                                    5058f1af8388633f609cadb75a75dc9d

                                                                                                    SHA1

                                                                                                    3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                    SHA256

                                                                                                    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                    SHA512

                                                                                                    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                    Filesize

                                                                                                    264B

                                                                                                    MD5

                                                                                                    d12730a98818117a29286ee794138626

                                                                                                    SHA1

                                                                                                    805bc031a65a1240130912fd5d0652b8ca17b335

                                                                                                    SHA256

                                                                                                    76d442af43a20eea1478ad8d38d1f1246ea2869c8d95eb20c16ebe69f663a916

                                                                                                    SHA512

                                                                                                    ebd837cad8f0fdc251ca62256ac18e58df11929ce719699a4a452cb0bd2d466af9cd00ded6098c88cdf539c3b76e7bd7e33824e92de3d5c4234fe29769c01bd3

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe58a16b.TMP

                                                                                                    Filesize

                                                                                                    264B

                                                                                                    MD5

                                                                                                    f07d3f0fa86e58f474b05e5efe754f6a

                                                                                                    SHA1

                                                                                                    bf3bc95a8826ce36891e144a7df548973eac3365

                                                                                                    SHA256

                                                                                                    6cb1cc4be4eb89a42e966e30e5c6d195e0d105e7abb4b713afdf2120c39d1dcd

                                                                                                    SHA512

                                                                                                    e4c035d162d78149ae68700b64cbd64493b9c7d049f5b02559354180b56cb33ae377372d1c47214479a96feed8cbcb7e35235f85b86e533d88e301663f2d96b1

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Favicons

                                                                                                    Filesize

                                                                                                    20KB

                                                                                                    MD5

                                                                                                    a5315a8673db12b2b13470e6fb5b8a51

                                                                                                    SHA1

                                                                                                    8f267dcb29becf6d9540c4985252f890b106c8e5

                                                                                                    SHA256

                                                                                                    7373ed0b876682f210d19b946f703163ca16935a9977f93299d2d7a9c1a2bfea

                                                                                                    SHA512

                                                                                                    91da122e8b66b0dbb13c1835638850fbbe7bcc9af06b98f012bec3adba8943e7342138164d00eb6cb7cd768e0ced8e63150a26858f8f589a45c3107dc44438b8

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                                                                                    Filesize

                                                                                                    124KB

                                                                                                    MD5

                                                                                                    ddca4c0c32fb6a8b5b235ebc07e37108

                                                                                                    SHA1

                                                                                                    5ac683d30d7f02fdde63e7917d9fa0bbdfacd540

                                                                                                    SHA256

                                                                                                    158444f891745dbe8a48e686afb288b05858b3d0ec9607db998e3b58e4c02ac8

                                                                                                    SHA512

                                                                                                    4d17b2ada0e8826c66078007a04e4de5cea270ba4435e612532e7adb34e925ed3a2b972fd93d142d4307a69e099b53e0881b7dc99116dffe537f4e231bf5d2ad

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log

                                                                                                    Filesize

                                                                                                    36KB

                                                                                                    MD5

                                                                                                    dbc9c6580e7d2d02f2a0b8803e399c71

                                                                                                    SHA1

                                                                                                    a1e18e85a66e83e137ee439058ae7f6ca6676a58

                                                                                                    SHA256

                                                                                                    ca17a1c744647e20001a24d52dd462d3cd1e1ef3f0dc54b528724810c7e7fbcc

                                                                                                    SHA512

                                                                                                    d1dd0ff67cce331b69302c33ea9117a7c10b52e96ebbf9dab0c44c6a9394dfa6daccc85271aa7a182ac162e55c76bf1f541808593465a2cb3e5b7488c52f2f94

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG

                                                                                                    Filesize

                                                                                                    331B

                                                                                                    MD5

                                                                                                    95cb22eb5d5a4549d498cf2d16f3a204

                                                                                                    SHA1

                                                                                                    17b3b30f22f3b311ac3152ac6d2272a0aa916643

                                                                                                    SHA256

                                                                                                    04f365ae45eb88c738d93a6563e7cc2762bbc66828fba910f1ccfa65c22232f3

                                                                                                    SHA512

                                                                                                    6c5169e64d929548d8da4fd3eff64aa697d8e3de0c3d23fc2e583d70a8edeacea10b96e2ee3b6a2e1898606c9a7e419362c5898fcec429ff58b6348d366c1ba8

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                    Filesize

                                                                                                    111B

                                                                                                    MD5

                                                                                                    285252a2f6327d41eab203dc2f402c67

                                                                                                    SHA1

                                                                                                    acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                                    SHA256

                                                                                                    5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                                    SHA512

                                                                                                    11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                    Filesize

                                                                                                    278B

                                                                                                    MD5

                                                                                                    df4c07bb6b92f41c32734bc470c29e41

                                                                                                    SHA1

                                                                                                    c3722967e791730863f6a2107c0379ca9c2be826

                                                                                                    SHA256

                                                                                                    468a71139ea54b5e9fa2f8b50e66da8dfbcf55cd4d5d69cf5c316292198eb2bd

                                                                                                    SHA512

                                                                                                    d9ec6aa803f1763df2ab60bf30817ae23334ccdf2e322c71e333ace06cd4543428ad3a305a9c0d6cfe1b8f835068372f476a156475ab63c8f86b6baa96ff84c1

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    ae126c64948882dbe83686b6e3aca370

                                                                                                    SHA1

                                                                                                    6606af5f4e4a08af08862f105fde934e2dc010e7

                                                                                                    SHA256

                                                                                                    168c08e42598939faa686f0213193dff25407866e929ba1d905f7ea7cc25a655

                                                                                                    SHA512

                                                                                                    28b24554fd8b2fa9bf8fb7e642cfc5b82b6b52104874f50657ea1a6b38fe581fc44da9929300a2d65c50d0eb2447f24c5526318d692cb6f5cd21bfa59e6074e3

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    f4985fd2dbaf9411a7a9682e0215b5f7

                                                                                                    SHA1

                                                                                                    0f6214d87407fb13abe7824973bafcaef46a7a30

                                                                                                    SHA256

                                                                                                    a7ebb2eddc9a7da9a2cc8f86da4581476de485ed3342d399a978be6f1433ec1a

                                                                                                    SHA512

                                                                                                    eadbd3c132c9428aa7744a0b29a38b46632017f49886ba4df90f30e569b0888944c25898ea913e54b7e2e1d21350187af0eee2430ec00563fc0b75382c5249ff

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    5KB

                                                                                                    MD5

                                                                                                    0e426e40ea0c14e218a2508fc4e3e771

                                                                                                    SHA1

                                                                                                    92d55a917dbf271ff32a53483f1bd62245544951

                                                                                                    SHA256

                                                                                                    efcaa6b52bdc594fc62b9f74694fc046aa25dc7879c8062b036dcf114d15b929

                                                                                                    SHA512

                                                                                                    be351ba1bf39d88fde7e94bb21992c735c78832e3eadf7d862b94529288dfd24a6841f496dd3522ad9c9a6930237ef1042856a5d2ac915d3045b924963cac36c

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    7c69e0020f1711b442cc6fdb3df6550b

                                                                                                    SHA1

                                                                                                    3f6f90763237185c8932e781b8b4952fbf9bf756

                                                                                                    SHA256

                                                                                                    94fe33d2969938371a8b12c49f4434a842ef27f4a831e17cd3fd65c6da6908e1

                                                                                                    SHA512

                                                                                                    be4297ef96ddbe8db2a7893b790672ba6227407778dd879686955cd30032aaacacec97b50f3b0c61eccdf171a013436e6b06aa9ec73a4350f0e50d16b96fb441

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13376001954890188

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                    MD5

                                                                                                    a4095e385edc12ee2f76aac18cb84f1a

                                                                                                    SHA1

                                                                                                    dedbabaaa712be566b7d756821b8c2e263ace123

                                                                                                    SHA256

                                                                                                    7bfb42a148c4e737f66ca87754eb421585d6ba68d3203ce486fc89790625d439

                                                                                                    SHA512

                                                                                                    700c9d5a238255c0c6da66ce96f59a031fda349b58f7df6451d4bd64d692e0f1d892bba1ec5a77621d62a39d71e220ca0a9930efffde876e31e6904f566cc9b3

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Tabs_13376001954886188

                                                                                                    Filesize

                                                                                                    933B

                                                                                                    MD5

                                                                                                    3d5c783dfa948900545f714c91c40ea4

                                                                                                    SHA1

                                                                                                    681ba6d1ae972c8a592c4553427cd2a7304a77b2

                                                                                                    SHA256

                                                                                                    730f5600395a85554a7cff0c50301611358607bf2947edd779b80eed26f96be5

                                                                                                    SHA512

                                                                                                    2bb80cb4c78660b756e13099dc06c0e9bf6152abc3a2945209aa07854cda3722447fc5fc85948948e067278959829e48bd27c7bd704f85d1691db2715cbd4444

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG

                                                                                                    Filesize

                                                                                                    350B

                                                                                                    MD5

                                                                                                    613d499f7c920b3726b64c76a18dc405

                                                                                                    SHA1

                                                                                                    ada8f2358f62a09c0294b5f4e5fa2b98b031231e

                                                                                                    SHA256

                                                                                                    6cb62f8cffc635c80e66e271d1d935ee0471dd6587ddbfdfb2312b8a71e25343

                                                                                                    SHA512

                                                                                                    254e7ae7c26200d4ea99025622a3bc2167ff38c7d590282fb9599df9d2efee6f2e2531ce2f13036f21a696fdce332beb2f61c10900a59ff18b56ac457a38e8c3

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG

                                                                                                    Filesize

                                                                                                    323B

                                                                                                    MD5

                                                                                                    fc19ffa7e3240cc5fdaad277cb48e02d

                                                                                                    SHA1

                                                                                                    a13474cccd9fb29ea23e5c49b1dce62044ea3eb3

                                                                                                    SHA256

                                                                                                    b70840ef2477cb3b963dd4576b4d72cdd7d950398df73fe7bbed9553f2f2794d

                                                                                                    SHA512

                                                                                                    50cd6802bd02ffa4a8652967a9beb3512ee46408fcbbed92484e42ae13384bfd0e8a628577c81ed957da798c03179e6d119548c8f9d6e1dec67c9df5729c8755

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                    Filesize

                                                                                                    371B

                                                                                                    MD5

                                                                                                    f61ac346e692355305c8fc7fae4a864d

                                                                                                    SHA1

                                                                                                    30787f4ff79316901d889f0d5da8e738dd868e8b

                                                                                                    SHA256

                                                                                                    712d6bc9d1cddba84565afaa41e0aaa0cccaf1f24ddaa000e64e4e6f27923bc4

                                                                                                    SHA512

                                                                                                    e44a3faef14c28a9ab656fcf7454c857fc1298eaecb5ad21297567705970fce42a30c8c79a3865e68b0839668fec9cd403bc72964d530f089511702c66c00999

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                    MD5

                                                                                                    e08a05de7103b4548b40eb43ed93ed79

                                                                                                    SHA1

                                                                                                    d61ad2d28bbac68916e6e8516b3c554e2f672f5f

                                                                                                    SHA256

                                                                                                    6f09f57a37707d518e4fa038f361867731c21d54dc0554a618cb4f1bf33b3ee0

                                                                                                    SHA512

                                                                                                    5eeb4f58c40b08329be6f4170d8f54101ade880021aa3640cf5a11159a6b0c15d262eb639903dc54ddeb4b6222c183006859c189144e191430cf4f037eced6c3

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                    Filesize

                                                                                                    16B

                                                                                                    MD5

                                                                                                    aefd77f47fb84fae5ea194496b44c67a

                                                                                                    SHA1

                                                                                                    dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                                                                                    SHA256

                                                                                                    4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                                                                                    SHA512

                                                                                                    b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                    Filesize

                                                                                                    16B

                                                                                                    MD5

                                                                                                    6752a1d65b201c13b62ea44016eb221f

                                                                                                    SHA1

                                                                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                    SHA256

                                                                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                    SHA512

                                                                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal

                                                                                                    Filesize

                                                                                                    225KB

                                                                                                    MD5

                                                                                                    144e11e55b20e606040541f7eac66c77

                                                                                                    SHA1

                                                                                                    8199fcdd41cf436dd8c7169eb509bc29c5db3f89

                                                                                                    SHA256

                                                                                                    8ef44bbf58322ed3134efd3db792441aba09f35a812fab28c633f1fe78fbd829

                                                                                                    SHA512

                                                                                                    41d07340044b882140a15061770059746d90f1343837d6354fe14b42539bff2e0307fd5ff577235952a5915981cc43085ad6bc691bfde8cf734866f852d3f667

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG

                                                                                                    Filesize

                                                                                                    337B

                                                                                                    MD5

                                                                                                    45d44b0b818b7857efe536e98801e624

                                                                                                    SHA1

                                                                                                    c4d90ec8a580c3f86441740c3e542f4f0f2c2883

                                                                                                    SHA256

                                                                                                    10740489206a27ee1d54bd7b50a2540fe60f039e012c42586fb583e925bd2d9d

                                                                                                    SHA512

                                                                                                    30790a45bf7f9a8893d066b55cec0b02177e36f57218d3c19cf45085f2f2d48eab5319a5d1c4bd97ce34e667f67a99ac989d755de09f6be4bf631eb0f5991bf3

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Version

                                                                                                    Filesize

                                                                                                    11B

                                                                                                    MD5

                                                                                                    838a7b32aefb618130392bc7d006aa2e

                                                                                                    SHA1

                                                                                                    5159e0f18c9e68f0e75e2239875aa994847b8290

                                                                                                    SHA256

                                                                                                    ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                                                                                                    SHA512

                                                                                                    9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                    Filesize

                                                                                                    10KB

                                                                                                    MD5

                                                                                                    00902a383c82f44de9714ded2c691034

                                                                                                    SHA1

                                                                                                    5716e41584823ee486ae2159efb01f3be42b248e

                                                                                                    SHA256

                                                                                                    c521e5b82c0a3b3d4212d298bc9b6383f407171060a953c8806873a1a4f853c4

                                                                                                    SHA512

                                                                                                    ff3a5e894e8a46074b9c437b7f637242e7b8233a28dd5101c46c8b966608c34d69604b2e8c0d59afb7d1e3ec10262a23efa3be8398ee5a66af840a5ec238a36b

                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json

                                                                                                    Filesize

                                                                                                    22KB

                                                                                                    MD5

                                                                                                    d001e9d459727a1de168b5dc9d59b333

                                                                                                    SHA1

                                                                                                    87d8b5417372d7bad6f1c15150de1a52fce2c714

                                                                                                    SHA256

                                                                                                    a3578b83ff23bdb5ef6994122d457310f40dbf791073cd65d44c12ef2e990e53

                                                                                                    SHA512

                                                                                                    3d216d2c4e4352f3e3fa8f1416667f79cb3bf2ae8e9c06470a5b4ad4c9d5ff7542409696ab4ff6fb097201f0628bd8a6e8876dcb70c2f264c35c8e5beaa69aa7

                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                                                                                    Filesize

                                                                                                    13KB

                                                                                                    MD5

                                                                                                    c383531b623e1590d7790076ea5d8d8e

                                                                                                    SHA1

                                                                                                    b990c4ba72ae7c8b10ea7240c14dec0eb7323b3b

                                                                                                    SHA256

                                                                                                    44501b969e900c703a07271713433b956918812b8e314356aecba9ddf25993fc

                                                                                                    SHA512

                                                                                                    d68a75f415db7f6f198a792f2cd49580d6038c365ab542556a1617174831308b708754da3a5948d47390c4742c5691f5603f1269a9876cda22a36eb615244407

                                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                                                                                                    Filesize

                                                                                                    13KB

                                                                                                    MD5

                                                                                                    ec16be641fe2876531dec9dbf48c9ccc

                                                                                                    SHA1

                                                                                                    67abd05b8fd833561407af27b944cc7ea9644649

                                                                                                    SHA256

                                                                                                    e65ba5a4f81fa67b9e5cde0f2b01c83a24d08768a1064b4cbe2da509d871482b

                                                                                                    SHA512

                                                                                                    3b2503b6b405bb47de36480be13613f9c73f9a1404d9364ac0b12f10d435e2640ae4bf84b73f028b5d8a39c7fcec9a483e56190e868643ccb4a1bbb5319c4787

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1005956001\31a8afa0d1.exe

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                    MD5

                                                                                                    77eb79a7af5d8cdd242f7f9dba533963

                                                                                                    SHA1

                                                                                                    f89c650c1587dc8f983f9639536c4ef00032b6de

                                                                                                    SHA256

                                                                                                    650d696c30ec972a17a803a58db66bf671628124eedfd06101224958d47e4808

                                                                                                    SHA512

                                                                                                    c77e7f2c740321b4b079e984e7df1f3968f487d7d01efee875b82af378f0da9f80601198b8a7dd7fd6c3ae4ea8591a03202d10ade319e97ae15d214799c3ae02

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1006034001\mk.exe

                                                                                                    Filesize

                                                                                                    8.9MB

                                                                                                    MD5

                                                                                                    b56761ad16c0e1cdd4765a130123dbc2

                                                                                                    SHA1

                                                                                                    fc50b4fd56335d85bbaaf2d6f998aad037428009

                                                                                                    SHA256

                                                                                                    095a2046d9a3aeeefc290dc43793f58ba6ab884a30d1743d04c9b5423234ccdd

                                                                                                    SHA512

                                                                                                    26c82da68d7eef66c15e8ae0663d29c81b00691580718c63cdb05097ae953cbe0e6ac35b654e883db735808640bc82141da54c8773af627a5eaea70b0acf77ed

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1006044001\bff84504fa.exe

                                                                                                    Filesize

                                                                                                    1.7MB

                                                                                                    MD5

                                                                                                    f8d1d73a4b017ae508ee5172f7601906

                                                                                                    SHA1

                                                                                                    6feb8b7fa058b1f818ea2b2485b8435d87b218c6

                                                                                                    SHA256

                                                                                                    4688b875a5efc11c995747658f96f517bf06631e4ab4a1c05d0718abdc33e5fe

                                                                                                    SHA512

                                                                                                    1365b7dda13edae170c5022828edcfd708f5378d8fc83ba07433a2094e7137c1fdf47e18bf387d481ae2610b3ce13eacd8e6e9fcb63b4423f39536c4bd631e7a

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1006046001\2ed488aec4.exe

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                    MD5

                                                                                                    39307db79b786d76d1b6070fec77bc0b

                                                                                                    SHA1

                                                                                                    54546d19873479cff3fc1ba00a77c9433612c8d6

                                                                                                    SHA256

                                                                                                    c6051a76f472b570bf9eb2a80faa638d370e415f0c7904ba4c4c044d673db69b

                                                                                                    SHA512

                                                                                                    0da1eee41b9dd08c85f8809427e30bff86da2f811f5be29d0aefb951b377408b0a4899b25efd6d9f24d3c69be193a8adc465d18590d6f81a8df865fc68a75125

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U203o.exe

                                                                                                    Filesize

                                                                                                    898KB

                                                                                                    MD5

                                                                                                    bc85ba0b82704f21ce658beb946953e6

                                                                                                    SHA1

                                                                                                    44901023eb719c38bb46d4a332ce6be193e52833

                                                                                                    SHA256

                                                                                                    5b849304801df38fc27b0815ffb76af4a5fb2cc28d57234d5421de65e46a64f6

                                                                                                    SHA512

                                                                                                    7fe40055c7127292e1271ccdcc5fb5e7fa83fa44d68d2a61242c45d45e6f67dac9e105a940d36b694197c591d89fd72084a59b5027db9fc6f1e9e8924808be35

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N2A33.exe

                                                                                                    Filesize

                                                                                                    5.2MB

                                                                                                    MD5

                                                                                                    3ac5525893c5aba53b452419e783f4e3

                                                                                                    SHA1

                                                                                                    bdc6bd46feb91e733678e61d16debbd9aa602f6c

                                                                                                    SHA256

                                                                                                    8e74eaf572eef39248dc314d4407ecc2bfd58c12f4f7c89029c843e3dfd59d8e

                                                                                                    SHA512

                                                                                                    69bc1dd7e88c10133f9fb072c56f56940add9efc5ca71c8a9d474d3fc8bc4a1b5ab0f19174704d715c24066388026a347cda040f0297c5b7e1dd368a4d70bb03

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e2p28.exe

                                                                                                    Filesize

                                                                                                    3.4MB

                                                                                                    MD5

                                                                                                    98c81981f744f96c818ba5ffb7a48962

                                                                                                    SHA1

                                                                                                    3630fc24907ed8b0005ce4d091eedacbb5fe1c3b

                                                                                                    SHA256

                                                                                                    be9c00e775c6aa400ebf21d75ce14c69dfb49557b2f3ed05d5f7430e4bd553f1

                                                                                                    SHA512

                                                                                                    b59c070963f11fb1708ca357ea0b28a320c829bab4ab59e3ca72b1da7d43b96e16d0b1e0c8fa3dcb2796a16b4c2275ff9735b48d7d6cbccb3f67419a460230ab

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u96i1.exe

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                    MD5

                                                                                                    0a25084685b54b88100d89d2bf1fb4de

                                                                                                    SHA1

                                                                                                    5a67610f98d718816fc87ddb0c07bec46e0fd272

                                                                                                    SHA256

                                                                                                    febbb41378c5839064c6449c9b827d5f86cd5d3d162798e30a365c50f217a1fd

                                                                                                    SHA512

                                                                                                    d9dd3e961b48ef0989d65d73b4726e15f5773d4075527a1fdc7e4a8a1bd94a0bb8317dfe039f15d0e97642e78d0388bfc19a25098d416a2e1856ce522db5a2d1

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G1337.exe

                                                                                                    Filesize

                                                                                                    3.0MB

                                                                                                    MD5

                                                                                                    2eb7dd5fc174ea7ce691ba15a1e34ba4

                                                                                                    SHA1

                                                                                                    4287676addcd538c2f5f975b6f2a9e8a415f2b37

                                                                                                    SHA256

                                                                                                    6094e39d84c42971e1efba0875fa34052dc3d2cd24f8b884b383aaaf32fe3cec

                                                                                                    SHA512

                                                                                                    b98cde63c0678552966025db56a15cf211d8d79513bd9a928bfee11909490aba53ceb1135cf88647196e079430bbd878828091840ebf822251f01f4c776a4e4a

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3pj01kxo.cr5.ps1

                                                                                                    Filesize

                                                                                                    60B

                                                                                                    MD5

                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                    SHA1

                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                    SHA256

                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                    SHA512

                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                    Filesize

                                                                                                    479KB

                                                                                                    MD5

                                                                                                    09372174e83dbbf696ee732fd2e875bb

                                                                                                    SHA1

                                                                                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                    SHA256

                                                                                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                    SHA512

                                                                                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-2

                                                                                                    Filesize

                                                                                                    13.8MB

                                                                                                    MD5

                                                                                                    0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                    SHA1

                                                                                                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                    SHA256

                                                                                                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                    SHA512

                                                                                                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                                                                                    Filesize

                                                                                                    10KB

                                                                                                    MD5

                                                                                                    dfc5b8a1275b4ebea4e7a45a85c2b942

                                                                                                    SHA1

                                                                                                    94a8a70cf022f581ab5e29fa9c5a0574d5fc20f4

                                                                                                    SHA256

                                                                                                    3ed0530746cb27cfbb38a5aad093b919524401568ae33663f3ed011611f1a88d

                                                                                                    SHA512

                                                                                                    555fbab3154093dd951bdcc8e5fea2242637e43d1bbead5c434c481f93f9ce9763c9f9cbc276e898c26556f4c1c78d1d56417b729c589ad6878dcf3cb2a76eca

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                                                                                    Filesize

                                                                                                    17KB

                                                                                                    MD5

                                                                                                    ff1c0aa763884e819457f7fb43a87ce9

                                                                                                    SHA1

                                                                                                    71dad42a0412ea4a6f5c52ef5def9370ecf9a205

                                                                                                    SHA256

                                                                                                    25f7f4194f1b384ecd0cda757e6681238d8292af0862d7aa4a5b0d4df73981ad

                                                                                                    SHA512

                                                                                                    35431133546dd494006912c80b487b3f6a8739499752adf87933f731f5e8145131ed3c37b4c0873998a1cce9f506aa02513cdbee3e9cfb0a95cea8742b83628a

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    d2efe1520b1653d69944d90351c7e24c

                                                                                                    SHA1

                                                                                                    ead0da99c7f54ce5bc5b26f39b1100ffc9f9ba1d

                                                                                                    SHA256

                                                                                                    f751d41f058d6b0f4e73d53e0d759250d0295b0ea74202c5b96ed5b61d5793fe

                                                                                                    SHA512

                                                                                                    d240c3ab4a201d0ec8c93078a4c5ca90a6062eaa2f71c9970cc1a8536b8a3c91bb00c5a7594c902cba5ac87c1ce0c52f728d1ceee2cff2c6d475f84fc05fb1ae

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                                                                                                    Filesize

                                                                                                    27KB

                                                                                                    MD5

                                                                                                    fcf1e80a54f4d3b35ca852f04b543610

                                                                                                    SHA1

                                                                                                    87131a8d085540bc96ee530f41136a8583d068db

                                                                                                    SHA256

                                                                                                    30c807607cba513e534d19811d899ab6c9877706451d1d86af5c8abbe9443fbe

                                                                                                    SHA512

                                                                                                    4fb07d83a2d2ff5852314ae7199f9e0138cb101c2c82d1747eebbc249011987bcd4e3f4de2763fe44eca26b6d0ee98cb004d1ca1a989c3f23ba217e207ec73f1

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                                                                                                    Filesize

                                                                                                    26KB

                                                                                                    MD5

                                                                                                    3f39a9bad688d02bb78b7059e93c1804

                                                                                                    SHA1

                                                                                                    6fdc61cab578749344f8e595a16f94e6fefea516

                                                                                                    SHA256

                                                                                                    47ae37d5a8cbe432a91e623917d212eae5ff8426ab8b1928f4267cade552e988

                                                                                                    SHA512

                                                                                                    9e432a72976a15811e05ed16dadda96bd519531c54b0fc905a474a329b0e41415155096fb474650717762fec805fc17dc2a865e1be4e6378013fd8153d2db125

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                                                                                                    Filesize

                                                                                                    23KB

                                                                                                    MD5

                                                                                                    64260c595d3aad2b99b2cf81e5e84ad8

                                                                                                    SHA1

                                                                                                    865870291664e465c03f81a7806c91c7a9c4e1ed

                                                                                                    SHA256

                                                                                                    a95ecb051862ad4298e4e7ea9d38e5f6b8d3daf77ced54a8c599cf483f88652c

                                                                                                    SHA512

                                                                                                    c1f70a0cbcef35b0e15fc58a667c3c67e99773293692fd62b18e3fbe588c9054886bec47d04303739293870cc55493ff8d9ecee32b138d5f2ad701ed76a6e5f8

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    65ad36d91a9241fb6a98bac872cc02bc

                                                                                                    SHA1

                                                                                                    3c0d85724d38147b6b630158162546adc9ecc448

                                                                                                    SHA256

                                                                                                    25de4cbbef9926c2d4c3397d4fabbeaea5fdc353acc3e23e7d330474f6572c95

                                                                                                    SHA512

                                                                                                    8a7e04cb66a1cb7bfe2df4facf245f36c3ba53ccdb2caec3ec4c4f13df7bfcd396be6216386001854ed187571213f9f91de0fe43bac30c896e310cd7fbc25be4

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                    Filesize

                                                                                                    27KB

                                                                                                    MD5

                                                                                                    b51fcaa2fb9b8ca35b407bc6770ba8e3

                                                                                                    SHA1

                                                                                                    d0a2649db50ecb138aafcf3cc5070cec4e55af85

                                                                                                    SHA256

                                                                                                    0093e933fd2c916581ab42b56abbdda01044828499c841289bd4b18974fa9133

                                                                                                    SHA512

                                                                                                    0309002938e4f3b8ccd29f32b7f0fee553723288fef7bd98472cd8556cdd31e3abff4fb5f17ea2b3da289d0d03978ee9e9bece1f5a8950273ece31119b630a90

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                    Filesize

                                                                                                    5KB

                                                                                                    MD5

                                                                                                    43b7b398815be6d47c110287028d23f3

                                                                                                    SHA1

                                                                                                    924c0c40b7f53c99d28968dc413ef41dd09c4ddf

                                                                                                    SHA256

                                                                                                    b34367352f266b76fe6dce42c426d5c2b3e5b7dbcd183c0ef4d656b8a779b238

                                                                                                    SHA512

                                                                                                    413eebd1c6903ebc1dc6745c3542ab093486cdb9fbba8e4514e1b7bf9d19cb8116fca1bdff738bd945b16fa186eca519336607a9dce16d98764faa20d3fe8842

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                    Filesize

                                                                                                    27KB

                                                                                                    MD5

                                                                                                    b8218c575410e5743dd1a818afc35516

                                                                                                    SHA1

                                                                                                    059bfa4832fc1cb1fdc9bb9962b6d234af3b9d1f

                                                                                                    SHA256

                                                                                                    2167bc3343cab38440ea4bf1c2c9c33594e3f91bcfd3bd339e8d8fd83d546ed4

                                                                                                    SHA512

                                                                                                    6927d60518bb02323ed75b66ed8c485c56383abc6fcee4e9b3df1f809461e4baac8d65a94e92428c1914a0339310ca105fd0d46eb5a6846dfb6997ef4eb27561

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    a37b333f59d35ddcf3880e79289006c3

                                                                                                    SHA1

                                                                                                    ee8df42ec3da4b886ac8f466fe2fa9d7ad646a20

                                                                                                    SHA256

                                                                                                    f7c1eb9df2c9c45e820d5c4acf44b1c08f3d3499bd54356052abedc747aecb1c

                                                                                                    SHA512

                                                                                                    c4d7cdac7c8c6264e576f2360b19fb3ebf3a0de052cf2272276f8cc2904b781cfcb89e74f96347dbbb37e863e51478d5035e1fb479609b63c34cd32ca7a7fb47

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    8ffd2a8bbd16193646ca55f4055780d3

                                                                                                    SHA1

                                                                                                    faa0474cc82915bcf182ce0c182aa198443f3c3d

                                                                                                    SHA256

                                                                                                    48dc03f65f3fc9601e58de8f3e50ba9c2c34e3caf7b4d1d5178b2d5d803544b5

                                                                                                    SHA512

                                                                                                    723d31fa34d131b8b0d75d681f180d0dfec06a406a156a5b9880e7c2428f0cb8b8ba85b935be6d88c485d7614bc0618cc3f86bb114a2c0446c74c0a51822bffe

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\035f879a-0058-4b46-825b-10e574314f53

                                                                                                    Filesize

                                                                                                    671B

                                                                                                    MD5

                                                                                                    c20db42cf769bfd1dd3bb04ede80e329

                                                                                                    SHA1

                                                                                                    1f690e7fcaf5081499273ca38b60ddcd189896f3

                                                                                                    SHA256

                                                                                                    f1e67acc75c4372c0d8ea0dc3fdd5aa4eb76a9a924205ac764a59b0938b059b4

                                                                                                    SHA512

                                                                                                    bcc52670d68007e5e5a64d66b6bec681eb9a10c3e6be0b399549d09dc2028e1d0c2f25eece18613847dc78d6efd69d2849c163cbdefd059690c8c9e279ebb6ef

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\0914109b-6114-4693-8b54-f0cdcd36c508

                                                                                                    Filesize

                                                                                                    27KB

                                                                                                    MD5

                                                                                                    4a19adba8429b1e1168b5a4840a29849

                                                                                                    SHA1

                                                                                                    399be98413527cf514b4581911e943eaa8dcc7be

                                                                                                    SHA256

                                                                                                    eee30ecce1c01d335c15358a58e8009cf7e1aea47eb679ea825a4fc469879211

                                                                                                    SHA512

                                                                                                    60259949f179431f2c6391ee6692372f344b83c7eb247e11f92025784ef4fa099a1f2da1fbbfe107d02aa5a4cb7d0e0fce14a6d5ad1cde0afb81573d678d3465

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\dd7f73b4-7374-40d9-bca2-29c0e1725868

                                                                                                    Filesize

                                                                                                    982B

                                                                                                    MD5

                                                                                                    25952626e38c80513211cd5b712a9b46

                                                                                                    SHA1

                                                                                                    f1e817cdacb6aa219331057202c5baf707807199

                                                                                                    SHA256

                                                                                                    7f6a130bb7245ae1022934462358da7a3899a3ab182db4710a94c9aff98ab137

                                                                                                    SHA512

                                                                                                    d217c7f86fad21df37cc096c48e4719a82fad2ca2d01a130c884a4ce912231e0c0c02af456039dfe9c7bd5a542de8fb31eca3799b6f98315079710706b20c1cb

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll.tmp

                                                                                                    Filesize

                                                                                                    1.1MB

                                                                                                    MD5

                                                                                                    842039753bf41fa5e11b3a1383061a87

                                                                                                    SHA1

                                                                                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                    SHA256

                                                                                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                    SHA512

                                                                                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                    Filesize

                                                                                                    116B

                                                                                                    MD5

                                                                                                    2a461e9eb87fd1955cea740a3444ee7a

                                                                                                    SHA1

                                                                                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                    SHA256

                                                                                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                    SHA512

                                                                                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp

                                                                                                    Filesize

                                                                                                    479B

                                                                                                    MD5

                                                                                                    49ddb419d96dceb9069018535fb2e2fc

                                                                                                    SHA1

                                                                                                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                                                                    SHA256

                                                                                                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                                                                    SHA512

                                                                                                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                    Filesize

                                                                                                    372B

                                                                                                    MD5

                                                                                                    bf957ad58b55f64219ab3f793e374316

                                                                                                    SHA1

                                                                                                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                    SHA256

                                                                                                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                    SHA512

                                                                                                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                    Filesize

                                                                                                    17.8MB

                                                                                                    MD5

                                                                                                    daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                    SHA1

                                                                                                    f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                    SHA256

                                                                                                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                    SHA512

                                                                                                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    688bed3676d2104e7f17ae1cd2c59404

                                                                                                    SHA1

                                                                                                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                                                                    SHA256

                                                                                                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                                                                    SHA512

                                                                                                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    36e5ee071a6f2f03c5d3889de80b0f0d

                                                                                                    SHA1

                                                                                                    cf6e8ddb87660ef1ef84ae36f97548a2351ac604

                                                                                                    SHA256

                                                                                                    6be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683

                                                                                                    SHA512

                                                                                                    99b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                                                                                    Filesize

                                                                                                    10KB

                                                                                                    MD5

                                                                                                    a9485681e6f828678a344f7d83ec2294

                                                                                                    SHA1

                                                                                                    21a119d38fd00f1d05e8474dc7817a988d9ed84f

                                                                                                    SHA256

                                                                                                    5894fcedec8170a661642e25e896ecc5ab688f594aab447d6c30d12ccc5d018c

                                                                                                    SHA512

                                                                                                    e7e37b317da3c8d0239c8669c3a0427639166fb91a717139657938d7b34fd0338a942258f39750aa1d0d905d80a1cd5b05f8cefc65256f778c0494d5f8698124

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                                                                                    Filesize

                                                                                                    11KB

                                                                                                    MD5

                                                                                                    9beb41e3019fc358459e3884ca61dfdd

                                                                                                    SHA1

                                                                                                    9b99c16cdd8fab09c3540b8e6668099413b420a4

                                                                                                    SHA256

                                                                                                    6b02ddaa2b04a1007d77e8b3b0d6926527283015dfff0e7cfe3e5fef9d9f2ba9

                                                                                                    SHA512

                                                                                                    9329ecbee198e1502699935ba323e32669baf2607d62d1180df2a5f9614dc59fa919419b71f114c97ee9d35e7b1973cf6096d039e156f8b8485533a5519ec6f4

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                                                                                                    Filesize

                                                                                                    10KB

                                                                                                    MD5

                                                                                                    64ccb81d7f83a15349ee831976ff3791

                                                                                                    SHA1

                                                                                                    b46fd9954cef82008f65cf5e13090700bf5150e8

                                                                                                    SHA256

                                                                                                    838a512eec19b89a259849ba6ddec63955c30f18fa7abbcaa75f27e4482cd416

                                                                                                    SHA512

                                                                                                    dc2001e6cf98d48daa4ccf979f41ccfac86b194e9a749d2b09fd70ee4fece319cfd3a9f9a48186d338208803df37f7db3cdca7baec5a84576f9d323e5d00592b

                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                    Filesize

                                                                                                    1.7MB

                                                                                                    MD5

                                                                                                    c592113d763a9ad6b97bb4f9e6939ea2

                                                                                                    SHA1

                                                                                                    89320d0357dbebc65ab868d920c44529b1e75303

                                                                                                    SHA256

                                                                                                    839a6f36596e842479bb2bbca29f13924d53582eea5edc6fdfde44686311b67e

                                                                                                    SHA512

                                                                                                    61b513d4e0c30b353e24f889aabf3d94e70390c6f025c0af46968da3783edbc7b67c6f400dcc1cadce189cb867918959b617b9b519d662dc684252fb9b0b026d

                                                                                                  • \??\pipe\LOCAL\crashpad_1884_HKIKZTJPQESKMFHG

                                                                                                    MD5

                                                                                                    d41d8cd98f00b204e9800998ecf8427e

                                                                                                    SHA1

                                                                                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                    SHA256

                                                                                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                    SHA512

                                                                                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                  • memory/1144-191-0x0000000000400000-0x0000000000CF2000-memory.dmp

                                                                                                    Filesize

                                                                                                    8.9MB

                                                                                                  • memory/2432-1210-0x000002774A740000-0x000002774A762000-memory.dmp

                                                                                                    Filesize

                                                                                                    136KB

                                                                                                  • memory/2684-97-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-106-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-39-0x0000000000E40000-0x000000000114C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.0MB

                                                                                                  • memory/2684-58-0x0000000000E40000-0x000000000114C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.0MB

                                                                                                  • memory/2684-59-0x0000000000E40000-0x000000000114C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.0MB

                                                                                                  • memory/2684-80-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-78-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-295-0x0000000000E40000-0x000000000114C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.0MB

                                                                                                  • memory/2684-91-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-94-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-105-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-108-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-107-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-104-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-111-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-112-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-110-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-109-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-103-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-101-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-102-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-149-0x0000000000E40000-0x000000000114C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.0MB

                                                                                                  • memory/2684-100-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-85-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-95-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-86-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-87-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-88-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-89-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-90-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-92-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-93-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-96-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-98-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2684-99-0x0000000006570000-0x000000000682A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2904-234-0x0000000006170000-0x000000000642A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2904-236-0x0000000006170000-0x000000000642A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2904-306-0x00000000005B0000-0x00000000008BC000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.0MB

                                                                                                  • memory/2904-235-0x0000000006170000-0x000000000642A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/2904-1314-0x00000000005B0000-0x00000000008BC000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.0MB

                                                                                                  • memory/2904-155-0x00000000005B0000-0x00000000008BC000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.0MB

                                                                                                  • memory/3444-387-0x0000000000D20000-0x00000000013AF000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.6MB

                                                                                                  • memory/3444-305-0x0000000000D20000-0x00000000013AF000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.6MB

                                                                                                  • memory/3492-1351-0x0000000000710000-0x00000000012B6000-memory.dmp

                                                                                                    Filesize

                                                                                                    11.6MB

                                                                                                  • memory/3492-152-0x0000000000710000-0x00000000012B6000-memory.dmp

                                                                                                    Filesize

                                                                                                    11.6MB

                                                                                                  • memory/3492-55-0x0000000000710000-0x00000000012B6000-memory.dmp

                                                                                                    Filesize

                                                                                                    11.6MB

                                                                                                  • memory/3492-157-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                                                                                    Filesize

                                                                                                    10.4MB

                                                                                                  • memory/3492-223-0x0000000000710000-0x00000000012B6000-memory.dmp

                                                                                                    Filesize

                                                                                                    11.6MB

                                                                                                  • memory/3492-113-0x0000000000710000-0x00000000012B6000-memory.dmp

                                                                                                    Filesize

                                                                                                    11.6MB

                                                                                                  • memory/4252-148-0x0000000000B70000-0x0000000000E94000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/4252-34-0x0000000000B70000-0x0000000000E94000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/4252-57-0x0000000000B70000-0x0000000000E94000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/4252-56-0x0000000000B70000-0x0000000000E94000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/4604-21-0x0000000000520000-0x0000000000844000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/4604-35-0x0000000000520000-0x0000000000844000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5260-233-0x0000000000B70000-0x0000000000E94000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/5520-208-0x00000000003B0000-0x0000000000A3F000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.6MB

                                                                                                  • memory/5520-210-0x00000000003B0000-0x0000000000A3F000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.6MB

                                                                                                  • memory/6204-4103-0x0000000000B70000-0x0000000000E94000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/6512-1225-0x0000000000870000-0x0000000000B2A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/6512-449-0x0000000000870000-0x0000000000B2A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/6512-450-0x0000000000870000-0x0000000000B2A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/6512-1228-0x0000000000870000-0x0000000000B2A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                  • memory/6512-448-0x0000000000870000-0x0000000000B2A000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.7MB