Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 10:41

General

  • Target

    4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe

  • Size

    1.8MB

  • MD5

    907bd76d432cc1bf958507adcd270054

  • SHA1

    131bd682061b92bbed95087770bfaf0ecc18442f

  • SHA256

    4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7

  • SHA512

    7e0e3b0a6a52de006886a17d12a300e149a7fc1fcb311fca6cbb89b1108af3ccf2e36f0fecc68de9909b3daefeba7d169915e6503f4efba3c8f08930365345d0

  • SSDEEP

    49152:ekQ7+hs6IQ63Mtp/WP6i79B/oGNT5ymAo0Nj:ex+l8m46iHl5Vcj

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

vidar

Version

11.8

Botnet

93e4f2dec1428009f8bc755e83a21d1b

C2

https://t.me/fu4chmo

https://steamcommunity.com/profiles/76561199802540894

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detect Vidar Stealer 3 IoCs
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 13 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 11 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe
    "C:\Users\Admin\AppData\Local\Temp\4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\Users\Admin\AppData\Local\Temp\1009006001\eDPQZkT.exe
        "C:\Users\Admin\AppData\Local\Temp\1009006001\eDPQZkT.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2444
      • C:\Users\Admin\AppData\Local\Temp\1009007001\l0k3fsu.exe
        "C:\Users\Admin\AppData\Local\Temp\1009007001\l0k3fsu.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1584
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1356
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff91592cc40,0x7ff91592cc4c,0x7ff91592cc58
            5⤵
              PID:4440
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1932 /prefetch:2
              5⤵
                PID:1648
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2196 /prefetch:3
                5⤵
                  PID:1944
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2464 /prefetch:8
                  5⤵
                    PID:1784
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:3188
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3240,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4328
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3756,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4628 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:3644
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3876,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4816 /prefetch:8
                    5⤵
                      PID:2676
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4852,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:8
                      5⤵
                        PID:1520
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                      4⤵
                      • Uses browser remote debugging
                      • Enumerates system info in registry
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                      • Suspicious use of FindShellTrayWindow
                      PID:4912
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9159346f8,0x7ff915934708,0x7ff915934718
                        5⤵
                        • Checks processor information in registry
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1220
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
                        5⤵
                          PID:856
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
                          5⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3252
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:8
                          5⤵
                            PID:4180
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:4292
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:3224
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:1056
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:5776
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BFBGDGIDBAAE" & exit
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:3088
                          • C:\Windows\SysWOW64\timeout.exe
                            timeout /t 10
                            5⤵
                            • System Location Discovery: System Language Discovery
                            • Delays execution with timeout.exe
                            PID:5580
                      • C:\Users\Admin\AppData\Local\Temp\1009009001\ea781ee0ea.exe
                        "C:\Users\Admin\AppData\Local\Temp\1009009001\ea781ee0ea.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3612
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                          4⤵
                          • Uses browser remote debugging
                          • Enumerates system info in registry
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5368
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff92552cc40,0x7ff92552cc4c,0x7ff92552cc58
                            5⤵
                              PID:5968
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2020,i,1182620172863502872,16376407130923787906,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2012 /prefetch:2
                              5⤵
                                PID:4912
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,1182620172863502872,16376407130923787906,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2084 /prefetch:3
                                5⤵
                                  PID:5148
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,1182620172863502872,16376407130923787906,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2432 /prefetch:8
                                  5⤵
                                    PID:5828
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3228,i,1182620172863502872,16376407130923787906,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3248 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:5896
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3268,i,1182620172863502872,16376407130923787906,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3408 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:5948
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3704,i,1182620172863502872,16376407130923787906,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4308 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:3980
                                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  PID:3512
                                • C:\Windows\SysWOW64\schtasks.exe
                                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:5708
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 1304
                                  4⤵
                                  • Program crash
                                  PID:3948
                              • C:\Users\Admin\AppData\Local\Temp\1009010001\2d615fed30.exe
                                "C:\Users\Admin\AppData\Local\Temp\1009010001\2d615fed30.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4552
                              • C:\Users\Admin\AppData\Local\Temp\1009011001\575b50b3a7.exe
                                "C:\Users\Admin\AppData\Local\Temp\1009011001\575b50b3a7.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2064
                              • C:\Users\Admin\AppData\Local\Temp\1009012001\1fc9859770.exe
                                "C:\Users\Admin\AppData\Local\Temp\1009012001\1fc9859770.exe"
                                3⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:4232
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM firefox.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1880
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM chrome.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:680
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM msedge.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:800
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM opera.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2204
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM brave.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1760
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                  4⤵
                                    PID:4428
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                      5⤵
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2884
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1880 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b48dec2-4ef1-4e16-896b-59d75f45a02a} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" gpu
                                        6⤵
                                          PID:3852
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2404 -parentBuildID 20240401114208 -prefsHandle 2392 -prefMapHandle 2388 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8ac82af2-da7d-4c76-8db6-a312a09cabf4} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" socket
                                          6⤵
                                            PID:4260
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2804 -childID 1 -isForBrowser -prefsHandle 3284 -prefMapHandle 3344 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e84f4728-4b03-4cd9-8ebe-f04aa35efd2c} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" tab
                                            6⤵
                                              PID:5380
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2976 -childID 2 -isForBrowser -prefsHandle 3764 -prefMapHandle 3760 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f0a258f-9978-45d6-8cfb-291158a5fdb4} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" tab
                                              6⤵
                                                PID:5572
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4212 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4240 -prefMapHandle 4236 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e8838e97-bea0-4740-a12e-017ca458a911} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" utility
                                                6⤵
                                                • Checks processor information in registry
                                                PID:5904
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5420 -childID 3 -isForBrowser -prefsHandle 5412 -prefMapHandle 5408 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0bfdf291-1fa5-4e3c-9428-03a3000425c0} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" tab
                                                6⤵
                                                  PID:6064
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5548 -childID 4 -isForBrowser -prefsHandle 5556 -prefMapHandle 5560 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {130c73b3-0c81-4ad9-8f8d-9768603418db} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" tab
                                                  6⤵
                                                    PID:6080
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5840 -childID 5 -isForBrowser -prefsHandle 5832 -prefMapHandle 5828 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7b43072-59e2-4f80-a31c-e3ef17f13d33} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" tab
                                                    6⤵
                                                      PID:6084
                                              • C:\Users\Admin\AppData\Local\Temp\1009013001\16f4b3c884.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1009013001\16f4b3c884.exe"
                                                3⤵
                                                • Modifies Windows Defender Real-time Protection settings
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Windows security modification
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5304
                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                            1⤵
                                              PID:372
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                              1⤵
                                                PID:3492
                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5980
                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                1⤵
                                                  PID:4880
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3612 -ip 3612
                                                  1⤵
                                                    PID:5388
                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5016
                                                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                    C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    PID:6048

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\ProgramData\mozglue.dll

                                                    Filesize

                                                    593KB

                                                    MD5

                                                    c8fd9be83bc728cc04beffafc2907fe9

                                                    SHA1

                                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                    SHA256

                                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                    SHA512

                                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                  • C:\ProgramData\nss3.dll

                                                    Filesize

                                                    2.0MB

                                                    MD5

                                                    1cc453cdf74f31e4d913ff9c10acdde2

                                                    SHA1

                                                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                    SHA256

                                                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                    SHA512

                                                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    40B

                                                    MD5

                                                    db9149f34c6cfa44d2668a52f26b5b7f

                                                    SHA1

                                                    f8cd86ce3eed8a75ff72c1e96e815a9031856ae7

                                                    SHA256

                                                    632789cdfa972eec9efe17d8e2981c0298cf6bd5a7e5dad3cbdcf7bb30f2e47f

                                                    SHA512

                                                    169b56304747417e0afe6263dd16415d3a64fff1b5318cd4a919005abe49ca213537e85a2f2d2291ea9dc9a48ea31c001e8e09e24f25304ae3c2cfefad715ce9

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\224caf17-4bfa-482a-8913-65b2627df4f3.tmp

                                                    Filesize

                                                    1B

                                                    MD5

                                                    5058f1af8388633f609cadb75a75dc9d

                                                    SHA1

                                                    3a52ce780950d4d969792a2559cd519d7ee8c727

                                                    SHA256

                                                    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                    SHA512

                                                    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                    Filesize

                                                    649B

                                                    MD5

                                                    c9b4af931c748370084a25752d8a99bf

                                                    SHA1

                                                    3f29e19b8459d0ed9439f720d57eda54fb4459e3

                                                    SHA256

                                                    92c64e41a27db115fce07d53835e6682303643b12162a93643170bca7649e60a

                                                    SHA512

                                                    081b73c419a1ea52de167176a35425ecc529f72b6f21a5d996a7cb7abac05ab99cda37e3dbfe745e2ed19e994e4d4fdc4a1327ab4a2b278f21987eee285fd1c0

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0

                                                    Filesize

                                                    44KB

                                                    MD5

                                                    1a2ad795606e75517c37984fac17d9e9

                                                    SHA1

                                                    49dfb8266e6e355c4855f0c89b2e8a6a8f801c7d

                                                    SHA256

                                                    7670f522827d25213d2ba795e44ef7e0a4ba9d858adb8d63107da128f297c09a

                                                    SHA512

                                                    cec898b1b2419833a92038577b2de31b9e43ffa74eaea646a568b86a1a353d29f9f665483f924d81623320da6f9be9b6100dff4372a0498983f6c095c4921605

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    6d6eee248802b2d8e2161775a9413b9f

                                                    SHA1

                                                    4d9cfb449a545332a06b77932ad4c0a6e1ad2e72

                                                    SHA256

                                                    7e0320c6dc8fbb646d752da4ea9806bcc5b4a17e28e13a4e2052d38956510ae6

                                                    SHA512

                                                    354de6df5d243a8306a3272d670ecd474f4a988a0511a3a8a1a2bf4f524e639200d1c4c8bb3c284ec20cc146d9567428cab6595249e8f55f6328ea6d4fa85dce

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3

                                                    Filesize

                                                    4.0MB

                                                    MD5

                                                    9f74cab1e78b94e096a8f9ccf03e55a6

                                                    SHA1

                                                    0fea33d17bb9363f983794a89474d54d92247c53

                                                    SHA256

                                                    b1d0a32e0ec8d7ab06238072e8ac3cda5b5b2b247024dd4559ac2bd640b37cd0

                                                    SHA512

                                                    01cc4386bed93133e15a312311539a1a4f1e814d4ee28e24331e5d755ef8bdcf1a616d0504fbb2ee9a749bcdaf0524ba7b36993ea16f929f1d4c5c57d62cc183

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG

                                                    Filesize

                                                    317B

                                                    MD5

                                                    b8fb9ce89972cd1a412cc0b15ed7fed3

                                                    SHA1

                                                    9390a33d33ed1a2e6ccfab6b4f020da84e065f3e

                                                    SHA256

                                                    f43aea8cba8a1cef6360c5ffeddac6d4514bf3af6ccbe2416c162871a8c2cdae

                                                    SHA512

                                                    bb07afc0e0bd6bb2853b1453a08ac0faff96f865b3155bfdb38b4c76689369f256edc6f7cf7e59abdef4f264802384c16cd9c6753ed297c9859ad1c17956b627

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0

                                                    Filesize

                                                    44KB

                                                    MD5

                                                    22e60e6cb9a8d237a575399fd969f3a9

                                                    SHA1

                                                    ae9fc836492fb6ca0d9a9633a080f6d0161ed349

                                                    SHA256

                                                    6df281284ae8bcdd9601c5db5298d83a51ec738f7925b15a46871eb60c4abcbf

                                                    SHA512

                                                    0ef8f4024f7c4a3f126ac626728b5bf7f027e1f52e452950069bc19ec3559aa519a525dc750eed063eac198ca61751776cae53a287186a81a2e32197bf94572b

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    08f2e2f3f94b8b9c6ea509258488ceda

                                                    SHA1

                                                    30adb3c8e99b78bfaee946ff096ae6813a885b2f

                                                    SHA256

                                                    2aa5d93253e55980523ff4340daf785dd73a0448989d5ada25a3877ec17696f0

                                                    SHA512

                                                    f3ec3481fc9ccd032933e36366e134bfc0dc2551992fd52e1ca35141f68d66e62ff7189c8330ee72ee40e0280a0447130322f02c6cc06e853a5b5b87d5e774b8

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2

                                                    Filesize

                                                    1.0MB

                                                    MD5

                                                    fe993339a25710ebec86c051941d462c

                                                    SHA1

                                                    1a7a578b7a32bbe2102a789c2321090d406838d1

                                                    SHA256

                                                    59ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443

                                                    SHA512

                                                    b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_3

                                                    Filesize

                                                    4.0MB

                                                    MD5

                                                    d6b0609c4b6edb45553ff9afbfc95e33

                                                    SHA1

                                                    2697657b75906d3653f48080ec1f3993c07bd8bf

                                                    SHA256

                                                    eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e

                                                    SHA512

                                                    db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                                    Filesize

                                                    329B

                                                    MD5

                                                    3c816bc32780ef8b7083152c1bf01265

                                                    SHA1

                                                    4e9f41f2e7669cca34c8a30a5d484d22d7c2372f

                                                    SHA256

                                                    65276acd8d69519765c82f299f053658a99499c182a32eb51cb4bbe8e196fede

                                                    SHA512

                                                    3110fa19f65b8a7f279f7dcdb6b13ef40b80e2950f9f468bf0c1af46ac3c709f0dd32fcd0c8b70636ef067ccdba465a3c0082d3d5b20a2c2c999d2ca5cc5c942

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG

                                                    Filesize

                                                    336B

                                                    MD5

                                                    8729730464fccd3d4e7dd30b83eceac4

                                                    SHA1

                                                    8584a6f76190078cb96c974b58242d46ad57344f

                                                    SHA256

                                                    dba0302dbe3b168151c0143d500d2429ab25f6352dca8207b5a64e46f2bbacf2

                                                    SHA512

                                                    67ffafb0a4948e4cbe933ff8fd12fec0a224c77671750fbc56a4cb80bbd66d7a6d1fb5c2c4a9a93bfcd93a1549bbd0f06a6b8b45e0be35691d699f74a2c1004e

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.log

                                                    Filesize

                                                    289B

                                                    MD5

                                                    541c42f1c98b3e1b011d22eba854e707

                                                    SHA1

                                                    db30188de1f22e3077e7044be1386a5d0ecaed9d

                                                    SHA256

                                                    0768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b

                                                    SHA512

                                                    47828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG

                                                    Filesize

                                                    317B

                                                    MD5

                                                    5b19c224e6882c9f5d676c68d1667c94

                                                    SHA1

                                                    a643a32da3cc6a5ead3739b6c4518ffa494144c3

                                                    SHA256

                                                    3245144c7266daac1fe80faba6cae5214ab1ed165a7969ac0a014852de436b95

                                                    SHA512

                                                    f857947d3fbaba7cb3e5f98f040a47d2238535f8e81ca10158fe5837f51504fb3eaae1dfd1e78ec74b3db17c77c94746e9418ae9914be4311dac19710000035b

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                                    Filesize

                                                    345B

                                                    MD5

                                                    4f1204fc9ba163537ba4c326bfb53038

                                                    SHA1

                                                    aabcb2ae7c80bc64eefdea3b207f69f220722497

                                                    SHA256

                                                    1f6e3f47b842ed793c453384030b93da11c8f6a06682e1968048d633d6cde61f

                                                    SHA512

                                                    322b0a2c97a03df070fd85a03c5abb4463e3c8dbc337e2c4e26180c35fb87f707540f6426d78554ae8e0a7d9ad9fa8aeece7ddc06c8c1833424ded5c53ac648c

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                                    Filesize

                                                    321B

                                                    MD5

                                                    3c439969572cdbcf9a4a4f41cdeee78a

                                                    SHA1

                                                    bc81e4a5835c8c042c672f90515bd20b94b7a20d

                                                    SHA256

                                                    c60957ec83394b182bbec07b088c6e4ede22e79cb41733dbde217f92a9786610

                                                    SHA512

                                                    b97033ac1d55592a8bbe0dec5b9aae5d940fa8d0f5b5dee7e7dab68a2718d8d6e92e9472e8d4a6a9157913b414cc960b05e4241b4c6b0fd16cd42182f449e5fd

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager-journal

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    6473fd6024c0db0da72a3815237a3c04

                                                    SHA1

                                                    974038dc420c6da64d7ae73af1cd5c8bb2d7f83d

                                                    SHA256

                                                    aa531a59cc4cd5631e71431d8ac04eb0be224ce22265f9e18ecd9b088eba963e

                                                    SHA512

                                                    f7f14f970d93b43339a0a13220d6c74f8e305f8385d7cb511b821ece2a95c2236217731b549c259164cc30eb2d5c797b30eae11d2707f5930d241ca1d016fd0f

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    406af67c21d4b39a55c552eb44d376fe

                                                    SHA1

                                                    588a60131c9758c89e2a8cdd3d210f060a65f615

                                                    SHA256

                                                    d9f0855dec71c16b3fcdb37c95358350d545a9f62181509dad68b3485146bb6f

                                                    SHA512

                                                    0c962fbeb0668fd2f55496d307e9199a3e6ac0b907f4ed9b57d48c631376f55d784d5efcb4779584cdc21db0cc1207bb7c6d3187277c9f26af6c9b1e73ed2767

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                                    Filesize

                                                    320B

                                                    MD5

                                                    096a3ed771fccfac6c5b6803de30f1fb

                                                    SHA1

                                                    0b39b430657cc8a76df8fc6645466998de9640a0

                                                    SHA256

                                                    9186ed75f756ee2340d47698116fe0e11f44b8f04629a2f99e3c473fcee3ce4f

                                                    SHA512

                                                    174cdf1d6908e3994201e9a6fbe3f2dc5dfa23baffec01cf6a3a50e248bb75f4ab5db341c79001560adfbe607af43e6474595c1c003bc43f2b3867f1ee3297aa

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.log

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    28dff999a2420fd76a20d4c07e2ebeed

                                                    SHA1

                                                    2005e4d76587f1c6c1b98ac62687a616564532b0

                                                    SHA256

                                                    9f998c2de9744ee258b1b34a59ebede01ce742ccdeb1c980576900303062027f

                                                    SHA512

                                                    75ebffd7085b883a5e1f0dabc379b6d7ae6d75098826d7002b558785da1e81b0842b505de18918d12d57837f76fbf078875f4b8bcfb8e0ecc962cfb7da28be1c

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                                    Filesize

                                                    338B

                                                    MD5

                                                    788da6f70fd6576b5c933e6dfaefd0b5

                                                    SHA1

                                                    ba80ab6b1800b2bf92e69b74f710f3fbd8e98543

                                                    SHA256

                                                    041504ab3b5934cf2c2f5987401e151c32f352ecde3f5f09a0ccb8cef0252440

                                                    SHA512

                                                    11df73f91f1039d8a0fcfc51a478d79c7881e60e1c0735768db5cca380da6f1199ddfa9e968efa1fd0c51a23e95a1a9af5163383ba0c3841117659c753872312

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0

                                                    Filesize

                                                    44KB

                                                    MD5

                                                    f159d12b94eb7da3e4906416d95f4b21

                                                    SHA1

                                                    d438e148328ffb18c9e3b3ec759540309c03a18b

                                                    SHA256

                                                    a28da1baf6b97b07c4ead68b38156f850b68f565a9e1df6fc4027c0f77dd8db3

                                                    SHA512

                                                    9c04b052f6499a4684d830c7960b2e3c200d81b7206a331eee7ce8c3f6ac8c5267b0f3d77b602eef4c870100ff04fd14dd231ab86bb6a8dfc30883df4c33e8ad

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    c0584d5c00c3b2d4dff539d7e5e9548d

                                                    SHA1

                                                    1ae9eb6421915115d6ecd46dc970ea1116a44a9c

                                                    SHA256

                                                    76b754b7be1fce29d178eced1fcd93047b06e2836e69a293d548139ac3de0656

                                                    SHA512

                                                    16805bd3a649879f408550a36dc6262a722c7690d2081b50bc547c1ccbd03df75c5b2bd050f2bf38499886a8ecb74d91eae917626dd4e36cd9183b6bd05440fb

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3

                                                    Filesize

                                                    4.0MB

                                                    MD5

                                                    e39f95ae48a87705c07abeae9503e503

                                                    SHA1

                                                    7780349ff35b9620ac9cfbcf777e193c57b12802

                                                    SHA256

                                                    509e3fcd7404238039ff0030133c191fbd2fe48cf8e7295a796b18cc958b2d75

                                                    SHA512

                                                    9e91d63ee8b4812e0c59572cff2b7e88f0f816de5b5a36201ca39c633ef8a019af4f0ec456c545ed4614b82f84e6e16d160337be9fede0b5865a1152d2b7cfeb

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                    Filesize

                                                    14B

                                                    MD5

                                                    ef48733031b712ca7027624fff3ab208

                                                    SHA1

                                                    da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                                    SHA256

                                                    c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                                    SHA512

                                                    ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                    Filesize

                                                    86B

                                                    MD5

                                                    961e3604f228b0d10541ebf921500c86

                                                    SHA1

                                                    6e00570d9f78d9cfebe67d4da5efe546543949a7

                                                    SHA256

                                                    f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed

                                                    SHA512

                                                    535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    a0486d6f8406d852dd805b66ff467692

                                                    SHA1

                                                    77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                                    SHA256

                                                    c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                                    SHA512

                                                    065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    dc058ebc0f8181946a312f0be99ed79c

                                                    SHA1

                                                    0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                                    SHA256

                                                    378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                                    SHA512

                                                    36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    456f8e227dbfde8717df1ca40f7569e2

                                                    SHA1

                                                    32234609c9b973eb3ea71bdf9185aeb8edb4c26c

                                                    SHA256

                                                    cc87fdea3f90de3921c47cbc7c8415a81d6b2369fd5129a5aa0a31ba83bda631

                                                    SHA512

                                                    8d9ca8451e5e5394c4ea36bb41d06bde80cd7bd2f3c8f45660033e408c812a56781ea9e7c006b9d2f3264231343b8caccdd5f26a512c2aa8cfefc84459f8392a

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json

                                                    Filesize

                                                    24KB

                                                    MD5

                                                    40894c784f10cc2e4e76e9b8c56d8a56

                                                    SHA1

                                                    f8db3ffc4823bf4b54167fc7ca3e7fc799fbd65b

                                                    SHA256

                                                    fc3063c564d2c4cda16908fcd7e45c44cf7e60fddb77498d394b0f84c51b1f5b

                                                    SHA512

                                                    b51f79b7fdbb8dab7205ad95e9348630c7c5afad33747d27d83343362069fbad37c61af354ec0e95cc69b216f65594f6a6dc915cc822e0aba817131f966e37ef

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                                    Filesize

                                                    13KB

                                                    MD5

                                                    4fffa3770978298f03b8a73538572384

                                                    SHA1

                                                    e47c8c6255a53751e2d2e2d05a6e1a0d15cf26f8

                                                    SHA256

                                                    448240169b84df317e99c23278aea6421ffbbcb70bc64d35a4601a2e38bab5a0

                                                    SHA512

                                                    3dc12125346c43372d46a8c65f0e5f39712cfc247b705a936319a50b7bc4a18f01cb873efb457896818eec8c06811d0a9c2a255f077286270f9c53abec233917

                                                  • C:\Users\Admin\AppData\Local\Temp\1009006001\eDPQZkT.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    a63cadce90e5a2236df20feaf391a8a5

                                                    SHA1

                                                    f28a33957756a509324debaf69561557d09951e0

                                                    SHA256

                                                    8b30a280ca29471088ea3858b9f3e1788239dfe5d6e71a503c7916ac36f74fe9

                                                    SHA512

                                                    cd757a61e39c6b59d8971631f4c7041ab323be8250b57f12c2375eb46c22b0cee965df35f17794b9fe1b2da8c5caf6e38a41a8c9908092adffd35b4c76809e1c

                                                  • C:\Users\Admin\AppData\Local\Temp\1009007001\l0k3fsu.exe

                                                    Filesize

                                                    275KB

                                                    MD5

                                                    df96c3d0bb84474f4ed6c4206d1bacea

                                                    SHA1

                                                    3e846e3a979cfad2df3eadc821fccf48f2cda4fd

                                                    SHA256

                                                    dab9fee612125503146e28407ec8631232d6b48d567c902b6743bf2e984048b8

                                                    SHA512

                                                    17ab06107bfcbbd4cc5503996d544d5d48e6ae4f49f76be841455885b77e5c7a5128ab74903a1825dd3a809aed12b414f7dc97c2ae7f5750ad67abba22bd1055

                                                  • C:\Users\Admin\AppData\Local\Temp\1009009001\ea781ee0ea.exe

                                                    Filesize

                                                    4.2MB

                                                    MD5

                                                    2b0c7447e2568d3a7de91ecd14787204

                                                    SHA1

                                                    658b8b86bd1f906cf2e30675f8fe7de8b350fb79

                                                    SHA256

                                                    15132d20fdd894d09f23b8e7bdaf49736a0191a230a24141c63000d4b43ca72a

                                                    SHA512

                                                    b24c2337c69573c9d772b75512f40fa7baece45ad3de2cbdb9bcf2649056de583bc4245f1b06baf6e8ae7be1cc024a9578fe11874b52f352b9db5ad7803cb73d

                                                  • C:\Users\Admin\AppData\Local\Temp\1009010001\2d615fed30.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    9ffd11dacd9e499a8a7b86e408997489

                                                    SHA1

                                                    2f19287e2a190db2e604f790f9388b7216ae27b0

                                                    SHA256

                                                    87c3e97ca98903b7569d1ed39239c06f73ed311bdd13ceb3768acadbccb7616d

                                                    SHA512

                                                    bfa425ac138466140934c46b46af04746ee959c48a95e2b87cc8c6c2a492edeee4d2829797514e335865e9ee532c04c83df02aa7b5ca1386f9671c1e31692da7

                                                  • C:\Users\Admin\AppData\Local\Temp\1009011001\575b50b3a7.exe

                                                    Filesize

                                                    1.7MB

                                                    MD5

                                                    dbcb2bb33cc623898e5f5e93af43366f

                                                    SHA1

                                                    cf579373ffcec785e9fe2070c9a1fea1fe2cf62f

                                                    SHA256

                                                    4e9e5f4322649ec1edbf95ced7863a6df6413c933a780c6bee147c11eee28a56

                                                    SHA512

                                                    cebe946cdc4cd62fccd0e39a0a0bc64ac34da1de7515743c1db3ca7b3af2dab5ab914141794b43b8a42a2dccf1cde2d41434372faecad19de3fdd9b972e4c5aa

                                                  • C:\Users\Admin\AppData\Local\Temp\1009012001\1fc9859770.exe

                                                    Filesize

                                                    900KB

                                                    MD5

                                                    088bf96f7f07f9d38d2deeb897b64873

                                                    SHA1

                                                    12f050450140a99f0b834c6dd9070e73116877f7

                                                    SHA256

                                                    3fc67f9ae859f3da233203e40d88f00aff6f0c2c9c58d9d562ee8fe7cbf20c7a

                                                    SHA512

                                                    2e98491e4a3169c52d1acdfeceb18d01ffaa9229993dc97c2f36042157069244c28f0047c35a29d7579a5e4ecbb5320d333f7d82ec77724cf6ccb016cf6acc96

                                                  • C:\Users\Admin\AppData\Local\Temp\1009013001\16f4b3c884.exe

                                                    Filesize

                                                    2.6MB

                                                    MD5

                                                    13bcf53f60197abc7a0f147b7ed2567a

                                                    SHA1

                                                    8686ab285507d1f1efd50dc159f0e78de2f55f88

                                                    SHA256

                                                    62642a0982651ce48cbfecd78b1ce42361605ab391b21a09ad53c1b273e51321

                                                    SHA512

                                                    ec3555a12bae3f6a0774b53df0e7d06efdf04f3e5181fcd7297b7c1dc4ef0089ac3d9951e892b3133b104142893b16df12291f901f1627ba57c7d2b76156d7ea

                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    907bd76d432cc1bf958507adcd270054

                                                    SHA1

                                                    131bd682061b92bbed95087770bfaf0ecc18442f

                                                    SHA256

                                                    4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7

                                                    SHA512

                                                    7e0e3b0a6a52de006886a17d12a300e149a7fc1fcb311fca6cbb89b1108af3ccf2e36f0fecc68de9909b3daefeba7d169915e6503f4efba3c8f08930365345d0

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                    Filesize

                                                    479KB

                                                    MD5

                                                    09372174e83dbbf696ee732fd2e875bb

                                                    SHA1

                                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                                    SHA256

                                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                    SHA512

                                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                    Filesize

                                                    13.8MB

                                                    MD5

                                                    0a8747a2ac9ac08ae9508f36c6d75692

                                                    SHA1

                                                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                    SHA256

                                                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                    SHA512

                                                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    a37479a831952206566c95a31c65d4c8

                                                    SHA1

                                                    a5e6c5bca8e6cd8610884df98b01d233a0b38193

                                                    SHA256

                                                    6a1355288d72e35bab1b7be29e4812dfa274e38f09861318b6b2af333326ec04

                                                    SHA512

                                                    1c4bc299234952e56018b7f9b34a1223db45cacce84b5b728b71ec68f68dd567d93d0fa3af05950f627ac7e3d3adaa8ce1bba972f62402b2dca24871b789602b

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    3766cfb8155f4366acdb4c5e96042eb0

                                                    SHA1

                                                    76321620230662ab02604bbdcf482d89483f5f06

                                                    SHA256

                                                    009f035ba35676fbea1c8768c87b2866c3943a49de50b8c16d9b913329bc0255

                                                    SHA512

                                                    9c26ec829e1e16b2babd1369e76de5d692e030d4ee504db2013759097d06975b3a59d3ea955cffb56275a0a18b278a158ad9fc338fc358077ae9a86a3f203332

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    3adef5ce38c1eeab522d72bbecb720bf

                                                    SHA1

                                                    9c8e837700df24eda109076b2ecb47df1f0fd0f7

                                                    SHA256

                                                    ca1ad24def7a26ed62eddd4b8c23f5bb322063251256a84b6c81eb47b666c924

                                                    SHA512

                                                    83c76ba65474e01674d915ba9788dad7920ca055c51d89e01431cdabea44d09ec47b1cfc72e30491514d1035fa52e54a4be64207a6c6c886ccf1dfb040b41d16

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\65f6dc1e-5358-4646-8c26-cd1d1fcb4330

                                                    Filesize

                                                    671B

                                                    MD5

                                                    df92016b4a0e64c165640f1a0b9b64d9

                                                    SHA1

                                                    61dad69ce323e2f171ee30c6032377b8a82bb1d3

                                                    SHA256

                                                    c9aaf34fc1021c30aae83cda69ccaef23cc9f3e8a0dceafa80dafff914cc7e17

                                                    SHA512

                                                    91c6d7cec97e06aa5dcba0a61d4da009fc9cc35e89e758651ae8cd0be4febaaef02de264d57d199b22bf2bb10fcc37ffc902d9cdf7bc871f9b78cc9191b290cd

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\b102ee6e-4f8e-443e-9823-4e1090ecec02

                                                    Filesize

                                                    982B

                                                    MD5

                                                    ab4fb6b2642264b8a5228c4442f49a04

                                                    SHA1

                                                    ffddffc981aa6033da15cad8a6396091221d4b51

                                                    SHA256

                                                    dc50fde111ab85175b6807ab2f45b6bd8941488806808cff71e82fb1332a6f37

                                                    SHA512

                                                    b1d91277aa87559fc04b05c8b35fcebedc0571ec3c4a387511b67dad9c2f69d07eb5448f28d08812764be1b1068ab4f52c23c382d25ae99d1192c4827eb1e514

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\c5ed4d69-6566-46e2-bffc-1d99b32eea4d

                                                    Filesize

                                                    26KB

                                                    MD5

                                                    4aa6a49640258332ab91013271989ec5

                                                    SHA1

                                                    645c3878e3f2aba06e828241238d71cf2780333f

                                                    SHA256

                                                    0a36d3adae0e6cc2835ea2e3a3243e29473b371fa078988e533e05bbc279b674

                                                    SHA512

                                                    a8336bdd2a72591f7bf51ed59a7b4602689bd2493136680f526437bffc5f8cd9ae99179713ffc4f4c58920384b3ff2d587405c9b17460882812fe38d966b202a

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                    Filesize

                                                    1.1MB

                                                    MD5

                                                    842039753bf41fa5e11b3a1383061a87

                                                    SHA1

                                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                    SHA256

                                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                    SHA512

                                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                    Filesize

                                                    116B

                                                    MD5

                                                    2a461e9eb87fd1955cea740a3444ee7a

                                                    SHA1

                                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                                    SHA256

                                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                    SHA512

                                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                    Filesize

                                                    372B

                                                    MD5

                                                    bf957ad58b55f64219ab3f793e374316

                                                    SHA1

                                                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                    SHA256

                                                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                    SHA512

                                                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                    Filesize

                                                    17.8MB

                                                    MD5

                                                    daf7ef3acccab478aaa7d6dc1c60f865

                                                    SHA1

                                                    f8246162b97ce4a945feced27b6ea114366ff2ad

                                                    SHA256

                                                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                    SHA512

                                                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    9ec2c334b12d758d7e087b6338538b82

                                                    SHA1

                                                    34eec66dc948554ec57ba133d01d3ecef808f5ee

                                                    SHA256

                                                    4e14b3baeec435e06bf54779bd2b11e3b668a96cbef223b29eb14e1cf0f8f70c

                                                    SHA512

                                                    2e63b4184ee5d47ebbc9c1a6ba282fabcfeefe55c46652da41fb0ad251bb1b435285fb41de8f0d15b0766fc574b61890ff79bba04078a466ab9251f21e343d46

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    06cbad32de66daeecbf549b05265f1bc

                                                    SHA1

                                                    6be5c098d9462bf1a2cc769d6a3e1c22a9cd9925

                                                    SHA256

                                                    66b12e3235b4ba72abf084544b4096f1f76ae4c2e828253b694157345e776d67

                                                    SHA512

                                                    7fc3fc3e5951e5262828cf627ed076d06c04c5c695771e0beeb825b0559d725f183332cb1c7c4fc53099c412adc95225bcc15ad299a9955fa66d292987c5721a

                                                  • memory/1584-667-0x0000000000860000-0x0000000000AB9000-memory.dmp

                                                    Filesize

                                                    2.3MB

                                                  • memory/1584-94-0x000000001C310000-0x000000001C56F000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/1584-60-0x0000000000860000-0x0000000000AB9000-memory.dmp

                                                    Filesize

                                                    2.3MB

                                                  • memory/2064-162-0x00000000003B0000-0x0000000000A52000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/2064-159-0x00000000003B0000-0x0000000000A52000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/2444-39-0x00000000004D0000-0x0000000000976000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/2444-77-0x00000000004D0000-0x0000000000976000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/2444-41-0x00000000004D1000-0x00000000004F8000-memory.dmp

                                                    Filesize

                                                    156KB

                                                  • memory/3512-3130-0x0000000000F20000-0x0000000000F32000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/3512-3131-0x0000000073000000-0x0000000073134000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/3612-619-0x00000000005D0000-0x000000000122F000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/3612-3126-0x00000000005D0000-0x000000000122F000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/3612-918-0x00000000005D0000-0x000000000122F000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/3612-3113-0x00000000005D0000-0x000000000122F000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/3612-666-0x00000000005D0000-0x000000000122F000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/3612-1249-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                                    Filesize

                                                    10.4MB

                                                  • memory/3612-93-0x00000000005D0000-0x000000000122F000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/3612-1895-0x00000000005D0000-0x000000000122F000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/3612-163-0x00000000005D0000-0x000000000122F000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/3612-2837-0x00000000005D0000-0x000000000122F000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/3612-169-0x00000000005D0000-0x000000000122F000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/4552-160-0x0000000000370000-0x0000000000814000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4552-124-0x0000000000370000-0x0000000000814000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4592-142-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-3129-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-1586-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-3144-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-76-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-59-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-3141-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-785-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-40-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-3138-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-31-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-22-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-21-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-20-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-19-0x0000000000B11000-0x0000000000B3F000-memory.dmp

                                                    Filesize

                                                    184KB

                                                  • memory/4592-18-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-3132-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-559-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-3117-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-3111-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-660-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4592-2527-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4960-1-0x00000000774D4000-0x00000000774D6000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4960-2-0x0000000000031000-0x000000000005F000-memory.dmp

                                                    Filesize

                                                    184KB

                                                  • memory/4960-3-0x0000000000030000-0x00000000004E8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4960-4-0x0000000000030000-0x00000000004E8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4960-0-0x0000000000030000-0x00000000004E8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4960-17-0x0000000000030000-0x00000000004E8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5016-3136-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5016-3135-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5304-662-0x0000000000630000-0x00000000008DA000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/5304-589-0x0000000000630000-0x00000000008DA000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/5304-604-0x0000000000630000-0x00000000008DA000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/5304-605-0x0000000000630000-0x00000000008DA000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/5304-665-0x0000000000630000-0x00000000008DA000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/5980-1078-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5980-1115-0x0000000000B10000-0x0000000000FC8000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/6048-3137-0x0000000000F20000-0x0000000000F32000-memory.dmp

                                                    Filesize

                                                    72KB