Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 11:40

General

  • Target

    a22e452003a34a4c441e19bf61aed9b0e2869ebfcbc0a7495c9b851f3594d886.exe

  • Size

    1.8MB

  • MD5

    5801fe57838d80b26c4d2978dd6fd272

  • SHA1

    5928be4f762f479fecab45c184044d67e260e876

  • SHA256

    a22e452003a34a4c441e19bf61aed9b0e2869ebfcbc0a7495c9b851f3594d886

  • SHA512

    6cf1ff2e1f32f3d86b3688452afc43fdfdfef8fcff76fc574109d9d8a46c7a77eeb3f57ac7f40b17daa0b9a951d8d8ddc47ed7153653e21311d24a999dda0c57

  • SSDEEP

    49152:CStt4wR8XmEc0DVTdUbVX0nS18wEctrMtUAmgbKN:RtawRimEc03YKwdtrUlmg

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

vidar

Version

11.8

Botnet

93e4f2dec1428009f8bc755e83a21d1b

C2

https://t.me/fu4chmo

https://steamcommunity.com/profiles/76561199802540894

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detect Vidar Stealer 3 IoCs
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 13 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 11 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a22e452003a34a4c441e19bf61aed9b0e2869ebfcbc0a7495c9b851f3594d886.exe
    "C:\Users\Admin\AppData\Local\Temp\a22e452003a34a4c441e19bf61aed9b0e2869ebfcbc0a7495c9b851f3594d886.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4968
      • C:\Users\Admin\AppData\Local\Temp\1009018001\3jbbEG0.exe
        "C:\Users\Admin\AppData\Local\Temp\1009018001\3jbbEG0.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4924
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1352
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8fc82cc40,0x7ff8fc82cc4c,0x7ff8fc82cc58
            5⤵
              PID:1920
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2032,i,1267161556319466521,12749299007681757813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2028 /prefetch:2
              5⤵
                PID:2636
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1920,i,1267161556319466521,12749299007681757813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1984 /prefetch:3
                5⤵
                  PID:408
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,1267161556319466521,12749299007681757813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2376 /prefetch:8
                  5⤵
                    PID:3016
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,1267161556319466521,12749299007681757813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:2272
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,1267161556319466521,12749299007681757813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:1696
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4468,i,1267161556319466521,12749299007681757813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4568 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:2136
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4768,i,1267161556319466521,12749299007681757813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3856 /prefetch:8
                    5⤵
                      PID:4404
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4796,i,1267161556319466521,12749299007681757813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4836 /prefetch:8
                      5⤵
                        PID:2320
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                      4⤵
                      • Uses browser remote debugging
                      • Enumerates system info in registry
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                      • Suspicious use of FindShellTrayWindow
                      PID:2384
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fc8346f8,0x7ff8fc834708,0x7ff8fc834718
                        5⤵
                        • Checks processor information in registry
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1436
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7951005085759565060,11803977770148654302,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:2
                        5⤵
                          PID:4228
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,7951005085759565060,11803977770148654302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:3
                          5⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2908
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,7951005085759565060,11803977770148654302,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:8
                          5⤵
                            PID:3704
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2076,7951005085759565060,11803977770148654302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:4888
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2076,7951005085759565060,11803977770148654302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:1732
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2076,7951005085759565060,11803977770148654302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:4372
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2076,7951005085759565060,11803977770148654302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:3456
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7951005085759565060,11803977770148654302,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
                            5⤵
                              PID:4548
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BFBKFHIDHIIJ" & exit
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:5148
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 10
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Delays execution with timeout.exe
                              PID:5220
                        • C:\Users\Admin\AppData\Local\Temp\1009019001\cdb5f5f24d.exe
                          "C:\Users\Admin\AppData\Local\Temp\1009019001\cdb5f5f24d.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4980
                        • C:\Users\Admin\AppData\Local\Temp\1009020001\3a6dc22c4d.exe
                          "C:\Users\Admin\AppData\Local\Temp\1009020001\3a6dc22c4d.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4108
                        • C:\Users\Admin\AppData\Local\Temp\1009021001\a18ac63cfe.exe
                          "C:\Users\Admin\AppData\Local\Temp\1009021001\a18ac63cfe.exe"
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:1728
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM firefox.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:868
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM chrome.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3792
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM msedge.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1316
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM opera.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3720
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM brave.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2936
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                            4⤵
                              PID:1872
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                5⤵
                                • Checks processor information in registry
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                • Suspicious use of SetWindowsHookEx
                                PID:1812
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {33485f1f-5d06-4c26-a88d-8423fd30e6fe} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" gpu
                                  6⤵
                                    PID:4228
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2428 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {336934d7-846f-43b1-bf5b-b790bbe991a3} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" socket
                                    6⤵
                                      PID:920
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3112 -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 3080 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9bee23fe-2ab3-4415-b26b-80d453643103} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" tab
                                      6⤵
                                        PID:4476
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3920 -childID 2 -isForBrowser -prefsHandle 3912 -prefMapHandle 3108 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a689febb-d360-45b5-8413-54f20a8010fa} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" tab
                                        6⤵
                                          PID:5100
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4860 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4804 -prefMapHandle 4856 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a5c513e-c446-436e-9c56-b8a7b70623bb} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" utility
                                          6⤵
                                          • Checks processor information in registry
                                          PID:5244
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3868 -childID 3 -isForBrowser -prefsHandle 5328 -prefMapHandle 5324 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7568dcad-daca-4877-9d74-b2dd6c9045ea} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" tab
                                          6⤵
                                            PID:5956
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5456 -childID 4 -isForBrowser -prefsHandle 5464 -prefMapHandle 5468 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b61be0f5-a87f-476d-b559-79a49a336642} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" tab
                                            6⤵
                                              PID:6008
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5680 -childID 5 -isForBrowser -prefsHandle 5688 -prefMapHandle 5316 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac9a7288-f629-4c87-89bc-f667b8aa786f} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" tab
                                              6⤵
                                                PID:6028
                                        • C:\Users\Admin\AppData\Local\Temp\1009022001\f25145dfb0.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1009022001\f25145dfb0.exe"
                                          3⤵
                                          • Modifies Windows Defender Real-time Protection settings
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Windows security modification
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5328
                                        • C:\Users\Admin\AppData\Local\Temp\1009023001\c22ab5108d.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1009023001\c22ab5108d.exe"
                                          3⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Checks processor information in registry
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4504
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                                            4⤵
                                            • Uses browser remote debugging
                                            • Enumerates system info in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5316
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff90babcc40,0x7ff90babcc4c,0x7ff90babcc58
                                              5⤵
                                                PID:2000
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2024,i,16162102194284239047,9542998922087282253,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2020 /prefetch:2
                                                5⤵
                                                  PID:1880
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1900,i,16162102194284239047,9542998922087282253,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2136 /prefetch:3
                                                  5⤵
                                                    PID:5516
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,16162102194284239047,9542998922087282253,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2276 /prefetch:8
                                                    5⤵
                                                      PID:1980
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,16162102194284239047,9542998922087282253,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:1
                                                      5⤵
                                                      • Uses browser remote debugging
                                                      PID:5048
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3232,i,16162102194284239047,9542998922087282253,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3264 /prefetch:1
                                                      5⤵
                                                      • Uses browser remote debugging
                                                      PID:5204
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4612,i,16162102194284239047,9542998922087282253,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4532 /prefetch:1
                                                      5⤵
                                                      • Uses browser remote debugging
                                                      PID:5828
                                                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    PID:5552
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:5676
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 1304
                                                    4⤵
                                                    • Program crash
                                                    PID:2640
                                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                              1⤵
                                                PID:4828
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                1⤵
                                                  PID:3244
                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:2236
                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:3980
                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                  1⤵
                                                    PID:5428
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4504 -ip 4504
                                                    1⤵
                                                      PID:5620

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\ProgramData\mozglue.dll

                                                      Filesize

                                                      593KB

                                                      MD5

                                                      c8fd9be83bc728cc04beffafc2907fe9

                                                      SHA1

                                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                      SHA256

                                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                      SHA512

                                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                    • C:\ProgramData\nss3.dll

                                                      Filesize

                                                      2.0MB

                                                      MD5

                                                      1cc453cdf74f31e4d913ff9c10acdde2

                                                      SHA1

                                                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                      SHA256

                                                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                      SHA512

                                                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      40B

                                                      MD5

                                                      800547b40b40a6d57a70b74809b450fa

                                                      SHA1

                                                      310a064c7ba82120f80af50892dcbe61b53f9d70

                                                      SHA256

                                                      a562ff4b14badc73b0804883bf4ccfd9972e485123de5e5949981794f66ed936

                                                      SHA512

                                                      39630e3b5069d0c66ea44069358cf01f180bf25103968f77d483a27deb7e91e796a1718ce9af2f438bebe8207537e735cd402d649e2adfa2ca7748faae2db949

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\629a3895-e164-4217-80ec-6d87aa6090cd.tmp

                                                      Filesize

                                                      1B

                                                      MD5

                                                      5058f1af8388633f609cadb75a75dc9d

                                                      SHA1

                                                      3a52ce780950d4d969792a2559cd519d7ee8c727

                                                      SHA256

                                                      cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                      SHA512

                                                      0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                      Filesize

                                                      649B

                                                      MD5

                                                      937aa49c325edac67efe76c194631e5a

                                                      SHA1

                                                      3141e5e2271b4dd0b7181ab54acfe8691caca050

                                                      SHA256

                                                      ab92eccb96ab6e5c9cf7be55ee54e0710c9362b75e63f87c1c7a5ad98cadeab9

                                                      SHA512

                                                      3e9172ccb7ff46e696f5cc65a04a9ab3200dfcfa10f8a8ea4c4cff6efc91e3f652c8cd313cc5a610ed466cf13a71b1bb89f021644b2a58a65ae436c58cdc38dc

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0

                                                      Filesize

                                                      44KB

                                                      MD5

                                                      287ef9971bf2cd2075902714a4750c71

                                                      SHA1

                                                      8d484aca5500ff01302d8f8c268a980cdc1cba78

                                                      SHA256

                                                      9bd86bcd9f27e40211aabcb35a4bce7477013c9de25c1c437dbea5a18d8f801a

                                                      SHA512

                                                      a38df5832a54c755e05ae699fd381ac31e548e33c28936cbc77dac72698f60fb8c9da97b47b71d65599439ef41f4a53bb9487bfca3e49aa88f4aea3606c74e38

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1

                                                      Filesize

                                                      264KB

                                                      MD5

                                                      07be2c4d0685501a0b9f3d8453f1a3f2

                                                      SHA1

                                                      9ef5ce94be9b5011bf522bcad706746905b3ace7

                                                      SHA256

                                                      5114d1d51add3f9c6ce4c3d9a06770a1428d33aa820b119551d42c46fc52d8b9

                                                      SHA512

                                                      c536818fd6ede06d78a1f89abfdca2518966410767b6056ce33d52c8dfbdc19c23e2d0b64882b6b4c468f179f68c17e4fb5fee3087221db7d3f1aa92243066e0

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3

                                                      Filesize

                                                      4.0MB

                                                      MD5

                                                      490dc48a7cc1aa8656fac2b40475c8a7

                                                      SHA1

                                                      57950049883b6ff9b09d99a20050ab46b6e53456

                                                      SHA256

                                                      133e07825fdf5f03857b13416d5c2395dab6308c55165b5a9eecfabcc06261b6

                                                      SHA512

                                                      e6a9f2f710589a4c1b435ac352fac8e62ace5ecc9b718d7ba4737ad7bbf05e46967ebf0b30fd4dd27d4123b7c945d8a3a252543ea380f1ff20e4fa3212806f20

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG

                                                      Filesize

                                                      317B

                                                      MD5

                                                      9f440edb97906d70a59941ce77cbdaf7

                                                      SHA1

                                                      9891d8e8e0ae85eff4134a55e759309c1f1741b6

                                                      SHA256

                                                      09c555dbdf55f198f5c8e93c2ac78a93e26bade726ca207c1335afc1b01f2083

                                                      SHA512

                                                      9e8c6bdbbaafbea91e08f1560e243a9d994279bd44fc5d77722eed2e7216e0aea982b785f117748282cd12cc1e7dde1a5dd85f88c3dadada434ea4c28213188b

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0

                                                      Filesize

                                                      44KB

                                                      MD5

                                                      2a884d28e8b93f585895ce96fb7890c0

                                                      SHA1

                                                      60a986bbd411f11ef8a72dc9a19292cd7962564f

                                                      SHA256

                                                      6aa10e48d07fa7b49e67badba072ed98ce8615cbb7a9876b4c1f55ff6325d151

                                                      SHA512

                                                      1813f499f6b6c2a868807a500c032237b953e458551e58fc4da90723a5a480bd5aa858111d967cf7cf5613266f4d258c2d379fc0b8ba1ac049f66c8825541d61

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                      Filesize

                                                      264KB

                                                      MD5

                                                      befabb3cb1e29a78ec1cdc2630b26de5

                                                      SHA1

                                                      b49dff0a13e1a217f8a975c8e02cb0d104ac66a8

                                                      SHA256

                                                      d740f0be8ce06195374f4874eedc89a4f8843c0620bd02946b748e9cfded0d3b

                                                      SHA512

                                                      1e72d671e28382e87f11956129dbf3fb9f105ef5d0b5dcdd3f4ba4b6acec16e2270742793a5557619d5965821218abe73c8a24d96ece457513f822d8dbefbe1d

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2

                                                      Filesize

                                                      1.0MB

                                                      MD5

                                                      fe993339a25710ebec86c051941d462c

                                                      SHA1

                                                      1a7a578b7a32bbe2102a789c2321090d406838d1

                                                      SHA256

                                                      59ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443

                                                      SHA512

                                                      b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_3

                                                      Filesize

                                                      4.0MB

                                                      MD5

                                                      d6b0609c4b6edb45553ff9afbfc95e33

                                                      SHA1

                                                      2697657b75906d3653f48080ec1f3993c07bd8bf

                                                      SHA256

                                                      eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e

                                                      SHA512

                                                      db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                                      Filesize

                                                      329B

                                                      MD5

                                                      933307ca29a3d4b4dab3a02a9c14f57a

                                                      SHA1

                                                      8020625daa3bc7a5a7aa2ea6e277427703029425

                                                      SHA256

                                                      8394cd213e1cd8cce5ff2d06eb322e26e71d76c481e65f966f917d720c30d2ea

                                                      SHA512

                                                      e813da0ab1ad29b18eb674eeceb89def41712053363772b50659c1c1b90fb9de3e8ec28eed2799d7405f477e8d6c9addca032bb5568f7f53f5fe0a332cc7cf03

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                      Filesize

                                                      2B

                                                      MD5

                                                      d751713988987e9331980363e24189ce

                                                      SHA1

                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                      SHA256

                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                      SHA512

                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG

                                                      Filesize

                                                      333B

                                                      MD5

                                                      3f9c0880190b1deea6884a25a897c697

                                                      SHA1

                                                      99bb47157ca5ef5d08e028d68b5df929171e41b2

                                                      SHA256

                                                      2ee783bc5c15050bf2bf8ec1bf42aaf5f88192a8bc61a6ac275979efa82e6cf8

                                                      SHA512

                                                      83a5b25613f4bff35592ebb766d372abd498710a7360c316e4da4ddc7743380ef3d48f02beca95d2ddf5ade864a96d7d48dd585ae4831acc2230d4fe66a2884c

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.log

                                                      Filesize

                                                      308B

                                                      MD5

                                                      4e7982b86b3d7d916b7722aa3b3f0669

                                                      SHA1

                                                      ce4e874903cb71d9012cc7654ca7a6ba5e4f7efd

                                                      SHA256

                                                      cbee1100a2c9add47776b7e416b58a809f6feb9fe458bef8185b0c176b5db340

                                                      SHA512

                                                      c4dda8b36e90a327061dab901730f47fc23cca129b02a157f1ed0c566a1d6dddf272a4e74d3acbf14eb3a7fac0820387a584db9e19ca299724ed7f3030f891bb

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG

                                                      Filesize

                                                      317B

                                                      MD5

                                                      e90b4cf7836b0e9344b35862f283916a

                                                      SHA1

                                                      a22b20c8c4f630bfd2e827837dba3515b61b945b

                                                      SHA256

                                                      b0c166b1e57a6f75f1086b822a205ca69405abd91deb4296c5cec1c864375a1f

                                                      SHA512

                                                      d27785abb2daa6f5a503907a203ce12af78af032787012d4720fbb92a0ed6e22671f0734add94ab8b88e9459d7dab14ca1eaff1c19da3232f96afcefc902e68b

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                                      Filesize

                                                      345B

                                                      MD5

                                                      7920028752c7cbb18124751e47e0dd68

                                                      SHA1

                                                      14c4a082d953d98807ca926882ae13aa8e172f4e

                                                      SHA256

                                                      90cfed00769df8c9364a36d7437f10cccb7d5540fa26472b65456437fc74f461

                                                      SHA512

                                                      a7b1dccc7d6bfdc6882f18dd86d02d6c280c8562ae8ff38d0d9591987f1c591b41f135bb64926283a73adf010666adaa46adf69e893615e2c52f99b7087524e7

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                                      Filesize

                                                      321B

                                                      MD5

                                                      0b20d7ce8998b6b93fc1891a42b63244

                                                      SHA1

                                                      d8d153e945fb48e0d606813bef6ad7bc4eee568e

                                                      SHA256

                                                      b2f0b06e032b1847af0f17e8c2062e08521485a76ec8621ad55a64b8b246954b

                                                      SHA512

                                                      6953f2d6c52b7e6f9979b5d089b36c95c9a761c9d036ed1430e19ae60d3220fcb2ac0fb23072d16e9331fe8cfbd09f2c821c5337614e03903d496f2ad318df4a

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager-journal

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      2f38e83172deb563bf2c2b807fc026b7

                                                      SHA1

                                                      3f6c989dbc234fb76514689dd056614cc9692e19

                                                      SHA256

                                                      d34219585967b55aac67af70336e96fb549c20c8fef4c19b8f2a93c6d6858925

                                                      SHA512

                                                      162d139233dd73d599f9624c266a33c9e69e49587bb0cd36b3aab52af9dae6b9c6935bca45042ede28386a3ea004084b73bce4dcea35bc506d9fb88d1e9f1c2e

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log

                                                      Filesize

                                                      18KB

                                                      MD5

                                                      ea8a8906709839fd8d945b6148e79bf6

                                                      SHA1

                                                      f326a5e4a07332650830e9eca11a5e023c27bb61

                                                      SHA256

                                                      b9479d44848393f134caf50760078c732586fbd403316a4595e0ebf19206adba

                                                      SHA512

                                                      cc7de5dc4929f14388f5931e5410c5d29a4ec0f45a88fb87bc4e46c9cc75f9d2f87ffef604666fea1e2ddba2bc27f20854017812a1a73ac4857dbb55073acc57

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                                      Filesize

                                                      320B

                                                      MD5

                                                      cda7c2fb738e9495514e2688c2931230

                                                      SHA1

                                                      938d992b5ae235dd79950bf59944471d3b5f5207

                                                      SHA256

                                                      1f360708b412857228a7d6b24699b4a267ed59d9a8edcd3eeb952b17cb48cb30

                                                      SHA512

                                                      2db211d49ea4baed4074b4c80f85770fe824e85c4671bd7320e73f1a947ef2327c58b63e9b12d4030a380e758dd174b8b1496f805273fbe33cf739c80408d2e3

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.log

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      5d4170fc4610647c9841057aa0e7102d

                                                      SHA1

                                                      517090b546695c52b79fa9af0c29d85c6dfebda8

                                                      SHA256

                                                      d005782c29b049ed6c52e95c70c873d491297e6ee36b2a269b162099f80f5e09

                                                      SHA512

                                                      9b83aca1983d2c329b9b894d3e5378fb1e674b2d8f1b97b25edc9c4fc993d1bb087434d9dd0522f05726d1c9d57024fe25391ddcbb5ae90cc7d735aeaf0ccd2e

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                                      Filesize

                                                      338B

                                                      MD5

                                                      136aa56a91cbfa422c371a4c092329e5

                                                      SHA1

                                                      acc609ee4139618d311d3af15d9e0d937a2f9c58

                                                      SHA256

                                                      13c7a1bedcb4639182c604a3538e77aa28693906870bd106a46f36bc6ca8d014

                                                      SHA512

                                                      83b21a472afb388646fccc9786b9518c70880616bc9a77f92f41b47ff833f077f95cd9366465f68eb653b039cc66fe6f8f817f9bcf550c4f0ac9114a95fa3ffc

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0

                                                      Filesize

                                                      44KB

                                                      MD5

                                                      c9e2b0301b9890928bff2675deeefb28

                                                      SHA1

                                                      0004b14fbee5eb302873977adc01b9ff037071f4

                                                      SHA256

                                                      c2d49a3616329fca349b0ba5ada9c5151fa782af89fd3a657843594898046c78

                                                      SHA512

                                                      3caabb683cd06efeafa74a2811edb72bf525803fcb1d47190f5ce0fa7aa9f9bee85d2ad0ddb62af270c11a2e590e7cc58d9ac93156ad51c82c44a164ca19f025

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                                                      Filesize

                                                      264KB

                                                      MD5

                                                      c5db32306f787e3214392f918db9ebc4

                                                      SHA1

                                                      99cebda6cb45749312a21532564597f6fdea8d69

                                                      SHA256

                                                      360e9cedb8dd3e146d2e5c2c74b0ded4d08913773617539df3178ba7e6b86aee

                                                      SHA512

                                                      ca0e364c44bcfa2ab1a05edd0b9247894b01fd74f5a67e253fbcfd590a30670c59dbac4faf85a26b8b54f6debe93a053ca8b3cf8d98c948e80199453220423ce

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3

                                                      Filesize

                                                      4.0MB

                                                      MD5

                                                      e39f95ae48a87705c07abeae9503e503

                                                      SHA1

                                                      7780349ff35b9620ac9cfbcf777e193c57b12802

                                                      SHA256

                                                      509e3fcd7404238039ff0030133c191fbd2fe48cf8e7295a796b18cc958b2d75

                                                      SHA512

                                                      9e91d63ee8b4812e0c59572cff2b7e88f0f816de5b5a36201ca39c633ef8a019af4f0ec456c545ed4614b82f84e6e16d160337be9fede0b5865a1152d2b7cfeb

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                      Filesize

                                                      14B

                                                      MD5

                                                      ef48733031b712ca7027624fff3ab208

                                                      SHA1

                                                      da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                                      SHA256

                                                      c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                                      SHA512

                                                      ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                      Filesize

                                                      86B

                                                      MD5

                                                      f732dbed9289177d15e236d0f8f2ddd3

                                                      SHA1

                                                      53f822af51b014bc3d4b575865d9c3ef0e4debde

                                                      SHA256

                                                      2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                                      SHA512

                                                      b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      37f660dd4b6ddf23bc37f5c823d1c33a

                                                      SHA1

                                                      1c35538aa307a3e09d15519df6ace99674ae428b

                                                      SHA256

                                                      4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                                      SHA512

                                                      807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      d7cb450b1315c63b1d5d89d98ba22da5

                                                      SHA1

                                                      694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                                      SHA256

                                                      38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                                      SHA512

                                                      df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      bfe7f9f226fec66828c5f36e3ae54ef9

                                                      SHA1

                                                      ef00a2c2e1328094846c06ad93fdac770e36c7e9

                                                      SHA256

                                                      9d9e8e050065f3c67a20a9063456b77c695ef1a69d65856a551dc3d2e69e70d1

                                                      SHA512

                                                      bc8a1606c1c7cefde1ce1fae22c8602afe79efd127cd011d9b1286d9c53635ec30a3a7180917456854a671901b7b76750a29d7fc6fd6a722f581ff78f33d435f

                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json

                                                      Filesize

                                                      22KB

                                                      MD5

                                                      a69c16215822f43c5925dc6d4cf47b0c

                                                      SHA1

                                                      f6d66c738f9e2047bb05778821a5ce8856a42c88

                                                      SHA256

                                                      3851c3d8a687a0a0e48b67c368470c0d3efb511908cb06083baf1b65ce6d2df2

                                                      SHA512

                                                      97b68b3a4ebce6fc5a04ef6661844442ae9d19904f76576679a911e4a54488c28c86dab5da282393fe8cce28199e5df2e09c2cf5bc918e69659600d252a0d396

                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                                      Filesize

                                                      13KB

                                                      MD5

                                                      8b4e8b5cf82d561c67f08088deeedc5d

                                                      SHA1

                                                      6d890eeb87dc9d3b4ab18294bdf087fb66f62521

                                                      SHA256

                                                      236b9a6b33a3652467af73d9b166e03b62cae13e2741404b1bcad753a878629e

                                                      SHA512

                                                      da60d69cb39c2bc7f34c626e24cfd0e9c90b0ae5c471e9a6ca32514b8f258b4a786e6a0121b83303760505b97a149f98c1d95217bd0e90d922cd65cbf8aa717f

                                                    • C:\Users\Admin\AppData\Local\Temp\1009018001\3jbbEG0.exe

                                                      Filesize

                                                      275KB

                                                      MD5

                                                      df96c3d0bb84474f4ed6c4206d1bacea

                                                      SHA1

                                                      3e846e3a979cfad2df3eadc821fccf48f2cda4fd

                                                      SHA256

                                                      dab9fee612125503146e28407ec8631232d6b48d567c902b6743bf2e984048b8

                                                      SHA512

                                                      17ab06107bfcbbd4cc5503996d544d5d48e6ae4f49f76be841455885b77e5c7a5128ab74903a1825dd3a809aed12b414f7dc97c2ae7f5750ad67abba22bd1055

                                                    • C:\Users\Admin\AppData\Local\Temp\1009019001\cdb5f5f24d.exe

                                                      Filesize

                                                      1.8MB

                                                      MD5

                                                      91ed86397a1d20fc8c1057985c13abc5

                                                      SHA1

                                                      31402c55aa6e6295383e405d9d12ff4bc84e980a

                                                      SHA256

                                                      c1b9a83f47c5b38c215aff0cce585477e084a5af8630726d960f699971a3852e

                                                      SHA512

                                                      4a3f739f61910575923801477a45373286612c131e1277c21b658fe8f227641f2f97bb323481f3a8f9f2c1508ed5dfce309d304f05b6d314eb3f5fa83d25fd1d

                                                    • C:\Users\Admin\AppData\Local\Temp\1009020001\3a6dc22c4d.exe

                                                      Filesize

                                                      1.7MB

                                                      MD5

                                                      91b37d2cd25d901080a13743131a5229

                                                      SHA1

                                                      0b77ba7424bf660b1bd8f4f6c01208cb8eaaef9e

                                                      SHA256

                                                      d84a99942feba00f43b585deed2d7b44caa59488c61ec4d8b118b407d4f4c6f9

                                                      SHA512

                                                      e6006d818362a4d5713fb2d41a8bde6db8d8a6961e7314741dd8719583a601b18775ef6ec7835c3db6ad6f6e8f7aedba67a3edc98d8e8faca7a825fbc0483323

                                                    • C:\Users\Admin\AppData\Local\Temp\1009021001\a18ac63cfe.exe

                                                      Filesize

                                                      900KB

                                                      MD5

                                                      088bf96f7f07f9d38d2deeb897b64873

                                                      SHA1

                                                      12f050450140a99f0b834c6dd9070e73116877f7

                                                      SHA256

                                                      3fc67f9ae859f3da233203e40d88f00aff6f0c2c9c58d9d562ee8fe7cbf20c7a

                                                      SHA512

                                                      2e98491e4a3169c52d1acdfeceb18d01ffaa9229993dc97c2f36042157069244c28f0047c35a29d7579a5e4ecbb5320d333f7d82ec77724cf6ccb016cf6acc96

                                                    • C:\Users\Admin\AppData\Local\Temp\1009022001\f25145dfb0.exe

                                                      Filesize

                                                      2.7MB

                                                      MD5

                                                      d30bd6bc4ce8e63cd599e4d1b604c815

                                                      SHA1

                                                      c79f06015669a06f56c7f3ce81e4b5f18c91d867

                                                      SHA256

                                                      53705aeb862870ba7f20fcbe388077b9b47f049a6132ae4b3fe9a23208f5897f

                                                      SHA512

                                                      847adf10aea75d02d7cfb45331946270f97624dc918ced6349c5c4b181fed23508fb67e64384c5d971a38fe4f318fd6ab985982f97a6b7fe483b6de426f612cd

                                                    • C:\Users\Admin\AppData\Local\Temp\1009023001\c22ab5108d.exe

                                                      Filesize

                                                      4.2MB

                                                      MD5

                                                      2b0c7447e2568d3a7de91ecd14787204

                                                      SHA1

                                                      658b8b86bd1f906cf2e30675f8fe7de8b350fb79

                                                      SHA256

                                                      15132d20fdd894d09f23b8e7bdaf49736a0191a230a24141c63000d4b43ca72a

                                                      SHA512

                                                      b24c2337c69573c9d772b75512f40fa7baece45ad3de2cbdb9bcf2649056de583bc4245f1b06baf6e8ae7be1cc024a9578fe11874b52f352b9db5ad7803cb73d

                                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                      Filesize

                                                      1.8MB

                                                      MD5

                                                      5801fe57838d80b26c4d2978dd6fd272

                                                      SHA1

                                                      5928be4f762f479fecab45c184044d67e260e876

                                                      SHA256

                                                      a22e452003a34a4c441e19bf61aed9b0e2869ebfcbc0a7495c9b851f3594d886

                                                      SHA512

                                                      6cf1ff2e1f32f3d86b3688452afc43fdfdfef8fcff76fc574109d9d8a46c7a77eeb3f57ac7f40b17daa0b9a951d8d8ddc47ed7153653e21311d24a999dda0c57

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                      Filesize

                                                      479KB

                                                      MD5

                                                      09372174e83dbbf696ee732fd2e875bb

                                                      SHA1

                                                      ba360186ba650a769f9303f48b7200fb5eaccee1

                                                      SHA256

                                                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                      SHA512

                                                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                      Filesize

                                                      13.8MB

                                                      MD5

                                                      0a8747a2ac9ac08ae9508f36c6d75692

                                                      SHA1

                                                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                      SHA256

                                                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                      SHA512

                                                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      2cc0e8c6e3e0d34b07eeaea61a85ff3c

                                                      SHA1

                                                      87f86432a3d62451fa2b48182505a75cee99d9af

                                                      SHA256

                                                      9a6c47b1fe0362147df93836a49a65098ab227c00d9d27c8c2df277673ef3660

                                                      SHA512

                                                      0da32d94ca1e3ecea0d9dc6dbcbe2d84d6162dd6c80b6e0ec45c0831b2ceb7b9b53bdddadd9e0c7227a5cb221bfd9bbc4a91582b0c7a943a1c36b4d2d6242881

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                                      Filesize

                                                      18KB

                                                      MD5

                                                      86637fe8bd2ffcdd0a24143ff492b2b2

                                                      SHA1

                                                      f3168b08ad4b83ba24e2790697d44cbd2664075c

                                                      SHA256

                                                      d404ab8bb86cc625a95960b859f5d7950f42510a8ad3776a1bf90b5ac5701bd1

                                                      SHA512

                                                      109049e88fd5a306e434e931b1db9a261b7f2e14c808c7e1a2194b4d9b207b79aeeea4621bb7fe75823df63ae8ebb9994b3f9bdeec568a7c9da305801b2e8ad5

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      87396df6182432996c2dc5bf086e25a7

                                                      SHA1

                                                      900b35d33dc5e0a2c12e7db20208f849dcefb26e

                                                      SHA256

                                                      421e3ee56cf912409b54fc5ee24e89cc1af2a988ded4c2e6f21cd9992d5ed5aa

                                                      SHA512

                                                      ae382719e52b9305e539310aee7883982bc834d9e9dbbdcd78d545ea15913f710d474568fe7c034e5799efd9fe4599b49a9ab2a7521246c6b42e76a0e07c46f8

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      04211dca2f05a382c9923661d5ff32f8

                                                      SHA1

                                                      b2a4be295ec15cd4ace245d27117fc7ff6ca95ff

                                                      SHA256

                                                      086b1dd9c6830d37f2ae336be4d833792062fb1c902ac66e5f6b26a707c6f8cb

                                                      SHA512

                                                      1d8df9a92383b0d646c8e63d0d7f0b15a4c01c305c4cec1b738a39f5dc4d52f5cdebbb85e3a29338c71aa9af9294d0ee030b93f723ba0acaf5a241b66f0131a6

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      050f965d3e7cd43552a10f9541388bc7

                                                      SHA1

                                                      9d576212dc8b2f3d63e105ba4b40213cd5ffd968

                                                      SHA256

                                                      dfd11a6f6e8f4f6ac7678b6b0937e2af55effd4e4fe5ba30f73aa9fcb6d5abb7

                                                      SHA512

                                                      c27dc91beb94066f85bd2369e78f6c791cc4ddbbf427b6b42c287c8e1bfef182467f3487287b59c2d4c7448df73fe4ce789b16a77b09e11cceb22e04e768f7f5

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                      Filesize

                                                      15KB

                                                      MD5

                                                      bd528ec996c8a5b7ac3ce1d1f65e8707

                                                      SHA1

                                                      b301460d03bce5000ffde2378c0298ee019ba072

                                                      SHA256

                                                      5de721c6ea8e51fa804611b19ab85fb871dcfc5cb1d088a1d812b67dab97cd7f

                                                      SHA512

                                                      16cb306352af63b8383d69bb3ca629d44b487e71f14e13ebc70f68b233ce83a08c5bd3cf62daf30de28d5db20bcf4e6192014f3e2f9ace70c2cbdee5887491bb

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                      Filesize

                                                      15KB

                                                      MD5

                                                      c32c105c59df774bd347405511f327d8

                                                      SHA1

                                                      5af5346686cc4e489969c8ea3df87a120f164747

                                                      SHA256

                                                      90bb43e0586442abfd8def6fbd4d5424a0dafe6f6baa9ee4d95c20c2ee464cab

                                                      SHA512

                                                      168efe9836b099d973ea454c8af2725049cf9ff2c8411ccc5fd2cc8c0eb0ebc5ce4582375e80d7d2da8f10463db4f16bbe178aaad8b89f6a6da940cef7762955

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                      Filesize

                                                      15KB

                                                      MD5

                                                      35e2726a8b54737e804c1fea5f9d0eb1

                                                      SHA1

                                                      57b26093af85097e64c6228f33fbda427c9342bd

                                                      SHA256

                                                      31eb2270050556a19bdaca59e34682351f14f030432ec497be9dd175792b9ed3

                                                      SHA512

                                                      3618fffa5ad8230ed57f371c74c0956613efba11884451a20eca7df6e524ee39e878a108136eefcc4baa97d23d402a25812e0ce6fb6e9faad76b7e054a8b715b

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\13832287-42ab-44f7-930b-2f9eb6c87573

                                                      Filesize

                                                      25KB

                                                      MD5

                                                      45b9c1acc3107829180b1af5435217ee

                                                      SHA1

                                                      c96e7e29ddaf6ba8d6574e0f7cdf243549dfe391

                                                      SHA256

                                                      cc063958c06207835a381af51ef8f311a60edc3a2597131be7a7a322c9ae1c59

                                                      SHA512

                                                      59c777c2dc29bea05198d3063272cca46029bd2cc84edc78bef80e675622c713c0a20e5dbe4daa11728d87d319bdbd0101c1f698b42b351fab864b437b2de021

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\700df825-ad57-4b89-b915-87ec56e70603

                                                      Filesize

                                                      671B

                                                      MD5

                                                      d5083698caa736b31e9ce0431c714b96

                                                      SHA1

                                                      a550053d1c26a85e8af12f0123c20fade1663ebd

                                                      SHA256

                                                      5f087d329c0fe27bfd00c308afb0f09d9140d9d86e6e1355fdf5a532cfbf4332

                                                      SHA512

                                                      77e802e37688fe40b71942d7b1a56a7520ad517d598490e0e8df0744d14e85922c87c95a7adbd3a6eb37e30977ba00c7bbfca41fc2b2be86da419c3184d27e83

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\9bf294fb-ca74-42d6-aba0-5380fccc43c1

                                                      Filesize

                                                      982B

                                                      MD5

                                                      a2de360ac67d32f85c1d3b5d553c4fcb

                                                      SHA1

                                                      8a40f831c652d065f8dd6e21e7a19c72444bdb08

                                                      SHA256

                                                      4499d35c774cac016e45537062adf4f56cbacddd9301344775992cbbb3507c5c

                                                      SHA512

                                                      10a1a5f3b9939dc108bfe31131af6556fe2d7745200e5419e5f67f2a41200eaf897664c1ad70d7937a0fa60a99fd84b1f7e11c8e2016fca18eac2ef4d5bbd144

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                      Filesize

                                                      1.1MB

                                                      MD5

                                                      842039753bf41fa5e11b3a1383061a87

                                                      SHA1

                                                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                      SHA256

                                                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                      SHA512

                                                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                      Filesize

                                                      116B

                                                      MD5

                                                      2a461e9eb87fd1955cea740a3444ee7a

                                                      SHA1

                                                      b10755914c713f5a4677494dbe8a686ed458c3c5

                                                      SHA256

                                                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                      SHA512

                                                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                      Filesize

                                                      372B

                                                      MD5

                                                      bf957ad58b55f64219ab3f793e374316

                                                      SHA1

                                                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                      SHA256

                                                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                      SHA512

                                                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                      Filesize

                                                      17.8MB

                                                      MD5

                                                      daf7ef3acccab478aaa7d6dc1c60f865

                                                      SHA1

                                                      f8246162b97ce4a945feced27b6ea114366ff2ad

                                                      SHA256

                                                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                      SHA512

                                                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      46ed5e25ad5ccfa26bcdde5e66d44ff0

                                                      SHA1

                                                      f4860a2c06d79bf20b59ba7e21792777002603f0

                                                      SHA256

                                                      5046a7838e68c348e2cbfcd6ce11d5267b607f0d398b8f06d0859fd9b315dd3f

                                                      SHA512

                                                      9afed982f91b23d915024afab9cb7220de0c0b9e435c4e7cf23f9edd57e0b3aea094873c827c506ea8b158acc7b42c187b9bc88e18c5f71c1919fc47a247d7ab

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      be8182e88e27aaa0a72af10cccf5e414

                                                      SHA1

                                                      db07cc16c23d8650f7642e41958a07600dd9e525

                                                      SHA256

                                                      0ac500c5b2d9e5b38d2e4c49ddabad909e4c090980e4e4b4358f01243b8b8b36

                                                      SHA512

                                                      e21f03ab4df758cb5be07a71c9657ea8aefadb323a14dff0d15e70422307968e35a4d19106c9935ab0fd2a9f42e9f51b5137da8b9b7219022d4bafae6eb72cad

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      34f8ca770b9a61099ccb2aa2c3ed1b51

                                                      SHA1

                                                      1de9645de080dc0561529192d795e5b64988e672

                                                      SHA256

                                                      0b3cbdb442935992c77b43e818d5cacd868a6712b7280e21e84a984c3a7f26f5

                                                      SHA512

                                                      c5f4c36ea94ff22915d9bf366561d3c9bca392a14d9f4952adf6874c827fedf340b16814dbcdb644f796316e0d5d3582773c54f027888341345feb829a0f1fe5

                                                    • \??\pipe\crashpad_1352_BIOKJPIAWEBXHGPI

                                                      MD5

                                                      d41d8cd98f00b204e9800998ecf8427e

                                                      SHA1

                                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                      SHA256

                                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                      SHA512

                                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                    • memory/1264-17-0x0000000000F00000-0x00000000013A1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/1264-4-0x0000000000F00000-0x00000000013A1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/1264-2-0x0000000000F01000-0x0000000000F2F000-memory.dmp

                                                      Filesize

                                                      184KB

                                                    • memory/1264-3-0x0000000000F00000-0x00000000013A1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/1264-0-0x0000000000F00000-0x00000000013A1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/1264-1-0x00000000774E4000-0x00000000774E6000-memory.dmp

                                                      Filesize

                                                      8KB

                                                    • memory/2236-191-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/2236-192-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/3980-2800-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4108-128-0x00000000004F0000-0x0000000000B99000-memory.dmp

                                                      Filesize

                                                      6.7MB

                                                    • memory/4108-129-0x00000000004F0000-0x0000000000B99000-memory.dmp

                                                      Filesize

                                                      6.7MB

                                                    • memory/4504-2465-0x0000000000610000-0x000000000126F000-memory.dmp

                                                      Filesize

                                                      12.4MB

                                                    • memory/4504-3111-0x0000000000610000-0x000000000126F000-memory.dmp

                                                      Filesize

                                                      12.4MB

                                                    • memory/4504-1784-0x0000000000610000-0x000000000126F000-memory.dmp

                                                      Filesize

                                                      12.4MB

                                                    • memory/4504-3121-0x0000000000610000-0x000000000126F000-memory.dmp

                                                      Filesize

                                                      12.4MB

                                                    • memory/4504-1783-0x0000000000610000-0x000000000126F000-memory.dmp

                                                      Filesize

                                                      12.4MB

                                                    • memory/4504-3027-0x0000000000610000-0x000000000126F000-memory.dmp

                                                      Filesize

                                                      12.4MB

                                                    • memory/4504-3114-0x0000000000610000-0x000000000126F000-memory.dmp

                                                      Filesize

                                                      12.4MB

                                                    • memory/4504-1135-0x0000000000610000-0x000000000126F000-memory.dmp

                                                      Filesize

                                                      12.4MB

                                                    • memory/4504-3031-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                                      Filesize

                                                      10.4MB

                                                    • memory/4504-3041-0x0000000000610000-0x000000000126F000-memory.dmp

                                                      Filesize

                                                      12.4MB

                                                    • memory/4504-3109-0x0000000000610000-0x000000000126F000-memory.dmp

                                                      Filesize

                                                      12.4MB

                                                    • memory/4924-40-0x0000000000640000-0x0000000000899000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/4924-708-0x0000000000640000-0x0000000000899000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/4924-78-0x000000001E9D0000-0x000000001EC2F000-memory.dmp

                                                      Filesize

                                                      2.4MB

                                                    • memory/4968-53-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-19-0x0000000000411000-0x000000000043F000-memory.dmp

                                                      Filesize

                                                      184KB

                                                    • memory/4968-107-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-3122-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-882-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-2720-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-54-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-2050-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-52-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-39-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-189-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-35-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-22-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-21-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-20-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-1374-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-18-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-3112-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-621-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-3030-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-3110-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-3044-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4968-559-0x0000000000410000-0x00000000008B1000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4980-109-0x00000000007C0000-0x0000000000C6B000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/4980-76-0x00000000007C0000-0x0000000000C6B000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/5328-587-0x0000000000FD0000-0x0000000001292000-memory.dmp

                                                      Filesize

                                                      2.8MB

                                                    • memory/5328-588-0x0000000000FD0000-0x0000000001292000-memory.dmp

                                                      Filesize

                                                      2.8MB

                                                    • memory/5328-589-0x0000000000FD0000-0x0000000001292000-memory.dmp

                                                      Filesize

                                                      2.8MB

                                                    • memory/5328-623-0x0000000000FD0000-0x0000000001292000-memory.dmp

                                                      Filesize

                                                      2.8MB

                                                    • memory/5328-630-0x0000000000FD0000-0x0000000001292000-memory.dmp

                                                      Filesize

                                                      2.8MB