Analysis

  • max time kernel
    116s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2024 17:17

General

  • Target

    8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe

  • Size

    7.1MB

  • MD5

    de16056f45e6d98f84dd38a78fa355e0

  • SHA1

    56d833711751143044398d868c2a3f0d70ed066e

  • SHA256

    8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2

  • SHA512

    da4045ac6b5f0080233500a4c501e989b899b8916dde5a2f1f92078943615910a51891dd9dec8ab1121b73a28c6c5069755fec426bf392599113a53eea9ba1fe

  • SSDEEP

    196608:T61etDwoo14zL28osWzvnp629hdbj6ypDXM5:W1cnoaX2zswnb9Hf68DX

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://preside-comforter.sbs

https://savvy-steereo.sbs

https://copper-replace.sbs

https://record-envyp.sbs

https://slam-whipp.sbs

https://wrench-creter.sbs

https://looky-marked.sbs

https://plastic-mitten.sbs

https://hallowed-noisy.sbs

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

gurcu

C2

https://api.telegram.org/bot8009002136:AAHPJrz2-Pn7ZXvJ8icMhaRHpwMHWNcOutY/sendDocumen

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 12 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 15 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 16 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Kills process with taskkill 12 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe
    "C:\Users\Admin\AppData\Local\Temp\8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2q73.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2q73.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0o66.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0o66.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3332
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k74W5.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k74W5.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4636
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1752
            • C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe
              "C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3540
              • C:\Windows\SYSTEM32\cmd.exe
                "cmd" /c wmic path win32_videocontroller get caption
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2388
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic path win32_videocontroller get caption
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3352
              • C:\Windows\SYSTEM32\dxdiag.exe
                "dxdiag" /t C:\Users\Admin\AppData\Local\Temp\dxdiag.txt
                7⤵
                • Drops file in System32 directory
                • Checks SCSI registry key(s)
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:1588
              • C:\Windows\SYSTEM32\taskkill.exe
                "taskkill" /F /IM chrome.exe
                7⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3280
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=16630 --profile-directory="Default" --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox
                7⤵
                • Uses browser remote debugging
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:2904
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffb384bcc40,0x7ffb384bcc4c,0x7ffb384bcc58
                  8⤵
                    PID:3652
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1748,i,2272495318656064496,11189506106874561400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1740 /prefetch:2
                    8⤵
                      PID:2120
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --no-appcompat-clear --field-trial-handle=1880,i,2272495318656064496,11189506106874561400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1876 /prefetch:3
                      8⤵
                        PID:3592
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --no-appcompat-clear --field-trial-handle=2032,i,2272495318656064496,11189506106874561400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2156 /prefetch:8
                        8⤵
                          PID:3156
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=16630 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2904,i,2272495318656064496,11189506106874561400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2924 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:4548
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=16630 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2940,i,2272495318656064496,11189506106874561400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2964 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:1968
                      • C:\Windows\SYSTEM32\taskkill.exe
                        "taskkill" /F /IM chrome.exe
                        7⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5356
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=13817 --profile-directory="Default" --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox
                        7⤵
                        • Uses browser remote debugging
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        PID:5476
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffb23b2cc40,0x7ffb23b2cc4c,0x7ffb23b2cc58
                          8⤵
                            PID:5492
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1832,i,9182300557105319082,10962612480020825465,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1828 /prefetch:2
                            8⤵
                              PID:5916
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --no-appcompat-clear --field-trial-handle=1844,i,9182300557105319082,10962612480020825465,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:3
                              8⤵
                                PID:5924
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --no-appcompat-clear --field-trial-handle=2116,i,9182300557105319082,10962612480020825465,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2324 /prefetch:8
                                8⤵
                                  PID:5984
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=13817 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2936,i,9182300557105319082,10962612480020825465,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2952 /prefetch:1
                                  8⤵
                                  • Uses browser remote debugging
                                  PID:6268
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=13817 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2956,i,9182300557105319082,10962612480020825465,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2976 /prefetch:1
                                  8⤵
                                  • Uses browser remote debugging
                                  PID:6280
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=13817 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4092,i,9182300557105319082,10962612480020825465,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4076 /prefetch:1
                                  8⤵
                                  • Uses browser remote debugging
                                  PID:6624
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill" /F /IM msedge.exe
                                7⤵
                                • Kills process with taskkill
                                PID:4892
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=11986 --profile-directory="Default" --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox
                                7⤵
                                • Uses browser remote debugging
                                • Enumerates system info in registry
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                PID:5148
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffb231446f8,0x7ffb23144708,0x7ffb23144718
                                  8⤵
                                    PID:5164
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --no-sandbox --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2096 /prefetch:2
                                    8⤵
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5392
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --mojo-platform-channel-handle=2148 /prefetch:3
                                    8⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5360
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --mojo-platform-channel-handle=2628 /prefetch:8
                                    8⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5640
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=11986 --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
                                    8⤵
                                    • Uses browser remote debugging
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5860
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=11986 --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
                                    8⤵
                                    • Uses browser remote debugging
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5864
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=11986 --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:1
                                    8⤵
                                    • Uses browser remote debugging
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:6736
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=11986 --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:1
                                    8⤵
                                    • Uses browser remote debugging
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1872
                                • C:\Windows\SYSTEM32\cmd.exe
                                  "cmd.exe" /C taskkill /F /IM firefox.exe
                                  7⤵
                                    PID:3284
                                    • C:\Windows\system32\taskkill.exe
                                      taskkill /F /IM firefox.exe
                                      8⤵
                                      • Kills process with taskkill
                                      PID:5832
                                  • C:\Windows\SYSTEM32\cmd.exe
                                    "cmd.exe" /C taskkill /F /IM firefox.exe
                                    7⤵
                                      PID:5128
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill /F /IM firefox.exe
                                        8⤵
                                        • Kills process with taskkill
                                        PID:5872
                                    • C:\Windows\SYSTEM32\cmd.exe
                                      "cmd.exe" /C taskkill /F /IM Firefox.exe
                                      7⤵
                                        PID:5620
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /F /IM Firefox.exe
                                          8⤵
                                          • Kills process with taskkill
                                          PID:1144
                                      • C:\Windows\SYSTEM32\cmd.exe
                                        "cmd.exe" /C taskkill /F /IM Firefox.exe
                                        7⤵
                                          PID:6060
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /F /IM Firefox.exe
                                            8⤵
                                            • Kills process with taskkill
                                            PID:6340
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 & Del "C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe"
                                          7⤵
                                            PID:6120
                                            • C:\Windows\system32\choice.exe
                                              choice /C Y /N /D Y /T 1
                                              8⤵
                                                PID:6568
                                          • C:\Users\Admin\AppData\Local\Temp\1011363001\0f0ac6eb56.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1011363001\0f0ac6eb56.exe"
                                            6⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4524
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 1684
                                              7⤵
                                              • Program crash
                                              PID:3928
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 1680
                                              7⤵
                                              • Program crash
                                              PID:2880
                                          • C:\Users\Admin\AppData\Local\Temp\1011364001\d29a5547d3.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1011364001\d29a5547d3.exe"
                                            6⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4012
                                          • C:\Users\Admin\AppData\Local\Temp\1011365001\c065e5281b.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1011365001\c065e5281b.exe"
                                            6⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            • Suspicious use of WriteProcessMemory
                                            PID:4676
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM firefox.exe /T
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4712
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM chrome.exe /T
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4420
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM msedge.exe /T
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2952
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM opera.exe /T
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3028
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM brave.exe /T
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1668
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                              7⤵
                                                PID:784
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                  8⤵
                                                  • Checks processor information in registry
                                                  • Modifies registry class
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3780
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3e0e004-9259-42d7-b0aa-fb3225accb8b} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" gpu
                                                    9⤵
                                                      PID:5048
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2452 -prefMapHandle 2448 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07d77683-04fa-473e-89de-7e59c6a2fba2} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" socket
                                                      9⤵
                                                        PID:3928
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3380 -childID 1 -isForBrowser -prefsHandle 3096 -prefMapHandle 3292 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b28e24d6-734a-4ed5-837f-ef7a313d27a7} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" tab
                                                        9⤵
                                                          PID:492
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3900 -childID 2 -isForBrowser -prefsHandle 2960 -prefMapHandle 3888 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d163c454-dd34-4e4a-af5e-24f0efe0a8a2} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" tab
                                                          9⤵
                                                            PID:2132
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4420 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4600 -prefMapHandle 4596 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04609ec6-78bc-4258-838a-d9dfe6100bf1} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" utility
                                                            9⤵
                                                            • Checks processor information in registry
                                                            PID:6148
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5108 -childID 3 -isForBrowser -prefsHandle 5100 -prefMapHandle 4996 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e4d3c13-7f80-409d-b34d-ba5d59568ee5} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" tab
                                                            9⤵
                                                              PID:7132
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 4 -isForBrowser -prefsHandle 5300 -prefMapHandle 5304 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2181e9ee-bdfb-4743-92c5-65a53d1bcbe5} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" tab
                                                              9⤵
                                                                PID:7152
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5488 -childID 5 -isForBrowser -prefsHandle 5532 -prefMapHandle 5540 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {99bea529-44ac-45b6-9bde-a5f207d63bdc} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" tab
                                                                9⤵
                                                                  PID:7164
                                                          • C:\Users\Admin\AppData\Local\Temp\1011366001\5d60497ec0.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\1011366001\5d60497ec0.exe"
                                                            6⤵
                                                            • Modifies Windows Defender Real-time Protection settings
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Windows security modification
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:4512
                                                          • C:\Users\Admin\AppData\Local\Temp\1011367001\a846bc2230.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\1011367001\a846bc2230.exe"
                                                            6⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:6796
                                                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f4472.exe
                                                        C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f4472.exe
                                                        4⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:656
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 1708
                                                          5⤵
                                                          • Program crash
                                                          PID:1088
                                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y27V.exe
                                                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y27V.exe
                                                      3⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:5100
                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o587L.exe
                                                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o587L.exe
                                                    2⤵
                                                    • Modifies Windows Defender Real-time Protection settings
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Windows security modification
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3096
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 656 -ip 656
                                                  1⤵
                                                    PID:1616
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4524 -ip 4524
                                                    1⤵
                                                      PID:1616
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4524 -ip 4524
                                                      1⤵
                                                        PID:2624
                                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                        1⤵
                                                          PID:2100
                                                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                          1⤵
                                                            PID:6388
                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                            1⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:6656
                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                            1⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3668

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            40B

                                                            MD5

                                                            9e930267525529064c3cccf82f7f630d

                                                            SHA1

                                                            9cdf349a8e5e2759aeeb73063a414730c40a5341

                                                            SHA256

                                                            1cf7df0f74ee0baaaaa32e44c197edec1ae04c2191e86bf52373f2a5a559f1ac

                                                            SHA512

                                                            dbc7db60f6d140f08058ba07249cc1d55127896b14663f6a4593f88829867063952d1f0e0dd47533e7e8532aa45e3acc90c117b8dd9497e11212ac1daa703055

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG

                                                            Filesize

                                                            320B

                                                            MD5

                                                            c115182d3fcc4e8d354b95bbdc3857ef

                                                            SHA1

                                                            137ee479b0963a95192940a773fb9b27137478c1

                                                            SHA256

                                                            f1858646c7926ec79eb80cbbd191c6e4c75c4303206aa0bc67f794fa66df131a

                                                            SHA512

                                                            f335592363c2410fa05c41350f86d51b85092b506d49ee306968d1f22bd57c0f149c4e565bc1a0bd19ec9cb5e934bdb590888564a39af335cf2fc6abc88fa53d

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                                            Filesize

                                                            329B

                                                            MD5

                                                            95e1e3010023d3ceaeb5ed90f3827df7

                                                            SHA1

                                                            3415dfa980f237365072b75158c2b3abcc528129

                                                            SHA256

                                                            14a826a93370c7858c7d78c9dd2948252b414c83f53b7216601480f973efa169

                                                            SHA512

                                                            531d2928342d56ef84d56174e322d80fea32b89a987996d6d79fdc05d8e91889d1a1c3d7ef28cf3236bcf5dc938c6c6263ea6162a29006e6ac6be02a85ee63a9

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\29749d94-bbcf-47c7-9c0f-f206902fa83a.tmp

                                                            Filesize

                                                            2B

                                                            MD5

                                                            d751713988987e9331980363e24189ce

                                                            SHA1

                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                            SHA256

                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                            SHA512

                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG

                                                            Filesize

                                                            333B

                                                            MD5

                                                            b6e386064faf0ed080b7e070fe592ba2

                                                            SHA1

                                                            c32c0b8ad27153ceb36dd0179049fee0af07e387

                                                            SHA256

                                                            978185cebc207478ee31f59d9e3676abb0d2c6a04d1177a53883d86d6e95068f

                                                            SHA512

                                                            c0dd5cdfb6137c2b854b923e8d7ad20ed0b2da0ccdd47deef44b24eeadc7dca2b830b79ae54bf9515514da443f14d999d4cc0210ff605f432e26724dce9734dd

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.log

                                                            Filesize

                                                            308B

                                                            MD5

                                                            4e7982b86b3d7d916b7722aa3b3f0669

                                                            SHA1

                                                            ce4e874903cb71d9012cc7654ca7a6ba5e4f7efd

                                                            SHA256

                                                            cbee1100a2c9add47776b7e416b58a809f6feb9fe458bef8185b0c176b5db340

                                                            SHA512

                                                            c4dda8b36e90a327061dab901730f47fc23cca129b02a157f1ed0c566a1d6dddf272a4e74d3acbf14eb3a7fac0820387a584db9e19ca299724ed7f3030f891bb

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG

                                                            Filesize

                                                            317B

                                                            MD5

                                                            df7b67201e483fbdafa7bb2b8c8e46a6

                                                            SHA1

                                                            6ba134c4c20d207b5143361b626517c4e0f15f51

                                                            SHA256

                                                            395cd37a1b01ca08047561a6e69d04d54c7d8fd3820e1f2a7d5a2fa84d86ca3b

                                                            SHA512

                                                            0d2e47a95a1520e91dca9c8c962d50e3e678d332f18481fca60924867355fdfdb5d1b6444105f8693af6a4f5ea5fb7ae52733bbc5e86593a10a7ff23a18f4bbb

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                                            Filesize

                                                            345B

                                                            MD5

                                                            55adb595b579c8c957c7c65ba8445ec6

                                                            SHA1

                                                            b30340b7419bbf3e905ac53566d7271683c870ed

                                                            SHA256

                                                            99b6413e8b157e974a167eee9a9bdfbf11a343934f6fd176f7797205aaebee0e

                                                            SHA512

                                                            5bcc315c8c533db0c4562ad2349dc48405a152b4019606962c91fc88195552baf1a190e8686229080dbcdf3e6726db80d9f186823d0f317c0b2b988b20d7c97d

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                                            Filesize

                                                            324B

                                                            MD5

                                                            62b8b67112cb27f2a4e180096be0247e

                                                            SHA1

                                                            a82682d243276423b18b4529ae7352b3fb564340

                                                            SHA256

                                                            d87e1c4ed83a77b816d0278848016b019dcd8d1f23dff6d25da75174428bf519

                                                            SHA512

                                                            2d45dab800aaf8c3a7dcbb2b023d6a5f1439b5de0e97b3e2b2e9fe8dfe75c02e47c67af044c70ea9c31311cb8fa86297cacba34a01138c619cce8c5b1cd946a2

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager-journal

                                                            Filesize

                                                            8KB

                                                            MD5

                                                            61475be663440a24ef8cc48c77d957fa

                                                            SHA1

                                                            8c4de79d85ee5886b0106e76ffbe460da545b2dd

                                                            SHA256

                                                            b442fb2a256dca3fc7aa16af645fab3d2c138551af3086a76a3a0285f56c2c26

                                                            SHA512

                                                            253b87747c4492b92129bc74fc53c6c09512cdc622ba1cb12124e1cde0ab1c3e9e77d8e2a9693ec5a0826e847c2266ab3b085c9ada7f6b4d091960ecfd2ae68b

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log

                                                            Filesize

                                                            14KB

                                                            MD5

                                                            d9132c8c45b4fe3a7b3bda53b300032d

                                                            SHA1

                                                            a1e2377f4b1e7fba66ad780e48a29547e24f18f5

                                                            SHA256

                                                            d2e14cabcbb5553092cad535ec57bdc323a14ff7380ba7f01a847fec96b329b1

                                                            SHA512

                                                            45d5491d15fa1ff1f8b209366506316f56ea146f9e770fc863089aa8ee3b009f2ccd1e6ccbf4eb3177784ccc35f8ff3a1bcbffa04a0aa78cf49d1e29b5fbff52

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                                            Filesize

                                                            320B

                                                            MD5

                                                            afed09aaf305b3341cd2591676959416

                                                            SHA1

                                                            c7550ce42bee741f79f8b423fda3fd24647bba8a

                                                            SHA256

                                                            baf74821c9ef4e1eae40b1a3234af632c768ef5488e1960bd67b1c1d947710c2

                                                            SHA512

                                                            9705843953f1d9102bd7669e9179efec7bd367062c8e168bb0064534b4ef6e229f1157677b9ee758d300aa69ebced502c09d8bf7435aa486369668ecbd645668

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.log

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            e8be80aa28ff20d2fb5db4164beb089c

                                                            SHA1

                                                            e077bc1dbd9691426fc12a965d5eb7a0a7e054c7

                                                            SHA256

                                                            b9fd78e2d20e48e7157356b6dc202b9d7e69f2cdc4873eb71ab2c4cfd4393e71

                                                            SHA512

                                                            42f8b26c5178b5291327abda5f92fac051e2cbc61a6d4bee2a96e89a4ca6d0caa0679f241e75de438836aedce9a081c161daf1d1681c83b308b5802bb8994b84

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                                            Filesize

                                                            338B

                                                            MD5

                                                            876b984158968ee5e1bf31dd256b98bb

                                                            SHA1

                                                            9aa9744cdc9835f8f0b9c94e8c59fb8160c8154c

                                                            SHA256

                                                            529bf94789c0040fdfdde30f42852afdb47aebef03bbeb4ddec137af09d93f80

                                                            SHA512

                                                            b18341de1307d6e0c2afcfed4de948d9439ef42631c3fdc1bf288dd01769f22e3e4da2660d955b2359ffec02aecb965569a8cfe8a253a7633f4fb69864ba6f99

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                            Filesize

                                                            14B

                                                            MD5

                                                            ef48733031b712ca7027624fff3ab208

                                                            SHA1

                                                            da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                                            SHA256

                                                            c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                                            SHA512

                                                            ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                            Filesize

                                                            86B

                                                            MD5

                                                            f732dbed9289177d15e236d0f8f2ddd3

                                                            SHA1

                                                            53f822af51b014bc3d4b575865d9c3ef0e4debde

                                                            SHA256

                                                            2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                                            SHA512

                                                            b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            d22073dea53e79d9b824f27ac5e9813e

                                                            SHA1

                                                            6d8a7281241248431a1571e6ddc55798b01fa961

                                                            SHA256

                                                            86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                                            SHA512

                                                            97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\369730ed-ffde-4954-ac19-89230703a418.tmp

                                                            Filesize

                                                            1B

                                                            MD5

                                                            5058f1af8388633f609cadb75a75dc9d

                                                            SHA1

                                                            3a52ce780950d4d969792a2559cd519d7ee8c727

                                                            SHA256

                                                            cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                            SHA512

                                                            0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            ea262adae8e1fb903bcb3783e3241791

                                                            SHA1

                                                            f88127e9b8b5e00bdf61bd3ffb4a604b2d12ea5c

                                                            SHA256

                                                            09014e7a1e946e4527309fbd27273d60897d60f6022b5d49bf73af907278ffe9

                                                            SHA512

                                                            aacf688cc0bb7ba73c3a23ddaa71fcb0ed93e8c5f0e179a8cd11506fe1d0c4a08483703efc2ae02aaf0f0ce4fe9f7ac4b94ed44f75b8f6df2d2d07cda109906e

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json

                                                            Filesize

                                                            19KB

                                                            MD5

                                                            8c9384c0ca51308cb9c7c6d41e2e8674

                                                            SHA1

                                                            5db273f79f0c08b5370a19fe74a285750c7d2f4e

                                                            SHA256

                                                            d4429ea03b8fa283b4a3f4a10c5e51a84273a85bb7522b45eb07204f1b486249

                                                            SHA512

                                                            316a1eabb3ca7b44e640134f0c4b58be59da5f059739bb56c1ad3016fe889ae5ab7214c82a93ed35b5a2f689cb5f03e59b324eacdf6b40ab55ef77b84940fcd4

                                                          • C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe

                                                            Filesize

                                                            560KB

                                                            MD5

                                                            197feb829312be2d9505c1492b6ddd16

                                                            SHA1

                                                            4e521c36e4fd6c7755d93f8281cc028a980b0979

                                                            SHA256

                                                            2a08227ca39953cd8f967682f4f101f8debdc323b63b37aa1e9ddc38b9009a12

                                                            SHA512

                                                            fa9b18fb32f2892a4844fcf3d29823c1375daca8b3c46ce2dd048e3b11ff2ba2acf6ef73c38e57d16712e75304c8961cf7f2dee4213dc10798f645f9d59c8cb9

                                                          • C:\Users\Admin\AppData\Local\Temp\1011363001\0f0ac6eb56.exe

                                                            Filesize

                                                            1.7MB

                                                            MD5

                                                            d0f2c0640871f010112184d7e059d71d

                                                            SHA1

                                                            4b15d98aa959f70998734981c6c57a12538c71a8

                                                            SHA256

                                                            cb3d8ee15d2b14e807c77b92a7c48675b1f9524547c163ab787f82aa56ed023e

                                                            SHA512

                                                            f7f355f8593cf8c913638e246698c9a184279ab0eb523c5ae60939ce3387cda78dc6210d1f5eae110269162f75b3b3b196c3dd123e6d69d0e31b34decc9857c8

                                                          • C:\Users\Admin\AppData\Local\Temp\1011364001\d29a5547d3.exe

                                                            Filesize

                                                            1.7MB

                                                            MD5

                                                            99dbc3dc8a5a570531e619921a3da5a4

                                                            SHA1

                                                            955d1394d9074948e6f2a4ba90d316930580d9b9

                                                            SHA256

                                                            f9f42f3b2bf9665693451da26453f988ab5f0c636929bc5e39203e24e65e9b92

                                                            SHA512

                                                            36da7b98b3ac918f33498fc3f46b0e1c0790580b223ad1600c53dfba8e9078a69984b65f259d20e164ed34d0b7b386f2983558d84069d007b8858ec63c242e03

                                                          • C:\Users\Admin\AppData\Local\Temp\1011365001\c065e5281b.exe

                                                            Filesize

                                                            947KB

                                                            MD5

                                                            05ddc021a4b3ee147c8f107bbe549fa0

                                                            SHA1

                                                            f0dabac9cac119dd4eeb8540f51e92cd3dcfb543

                                                            SHA256

                                                            78bf23bf9328f0dc4d586a8534eadcc7e5db0c227b3bab76af4be20be2aa2722

                                                            SHA512

                                                            cc44c10831296ee0cad1143bc814745d63e872e3668d7f35a520ab43a262c335bd97d77a16374d9bfa514e722e4614b59a8ee0f9c7a068fa2b1b3b8d5e305c81

                                                          • C:\Users\Admin\AppData\Local\Temp\1011366001\5d60497ec0.exe

                                                            Filesize

                                                            2.7MB

                                                            MD5

                                                            d074af8129d64ccd7455fa7691582b25

                                                            SHA1

                                                            28ab71be91261912fa60093680f852ef29004d48

                                                            SHA256

                                                            79e9912fa56d1e8a79defd3db070450e34a253b2bdc36f7b6eca42bc9cf18fb5

                                                            SHA512

                                                            c2570d7a2f5a3d6f1fecf672e6a1832186fb005a9cbd2a5456382a1ac4906ecc0f2f182cd5e297ef3e3ca79c4b2ada3f85f241886ced64e82925022bbb67444d

                                                          • C:\Users\Admin\AppData\Local\Temp\1011367001\a846bc2230.exe

                                                            Filesize

                                                            1.9MB

                                                            MD5

                                                            972aeaccbec56da479e178a53d3b24ff

                                                            SHA1

                                                            af7d676bf5c59c2ac6cfaaaaad067ed34090e675

                                                            SHA256

                                                            c4a071a267dabdb052c37972911874070424f210cd7f3aa6e33cf4e08efbd87d

                                                            SHA512

                                                            53599df300461312f499a4c8ef303724d74417b5d26a9cf189a35dcf6a76d0aa686c8341af6e50c35182d769c2223407cf9076878fbaf52e0f6c2933dff319e1

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o587L.exe

                                                            Filesize

                                                            2.7MB

                                                            MD5

                                                            2490b83d42152804dd6911dae9d57b9d

                                                            SHA1

                                                            f0511fa429173266a5fc4173bc2317f44db1bf76

                                                            SHA256

                                                            6f8b8367498695d4e0dde1072b4b31e4aa5e11d73bab3dbda858a287186e9c3e

                                                            SHA512

                                                            a712e56b9aa52901ba13ed6ac00d3565f890ed69e81fd661b5df651903c47b9389d4ee905041f34b3cb3381b29c1762907db1551ed7cf16b2b468a6caf765cea

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2q73.exe

                                                            Filesize

                                                            5.5MB

                                                            MD5

                                                            efd1c6bfa8e79db02b5081e9e941a9c5

                                                            SHA1

                                                            8bcfe0d602b90daa5f98fc1e7f43355ca8fb8775

                                                            SHA256

                                                            2f7e38f1eea5f968083a60254110e43f35bb578280f7b34147eee19e1e2d3e4c

                                                            SHA512

                                                            e700b7e3987f33122dcb474ecbd8836b8f54f1cdda39105949a5d80f9c8428666e978db7eab80aae40f2c0524266ab12511b05876c15b7af31c18fa544ca3e32

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y27V.exe

                                                            Filesize

                                                            1.7MB

                                                            MD5

                                                            9c9d3e584df24ab3e393e1cf3a1d22bb

                                                            SHA1

                                                            fc54421a0f10399c33daa802018fa55d1cb3fc1e

                                                            SHA256

                                                            8c32a93b51b5a8f3dc864634df9e64033024814f88d4724d321f4af591b5fcff

                                                            SHA512

                                                            548277217b14c89bced03e197f6bfe1039c22b36bc831263a3c28ef73d454317fc3d5ce6b96d6c02f80b24660ee0c1d563ba659365c3e51a432e89beb4f1957c

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0o66.exe

                                                            Filesize

                                                            3.7MB

                                                            MD5

                                                            2ad344cd9ba7765d4aef5ae48b9f9de1

                                                            SHA1

                                                            61233c777d2c1e920d48a62febbbfb87f8cb0385

                                                            SHA256

                                                            a681dc8677a089ba5912b93791a1c8911adaa5ff58da99c25620f8a738e1ad97

                                                            SHA512

                                                            7938b9ac2201164dba801473335dc9eeb16950a6beb36a5405f00de73052b45f1a7372d2cee0ad9cadf0cd3b5d8f7d52139b2f43f99a0c9bd23fc1f634acf280

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k74W5.exe

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            44880800383f2d1e6ba9415f3ab244f3

                                                            SHA1

                                                            e0c65a51792be71d737c657164eb71dfc33e756a

                                                            SHA256

                                                            82460b8569927f518661f783b5690e7feb08d8cb43afb5d0ecd01127c2672ef6

                                                            SHA512

                                                            4505f7fd96770a6836e74208cccdc14e4692bef80ece4ac2bdd76d35e47c12254973e3cbcd254aff0a81eb370ac91edc3cf1b7f158227defed1b4235b5a517c4

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f4472.exe

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            ce43ce23bf4d7d8900e1d2c977a21485

                                                            SHA1

                                                            abfb344c9e741d65422f860b6a264427edae49c4

                                                            SHA256

                                                            6d880676ae7d6879ae8a558d891980c4ea1ff1f35fe389e611939a89b3ed5763

                                                            SHA512

                                                            a1ace2a775c4c3928bb6db2f1355f700ef87394704ad4c94c130dc12642473063a56343a5417315276df3ca0ab013b5a4862a01cc5fe749d92365a75da639958

                                                          • C:\Users\Admin\AppData\Local\Temp\dxdiag.txt

                                                            Filesize

                                                            86KB

                                                            MD5

                                                            5cb5d9c71ade118899e3d494c32f5eb1

                                                            SHA1

                                                            be1ccb4603b67edee76af3b4096c5dbc08e1ebfe

                                                            SHA256

                                                            6c67994ebf90ab1acd86e09295d81788db497f384fbf6c8fe3a9fbca58e968f9

                                                            SHA512

                                                            ff61f5f465acbd5fcff7e3c6eb64364b8b189c756edad52cc986f51b4c4c4288d42c76550dbdd239c525c1e43a73c33bac2c6b742ab3539368684669c54b2866

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                                                            Filesize

                                                            8KB

                                                            MD5

                                                            08924cc45e262187ef29d73737d510bd

                                                            SHA1

                                                            2059b5dc9847c989a9c49d1fa2cfeece4499bcf0

                                                            SHA256

                                                            fae7828a8c9cdeefd5aff832cff6cde75bd25b97a15db0f5a13b392adb215e36

                                                            SHA512

                                                            cc4f16c0c4e947e4732566dbd3465fdf35ee142a49b8dbe1048ae5488403a071b4421754b265b4d3e4f28b89572fdc9c185eaa33836d7217cea7305d3f0fce54

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                                                            Filesize

                                                            13KB

                                                            MD5

                                                            ce917ece0203b3fdba614c00e2f3e8e7

                                                            SHA1

                                                            f23e0e8e66edefe6f3418372e7b2d8c99c3b98ce

                                                            SHA256

                                                            1ac2f4412c1a293759943d2d890d7adf238b465943ba573e24a35305955da5c6

                                                            SHA512

                                                            9ccb564f4dc229090e83b3249a15681c17cb3a777fcb34e19ac698ddf70de716da3cd12fba78f0f95133e61c2e4f1c2b9aca48678c4b48e7fae71eefe9d095a4

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin

                                                            Filesize

                                                            23KB

                                                            MD5

                                                            c76751e89a768902f3c6363fa738ed60

                                                            SHA1

                                                            fa3051c14e6d144f8d78efa0ab7071dc0af95a8d

                                                            SHA256

                                                            b80c4674d79cd58f402c511a64488fefd3da54e79e1d2bad865d01df04fff08e

                                                            SHA512

                                                            856a77881df7da0a164d7dc94cd0cf20d1a1af139e195060a540cdace873a5def9485b8a3f975631cd3f78a3abc5cd274571e5cfd579d06baea18bd837a6afeb

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            1b86aac2d790542f0ca284c5c9b09430

                                                            SHA1

                                                            8e014f45ed54c043bd7a2c6c8450a9d1deeb0bc5

                                                            SHA256

                                                            26f1b8773cb780fc3058cc6f51905131a1d20886da4a1edbaa2a17b12354813f

                                                            SHA512

                                                            a3dd4d5ce83798192e4c4f3dda9509552ed4bbda0d4507f6f6eb5fcdf199ee4cd5d28a3719f1de70d34b7a21a6016ca77c2446808feedcbfee71db665c78831a

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            0c705c930ea875bebe9b6e98e2ec6663

                                                            SHA1

                                                            9d7fcab78dab578404e09584bb1324c50ea0b51e

                                                            SHA256

                                                            60281a196b4eaea4338c4371f849c85ccce4551bf5e2b81c97dd7d9b6daa79e2

                                                            SHA512

                                                            06626671d70cbb7874e816ab82941eeae76fe36c8966d77b3a73179d8ad0d753b69f3af9f06e3c98dd8baade63e50b808ae5f4d3d6b1e2f8e77868d6ada0d19c

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            b67d6f71c690dddbb863174976c3a2a1

                                                            SHA1

                                                            9cde284637afb2f04dd8ee7170b798f2a95e61df

                                                            SHA256

                                                            05987bf67230db6d192f799cfa55cf82c57d0f58acd5304b3308f1471aab33ad

                                                            SHA512

                                                            c869fb11fc2f2f3f84e092c7db55acf63569341a6a0e5e321ca328cb3f5789fe470b730c049f1d6d9c28f4266763d19eb8eeb548993a1bc63d2bd815d26f8c34

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\009d3c29-cb82-44a8-a732-b469ea5228a2

                                                            Filesize

                                                            26KB

                                                            MD5

                                                            732fa6c5e78ce3a455b4616491855b5a

                                                            SHA1

                                                            c0536d97dcdface42e64ad0a14cf3de9cfd2695b

                                                            SHA256

                                                            b48b967de6302c0202614e3dfa8a37de32b91f1496fbb4708b32391d6864235e

                                                            SHA512

                                                            4202ea373c3b0102fbad3c188f13d57277ac090451fb494fb16d4559a7a54a292e9bec0d47c1ea5e7f349406104037ba833676d89b7b7fd97e1c028dddfec33a

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\61f2e214-3ae3-4e08-99e2-d8bad2c2a613

                                                            Filesize

                                                            671B

                                                            MD5

                                                            42897c64c380449cce5926dd14c0c608

                                                            SHA1

                                                            a6667c2d75db5fa84d8f67b4aef192b18398db41

                                                            SHA256

                                                            a3225b7700bdf2ced91646ce30989897e88f9a895709fdb358fbcc5f3595d6ed

                                                            SHA512

                                                            b0583fd72118fe6e73649245815c0e9e74970d5b4c1441201081b2672d4a9c368b1cad781f48fdb60dce980c5031c6e6ae355874f398c83662a2c99606e5af56

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\bde9faa7-4be5-4368-aa65-d3f6b903630e

                                                            Filesize

                                                            982B

                                                            MD5

                                                            ad77e3dfa7db28b750f9e4b9c6a4bce6

                                                            SHA1

                                                            f78432b9ff7bd04da17760158bcd60764589b301

                                                            SHA256

                                                            de173c6268788735892de8d00a5648ab48b0d26e53a6286e4f9b7eada7888352

                                                            SHA512

                                                            19c24a2bc908e12e6fa34d8a1a7af5bfb1784f139a6f2ac78d15d5ea143fac0f55aa1aaf79e58a3a67c1a2792372c57610c85cd3032e0df5c9fcb8944b317181

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            f4585357a6e5a18da6fb8af8b5b1c253

                                                            SHA1

                                                            7ac635414f3b7b9f7d0c7210b1f23d7f59959af0

                                                            SHA256

                                                            a50eff36888b04c15fef177dadadbfda9b1cf4add64682c613cab7c22233ac91

                                                            SHA512

                                                            f970ac12c319c0417b21319959e6a09dab6ae6545e61d4a62258eef4e512545fbca53e51cded6c61edef9959b06b9c340bd42de2c87d57b36677ac89281051bf

                                                          • memory/656-39-0x00000000005C0000-0x0000000000A60000-memory.dmp

                                                            Filesize

                                                            4.6MB

                                                          • memory/656-65-0x00000000005C0000-0x0000000000A60000-memory.dmp

                                                            Filesize

                                                            4.6MB

                                                          • memory/1588-95-0x000001BF2E1B0000-0x000001BF2E1B1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/1588-101-0x000001BF2E1B0000-0x000001BF2E1B1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/1588-97-0x000001BF2E1B0000-0x000001BF2E1B1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/1588-96-0x000001BF2E1B0000-0x000001BF2E1B1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/1588-107-0x000001BF2E1B0000-0x000001BF2E1B1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/1588-106-0x000001BF2E1B0000-0x000001BF2E1B1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/1588-105-0x000001BF2E1B0000-0x000001BF2E1B1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/1588-104-0x000001BF2E1B0000-0x000001BF2E1B1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/1588-103-0x000001BF2E1B0000-0x000001BF2E1B1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/1588-102-0x000001BF2E1B0000-0x000001BF2E1B1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/1752-1099-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1752-1103-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1752-121-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1752-765-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1752-1093-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1752-1095-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1752-1097-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1752-33-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1752-1101-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1752-1088-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1752-1108-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1752-78-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1752-1050-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3096-171-0x0000000000BA0000-0x0000000000E58000-memory.dmp

                                                            Filesize

                                                            2.7MB

                                                          • memory/3096-185-0x0000000000BA0000-0x0000000000E58000-memory.dmp

                                                            Filesize

                                                            2.7MB

                                                          • memory/3096-76-0x0000000000BA0000-0x0000000000E58000-memory.dmp

                                                            Filesize

                                                            2.7MB

                                                          • memory/3096-77-0x0000000000BA0000-0x0000000000E58000-memory.dmp

                                                            Filesize

                                                            2.7MB

                                                          • memory/3096-75-0x0000000000BA0000-0x0000000000E58000-memory.dmp

                                                            Filesize

                                                            2.7MB

                                                          • memory/3540-59-0x000002421EB00000-0x000002421EBA0000-memory.dmp

                                                            Filesize

                                                            640KB

                                                          • memory/3540-1074-0x000002421F060000-0x000002421F06A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/3540-64-0x000002421EC60000-0x000002421ECD6000-memory.dmp

                                                            Filesize

                                                            472KB

                                                          • memory/3540-63-0x0000024206290000-0x00000242062AE000-memory.dmp

                                                            Filesize

                                                            120KB

                                                          • memory/3540-62-0x0000024206260000-0x0000024206268000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/3540-61-0x0000024204A70000-0x0000024204A7A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/3540-60-0x0000024206230000-0x0000024206256000-memory.dmp

                                                            Filesize

                                                            152KB

                                                          • memory/3540-172-0x000002421F0E0000-0x000002421F0EA000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/3540-58-0x00000242045F0000-0x0000024204682000-memory.dmp

                                                            Filesize

                                                            584KB

                                                          • memory/3540-164-0x000002421EDE0000-0x000002421EEE2000-memory.dmp

                                                            Filesize

                                                            1.0MB

                                                          • memory/3540-1008-0x000002421EC10000-0x000002421EC1A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/3540-1009-0x000002421F050000-0x000002421F058000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/3540-1007-0x000002421F030000-0x000002421F046000-memory.dmp

                                                            Filesize

                                                            88KB

                                                          • memory/3540-124-0x000002421EC30000-0x000002421EC4E000-memory.dmp

                                                            Filesize

                                                            120KB

                                                          • memory/3540-1087-0x000002421EDE0000-0x000002421EEE2000-memory.dmp

                                                            Filesize

                                                            1.0MB

                                                          • memory/3540-1075-0x000002421F090000-0x000002421F0A2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3668-1107-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3668-1106-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/4012-140-0x0000000000120000-0x00000000007A8000-memory.dmp

                                                            Filesize

                                                            6.5MB

                                                          • memory/4012-144-0x0000000000120000-0x00000000007A8000-memory.dmp

                                                            Filesize

                                                            6.5MB

                                                          • memory/4512-736-0x0000000000230000-0x00000000004EA000-memory.dmp

                                                            Filesize

                                                            2.7MB

                                                          • memory/4512-1060-0x0000000000230000-0x00000000004EA000-memory.dmp

                                                            Filesize

                                                            2.7MB

                                                          • memory/4512-1049-0x0000000000230000-0x00000000004EA000-memory.dmp

                                                            Filesize

                                                            2.7MB

                                                          • memory/4512-735-0x0000000000230000-0x00000000004EA000-memory.dmp

                                                            Filesize

                                                            2.7MB

                                                          • memory/4512-211-0x0000000000230000-0x00000000004EA000-memory.dmp

                                                            Filesize

                                                            2.7MB

                                                          • memory/4524-170-0x0000000000570000-0x00000000009FA000-memory.dmp

                                                            Filesize

                                                            4.5MB

                                                          • memory/4524-94-0x0000000000570000-0x00000000009FA000-memory.dmp

                                                            Filesize

                                                            4.5MB

                                                          • memory/4636-21-0x0000000000B70000-0x0000000001034000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/4636-34-0x0000000000B70000-0x0000000001034000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/5100-69-0x0000000000AF0000-0x0000000001192000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/5100-71-0x0000000000AF0000-0x0000000001192000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/6656-1092-0x0000000000BE0000-0x00000000010A4000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/6796-1094-0x0000000000400000-0x0000000000C82000-memory.dmp

                                                            Filesize

                                                            8.5MB

                                                          • memory/6796-1098-0x0000000000400000-0x0000000000C82000-memory.dmp

                                                            Filesize

                                                            8.5MB

                                                          • memory/6796-1100-0x0000000000400000-0x0000000000C82000-memory.dmp

                                                            Filesize

                                                            8.5MB

                                                          • memory/6796-998-0x0000000000400000-0x0000000000C82000-memory.dmp

                                                            Filesize

                                                            8.5MB

                                                          • memory/6796-1102-0x0000000000400000-0x0000000000C82000-memory.dmp

                                                            Filesize

                                                            8.5MB

                                                          • memory/6796-1096-0x0000000000400000-0x0000000000C82000-memory.dmp

                                                            Filesize

                                                            8.5MB

                                                          • memory/6796-1104-0x0000000000400000-0x0000000000C82000-memory.dmp

                                                            Filesize

                                                            8.5MB

                                                          • memory/6796-1089-0x0000000000400000-0x0000000000C82000-memory.dmp

                                                            Filesize

                                                            8.5MB

                                                          • memory/6796-1073-0x0000000000400000-0x0000000000C82000-memory.dmp

                                                            Filesize

                                                            8.5MB

                                                          • memory/6796-1072-0x0000000000400000-0x0000000000C82000-memory.dmp

                                                            Filesize

                                                            8.5MB

                                                          • memory/6796-1109-0x0000000000400000-0x0000000000C82000-memory.dmp

                                                            Filesize

                                                            8.5MB