Analysis

  • max time kernel
    113s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2024 21:12

General

  • Target

    7e8543af40fb3b0f0bd65e125beed348e9dd775427ff6fabe89458586ee65c05.exe

  • Size

    5.5MB

  • MD5

    66360536a6545bf68e6fb7aaa80fbed9

  • SHA1

    57276f8894f9c5fa600735070e6cf932576dff37

  • SHA256

    7e8543af40fb3b0f0bd65e125beed348e9dd775427ff6fabe89458586ee65c05

  • SHA512

    d82cbe13e791b6b2806529e71cbaa072731fdad229780edbdd68e083e59315c899e8be51887bab0f13beda925574a2a1e311d6e17e7a85e0228eeee0858b9532

  • SSDEEP

    98304:tupAd24SBNNIHtB1SnXUhXyxbnegBJY9NGNqS2MV9zbx9T1AJJ:8iSBNKH3AnXUJyJ9BJY9oQS2+xqJ

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

cryptbot

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e8543af40fb3b0f0bd65e125beed348e9dd775427ff6fabe89458586ee65c05.exe
    "C:\Users\Admin\AppData\Local\Temp\7e8543af40fb3b0f0bd65e125beed348e9dd775427ff6fabe89458586ee65c05.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\U1a74.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\U1a74.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1g67k4.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1g67k4.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2380
          • C:\Users\Admin\AppData\Local\Temp\1012797001\044cc0ecaa.exe
            "C:\Users\Admin\AppData\Local\Temp\1012797001\044cc0ecaa.exe"
            5⤵
            • Enumerates VirtualBox registry keys
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:5116
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 1268
              6⤵
              • Program crash
              PID:6936
          • C:\Users\Admin\AppData\Local\Temp\1012798001\5e5e80a0e0.exe
            "C:\Users\Admin\AppData\Local\Temp\1012798001\5e5e80a0e0.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:5736
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5736 -s 1596
              6⤵
              • Program crash
              PID:4788
          • C:\Users\Admin\AppData\Local\Temp\1012799001\411121f254.exe
            "C:\Users\Admin\AppData\Local\Temp\1012799001\411121f254.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2544
          • C:\Users\Admin\AppData\Local\Temp\1012800001\20558e1e59.exe
            "C:\Users\Admin\AppData\Local\Temp\1012800001\20558e1e59.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:4800
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3964
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4324
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5264
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2300
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5676
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              6⤵
                PID:5868
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  7⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:900
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2068 -parentBuildID 20240401114208 -prefsHandle 1976 -prefMapHandle 1968 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c15b8e61-635f-43a9-a67b-8975e1ed0e5c} 900 "\\.\pipe\gecko-crash-server-pipe.900" gpu
                    8⤵
                      PID:3020
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2504 -parentBuildID 20240401114208 -prefsHandle 2496 -prefMapHandle 2492 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {57000549-e77e-4925-ac0e-62e5954961cc} 900 "\\.\pipe\gecko-crash-server-pipe.900" socket
                      8⤵
                        PID:1636
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3068 -childID 1 -isForBrowser -prefsHandle 3064 -prefMapHandle 3044 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {76a94f50-0b50-4e89-892f-9583ed1ba046} 900 "\\.\pipe\gecko-crash-server-pipe.900" tab
                        8⤵
                          PID:5180
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4104 -childID 2 -isForBrowser -prefsHandle 4092 -prefMapHandle 4088 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b89fcca9-b05f-462c-b496-9e2f469b10c0} 900 "\\.\pipe\gecko-crash-server-pipe.900" tab
                          8⤵
                            PID:2008
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5160 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 5144 -prefMapHandle 5140 -prefsLen 29278 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {639606d9-224f-4203-b0b2-5f1faeea3d54} 900 "\\.\pipe\gecko-crash-server-pipe.900" utility
                            8⤵
                            • Checks processor information in registry
                            PID:7756
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4032 -childID 3 -isForBrowser -prefsHandle 5284 -prefMapHandle 5288 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f11a699-8673-414f-b289-90bb7c80dbfa} 900 "\\.\pipe\gecko-crash-server-pipe.900" tab
                            8⤵
                              PID:7768
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5304 -childID 4 -isForBrowser -prefsHandle 5148 -prefMapHandle 5152 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b114af73-3f96-4468-bc81-205f7ae0993f} 900 "\\.\pipe\gecko-crash-server-pipe.900" tab
                              8⤵
                                PID:7776
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5556 -childID 5 -isForBrowser -prefsHandle 5712 -prefMapHandle 5540 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {26d0e6b5-3064-485e-a76e-17bbbe5ab8e6} 900 "\\.\pipe\gecko-crash-server-pipe.900" tab
                                8⤵
                                  PID:7792
                          • C:\Users\Admin\AppData\Local\Temp\1012801001\8479f742b9.exe
                            "C:\Users\Admin\AppData\Local\Temp\1012801001\8479f742b9.exe"
                            5⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1228
                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2W0050.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2W0050.exe
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2260
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 1624
                          4⤵
                          • Program crash
                          PID:1604
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3C35D.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3C35D.exe
                      2⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Loads dropped DLL
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Checks processor information in registry
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:3732
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                        3⤵
                        • Uses browser remote debugging
                        • Enumerates system info in registry
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of WriteProcessMemory
                        PID:3140
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7fffe0f5cc40,0x7fffe0f5cc4c,0x7fffe0f5cc58
                          4⤵
                            PID:2688
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,1700984562351921422,8953938386138780171,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1904 /prefetch:2
                            4⤵
                              PID:4432
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1912,i,1700984562351921422,8953938386138780171,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2240 /prefetch:3
                              4⤵
                                PID:1528
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2284,i,1700984562351921422,8953938386138780171,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2592 /prefetch:8
                                4⤵
                                  PID:1708
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3212,i,1700984562351921422,8953938386138780171,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3232 /prefetch:1
                                  4⤵
                                  • Uses browser remote debugging
                                  PID:1520
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3356,i,1700984562351921422,8953938386138780171,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3376 /prefetch:1
                                  4⤵
                                  • Uses browser remote debugging
                                  PID:936
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3656,i,1700984562351921422,8953938386138780171,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:1
                                  4⤵
                                  • Uses browser remote debugging
                                  PID:4084
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4860,i,1700984562351921422,8953938386138780171,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4876 /prefetch:8
                                  4⤵
                                    PID:3564
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5024,i,1700984562351921422,8953938386138780171,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4960 /prefetch:8
                                    4⤵
                                      PID:240
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4872,i,1700984562351921422,8953938386138780171,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4892 /prefetch:8
                                      4⤵
                                        PID:1348
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4912,i,1700984562351921422,8953938386138780171,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4264 /prefetch:8
                                        4⤵
                                          PID:3784
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4916,i,1700984562351921422,8953938386138780171,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4208 /prefetch:8
                                          4⤵
                                            PID:4448
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5168,i,1700984562351921422,8953938386138780171,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4896 /prefetch:8
                                            4⤵
                                              PID:3240
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5340,i,1700984562351921422,8953938386138780171,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5244 /prefetch:2
                                              4⤵
                                              • Uses browser remote debugging
                                              PID:5440
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                            3⤵
                                            • Uses browser remote debugging
                                            • Enumerates system info in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                            • Suspicious use of FindShellTrayWindow
                                            PID:5996
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7fffe0f646f8,0x7fffe0f64708,0x7fffe0f64718
                                              4⤵
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:6012
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,3804803817231277107,13435620196863716261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:2
                                              4⤵
                                                PID:1304
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,3804803817231277107,13435620196863716261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
                                                4⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:660
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,3804803817231277107,13435620196863716261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2552 /prefetch:2
                                                4⤵
                                                  PID:3888
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,3804803817231277107,13435620196863716261,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2304 /prefetch:8
                                                  4⤵
                                                    PID:3564
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2060,3804803817231277107,13435620196863716261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
                                                    4⤵
                                                    • Uses browser remote debugging
                                                    PID:1752
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2060,3804803817231277107,13435620196863716261,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:1
                                                    4⤵
                                                    • Uses browser remote debugging
                                                    PID:1660
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,3804803817231277107,13435620196863716261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3828 /prefetch:2
                                                    4⤵
                                                      PID:2960
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,3804803817231277107,13435620196863716261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3832 /prefetch:2
                                                      4⤵
                                                        PID:3308
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,3804803817231277107,13435620196863716261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2340 /prefetch:2
                                                        4⤵
                                                          PID:4324
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,3804803817231277107,13435620196863716261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3940 /prefetch:2
                                                          4⤵
                                                            PID:5220
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,3804803817231277107,13435620196863716261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3940 /prefetch:2
                                                            4⤵
                                                              PID:5260
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,3804803817231277107,13435620196863716261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2968 /prefetch:2
                                                              4⤵
                                                                PID:5300
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,3804803817231277107,13435620196863716261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2896 /prefetch:2
                                                                4⤵
                                                                  PID:5328
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\FIEHDBGDHD.exe"
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4288
                                                                • C:\Users\Admin\Documents\FIEHDBGDHD.exe
                                                                  "C:\Users\Admin\Documents\FIEHDBGDHD.exe"
                                                                  4⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:5668
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2260 -ip 2260
                                                            1⤵
                                                              PID:2868
                                                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                              1⤵
                                                                PID:3228
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                1⤵
                                                                  PID:544
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5736 -ip 5736
                                                                  1⤵
                                                                    PID:1928
                                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                    1⤵
                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                    • Checks BIOS information in registry
                                                                    • Executes dropped EXE
                                                                    • Identifies Wine through registry keys
                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:6012
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5116 -ip 5116
                                                                    1⤵
                                                                      PID:6912

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\ProgramData\mozglue.dll

                                                                      Filesize

                                                                      593KB

                                                                      MD5

                                                                      c8fd9be83bc728cc04beffafc2907fe9

                                                                      SHA1

                                                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                      SHA256

                                                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                      SHA512

                                                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                    • C:\ProgramData\nss3.dll

                                                                      Filesize

                                                                      2.0MB

                                                                      MD5

                                                                      1cc453cdf74f31e4d913ff9c10acdde2

                                                                      SHA1

                                                                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                      SHA256

                                                                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                      SHA512

                                                                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                      Filesize

                                                                      649B

                                                                      MD5

                                                                      8bc6d73023775199e401343cbda5d7e6

                                                                      SHA1

                                                                      6ca4d94f544af7f4e44099d252f795e54f8e0919

                                                                      SHA256

                                                                      ef36dfd0811e8d257d08e58eb433b620d0f709af3f3198fc94caddbbb5f081c6

                                                                      SHA512

                                                                      baa81582555f8c56eca115cef25f9a9d7fc000e3888e3486b862de24ed4a0b4ef8dffa6eaf75e6d85b54171007a8e62e588a05605c69a3929dad6df099197243

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json

                                                                      Filesize

                                                                      851B

                                                                      MD5

                                                                      07ffbe5f24ca348723ff8c6c488abfb8

                                                                      SHA1

                                                                      6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                      SHA256

                                                                      6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                      SHA512

                                                                      7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json

                                                                      Filesize

                                                                      854B

                                                                      MD5

                                                                      4ec1df2da46182103d2ffc3b92d20ca5

                                                                      SHA1

                                                                      fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                      SHA256

                                                                      6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                      SHA512

                                                                      939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                      Filesize

                                                                      2B

                                                                      MD5

                                                                      d751713988987e9331980363e24189ce

                                                                      SHA1

                                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                                      SHA256

                                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                      SHA512

                                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\b27f7b83-9498-46e3-b430-82d4a1566a91.dmp

                                                                      Filesize

                                                                      10.5MB

                                                                      MD5

                                                                      8408609634f55c9379280cf8b788647e

                                                                      SHA1

                                                                      fdb5648dcb5ff54c17b66dc68352425748d063ba

                                                                      SHA256

                                                                      20bbc7b95f4edb617b5fd3b1b14831588825c665cf2d08d45b59a8860b6f2900

                                                                      SHA512

                                                                      a4a9e0a1ed20c6429f94759c8a1e50f7151fb081325e0d70d24d1a02c759babc9bb3c1855f0fc7dc12b45543d15cc480f9cb5a471d81390d285b9e421a953a40

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      e443ee4336fcf13c698b8ab5f3c173d0

                                                                      SHA1

                                                                      9bf70b16f03820cbe3158e1f1396b07b8ac9d75a

                                                                      SHA256

                                                                      79e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b

                                                                      SHA512

                                                                      cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                      Filesize

                                                                      152B

                                                                      MD5

                                                                      56a4f78e21616a6e19da57228569489b

                                                                      SHA1

                                                                      21bfabbfc294d5f2aa1da825c5590d760483bc76

                                                                      SHA256

                                                                      d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb

                                                                      SHA512

                                                                      c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\28de47f4-c56b-42d5-9816-5abb0a40b378.tmp

                                                                      Filesize

                                                                      1B

                                                                      MD5

                                                                      5058f1af8388633f609cadb75a75dc9d

                                                                      SHA1

                                                                      3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                      SHA256

                                                                      cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                      SHA512

                                                                      0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                      Filesize

                                                                      5KB

                                                                      MD5

                                                                      6aaeef0814f3f1716fd2b9d812cfb6df

                                                                      SHA1

                                                                      6e8b4bec596f958ac52484dd493bfbf7c221fd34

                                                                      SHA256

                                                                      44319524f639f7260abea0d552fc801277a0708df5f940d01739c6984ad0a6af

                                                                      SHA512

                                                                      94897db269c00e56c3d2f68d5dd8f1da2f2df5930104b2ce9ee52ca9972dd6eca03d094572b387bac95d2e8eaa23a0866b40764ceafe546fda3f920014af06cb

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                      Filesize

                                                                      264KB

                                                                      MD5

                                                                      f50f89a0a91564d0b8a211f8921aa7de

                                                                      SHA1

                                                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                      SHA256

                                                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                      SHA512

                                                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json

                                                                      Filesize

                                                                      19KB

                                                                      MD5

                                                                      59290dc7964d19f95a811c4dee192dc5

                                                                      SHA1

                                                                      660c414853756c94022a862d9b442812ad69ea08

                                                                      SHA256

                                                                      50f2e1ef92e520e13f05fcdea38738c492b026e2141580e4372169ed92370dc8

                                                                      SHA512

                                                                      fae980e7bcf56b52d2d895b4c8b4c2ca6966a9659bfe1b4a2400b34b8812cec8498efa02561eaaad12e84e0ac8a89d062fe2ce491af66239c38c70472f960769

                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                                                      Filesize

                                                                      13KB

                                                                      MD5

                                                                      bdccc4ca9eead661405ba5a1a41bbfd4

                                                                      SHA1

                                                                      ac7bbbd159929dfeaeb82e4752b205eb1525fd24

                                                                      SHA256

                                                                      cfd886ac6214ef82339d9d4691e724ed133969e18f70a032b2733dd06a858d1b

                                                                      SHA512

                                                                      884d3b23e8f3be01476ae0549cb0f7626544842eba3d66b770734856a921a6d2ed4b8a3c60f290d5b48b0e5522f045ae54b379e40405990343f30475e58ee7c8

                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                      Filesize

                                                                      15KB

                                                                      MD5

                                                                      96c542dec016d9ec1ecc4dddfcbaac66

                                                                      SHA1

                                                                      6199f7648bb744efa58acf7b96fee85d938389e4

                                                                      SHA256

                                                                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                      SHA512

                                                                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                    • C:\Users\Admin\AppData\Local\Temp\1012797001\044cc0ecaa.exe

                                                                      Filesize

                                                                      4.3MB

                                                                      MD5

                                                                      4500ada3f3ca96c5a4c012d41ecb92e6

                                                                      SHA1

                                                                      688d9fbf419423ec29c4037dc04a975475936c33

                                                                      SHA256

                                                                      e7a83ddae3eec8ce624fc138e1dddb7f3ff5c5c9f20db11f60e22f489bdcc947

                                                                      SHA512

                                                                      95102061505fa16f5bfe89d32001b75b4e353cd3fce2381045dbabb46db42299c8049bdec0e3b0dd376043c59a52f71e3e9d29fdd85c4b7db056697c1e4a50be

                                                                    • C:\Users\Admin\AppData\Local\Temp\1012798001\5e5e80a0e0.exe

                                                                      Filesize

                                                                      1.7MB

                                                                      MD5

                                                                      8b69c0f7e3d159bab26b9bde54764532

                                                                      SHA1

                                                                      c255dfbd114165c87e0170787a067124affbb0f8

                                                                      SHA256

                                                                      6413838042e2739f1fe823eccb3db6226e6c4b84d9ef74aae85b841a7d82e0ec

                                                                      SHA512

                                                                      9a6424a37457d94b3fb11bb93a1676643e927fbe8526a61bd8caa63e2417b5961e6b7b634063c32693ee2a46394f4785d3aaad679c7b3e9a29a9b5db75a3eb51

                                                                    • C:\Users\Admin\AppData\Local\Temp\1012799001\411121f254.exe

                                                                      Filesize

                                                                      5.0MB

                                                                      MD5

                                                                      2078aba4b222e2f98ba15dd2d129815a

                                                                      SHA1

                                                                      ae20c88e9db1d4ec511d24148a58a180d476aac3

                                                                      SHA256

                                                                      db02e1c041c72eba5685a97d036086cb9f1aada9415057bb25d88ff6a8c02e54

                                                                      SHA512

                                                                      2159ed7997c143163cf0bfbbfcaa6536e3f690f378f160f425b87a2e18b7739dcd220528859dfd554def726d0b6ab0fc572335326f8313feb01a1742a4ba8377

                                                                    • C:\Users\Admin\AppData\Local\Temp\1012800001\20558e1e59.exe

                                                                      Filesize

                                                                      945KB

                                                                      MD5

                                                                      78c07676a6a2a5118779c217e4f02d23

                                                                      SHA1

                                                                      20f47fb28847651bef0afacceed56b8256d812fb

                                                                      SHA256

                                                                      94e2194928333f59be23b2ad9a6d2f58de6e972b4ff8d8da6672c556ef431dac

                                                                      SHA512

                                                                      3650c5de9a00623d5195d6b4e2ef3aa8c8c10e59688d1a805fe6f253a2e365b1cfa2442f936235d1913845d129023d00b2077481ea9c6d5b5664f00d8a68c966

                                                                    • C:\Users\Admin\AppData\Local\Temp\1012801001\8479f742b9.exe

                                                                      Filesize

                                                                      2.6MB

                                                                      MD5

                                                                      fb3d887241d756b088142b20fa790c7d

                                                                      SHA1

                                                                      f3aefc49565b472d011bef753ff27752587deadb

                                                                      SHA256

                                                                      7362dfb18ec3d41f595e08f395f7c5fc5865d278b5770d7e5b1e095cae1f14a9

                                                                      SHA512

                                                                      e5480cff9367d62eab93824f2e9d3eb86ba592d33868bab2d989407a6a1a5cb0904c6a9a4607209ee96b0212e820a1e8fa9c666da892bd617529775f6cd57e0c

                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3C35D.exe

                                                                      Filesize

                                                                      1.7MB

                                                                      MD5

                                                                      033e51d4f55438302216ac21d4763c85

                                                                      SHA1

                                                                      a383509c659b7a95fb780f03895d84fec041da4a

                                                                      SHA256

                                                                      6014ff5135aa63053f17fd00de37c08f1f193e713f93772b0c84aa44754c1131

                                                                      SHA512

                                                                      e32707d739e88967badbbb1beab2131ef13a488e9099933e581463b0d4c387fa939986c5c33bda6b97e9c2eb1b5e1e74bfd4e7c54fb22f1a5bec0dde3bbc757c

                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\U1a74.exe

                                                                      Filesize

                                                                      3.7MB

                                                                      MD5

                                                                      7ac271033ff0648be1cb86d8b1d08ca0

                                                                      SHA1

                                                                      48799a2ba53a0f75f13c34432653db084e181295

                                                                      SHA256

                                                                      033e509bd6505978b562dc6c0c9c87a8d2ce3fe3b9f9ad75f544cda40c7a5075

                                                                      SHA512

                                                                      843eaca89664b009a4798fae1d8b1a83c5914c87fade55ed3e129104bae1df81a8ea950919d22632385446f03a0abdda39df6623162c762fd044e6fa3315ec50

                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1g67k4.exe

                                                                      Filesize

                                                                      1.8MB

                                                                      MD5

                                                                      f25ddb78a2cc3b6442c52a3c4a2aa843

                                                                      SHA1

                                                                      52ba6df84b158bf917044fee22625d2a12202382

                                                                      SHA256

                                                                      ca2d328cf8d3bb990c47a4ea62d67eff34f06a00b7a3a7bf5189120da96d8bc4

                                                                      SHA512

                                                                      74c7900f42e3d9b5d490e4848c7d12832f14b245065e04baa96604f2ca91ea5e46318ea71e081ee266fc770a94413edc298516abf23ed9f6c7cd6e7a70b72f14

                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2W0050.exe

                                                                      Filesize

                                                                      1.8MB

                                                                      MD5

                                                                      a996397cd4d1502f1eed95cd693d5752

                                                                      SHA1

                                                                      e66aed1fe77966fe2d9eebc5ba8e44f873485589

                                                                      SHA256

                                                                      81a3a8a0412d519ebc63f7020adff204ea2ea0c117fd0ad8d7828615895ea648

                                                                      SHA512

                                                                      160d03ee92fcc883ba168824d54404ea579b4e4ddebc8fb2ada4e9c0330658f3962b9cdbf894ea31453c27eff3ef04adbd2218eaa1330a8578464049a925d9ce

                                                                    • C:\Users\Admin\AppData\Local\Temp\scoped_dir3140_2025822423\CRX_INSTALL\_locales\en_CA\messages.json

                                                                      Filesize

                                                                      711B

                                                                      MD5

                                                                      558659936250e03cc14b60ebf648aa09

                                                                      SHA1

                                                                      32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                      SHA256

                                                                      2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                      SHA512

                                                                      1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                    • C:\Users\Admin\AppData\Local\Temp\scoped_dir3140_2025822423\e2bbef14-8022-48f6-ac2a-3ce6bff1a255.tmp

                                                                      Filesize

                                                                      135KB

                                                                      MD5

                                                                      3f6f93c3dccd4a91c4eb25c7f6feb1c1

                                                                      SHA1

                                                                      9b73f46adfa1f4464929b408407e73d4535c6827

                                                                      SHA256

                                                                      19f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e

                                                                      SHA512

                                                                      d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4

                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                      Filesize

                                                                      479KB

                                                                      MD5

                                                                      09372174e83dbbf696ee732fd2e875bb

                                                                      SHA1

                                                                      ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                      SHA256

                                                                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                      SHA512

                                                                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                      Filesize

                                                                      13.8MB

                                                                      MD5

                                                                      0a8747a2ac9ac08ae9508f36c6d75692

                                                                      SHA1

                                                                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                      SHA256

                                                                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                      SHA512

                                                                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin

                                                                      Filesize

                                                                      8KB

                                                                      MD5

                                                                      d6be5272cfcc347e3dde311f6b9238e3

                                                                      SHA1

                                                                      03069ce30ef52a05fe136254cf86285739985ffd

                                                                      SHA256

                                                                      572ab6c364a679cb36206800f5f7ffd0d87c91d0de6bf8a8b4d08b84dad32546

                                                                      SHA512

                                                                      a97d243377ea02a169e6e2c637a4733dd12dd58106b8365071371d976e6d763b5033d9ca60b6ea2c1980f3bf481c625721da78caa5c24bb9bbe4d9261852044f

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      0fe147717eec1e3455d10a6e68c498d5

                                                                      SHA1

                                                                      5786685f9e8bb23daf0209707d0f99d175826940

                                                                      SHA256

                                                                      bac4bf87c0d0652508ece2d500c230fd9c562756a40e6d0e4e3283e7440b6c7c

                                                                      SHA512

                                                                      120b90664e135d60af24cec93317a3de6ecc2a67e4f71e63bbb6eeee5b9ddf1c50d439062f2af719140ef275245a929669ffbf3ef0e81f11d36c87d067f28df0

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin

                                                                      Filesize

                                                                      14KB

                                                                      MD5

                                                                      f95c9eb048a28a0f37dc506b81c58652

                                                                      SHA1

                                                                      3441c1d88e1d2d59fc2bf6eca0f215cf76392b77

                                                                      SHA256

                                                                      93268455c63d6aab8d814fa7287ff13f93c9245a84816aa65e9ca90237f4e3ac

                                                                      SHA512

                                                                      6a65824df3e739b3bafc0212d42691db2299dfaf3336f075e9d0d225210541bfc2df86e41d506b99aa9107ac9ec106e136ac11f5c2a6320dd0c49dbde0c799ed

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin

                                                                      Filesize

                                                                      15KB

                                                                      MD5

                                                                      42a2a346198a58418ea167d57741b0a1

                                                                      SHA1

                                                                      50285c7fce7e80c92f15372726fb1ff27b9a295e

                                                                      SHA256

                                                                      452a7d67a459a075e5e1c5443dcfcd440dbcdc9c5eec4a32a0b4bd40be51468d

                                                                      SHA512

                                                                      9ae274ae596cb0b65a5579f6456a31ed253d48848bece4a0475dd2ec95a50ab410730a9305be408789aeda03a9171ec337d8ca66134d105c5d404307143da861

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin

                                                                      Filesize

                                                                      23KB

                                                                      MD5

                                                                      36ff116f0f1fd2c60a029c9ade9a25dc

                                                                      SHA1

                                                                      77c78fc7505f0f62c2621cb8f755688e1b043f44

                                                                      SHA256

                                                                      d84f1315991ccd25d72629fe6c63a10fb4a2bf22a63f1d8d992b7a09a786a858

                                                                      SHA512

                                                                      0692afcaece69624faf26c0c169867c2477b39fb735f98307c681667f938ec8dd55d5b3e762049685c32253651ce03f4cba96ef41d4a2b406ce91927f8b90d28

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      5e8e05f00b5f63bd9fe63f678beddf97

                                                                      SHA1

                                                                      5ac68084c3085518da85b93ad02d072548ad0d44

                                                                      SHA256

                                                                      5ef79441898f80b55a039251f148ee0be032544dd8d4070ca59a851bc2b5d0b9

                                                                      SHA512

                                                                      c6ad8862ce08a0b81f4c2ba13bf9d2cec4cbb44bc7caef38ecc73bcd06a1f168701a16649dda9c251856db71f3fa8593277cd90334611f5ba337a915788cdfe1

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                                                                      Filesize

                                                                      15KB

                                                                      MD5

                                                                      a17347cb81f7e41da4c369c390f71c0a

                                                                      SHA1

                                                                      e61554b062848e73523d9e2054a4939a37730592

                                                                      SHA256

                                                                      f4dba68c4059b4e681618ed248315a3c0f6a3ca3944b2831e709ffeedee8266a

                                                                      SHA512

                                                                      270ad074b587f5f557773ccafb51dd5499136ba26eccbf4c815c65d48c7422dfe37395b690cc54b3a4b56081d8ba4d00a31bb5f1cc49ae5892f4b84ce59c2ef2

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                                                                      Filesize

                                                                      5KB

                                                                      MD5

                                                                      47a1b2d1cfe65cd4a7e6f4ffc1b4eade

                                                                      SHA1

                                                                      40ac11fa99331b57c62e57af4c5d1eb432ccfa99

                                                                      SHA256

                                                                      e853e7f2aac446a3ea17f6630e889c8af2ab52814457607a4e918dec4b2baf8c

                                                                      SHA512

                                                                      3b6174ccd91e71225a458716af2afc3863cc9e2d93193ee8dbfec4009cf3463fd3a8574b0870f0e49b034e2b58929bb56ee54e7ca03f7b68d0bf96d28e90ce57

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\8926a2b8-c91f-49fb-868a-d07f0a935159

                                                                      Filesize

                                                                      982B

                                                                      MD5

                                                                      0d6c7255b7ce0d63343ade1c9fab9f7a

                                                                      SHA1

                                                                      c9e54add55fd30a1fb9a1fa643005dd594218811

                                                                      SHA256

                                                                      a4d6b9ad952dd0f33012d62737f3cbc65e7fb8ec2cb97ea531a1070c22c8cf5d

                                                                      SHA512

                                                                      d989acad693e164b141e33a3b9429752f3f4c13a6a03f026f39f6d8727b1290f16cd92ff634f955b3ca17c600df7add62fd0eb571ff287c5ede70523226b2e2b

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\db00e165-e9bf-4465-bd79-3af8a1f92288

                                                                      Filesize

                                                                      25KB

                                                                      MD5

                                                                      45a88898e9da6e844579dafd671d6a88

                                                                      SHA1

                                                                      4d33d4f5c5e6ea85a3a46d1d5980ee20eb541921

                                                                      SHA256

                                                                      3ab2552d729f3f6b28bd5c674f21453c38b98095f62e9d96fd4c895493d88703

                                                                      SHA512

                                                                      f047e851b51c14de52f1d0f29f87a818a1d7b0c58dc500477ebe2e2420c1d624a3b20a6437f43f13ce43bc225e42ab0b943b7d4e1e73f6b1c26254eb1cc2639b

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\e3cd0d00-c473-487e-a704-5381b29054e6

                                                                      Filesize

                                                                      671B

                                                                      MD5

                                                                      5bab5138f2c49940171cb13e0ee45b6e

                                                                      SHA1

                                                                      6943fdd9a34589119a039940cd73f66e6a79b635

                                                                      SHA256

                                                                      7c09eb7c43bd232a2cb32df9a0c5b842cd2f2469c96ef87da1712f3467a98cf9

                                                                      SHA512

                                                                      70a5d5eb26cd0b343a2cf4f9c752a3972a7225179ee1f28904985762930e777c07d88a2bd09ead15735cb9739825191ced89da1cd6e65eadc283c77e99e8d4cd

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                      Filesize

                                                                      1.1MB

                                                                      MD5

                                                                      842039753bf41fa5e11b3a1383061a87

                                                                      SHA1

                                                                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                      SHA256

                                                                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                      SHA512

                                                                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                      Filesize

                                                                      116B

                                                                      MD5

                                                                      2a461e9eb87fd1955cea740a3444ee7a

                                                                      SHA1

                                                                      b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                      SHA256

                                                                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                      SHA512

                                                                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                      Filesize

                                                                      372B

                                                                      MD5

                                                                      bf957ad58b55f64219ab3f793e374316

                                                                      SHA1

                                                                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                      SHA256

                                                                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                      SHA512

                                                                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                      Filesize

                                                                      17.8MB

                                                                      MD5

                                                                      daf7ef3acccab478aaa7d6dc1c60f865

                                                                      SHA1

                                                                      f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                      SHA256

                                                                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                      SHA512

                                                                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                                                                      Filesize

                                                                      10KB

                                                                      MD5

                                                                      99a7ed205ff25829d37b13d651ae4b93

                                                                      SHA1

                                                                      8ca74f1de645c45b70e30f6d330f7a471cca3ead

                                                                      SHA256

                                                                      7658aab84ad10589325c1a009b50a05e2205d23ff37a3bade7cf5aa272112e2c

                                                                      SHA512

                                                                      01cc9a99c108d183ec0f15474a4550b4416e4d0e887a26125fd34d3226082feac5cd833bcb16201c59c84c111d20346e7a7487545503c309de11d11427d77a63

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      faefd94fc337fda2af992bb3cbc84761

                                                                      SHA1

                                                                      990539ea142d1d7a5b052739fe8bf9cf383cad2b

                                                                      SHA256

                                                                      e8c64e27715fe60969be5f914c04541d010b85cba184dbb757c02007c64b6361

                                                                      SHA512

                                                                      7a19a4dc01d05fbd228795a83df1ebcdaacb0cdd6753059d378bc2102faa557d2abfb0e24a6da4a5e18b8999ad0edf881df4e0618226d74272148571a1add59a

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                                                                      Filesize

                                                                      15KB

                                                                      MD5

                                                                      5172c9ae22acfaefe51eb216ad49b092

                                                                      SHA1

                                                                      6553cfdffcfc1ab31fa2296d21f7d1be5c86c788

                                                                      SHA256

                                                                      b70a0932f649710e9fcf5e61f087bf0027505f3e98c60471abf0b3efe352445e

                                                                      SHA512

                                                                      0f170730678fa8b586995a0d501407c59f3c657563df4876641657586db4f5521e20697b936adcc59299ef5a94d2e8985987204fbb6ed4552377bf26e6e7a21d

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs.js

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      64aa5690dbcf8ad2947e6e38693b25ee

                                                                      SHA1

                                                                      606992d499cd5d1508f3cada9c6240fb11af06c9

                                                                      SHA256

                                                                      f21728e7f5e1ebd3398b8321a50fd6e5e85a824c9ee31a14e373e4a1a27c4412

                                                                      SHA512

                                                                      a5846bc529677df452f1de6bc3e0bda7fe00df765a5d7f34e870ee41412cd5aab210dba1ead2e52e0fe558dbc12839c92a1ca7cba98126e887f8c57f630cf25e

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs.js

                                                                      Filesize

                                                                      10KB

                                                                      MD5

                                                                      d123ce8668800e4bb5739287a7f29a0f

                                                                      SHA1

                                                                      174984fd19b737ddb71c09a5419682476bc475fb

                                                                      SHA256

                                                                      f04007bae85272454275dea168e0c7978baab7f325a24ce98d238b691cad0a57

                                                                      SHA512

                                                                      b1108fd236b60472d4f2d82cc35344a9ddb299bdc193e6a66dba588766ade44f418e6c056daee91d18b3eb5b663ceaf1e39ce0633b6f32b6707f3044aa5f851f

                                                                    • C:\Users\Admin\Documents\FIEHDBGDHD.exe

                                                                      Filesize

                                                                      3.1MB

                                                                      MD5

                                                                      52b7dbccde53a06fe0163efa59e1c0e1

                                                                      SHA1

                                                                      19f83bd0a5e39911c10061f6d9b596717594c4a4

                                                                      SHA256

                                                                      25e8fafc7a259e0d55f009e46c8d8156d38f8e35b7e58e85fb2040beb39d9a15

                                                                      SHA512

                                                                      6805cb5c13c8479889ae347e96e98c3628c1a9f6188d4ba6ec1af66f8af2e27cbb8d83e6444ea94d96dbd84295d01bc109ac5c2fee3bc8364475f9fd402605a9

                                                                    • memory/1228-1297-0x0000000000F00000-0x00000000011B0000-memory.dmp

                                                                      Filesize

                                                                      2.7MB

                                                                    • memory/1228-1296-0x0000000000F00000-0x00000000011B0000-memory.dmp

                                                                      Filesize

                                                                      2.7MB

                                                                    • memory/1228-1470-0x0000000000F00000-0x00000000011B0000-memory.dmp

                                                                      Filesize

                                                                      2.7MB

                                                                    • memory/1228-736-0x0000000000F00000-0x00000000011B0000-memory.dmp

                                                                      Filesize

                                                                      2.7MB

                                                                    • memory/1228-1473-0x0000000000F00000-0x00000000011B0000-memory.dmp

                                                                      Filesize

                                                                      2.7MB

                                                                    • memory/1688-32-0x0000000000B20000-0x0000000000FCF000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/1688-16-0x0000000000B21000-0x0000000000B4F000-memory.dmp

                                                                      Filesize

                                                                      184KB

                                                                    • memory/1688-14-0x0000000000B20000-0x0000000000FCF000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/1688-18-0x0000000000B20000-0x0000000000FCF000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/1688-15-0x00000000770C4000-0x00000000770C6000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/1688-17-0x0000000000B20000-0x0000000000FCF000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2260-37-0x0000000000870000-0x0000000000D07000-memory.dmp

                                                                      Filesize

                                                                      4.6MB

                                                                    • memory/2260-36-0x0000000000870000-0x0000000000D07000-memory.dmp

                                                                      Filesize

                                                                      4.6MB

                                                                    • memory/2380-1463-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2380-1484-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2380-4329-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2380-4324-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2380-4321-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2380-3633-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2380-691-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2380-30-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2380-1796-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2380-78-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2380-79-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2380-560-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2380-630-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2544-645-0x0000000000370000-0x0000000000867000-memory.dmp

                                                                      Filesize

                                                                      5.0MB

                                                                    • memory/2544-701-0x0000000000370000-0x0000000000867000-memory.dmp

                                                                      Filesize

                                                                      5.0MB

                                                                    • memory/2544-697-0x0000000000370000-0x0000000000867000-memory.dmp

                                                                      Filesize

                                                                      5.0MB

                                                                    • memory/2544-1397-0x0000000000370000-0x0000000000867000-memory.dmp

                                                                      Filesize

                                                                      5.0MB

                                                                    • memory/3732-475-0x00000000007F0000-0x0000000000E97000-memory.dmp

                                                                      Filesize

                                                                      6.7MB

                                                                    • memory/3732-700-0x00000000007F0000-0x0000000000E97000-memory.dmp

                                                                      Filesize

                                                                      6.7MB

                                                                    • memory/3732-618-0x00000000007F0000-0x0000000000E97000-memory.dmp

                                                                      Filesize

                                                                      6.7MB

                                                                    • memory/3732-41-0x00000000007F0000-0x0000000000E97000-memory.dmp

                                                                      Filesize

                                                                      6.7MB

                                                                    • memory/3732-42-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                      Filesize

                                                                      972KB

                                                                    • memory/3732-650-0x00000000007F0000-0x0000000000E97000-memory.dmp

                                                                      Filesize

                                                                      6.7MB

                                                                    • memory/3732-474-0x00000000007F0000-0x0000000000E97000-memory.dmp

                                                                      Filesize

                                                                      6.7MB

                                                                    • memory/5116-672-0x0000000000090000-0x0000000000D68000-memory.dmp

                                                                      Filesize

                                                                      12.8MB

                                                                    • memory/5116-623-0x0000000000090000-0x0000000000D68000-memory.dmp

                                                                      Filesize

                                                                      12.8MB

                                                                    • memory/5116-1624-0x0000000000090000-0x0000000000D68000-memory.dmp

                                                                      Filesize

                                                                      12.8MB

                                                                    • memory/5116-1480-0x0000000000090000-0x0000000000D68000-memory.dmp

                                                                      Filesize

                                                                      12.8MB

                                                                    • memory/5116-1431-0x0000000000090000-0x0000000000D68000-memory.dmp

                                                                      Filesize

                                                                      12.8MB

                                                                    • memory/5116-4194-0x0000000000090000-0x0000000000D68000-memory.dmp

                                                                      Filesize

                                                                      12.8MB

                                                                    • memory/5116-3138-0x0000000000090000-0x0000000000D68000-memory.dmp

                                                                      Filesize

                                                                      12.8MB

                                                                    • memory/5116-551-0x0000000000090000-0x0000000000D68000-memory.dmp

                                                                      Filesize

                                                                      12.8MB

                                                                    • memory/5116-622-0x0000000000090000-0x0000000000D68000-memory.dmp

                                                                      Filesize

                                                                      12.8MB

                                                                    • memory/5668-698-0x0000000000930000-0x0000000000C42000-memory.dmp

                                                                      Filesize

                                                                      3.1MB

                                                                    • memory/5668-703-0x0000000000930000-0x0000000000C42000-memory.dmp

                                                                      Filesize

                                                                      3.1MB

                                                                    • memory/5736-611-0x00000000004E0000-0x000000000095B000-memory.dmp

                                                                      Filesize

                                                                      4.5MB

                                                                    • memory/5736-568-0x00000000004E0000-0x000000000095B000-memory.dmp

                                                                      Filesize

                                                                      4.5MB

                                                                    • memory/6012-1483-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/6012-1482-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                                                      Filesize

                                                                      4.7MB