Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 21:39

General

  • Target

    492d857f2c4c3524ff8963895a3517060c6056e3fd17cb69f900a7c274a56841.exe

  • Size

    6.7MB

  • MD5

    e15cf68194bc56cf297ed9e12eea01e1

  • SHA1

    fcd274d8bd17c9de447ecfbc11e1de8f053bdd51

  • SHA256

    492d857f2c4c3524ff8963895a3517060c6056e3fd17cb69f900a7c274a56841

  • SHA512

    a994ed9f5cb638d7db2aeebd68e8bf21fb7fc65991f9290047f8b6330b67d90645a7276fda27d89c471a8cdf652622ff3cbf20455f09819bd67c15d15c2d788c

  • SSDEEP

    196608:RyMYtRmmnmTGqndXmHxfraI0Z2uhrmCKb5:RyLtjnmpWHZedwkH2

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 28 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 33 IoCs
  • Identifies Wine through registry keys 2 TTPs 14 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 39 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 59 IoCs
  • Suspicious use of SendNotifyMessage 56 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\492d857f2c4c3524ff8963895a3517060c6056e3fd17cb69f900a7c274a56841.exe
    "C:\Users\Admin\AppData\Local\Temp\492d857f2c4c3524ff8963895a3517060c6056e3fd17cb69f900a7c274a56841.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j2t43.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j2t43.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2224
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\O8R36.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\O8R36.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1N27n3.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1N27n3.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3300
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1860
            • C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe
              "C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4572
              • C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe
                "C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe"
                7⤵
                • Executes dropped EXE
                PID:824
              • C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe
                "C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4296
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 576
                7⤵
                • Program crash
                PID:3616
            • C:\Users\Admin\AppData\Local\Temp\1019563001\hYW0tgm.exe
              "C:\Users\Admin\AppData\Local\Temp\1019563001\hYW0tgm.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2596
            • C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe
              "C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4124
              • C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe
                "C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"
                7⤵
                • Executes dropped EXE
                PID:2728
              • C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe
                "C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4024
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 604
                7⤵
                • Program crash
                PID:4668
            • C:\Users\Admin\AppData\Local\Temp\1019679001\fbea73b3db.exe
              "C:\Users\Admin\AppData\Local\Temp\1019679001\fbea73b3db.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2956
            • C:\Users\Admin\AppData\Local\Temp\1019680001\f9d0bb06a0.exe
              "C:\Users\Admin\AppData\Local\Temp\1019680001\f9d0bb06a0.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3460
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" Add-MpPreference -ExclusionPath "C:\oizslgkrqb"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3036
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3156
              • C:\oizslgkrqb\defad7ed96214795a6fecc5e63712438.exe
                "C:\oizslgkrqb\defad7ed96214795a6fecc5e63712438.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:4120
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\oizslgkrqb\defad7ed96214795a6fecc5e63712438.exe" & rd /s /q "C:\ProgramData\CBAAA1VSJEKN" & exit
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2764
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 10
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Delays execution with timeout.exe
                    PID:664
              • C:\oizslgkrqb\fac8a61fb5b54e14a01f1f0b61c43706.exe
                "C:\oizslgkrqb\fac8a61fb5b54e14a01f1f0b61c43706.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:3484
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://apps.microsoft.com/store/detail/9MSZ40SLW145?ocid=&referrer=psi
                  8⤵
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:1244
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ffd04c646f8,0x7ffd04c64708,0x7ffd04c64718
                    9⤵
                      PID:4948
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7432682189260388500,13990085261181638906,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
                      9⤵
                        PID:1764
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,7432682189260388500,13990085261181638906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:3
                        9⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4652
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,7432682189260388500,13990085261181638906,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:8
                        9⤵
                          PID:4436
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7432682189260388500,13990085261181638906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
                          9⤵
                            PID:4556
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7432682189260388500,13990085261181638906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
                            9⤵
                              PID:4036
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,7432682189260388500,13990085261181638906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:8
                              9⤵
                                PID:4532
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,7432682189260388500,13990085261181638906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:8
                                9⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2580
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7432682189260388500,13990085261181638906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:1
                                9⤵
                                  PID:1736
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7432682189260388500,13990085261181638906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:1
                                  9⤵
                                    PID:4516
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7432682189260388500,13990085261181638906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:1
                                    9⤵
                                      PID:3908
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7432682189260388500,13990085261181638906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:1
                                      9⤵
                                        PID:5028
                                • C:\Users\Admin\AppData\Local\Temp\1019681001\f992b8578f.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019681001\f992b8578f.exe"
                                  6⤵
                                  • Enumerates VirtualBox registry keys
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1632
                                • C:\Users\Admin\AppData\Local\Temp\1019682001\4471d7fc06.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019682001\4471d7fc06.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:2804
                                • C:\Users\Admin\AppData\Local\Temp\1019683001\14e1cb6e5b.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019683001\14e1cb6e5b.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:3704
                                  • C:\Users\Admin\AppData\Local\Temp\1019683001\14e1cb6e5b.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1019683001\14e1cb6e5b.exe"
                                    7⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:3096
                                • C:\Users\Admin\AppData\Local\Temp\1019684001\ec3d3d6a75.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019684001\ec3d3d6a75.exe"
                                  6⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:684
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 772
                                    7⤵
                                    • Program crash
                                    PID:7412
                                • C:\Users\Admin\AppData\Local\Temp\1019685001\c2b00d1e4b.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019685001\c2b00d1e4b.exe"
                                  6⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5408
                                • C:\Users\Admin\AppData\Local\Temp\1019686001\38ded7ac8f.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019686001\38ded7ac8f.exe"
                                  6⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5784
                                • C:\Users\Admin\AppData\Local\Temp\1019687001\932c803633.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1019687001\932c803633.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:6048
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM firefox.exe /T
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:6088
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM chrome.exe /T
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4844
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM msedge.exe /T
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1728
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM opera.exe /T
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1700
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM brave.exe /T
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5320
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                    7⤵
                                      PID:1364
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                        8⤵
                                        • Checks processor information in registry
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        • Suspicious use of SetWindowsHookEx
                                        PID:116
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1932 -prefMapHandle 1924 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a991c829-d324-47dd-a41e-20eb2c1243ab} 116 "\\.\pipe\gecko-crash-server-pipe.116" gpu
                                          9⤵
                                            PID:5656
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2476 -parentBuildID 20240401114208 -prefsHandle 2452 -prefMapHandle 2448 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9d78982-e082-420a-88ec-3f48ac400d19} 116 "\\.\pipe\gecko-crash-server-pipe.116" socket
                                            9⤵
                                              PID:5680
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3180 -childID 1 -isForBrowser -prefsHandle 3172 -prefMapHandle 3168 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {25cd01c8-05d4-49e6-9180-d05862a07219} 116 "\\.\pipe\gecko-crash-server-pipe.116" tab
                                              9⤵
                                                PID:5928
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3156 -childID 2 -isForBrowser -prefsHandle 3508 -prefMapHandle 3444 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e684697-13ab-40ab-896a-0f631a5e1c7f} 116 "\\.\pipe\gecko-crash-server-pipe.116" tab
                                                9⤵
                                                  PID:6044
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1772 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 1468 -prefMapHandle 2500 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {efed6a88-665a-4f9d-b4cf-f5fd9f841986} 116 "\\.\pipe\gecko-crash-server-pipe.116" utility
                                                  9⤵
                                                  • Checks processor information in registry
                                                  PID:7340
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5160 -childID 3 -isForBrowser -prefsHandle 5152 -prefMapHandle 5148 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {81213ac9-56c3-418d-8807-58b3d9422c2c} 116 "\\.\pipe\gecko-crash-server-pipe.116" tab
                                                  9⤵
                                                    PID:8156
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5292 -childID 4 -isForBrowser -prefsHandle 5300 -prefMapHandle 5304 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f361a09-4691-4437-8617-d13d7256aaa4} 116 "\\.\pipe\gecko-crash-server-pipe.116" tab
                                                    9⤵
                                                      PID:8168
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5572 -childID 5 -isForBrowser -prefsHandle 5492 -prefMapHandle 5496 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65eeb217-1608-4db0-820e-698a2310a80f} 116 "\\.\pipe\gecko-crash-server-pipe.116" tab
                                                      9⤵
                                                        PID:8180
                                                • C:\Users\Admin\AppData\Local\Temp\1019688001\16ef8fccca.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1019688001\16ef8fccca.exe"
                                                  6⤵
                                                  • Modifies Windows Defender Real-time Protection settings
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Windows security modification
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:6132
                                                • C:\Users\Admin\AppData\Local\Temp\1019689001\0a6dd525d6.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1019689001\0a6dd525d6.exe"
                                                  6⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:6720
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 6720 -s 1564
                                                    7⤵
                                                    • Program crash
                                                    PID:6916
                                                • C:\Users\Admin\AppData\Local\Temp\1019690001\99a43b4250.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1019690001\99a43b4250.exe"
                                                  6⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  PID:7028
                                                  • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"
                                                    7⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:7128
                                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q7609.exe
                                              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q7609.exe
                                              4⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4844
                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3n23g.exe
                                            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3n23g.exe
                                            3⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2896
                                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B687y.exe
                                          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B687y.exe
                                          2⤵
                                          • Modifies Windows Defender Real-time Protection settings
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Windows security modification
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2448
                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2208
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4572 -ip 4572
                                        1⤵
                                          PID:952
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4124 -ip 4124
                                          1⤵
                                            PID:2228
                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1060
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:4916
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:1304
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6720 -ip 6720
                                                1⤵
                                                  PID:6896
                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:7248
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 684 -ip 684
                                                  1⤵
                                                    PID:7292

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    968cb9309758126772781b83adb8a28f

                                                    SHA1

                                                    8da30e71accf186b2ba11da1797cf67f8f78b47c

                                                    SHA256

                                                    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                                    SHA512

                                                    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    e443ee4336fcf13c698b8ab5f3c173d0

                                                    SHA1

                                                    9bf70b16f03820cbe3158e1f1396b07b8ac9d75a

                                                    SHA256

                                                    79e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b

                                                    SHA512

                                                    cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    56a4f78e21616a6e19da57228569489b

                                                    SHA1

                                                    21bfabbfc294d5f2aa1da825c5590d760483bc76

                                                    SHA256

                                                    d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb

                                                    SHA512

                                                    c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    120B

                                                    MD5

                                                    fe11e8a56a6aed0995ea6ccf0909e3ad

                                                    SHA1

                                                    1dfca9e3d4c3aecfb4c1fc67db860916eb11b632

                                                    SHA256

                                                    a28140f35c43be6485a8afef6fce9a9d5e9acb439c06ebc7c8a97f61b7f7301e

                                                    SHA512

                                                    4a4d0a9ed3739df8d442264bd2c2c6a45d5421a9554446d9eadaf70bf7faf1fd2f28f1f8e63effbe747f6e2c55dc41d7ad3d3a57d3674ad17679bf8f21f5e704

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    79155f10ba82945c9d78c044c4903991

                                                    SHA1

                                                    2072eb690c10042d707f0d68480039963e7f33a7

                                                    SHA256

                                                    5298032914bff31f01ea4256a12071afb2b9e13734f5ce9b521b240970062970

                                                    SHA512

                                                    a68ce504e36a1c50870e7b9f7f59a2ee65152b0732efdc38ed9c4cfe57958c43f551daa781fdf36cd2b0f96adb883cc8080f1358769f233f0e2a7e8b8c144b55

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    51f4e0a66d962aad0bde893e2bea0444

                                                    SHA1

                                                    2ea9d46a2027c367438e852015562f98e32f3050

                                                    SHA256

                                                    6b5a91fa9320c5a7360c0c7c72b193bf2bba7469e8534d7a860e1fb2e287df89

                                                    SHA512

                                                    d837707dafcd6bf275881d0fc2829215766e7abdf44f49d74c547604b71bdd5c68a5c514a2af058601898d882d7b5432309e4aa839902796b2755d01dbbfa37e

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\2566784d-0164-46b6-81d1-638f86fff64c\index-dir\the-real-index

                                                    Filesize

                                                    72B

                                                    MD5

                                                    ed362292237881d6b28ea69cd2ee811f

                                                    SHA1

                                                    4a211e714301655782f007dd55592d4e4c5117db

                                                    SHA256

                                                    c36c7af504843a64463de4fb7abb13d49afc43cd4bb72c7d682f66a363f5f32b

                                                    SHA512

                                                    4571dcb3caacbff31444b380b952507a0d3fff2f2107d8a1a47b69d9613eca445fb649fd897ec5cd395db6f96741e76185912bd971c39dc50cd11bf20ec3d944

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\2566784d-0164-46b6-81d1-638f86fff64c\index-dir\the-real-index~RFe59ae09.TMP

                                                    Filesize

                                                    48B

                                                    MD5

                                                    4d725c433596aa47a334982c8dae63fb

                                                    SHA1

                                                    7c42fcbf91882f4ba3c8e2ac1f7c348fa7daffdf

                                                    SHA256

                                                    45a157412f38fcdce1ddc41f8f94970d3bb451aac835d0a01eee3b557b13d834

                                                    SHA512

                                                    7ac341bdfa549b6a03f3cf7247906051a2260fea2da2a8a58d6e9fe25f5d0bf2fc25050a75f5b906b7ebf6373538659ca95e4f30e88ebbc26b49ddb694822764

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt

                                                    Filesize

                                                    109B

                                                    MD5

                                                    318c164c1a2d5d889931fdd0a720ad41

                                                    SHA1

                                                    9f37b976734e5de7fe7db35690b603494f745058

                                                    SHA256

                                                    e99a5b491ff13ccb533a2c87f3dac0c49f2169d50e3de2ae1919b7da40f3cc3e

                                                    SHA512

                                                    b3cff9378f576bc1f095013f546488b1bd363a0126f067f18f3f38c04f69b93604ec30f5219a99285a71df3731423ea5e099be40a4aac056e52eede457a891ed

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt

                                                    Filesize

                                                    204B

                                                    MD5

                                                    716ef31c6ebf90557a236ce6d5dea47a

                                                    SHA1

                                                    245648b162619ff9c6dc2ae27f6d54687880a587

                                                    SHA256

                                                    33b67444848ef343cc3321e43a954a72ad177e7287b1302fa68e48ffc5bb3204

                                                    SHA512

                                                    f04b50c7a919c33b1e04d355881f445abcf63f8f1e620cf315f68b67c35a621ecb5bb9250d61f48c6e831bd0dc02a92b7ca3a76c75e9907ff20b3b100fc6fcd3

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                    Filesize

                                                    72B

                                                    MD5

                                                    7cdeb79d17fdb30fc493845849dc04c8

                                                    SHA1

                                                    6ac61f8c179b514d86988ff01095927b5a358c58

                                                    SHA256

                                                    bc6755b4de83a4b628ae9c60eaa2b1110370a1760847b185986cfeed8073ac16

                                                    SHA512

                                                    951970a7778966adab247dccd5fc4fa9ef1af7e5ff19e190cdb5beb4ffc6efeff2aba29d0d5f9bf724f719c6a69c47b88df877c4ee50a996c32bd02b99df7631

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe59adbb.TMP

                                                    Filesize

                                                    48B

                                                    MD5

                                                    7ffcc7886dc960d254e6a1582a7254b3

                                                    SHA1

                                                    ecd6064acee7e90116477f65797c51346ebff946

                                                    SHA256

                                                    92245fa3013800fdd95741cd1a965a788f32b97555be85ea6423e538382ed9e7

                                                    SHA512

                                                    f30be7a1c80206211fe9adb36deda13563b58d22e75f4f1810f2f3f119b4f9b4be15e68cc83596df3f4d349108baf31345f3f49314adfff5bc3759fa3d8ba2c8

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    6752a1d65b201c13b62ea44016eb221f

                                                    SHA1

                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                    SHA256

                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                    SHA512

                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    1cbed31dd60ef6d13c4f2d8475efc885

                                                    SHA1

                                                    c88ea89b7ac6844bb76697d334dce76110af5b7c

                                                    SHA256

                                                    f1fd9e71d8e39dcdb6d4139c9f6712c523fa81bedc33931e4df25bf36050549f

                                                    SHA512

                                                    f3371d1f3b1830dab2c597e27d1b598818186abdb4232b91d66eadb966889d3c57e37b7c087e5c4ca1d616702eb815b6e170ddbaa405e134097f5e085ad25ab0

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\HA5FC889\download[1].htm

                                                    Filesize

                                                    1B

                                                    MD5

                                                    cfcd208495d565ef66e7dff9f98764da

                                                    SHA1

                                                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                    SHA256

                                                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                    SHA512

                                                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    6257ba262aaab19c86f973fb41211d96

                                                    SHA1

                                                    6033dbc01c0c1cc5c83a16d716c1855a6f9da4ef

                                                    SHA256

                                                    e8174c17b1d53eecb9c8ab2a988cadd3688f8b6392f0a6fbad4d13d46ba8dc4c

                                                    SHA512

                                                    5019333136a50ad59a217de4891564415a467892667b2c955069bc08411837d2e6747bbfd91a4cdff30ceeda40f0a29c7d69210cf0b37101e5a8cd3564626aa5

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    8f979374bfbf31b0a175fabe2568c6e2

                                                    SHA1

                                                    7b301955cf6fe34af030c959b4d576898fed0421

                                                    SHA256

                                                    58a9944bcf17b89335d6544cc004f17136383ca3bc85d65cf70127f025029434

                                                    SHA512

                                                    13e8bc7b3d8d4bb15a2072c08b9880a289b5a082af8adddeb185eb1355611aca3a6821a4605d82c15b97dfb5a409700cc68c629798d54d226a327493a1b6fff1

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    96c542dec016d9ec1ecc4dddfcbaac66

                                                    SHA1

                                                    6199f7648bb744efa58acf7b96fee85d938389e4

                                                    SHA256

                                                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                    SHA512

                                                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                  • C:\Users\Admin\AppData\Local\Temp\1019345001\0KGPkVX.exe

                                                    Filesize

                                                    240KB

                                                    MD5

                                                    a81f0f7d2a62e209e8f31e1992d2d9e4

                                                    SHA1

                                                    a26f61b2f3afef71e44adc858a484b3a61214158

                                                    SHA256

                                                    36a7f7f5d9915216410bb136cdf30c0c3ee01c11acab8d9c7d43e2033e6d8b76

                                                    SHA512

                                                    c0acca37ce76212688867ad80d37cfbd7e9939cea436b776119e0ab464ca375dffd2b13a6af69de582af0d82006ecbc049fec8d24068ac5f16fd8a5940625e14

                                                  • C:\Users\Admin\AppData\Local\Temp\1019352001\im2o0Q8.exe

                                                    Filesize

                                                    538KB

                                                    MD5

                                                    8339294bc24bf06136ca6eeb31651fb6

                                                    SHA1

                                                    f2a27ecfa302cee73a90e8b8bb9450f36d63ad6d

                                                    SHA256

                                                    78c22e4814c30c5e31c6a12427a908d03d9bdcdebd716514d54c517c131d46d7

                                                    SHA512

                                                    62dcfae552afb890e471f68bbe9267d93e562a715dcd71464e01177e5ce38ecbcf5cda7d501f723a35522036c20e251a986c07de5bd9d91a58ed7e50f47f8692

                                                  • C:\Users\Admin\AppData\Local\Temp\1019563001\hYW0tgm.exe

                                                    Filesize

                                                    295KB

                                                    MD5

                                                    b251cf9e14aa07b1a2e506ad4ee0028c

                                                    SHA1

                                                    3bafd765233c9bc50ba3945446b4153d6f10a41a

                                                    SHA256

                                                    be4ae482b0ca161f7d52dcfecc38e55af4b0a0342b0c1b854329da4f42b6c1cb

                                                    SHA512

                                                    660313d8286535b3acab03c8894d069d7fcb65eb4b5e75026529a096c2337cd68d8a291abf78f612d75b5aec2a413e0936eb16c8c1a94bfda0568dd41312c2c7

                                                  • C:\Users\Admin\AppData\Local\Temp\1019610001\murrgHN.exe

                                                    Filesize

                                                    543KB

                                                    MD5

                                                    4f36d38adf1aa27764e834263b790397

                                                    SHA1

                                                    c38cd4f1bc7762951225d35e06578b8bd91606d5

                                                    SHA256

                                                    d6a9fcd0a2fccd03908113ac2febc012c36cd007c30ff2e8903e3dd26e189bbd

                                                    SHA512

                                                    76d100555bb8a3ef8529b4dcb9391696b440e5b349f38c36ee1fb1ad8a46aa9289b805511d91597ceaa8dccf8fe64c6130111dcfe09cab0651428c83bd0bce23

                                                  • C:\Users\Admin\AppData\Local\Temp\1019679001\fbea73b3db.exe

                                                    Filesize

                                                    1.3MB

                                                    MD5

                                                    669ed3665495a4a52029ff680ec8eba9

                                                    SHA1

                                                    7785e285365a141e307931ca4c4ef00b7ecc8986

                                                    SHA256

                                                    2d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6

                                                    SHA512

                                                    bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6

                                                  • C:\Users\Admin\AppData\Local\Temp\1019680001\f9d0bb06a0.exe

                                                    Filesize

                                                    21KB

                                                    MD5

                                                    04f57c6fb2b2cd8dcc4b38e4a93d4366

                                                    SHA1

                                                    61770495aa18d480f70b654d1f57998e5bd8c885

                                                    SHA256

                                                    51e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2

                                                    SHA512

                                                    53f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd

                                                  • C:\Users\Admin\AppData\Local\Temp\1019681001\f992b8578f.exe

                                                    Filesize

                                                    4.2MB

                                                    MD5

                                                    0ff2001aeabb55d9ac0bfeb28c577633

                                                    SHA1

                                                    e5f37210806ae7b9cacd40a52dc1e20ceea5b89b

                                                    SHA256

                                                    dc1e0f683dabb770d3b77040889f5a189e6e5de7040a9625f688a8c240624d3a

                                                    SHA512

                                                    936cdfc268ec50b7c4df7d53ccbc45a8626a6c52869a1c5a1e0f944f8ab051700e53e0466c328e123e6797c865a329186bfaaba1d075d69c250f72e2f7326d54

                                                  • C:\Users\Admin\AppData\Local\Temp\1019682001\4471d7fc06.exe

                                                    Filesize

                                                    2.5MB

                                                    MD5

                                                    87330f1877c33a5a6203c49075223b16

                                                    SHA1

                                                    55b64ee8b2d1302581ab1978e9588191e4e62f81

                                                    SHA256

                                                    98f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0

                                                    SHA512

                                                    7c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f

                                                  • C:\Users\Admin\AppData\Local\Temp\1019683001\14e1cb6e5b.exe

                                                    Filesize

                                                    758KB

                                                    MD5

                                                    afd936e441bf5cbdb858e96833cc6ed3

                                                    SHA1

                                                    3491edd8c7caf9ae169e21fb58bccd29d95aefef

                                                    SHA256

                                                    c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                                                    SHA512

                                                    928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                                                  • C:\Users\Admin\AppData\Local\Temp\1019684001\ec3d3d6a75.exe

                                                    Filesize

                                                    1.9MB

                                                    MD5

                                                    87448823dab50a9edd9f481b99aca4ee

                                                    SHA1

                                                    2711209da94d4e33d7a6636fe1a797fba552002c

                                                    SHA256

                                                    4c813bff7644e8b3db0c1f15db3eae43ba2ca5badf089ec028607c888164e539

                                                    SHA512

                                                    37085c98ca976ef91631cc7d6b81bfcbf64f72443205d1df2a35105a504878b0795d45057a3c82a1cbddf0895d11dba9ffc234fb13aff14eb2def33ea449bf43

                                                  • C:\Users\Admin\AppData\Local\Temp\1019685001\c2b00d1e4b.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    1c76387d2784b116b9f532b8b0a48c8b

                                                    SHA1

                                                    9b977e6b1404a5e4f1b3f3254a1c025fa996ab0d

                                                    SHA256

                                                    ec07d0613f3d6cf3ba318445c88e2cc77c06065cdf8a1f61a402236c0687f1d9

                                                    SHA512

                                                    0fcf85db4a716b7f2da97304c70b0f7bed88d6fe448be5bff6d657df8f87cd6b57b007484017128a8c4b28c61ad5352949dba774f67d6afe8b94e701019fcaa9

                                                  • C:\Users\Admin\AppData\Local\Temp\1019686001\38ded7ac8f.exe

                                                    Filesize

                                                    2.7MB

                                                    MD5

                                                    5f8d93018394ecd9f599aa2c10147a5f

                                                    SHA1

                                                    2d8e3a0d25f83fd723861b5d6cca4e1ca98ac3eb

                                                    SHA256

                                                    681176f836e4a1921854c9aa2ae0fc6929b850c589beb81ccb45be4b355f2044

                                                    SHA512

                                                    66a5d018dec2b2353f0048113ced96e55870d78b9253b0704f625e9003293c60e03de56cf534613ece08f183701226b4f71a7ff3adafe3128e79fcadcc1359eb

                                                  • C:\Users\Admin\AppData\Local\Temp\1019687001\932c803633.exe

                                                    Filesize

                                                    944KB

                                                    MD5

                                                    c62f6307b430705a222d91251c64a3fd

                                                    SHA1

                                                    2e02770695aa07c45ccdc17160f7d57588d938e7

                                                    SHA256

                                                    bf00151c4e9ccb994891b277adca7ffb6dbb5f1e8704c9f877fabdf81653912b

                                                    SHA512

                                                    698a75e35b8466252357c46ac7089ce1d52289320a125c7f431a0befa80752cc5a75dc2d959935e0a9baa61848913801fb1d24e4cebe857c7754b7ae676bada6

                                                  • C:\Users\Admin\AppData\Local\Temp\1019688001\16ef8fccca.exe

                                                    Filesize

                                                    2.6MB

                                                    MD5

                                                    c682c12739cbb53b85334e649cf0b772

                                                    SHA1

                                                    d80e059a1162d937a09a3823022e749d5d7cdff8

                                                    SHA256

                                                    28ee82a1695d62f46ce43ee4ebd525806cdb508ed5f68dfe07113bd58b2587e3

                                                    SHA512

                                                    937d7d84b5af30d1788e958e8893195ad2e8abd6d9640d2343c5e9da199cee67199b824a10965a20b6a77e61844fc6c0bb9d887630b7f6433364671ee507c6dc

                                                  • C:\Users\Admin\AppData\Local\Temp\1019689001\0a6dd525d6.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    15709eba2afaf7cc0a86ce0abf8e53f1

                                                    SHA1

                                                    238ebf0d386ecf0e56d0ddb60faca0ea61939bb6

                                                    SHA256

                                                    10bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a

                                                    SHA512

                                                    65edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9

                                                  • C:\Users\Admin\AppData\Local\Temp\1019690001\99a43b4250.exe

                                                    Filesize

                                                    429KB

                                                    MD5

                                                    51ff79b406cb223dd49dd4c947ec97b0

                                                    SHA1

                                                    b9b0253480a1b6cbdd673383320fecae5efb3dce

                                                    SHA256

                                                    2e3a5dfa44d59681a60d78b8b08a1af3878d8e270c02d7e31a0876a85eb42a7e

                                                    SHA512

                                                    c2b8d15b0dc1b0846f39ce007be2deb41d5b6ae76af90d618f29da8691ed987c42f3c270f0ea7f4d10cbd2d3877118f4133803c9c965b6ff236ff8cfafd9367c

                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B687y.exe

                                                    Filesize

                                                    2.6MB

                                                    MD5

                                                    3932047ba13c345b7bf0f916570b975c

                                                    SHA1

                                                    e5d8f6be91e7a58bffb8eb8902cde50ba8d21156

                                                    SHA256

                                                    26cfec473064d6fc67596636ac0af118716962555255f7336b71698bf4423a25

                                                    SHA512

                                                    ce4487112ce042247c51dbd6948a8e8bb9301bf0e997596309bed267264a5dac29f410912fef964ccab7e0c73d8e678506809eebbacaa7e4ce1b15fb64a2b7a9

                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j2t43.exe

                                                    Filesize

                                                    5.2MB

                                                    MD5

                                                    bd54fa4f7c00d9ddb27befd0e872e498

                                                    SHA1

                                                    8c893ab9af24957e878a7dd327e96ea14cd31f62

                                                    SHA256

                                                    de4b49b66fbf23986936347e0263ed0b085e0eb6ef5f756a5ecb6b55726f7efd

                                                    SHA512

                                                    800f15a9cdeceb4440ca53fff93f12b8e28655b6e89216c6424307739e22809ae6c8f3337c975e8e7b00cbe0c4b570edf042020f39631c39a2ed0188dad6e2df

                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3n23g.exe

                                                    Filesize

                                                    2.8MB

                                                    MD5

                                                    afea54bb6f5e4adb448036812363ca2e

                                                    SHA1

                                                    9626b3093dc9c9aa2982462b14258b7ff9f8e256

                                                    SHA256

                                                    9742f2ebcfdac7645f7872e538cfde538ad165eab94e1f934bb8ebd1ab18aed4

                                                    SHA512

                                                    59231960ead5c1001e03164248fe3d771aadba467cfdbcf30138286962ab779961c6319b417bd6a751bcfe432fb56efc5d35a225a9965ee07d60809e60484527

                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\O8R36.exe

                                                    Filesize

                                                    3.5MB

                                                    MD5

                                                    e11453327a1e9017e1f8fb39844b61f3

                                                    SHA1

                                                    f201303d90d18c29287082be84fe0120ca31158b

                                                    SHA256

                                                    dadcad91ef2d1252bbb6234440a4826e6661685dd82cffa7232fe8796c74be8d

                                                    SHA512

                                                    94fdb8d8ff47ec2eafe4309029df2e0a988c9624e03cf0d6b72b1968884f4bdfdef61714ef691b4a930048d4830dfbb6ec70b556eebd8b00988171cb65829692

                                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1N27n3.exe

                                                    Filesize

                                                    2.8MB

                                                    MD5

                                                    aa49974c423dd11ca21b88b21def0aeb

                                                    SHA1

                                                    6d9f3a4fbbc0ad87a7190fd900fe5afc1111f34f

                                                    SHA256

                                                    976936764d06a077e452d0ee499308dcc6535f78fc61581c7a6cd6c096320b82

                                                    SHA512

                                                    2207c7125bf73e7589ccbe687a2541962e398101369f27d63cd88984ed6d1682a71d26a039b6008ea012ac0f5dcadcfb9111a99c856e28c3ae384e7f5eee1d84

                                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q7609.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    8ed130f18d336710681892376077e84b

                                                    SHA1

                                                    e17b7408774e6af987df8bbd305cf90a04907127

                                                    SHA256

                                                    cff3b8f3932251726136a77b23eb614eb05aba1779fa8de5fa6ee2a062d9f61b

                                                    SHA512

                                                    e09e49f9df4c8037a12ba224796abb12e422d1ec289f94a3d0a4cac7e454fbdda48c5c7fa3c08c9b90c8ffbf58c2ff931bef7db49ef5ed5f2bebc143c7d85456

                                                  • C:\Users\Admin\AppData\Local\Temp\Tmp4888.tmp

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    a10f31fa140f2608ff150125f3687920

                                                    SHA1

                                                    ec411cc7005aaa8e3775cf105fcd4e1239f8ed4b

                                                    SHA256

                                                    28c871238311d40287c51dc09aee6510cac5306329981777071600b1112286c6

                                                    SHA512

                                                    cf915fb34cd5ecfbd6b25171d6e0d3d09af2597edf29f9f24fa474685d4c5ec9bc742ade9f29abac457dd645ee955b1914a635c90af77c519d2ada895e7ecf12

                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pdp012ht.hfg.ps1

                                                    Filesize

                                                    60B

                                                    MD5

                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                    SHA1

                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                    SHA256

                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                    SHA512

                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    b0ff2d47553705fcb4b18dc9f6425f71

                                                    SHA1

                                                    c1ba3cb08e603868668bc68965afc30d4f775d20

                                                    SHA256

                                                    305ef5f788ecc63bfe4081aeed2a2ddcef8770dae6dc48277d8f61c3d8d2c1ab

                                                    SHA512

                                                    e0387e1b1d714c1de4bccc5e8a870aad18497feac6f2a1d13c8066a4f04948aed43c3ee2b823fbccdcecceae3bf0316c0be9c83160b417cb6584003866c87841

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    38bd15dd9a653076a5ac7ff91720ac9e

                                                    SHA1

                                                    f6e7dab4b45ece15f787cb58f05f6f0d1268d93e

                                                    SHA256

                                                    49baa8df640a2091e07dd6fb25018a80bf3349b87da1787a9ee66f251724baa1

                                                    SHA512

                                                    317fb3166c0fabe1ee28766bd78f012ece9b276e2b431a995adbc684b828b489bee5affb1ff3323831249d67bc465136500077303aeef8c33b204ebc72351c7b

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin

                                                    Filesize

                                                    23KB

                                                    MD5

                                                    81312f44c713f4baade6dc7bf791342a

                                                    SHA1

                                                    80f51e4f8783c141eea426dcb2aaa7520a98f3c4

                                                    SHA256

                                                    f04065fe01c1df005ec3aaac017fa23de3552df96b18525c4059094dc02bdd57

                                                    SHA512

                                                    1fab3333361ae36c279a0c25fae61f7f0f4c649d8de47a2e61c0267cb052e68890110dffb74321a1954bf943b1877cbc0ad03fe7e27c426b9dc0465768bab8fb

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.bin

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    77fac2347c4f6559b3b1ac78160a1ce9

                                                    SHA1

                                                    4988d90772614838c38d05c9f1254746fe034c0d

                                                    SHA256

                                                    04879d95a589023b476101fa503a46bade3fc0aac24e56f256dab568a70eaaec

                                                    SHA512

                                                    e1c8a52e16a80bdd091feb433cb305645ca2ef9f5de4fce35908cb80481f8b3893c6088235b3836ca77913ae53893ea04f6310d29d3bae873a173731ac276997

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    902eb8b30f6383ff5118cb97d24c91a6

                                                    SHA1

                                                    357069f6380a01fcfb3d5c455ee29ed704d09abd

                                                    SHA256

                                                    896c5744f7cc8ae5bb5f2a1c4d209f8c10703789c03b7ae408d2f399af179a55

                                                    SHA512

                                                    4696b4dcdc031ad97462c11409e2b85878bb29f3b803c5b4cd4cafb6472b9031306d38062903e7a273af317e63933ecba56b3ce4db049a98cd60bdbe6acb09c1

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    8acca3e58950bfa70ba77d3ec8c0cc6b

                                                    SHA1

                                                    6ac9834196824affa544522e60b701f60336af9f

                                                    SHA256

                                                    03e9e4760f5b8ab4e3745a7ba1620ce63788b78bb6bc769bb92ddd494b7129e0

                                                    SHA512

                                                    bbb28d194d55a9f06b43add34ce9014ab736e2f4b8ccc1f8da43f610f610a7b8c9d60096a2faa5d390b746bd79920f5022bb4fd31d6e85b57a9503db438b1dc6

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\8cd7dfa6-bf6e-4f92-be08-1630e72e5bc1

                                                    Filesize

                                                    24KB

                                                    MD5

                                                    353fc82f4b2187556e39c6496aafcbef

                                                    SHA1

                                                    4c5ee1dcf1143be09ebb9788a60f1d5154aa5b6d

                                                    SHA256

                                                    23f6b98d7770bb5a468fd41ac2c537890fa0a6dbfc80c5d4af55db0c551eaf4a

                                                    SHA512

                                                    ee40b2ee3cec3ab6f7fc097a466bebc72fa2a7294449baecce789e6ab428616845e9ee13381a31a9438255d81f7a99643dcd5fb32131f038bea35c9c9de84be0

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\ce70e48f-6f65-48f7-9c8f-15f61901dfac

                                                    Filesize

                                                    982B

                                                    MD5

                                                    d2199ce59827630c1e2ec38a8eaf35e5

                                                    SHA1

                                                    be2096f83ab6e439af06d4ef06d1d50b347d4e72

                                                    SHA256

                                                    164f0ed50dbe1d544b481c0c01abd7dc675344db48784ef44057ef4a0e550caf

                                                    SHA512

                                                    65fcb99f428703c520285ee87f5ffa8c5beea39818ee508dacf017dad7429b5ce7d5ba76bc4c6feb90d66b712def7e98bab2087415478886aee1c34b0dc0f8ae

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\e55fe142-3e7a-4650-b9e4-26295e52f74b

                                                    Filesize

                                                    671B

                                                    MD5

                                                    e4fc382544f179fc048da7a4a77bf74c

                                                    SHA1

                                                    3df55ebe6ce765894f53137474618f7f62057986

                                                    SHA256

                                                    e27a1466f8a9e1c0b06693d49f5c63aaf25efd6a5b8cfcbed7df3ee949b999a3

                                                    SHA512

                                                    4e765bb870eb06f882c7e88855d94ef02114c2b92952d670c07a8ffad7cfafbeebaab59b8fe2ff682029bdd60eb16727ccb857f521a87bb12508ed225182b982

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    772592215e57b1bc133af01d573d6b92

                                                    SHA1

                                                    b77a3a949daa8f5e6c98fadbf89a285ed0a29131

                                                    SHA256

                                                    b228f1c30c70080fc86bb4744e55f07d0a92555ac51e46b07ca906b54795d3fe

                                                    SHA512

                                                    77449d1dcd1a092e4035ca6738844fc6e2140a642e0f2e0955712247c864e7ff75af985e041c555346bc728c19cf0c0c4fd01d435c2e5d0623a1e68a922cb7aa

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs.js

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    8fd64837794cf020a8dd262b89f4bbff

                                                    SHA1

                                                    9448eeac0c177c73221c82b15e26d58bfedfe19a

                                                    SHA256

                                                    5778ba01f0d17da118af5fe2878b0a95f3d88f13894e37b7b0bd2c7fef4b780a

                                                    SHA512

                                                    5139c2fbe1f3424ab4363fd4ffeb576ed5c9e42f49249984c048905555da0df24a289004a3ae8a7b9d6e5add0d79e794575e22175f4b81807aa7a48c388dba1e

                                                  • C:\oizslgkrqb\defad7ed96214795a6fecc5e63712438.exe

                                                    Filesize

                                                    144KB

                                                    MD5

                                                    cc36e2a5a3c64941a79c31ca320e9797

                                                    SHA1

                                                    50c8f5db809cfec84735c9f4dcd6b55d53dfd9f5

                                                    SHA256

                                                    6fec179c363190199c1dcdf822be4d6b1f5c4895ebc7148a8fc9fa9512eeade8

                                                    SHA512

                                                    fcea6d62dc047e40182dc4ff1e0522ca935f9aeefdb1517957977bc5d9ac654285a973261401f3b98abf1f6ed62638b9e31306fd7aaeb67214ca42dfc2888af0

                                                  • C:\oizslgkrqb\fac8a61fb5b54e14a01f1f0b61c43706.exe

                                                    Filesize

                                                    1.0MB

                                                    MD5

                                                    971b0519b1c0461db6700610e5e9ca8e

                                                    SHA1

                                                    9a262218310f976aaf837e54b4842e53e73be088

                                                    SHA256

                                                    47cf75570c1eca775b2dd1823233d7c40924d3a8d93e0e78c943219cf391d023

                                                    SHA512

                                                    d234a9c5a1da8415cd4d2626797197039f2537e98f8f43d155f815a7867876cbc1bf466be58677c79a9199ea47d146a174998d21ef0aebc29a4b0443f8857cb9

                                                  • memory/684-1474-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                    Filesize

                                                    8.4MB

                                                  • memory/684-690-0x0000000010000000-0x000000001001C000-memory.dmp

                                                    Filesize

                                                    112KB

                                                  • memory/684-716-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                    Filesize

                                                    8.4MB

                                                  • memory/684-1611-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                    Filesize

                                                    8.4MB

                                                  • memory/684-1621-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                    Filesize

                                                    8.4MB

                                                  • memory/684-568-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                    Filesize

                                                    8.4MB

                                                  • memory/684-712-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                    Filesize

                                                    8.4MB

                                                  • memory/1060-155-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1632-382-0x00000000006C0000-0x000000000131C000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/1632-543-0x00000000006C0000-0x000000000131C000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/1632-252-0x00000000006C0000-0x000000000131C000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/1632-381-0x00000000006C0000-0x000000000131C000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/1860-105-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-50-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-40-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-41-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-33-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-1572-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-694-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-762-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-48-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-452-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-126-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-280-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-44-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-68-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-127-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1860-174-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2208-47-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2448-107-0x0000000000470000-0x000000000070C000-memory.dmp

                                                    Filesize

                                                    2.6MB

                                                  • memory/2448-69-0x0000000000470000-0x000000000070C000-memory.dmp

                                                    Filesize

                                                    2.6MB

                                                  • memory/2448-77-0x0000000000470000-0x000000000070C000-memory.dmp

                                                    Filesize

                                                    2.6MB

                                                  • memory/2448-78-0x0000000000470000-0x000000000070C000-memory.dmp

                                                    Filesize

                                                    2.6MB

                                                  • memory/2448-110-0x0000000000470000-0x000000000070C000-memory.dmp

                                                    Filesize

                                                    2.6MB

                                                  • memory/2896-56-0x00000000007C0000-0x0000000000CBA000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/2896-57-0x00000000007C0000-0x0000000000CBA000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/2956-224-0x0000000002D40000-0x0000000002D96000-memory.dmp

                                                    Filesize

                                                    344KB

                                                  • memory/2956-262-0x0000000000CC0000-0x0000000000E17000-memory.dmp

                                                    Filesize

                                                    1.3MB

                                                  • memory/3036-210-0x0000000006320000-0x000000000636C000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/3036-234-0x0000000007850000-0x0000000007864000-memory.dmp

                                                    Filesize

                                                    80KB

                                                  • memory/3036-198-0x0000000005C90000-0x0000000005CF6000-memory.dmp

                                                    Filesize

                                                    408KB

                                                  • memory/3036-197-0x0000000005AF0000-0x0000000005B56000-memory.dmp

                                                    Filesize

                                                    408KB

                                                  • memory/3036-208-0x0000000005D00000-0x0000000006054000-memory.dmp

                                                    Filesize

                                                    3.3MB

                                                  • memory/3036-209-0x00000000062F0000-0x000000000630E000-memory.dmp

                                                    Filesize

                                                    120KB

                                                  • memory/3036-195-0x0000000005450000-0x0000000005A78000-memory.dmp

                                                    Filesize

                                                    6.2MB

                                                  • memory/3036-194-0x00000000029E0000-0x0000000002A16000-memory.dmp

                                                    Filesize

                                                    216KB

                                                  • memory/3036-211-0x00000000068C0000-0x00000000068F2000-memory.dmp

                                                    Filesize

                                                    200KB

                                                  • memory/3036-236-0x0000000007930000-0x0000000007938000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/3036-235-0x0000000007950000-0x000000000796A000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/3036-196-0x0000000005310000-0x0000000005332000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/3036-233-0x0000000007840000-0x000000000784E000-memory.dmp

                                                    Filesize

                                                    56KB

                                                  • memory/3036-232-0x0000000007810000-0x0000000007821000-memory.dmp

                                                    Filesize

                                                    68KB

                                                  • memory/3036-212-0x000000006F4E0000-0x000000006F52C000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/3036-222-0x00000000074C0000-0x00000000074DE000-memory.dmp

                                                    Filesize

                                                    120KB

                                                  • memory/3036-223-0x00000000074E0000-0x0000000007583000-memory.dmp

                                                    Filesize

                                                    652KB

                                                  • memory/3036-231-0x0000000007890000-0x0000000007926000-memory.dmp

                                                    Filesize

                                                    600KB

                                                  • memory/3036-230-0x0000000007680000-0x000000000768A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/3036-229-0x0000000007610000-0x000000000762A000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/3036-228-0x0000000007C50000-0x00000000082CA000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/3096-458-0x0000000000400000-0x0000000000456000-memory.dmp

                                                    Filesize

                                                    344KB

                                                  • memory/3096-460-0x0000000000400000-0x0000000000456000-memory.dmp

                                                    Filesize

                                                    344KB

                                                  • memory/3096-456-0x0000000000400000-0x0000000000456000-memory.dmp

                                                    Filesize

                                                    344KB

                                                  • memory/3156-261-0x0000000005760000-0x0000000005AB4000-memory.dmp

                                                    Filesize

                                                    3.3MB

                                                  • memory/3156-268-0x0000000005E80000-0x0000000005ECC000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/3156-269-0x000000006F420000-0x000000006F46C000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/3156-279-0x00000000070D0000-0x0000000007173000-memory.dmp

                                                    Filesize

                                                    652KB

                                                  • memory/3156-281-0x0000000007380000-0x0000000007391000-memory.dmp

                                                    Filesize

                                                    68KB

                                                  • memory/3156-282-0x00000000073C0000-0x00000000073D4000-memory.dmp

                                                    Filesize

                                                    80KB

                                                  • memory/3300-21-0x0000000000780000-0x0000000000A91000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/3300-35-0x0000000000780000-0x0000000000A91000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/3460-193-0x0000000000E80000-0x0000000000E8C000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/3484-327-0x000001C043630000-0x000001C0437B6000-memory.dmp

                                                    Filesize

                                                    1.5MB

                                                  • memory/3484-326-0x000001C042520000-0x000001C04252E000-memory.dmp

                                                    Filesize

                                                    56KB

                                                  • memory/3484-325-0x000001C0429B0000-0x000001C0429E8000-memory.dmp

                                                    Filesize

                                                    224KB

                                                  • memory/3484-324-0x000001C0402F0000-0x000001C0402F8000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/3484-323-0x000001C03F910000-0x000001C03F94C000-memory.dmp

                                                    Filesize

                                                    240KB

                                                  • memory/3484-322-0x000001C03E930000-0x000001C03E942000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/3484-304-0x000001C024170000-0x000001C024272000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/3484-307-0x000001C03FFD0000-0x000001C04008A000-memory.dmp

                                                    Filesize

                                                    744KB

                                                  • memory/3484-354-0x000001C043810000-0x000001C043836000-memory.dmp

                                                    Filesize

                                                    152KB

                                                  • memory/3484-306-0x000001C03E8E0000-0x000001C03E8EA000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/4024-153-0x0000000000400000-0x0000000000457000-memory.dmp

                                                    Filesize

                                                    348KB

                                                  • memory/4024-149-0x0000000000400000-0x0000000000457000-memory.dmp

                                                    Filesize

                                                    348KB

                                                  • memory/4024-151-0x0000000000400000-0x0000000000457000-memory.dmp

                                                    Filesize

                                                    348KB

                                                  • memory/4120-293-0x0000000000400000-0x0000000000639000-memory.dmp

                                                    Filesize

                                                    2.2MB

                                                  • memory/4120-393-0x0000000000400000-0x0000000000639000-memory.dmp

                                                    Filesize

                                                    2.2MB

                                                  • memory/4296-100-0x0000000000400000-0x0000000000454000-memory.dmp

                                                    Filesize

                                                    336KB

                                                  • memory/4296-104-0x0000000000400000-0x0000000000454000-memory.dmp

                                                    Filesize

                                                    336KB

                                                  • memory/4296-102-0x0000000000400000-0x0000000000454000-memory.dmp

                                                    Filesize

                                                    336KB

                                                  • memory/4844-45-0x0000000000F70000-0x000000000141A000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4844-49-0x0000000000F70000-0x000000000141A000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4844-38-0x0000000000F70000-0x000000000141A000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4844-43-0x0000000000F70000-0x000000000141A000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4844-52-0x0000000000F70000-0x000000000141A000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4844-51-0x0000000000F70000-0x000000000141A000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5408-1389-0x0000000000AE0000-0x0000000000F79000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/5408-685-0x0000000000AE0000-0x0000000000F79000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/5408-736-0x0000000000AE0000-0x0000000000F79000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/5408-742-0x0000000000AE0000-0x0000000000F79000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/5784-710-0x00000000000F0000-0x00000000005E3000-memory.dmp

                                                    Filesize

                                                    4.9MB

                                                  • memory/5784-715-0x00000000000F0000-0x00000000005E3000-memory.dmp

                                                    Filesize

                                                    4.9MB

                                                  • memory/6132-1608-0x00000000007E0000-0x0000000000A88000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/6132-1589-0x00000000007E0000-0x0000000000A88000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/6132-1428-0x00000000007E0000-0x0000000000A88000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/6132-1470-0x00000000007E0000-0x0000000000A88000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/6132-1471-0x00000000007E0000-0x0000000000A88000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/6720-1574-0x0000000000D30000-0x00000000011C8000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/6720-1569-0x0000000000D30000-0x00000000011C8000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/7248-1612-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/7248-1619-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                    Filesize

                                                    3.1MB