Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

06/03/2025, 03:13

250306-dqq5hsxlz7 4

06/03/2025, 03:02

250306-djjrvswwb1 10

Analysis

  • max time kernel
    428s
  • max time network
    430s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06/03/2025, 03:02

Errors

Reason
Machine shutdown

General

  • Target

    SchoolBoy Runaway.exe

  • Size

    635KB

  • MD5

    c66114e4978c9d4471f950928b0e2f9d

  • SHA1

    1dee05ddcbf6f449d07e5f82a8bedd5c5e5452f9

  • SHA256

    a8683d722ba537caef48839be7a454fcb9a190aaa06c092daa5e9f92686b35db

  • SHA512

    e066d1a3061b50ad0d1420c2813069d6843920e6262f9ececa35a4a066f31060c51ccb5ea2caf59e39de3f3752fdf291b7725fb01abe2d73f1324125fbe4a563

  • SSDEEP

    12288:UKQGzu2BFhnkCYEABNdL7urYP1DqcKoYRC3zC12KZvIZX:UKZkD3L7urYP1DtKoYRCQ2KZvE

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://erpoweredent.at/3/zte.dll

Extracted

Family

danabot

C2

51.178.195.151

51.222.39.81

149.255.35.125

38.68.50.179

51.77.7.204

rsa_pubkey.plain

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Badrabbit family
  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot family
  • Danabot x86 payload 1 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 11 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 21 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 52 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SchoolBoy Runaway.exe
    "C:\Users\Admin\AppData\Local\Temp\SchoolBoy Runaway.exe"
    1⤵
      PID:1960
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:416
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe"
        2⤵
        • Checks processor information in registry
        • Modifies registry class
        • NTFS ADS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1956 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1864 -prefsLen 27215 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4f1221d-457e-4b42-b0c4-71b4d7dba738} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" gpu
          3⤵
            PID:4928
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2364 -parentBuildID 20240401114208 -prefsHandle 2348 -prefMapHandle 2344 -prefsLen 27251 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {85b3ee67-eedf-419e-adec-52133e3319b4} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" socket
            3⤵
            • Checks processor information in registry
            PID:880
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3240 -childID 1 -isForBrowser -prefsHandle 2976 -prefMapHandle 3300 -prefsLen 27392 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a405061-c394-4c59-bf4a-d5c98e78c6e6} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab
            3⤵
              PID:4288
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4272 -childID 2 -isForBrowser -prefsHandle 4264 -prefMapHandle 4260 -prefsLen 32625 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87d615b3-2eed-4602-ad02-1ccfed1b3c09} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab
              3⤵
                PID:3716
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4752 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4784 -prefMapHandle 4740 -prefsLen 32625 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4f89873-b9da-4e8b-9a7e-4f285a8fea75} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" utility
                3⤵
                • Checks processor information in registry
                PID:3236
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5236 -childID 3 -isForBrowser -prefsHandle 5228 -prefMapHandle 5224 -prefsLen 26928 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d593aead-f7b9-47f1-8d78-90b7fefb44ba} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab
                3⤵
                  PID:1240
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5360 -childID 4 -isForBrowser -prefsHandle 5368 -prefMapHandle 5372 -prefsLen 26928 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b2ff253-69e3-4986-a25d-b37c1e4927b2} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab
                  3⤵
                    PID:1288
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5640 -childID 5 -isForBrowser -prefsHandle 5560 -prefMapHandle 5564 -prefsLen 26928 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b06946a2-67ae-403d-b619-79ad84d01ed5} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab
                    3⤵
                      PID:636
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4248 -childID 6 -isForBrowser -prefsHandle 4240 -prefMapHandle 3528 -prefsLen 27226 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f222078-9470-4d99-a715-b02a03eb6bd6} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab
                      3⤵
                        PID:3732
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6060 -childID 7 -isForBrowser -prefsHandle 5320 -prefMapHandle 5324 -prefsLen 28092 -prefMapSize 244628 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6dd9a62-7467-491d-9b68-e0d3d787f2d0} 2000 "\\.\pipe\gecko-crash-server-pipe.2000" tab
                        3⤵
                          PID:656
                    • C:\Windows\System32\rundll32.exe
                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                      1⤵
                        PID:1268
                      • C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Joke\CookieClickerHack.exe
                        "C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Joke\CookieClickerHack.exe"
                        1⤵
                          PID:2256
                        • C:\Windows\system32\NOTEPAD.EXE
                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Browser Hijackers\BabylonToolbar.txt
                          1⤵
                            PID:4920
                          • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                            "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Banking-Malware\Zloader.xlsm"
                            1⤵
                            • Enumerates connected drives
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            • Suspicious behavior: AddClipboardFormatListener
                            • Suspicious use of SetWindowsHookEx
                            PID:2204
                            • C:\Windows\System32\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\nxTgTGh\ECeMdPT\EnVYsVZ.dll,DllRegisterServer
                              2⤵
                              • Process spawned unexpected child process
                              PID:2116
                          • C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Banking-Malware\DanaBot.exe
                            "C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Banking-Malware\DanaBot.exe"
                            1⤵
                            • System Location Discovery: System Language Discovery
                            PID:3996
                            • C:\Windows\SysWOW64\regsvr32.exe
                              C:\Windows\system32\regsvr32.exe -s C:\Users\Admin\Desktop\THE-MA~1\BANKIN~1\DanaBot.dll f1 C:\Users\Admin\Desktop\THE-MA~1\BANKIN~1\DanaBot.exe@3996
                              2⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:4264
                              • C:\Windows\SysWOW64\rundll32.exe
                                C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\Desktop\THE-MA~1\BANKIN~1\DanaBot.dll,f0
                                3⤵
                                • Blocklisted process makes network request
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:544
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 468
                              2⤵
                              • Program crash
                              PID:4688
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3996 -ip 3996
                            1⤵
                              PID:4852
                            • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                              "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Pony\metrofax.doc" /o ""
                              1⤵
                              • Checks processor information in registry
                              • Enumerates system info in registry
                              • Suspicious behavior: AddClipboardFormatListener
                              • Suspicious use of SetWindowsHookEx
                              PID:3692
                              • C:\Windows\splwow64.exe
                                C:\Windows\splwow64.exe 12288
                                2⤵
                                  PID:788
                              • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
                                1⤵
                                • Subvert Trust Controls: Mark-of-the-Web Bypass
                                • Checks processor information in registry
                                • Enumerates system info in registry
                                • NTFS ADS
                                • Suspicious behavior: AddClipboardFormatListener
                                • Suspicious use of SetWindowsHookEx
                                PID:2040
                              • C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe
                                "C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe"
                                1⤵
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:1960
                                • C:\Windows\SysWOW64\rundll32.exe
                                  C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                  2⤵
                                  • Loads dropped DLL
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:776
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /c schtasks /Delete /F /TN rhaegal
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3548
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /Delete /F /TN rhaegal
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4712
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2737521212 && exit"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1572
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2737521212 && exit"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:4288
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 03:27:00
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3056
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 03:27:00
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:4572
                                  • C:\Windows\5050.tmp
                                    "C:\Windows\5050.tmp" \\.\pipe\{054C622B-2DB9-47EE-99C2-E17A6CEB2FE9}
                                    3⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2388
                              • C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe
                                "C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe"
                                1⤵
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:1464
                                • C:\Windows\SysWOW64\rundll32.exe
                                  C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                  2⤵
                                  • Loads dropped DLL
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1924
                              • C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe
                                "C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe"
                                1⤵
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:1896
                                • C:\Windows\SysWOW64\rundll32.exe
                                  C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                  2⤵
                                  • Loads dropped DLL
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4120
                              • C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe
                                "C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\BadRabbit.exe"
                                1⤵
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:3932
                                • C:\Windows\SysWOW64\rundll32.exe
                                  C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                  2⤵
                                  • Loads dropped DLL
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:896
                              • C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\Petya.A.exe
                                "C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Ransomware\Petya.A.exe"
                                1⤵
                                • Writes to the Master Boot Record (MBR)
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of SetWindowsHookEx
                                PID:2992

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                                Filesize

                                471B

                                MD5

                                b5585a9f10b8e0fd8b380a1e9a08f0c6

                                SHA1

                                cbfa8300c38aa4ed9f715ef7e2ba23421bf32882

                                SHA256

                                abb8787788ff55c5da185930e393ef7de7fa8f60723c7b116bbab6df439f4226

                                SHA512

                                1fc959a4f557b664e29ada23986eeddb3b7b98c7c903f37665c3693ba4ea0f2833883964d4c82f911f1f73f6cce97bc2361c9ce86138c2b036f674b7b5948f45

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                                Filesize

                                420B

                                MD5

                                aebb034f5e4b003b43dc1e2395d4c33a

                                SHA1

                                318d1e3d008a5d7ae939ce82287cf5bbf00c69f9

                                SHA256

                                ac113dee5fb2b781d1f27f5f1d8d6ea6a1c9c81ddd402201d27d43bc6987cb15

                                SHA512

                                b9bc0d1c5ef66b35f300a78b4609872584b39c6466d3cbdd9c0206715d7c8ceca4784f4ca0acd3c2d7af22b7c83da1316491b760063f49d668d60f0c02f0ae77

                              • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\9E37421D-E4CE-44B5-A10B-31673E0BDB15

                                Filesize

                                177KB

                                MD5

                                80941df41ec64bd630b16be6cb1ec263

                                SHA1

                                8c7030530214c350d113a41ec20c0408586b50cb

                                SHA256

                                5b75503c8c865ced9086b4d7846f1a2e8944e4778055df645111dc11c227c0ba

                                SHA512

                                a78b128aae8f2d2b336d56711b0a5fc52b8b3b0710f20a5e2770337a406e7badecaa844509b44379bfc35f3de7977ece0ee8d43d48b5b2dbdbaff37e234638b7

                              • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\winword.exe_Rules.xml

                                Filesize

                                331KB

                                MD5

                                93b86dbf4b144be5b008e1cf103fc857

                                SHA1

                                65b7222eb6dc14a104558d62e28d4441838f1a14

                                SHA256

                                fbcc86f3fee25158e3445c60f44ed208ea64fa3c2cbd175fe07c689a330a2b1f

                                SHA512

                                8b3db391afafe1782937bf28caca0e5847b536bf0f846f098360a8ce59297f1a4793b96fbea1264fe19775daae4d9e5727a3f4295e82c8257ca0f705152c95bf

                              • C:\Users\Admin\AppData\Local\Microsoft\Office\DLP\mip\logs\mip_sdk.miplog

                                Filesize

                                12KB

                                MD5

                                32fd2401b3d5f2faf47252c587bdeb7f

                                SHA1

                                94b8e118442195d44f5232324039b0c268faf52c

                                SHA256

                                ff7cfaab16e74aea5cb66866afacc2a73e371cacce14b19f6a6999ddd58d08c4

                                SHA512

                                9f8bc6a50abd63c67b893145c2e03ceeb7f8d857175f46fe4082f48de6c7034953f77aa31ec29a1bedf7dcd8e48997f18c48fb437be1aea3c9723b0ee29b1d7c

                              • C:\Users\Admin\AppData\Local\Microsoft\Office\DLP\mip\logs\mip_sdk.miplog

                                Filesize

                                13KB

                                MD5

                                c83e5af816f6321f70e008820bc2f727

                                SHA1

                                0aceda4d26480c1c8e617f5ceea6d9ac94bd6fd2

                                SHA256

                                20617601dc575cd7860ed761da0b5301994c7e042cacc1bc0c6976871e3f1b63

                                SHA512

                                96c6f785599bef191fbad23f5a8b5958d0cbc346ea91209b1a4fee3d0f29650c1169b941a160b5711abb85a983ff836a24d1751937052cb9294445caa333a05c

                              • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\winword.exe.db-wal

                                Filesize

                                52KB

                                MD5

                                b11d629bb11214fba0b0f68c140b53ab

                                SHA1

                                66646c135493f0f35bedaa21c30ce58bef7d4af7

                                SHA256

                                dd272144f78668a91e353bc767f0d6d16433b31f9481be67b4fb71f589b6ecb3

                                SHA512

                                2930131ef0b46cd3bd5302e20fcb861c348936afc215660005ad3c5b6b4bfe1400614ffbce91297fa5b6fb8b0c3ba0de6013d8f0c01a114b0ba95766a43e698f

                              • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

                                Filesize

                                2KB

                                MD5

                                6ad285c5b2b0fb07192d3b5b3896e47f

                                SHA1

                                aaaefeeb0c70835ffe1560477d147db91bdc5734

                                SHA256

                                0768bfcce45b1008eefeed84fd177bd0b027787d6ae8077b7e536fe83194c64e

                                SHA512

                                8b986b05896ca0cc7b725d930cc5720f98fc3b9c44a17b3fd4b827a6124e8fd8c88cd1b3becb579f1b3eb4b25e9387a6db0a9458a6e681b7685d14a80cbba6b1

                              • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

                                Filesize

                                2KB

                                MD5

                                3f5a19caef92852a07408415e8b029e6

                                SHA1

                                1777a485074b7b004dd80674a045af9ba67854c6

                                SHA256

                                5736e6fcda7e4784fd13664729d051da4b816a2cbf096d4d80d7ebce00bc0045

                                SHA512

                                370c22a872c49e232ed19fd6e74d8c6acea1d05ae0a70181c45316062bb19459402563eef7ea0c5330645fef9023d88ea50756175adf8c865f92eb7a8e1fceb6

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\3312D699.emf

                                Filesize

                                5KB

                                MD5

                                0ed5bc16545d23c325d756013579a697

                                SHA1

                                dcdde3196414a743177131d7d906cb67315d88e7

                                SHA256

                                3e430584cd9774ea3b21d8e19b485b48212fe356776158dd5f3c5f63a5bde7d3

                                SHA512

                                c93072d11058fa50e3b09ff4da9f3dbe2637c2b5df05e616bd8ddd04557ea1e8b0db106b1545fad334619118c467776f81cf97ca52d3f2fcbbe007f30032b8af

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\tq9vu3av.default-release\activity-stream.discovery_stream.json

                                Filesize

                                24KB

                                MD5

                                470b578013e92b6bd8fd27da35848864

                                SHA1

                                c452648857d6affaeab6b9c2d35c56e128f4be2c

                                SHA256

                                95f03e697ebfa045e330fdc75cfe278e3c5b4569a93438e5d0d71cf9c121879d

                                SHA512

                                e0115faa9c713e861f3ebe9513e5c9f23c8bc2daf680d5c6d2b0a479d0565b4dc21b60b813e310107486085a6ce5a605643f20d28883b9e2d2a86c75a6edb22b

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\tq9vu3av.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                Filesize

                                15KB

                                MD5

                                96c542dec016d9ec1ecc4dddfcbaac66

                                SHA1

                                6199f7648bb744efa58acf7b96fee85d938389e4

                                SHA256

                                7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                SHA512

                                cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                              • C:\Users\Admin\AppData\Local\Temp\TCD5C01.tmp\gb.xsl

                                Filesize

                                262KB

                                MD5

                                51d32ee5bc7ab811041f799652d26e04

                                SHA1

                                412193006aa3ef19e0a57e16acf86b830993024a

                                SHA256

                                6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

                                SHA512

                                5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                Filesize

                                479KB

                                MD5

                                09372174e83dbbf696ee732fd2e875bb

                                SHA1

                                ba360186ba650a769f9303f48b7200fb5eaccee1

                                SHA256

                                c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                SHA512

                                b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                Filesize

                                13.8MB

                                MD5

                                0a8747a2ac9ac08ae9508f36c6d75692

                                SHA1

                                b287a96fd6cc12433adb42193dfe06111c38eaf0

                                SHA256

                                32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                SHA512

                                59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                              • C:\Users\Admin\AppData\Local\Temp\vbhja.rtf

                                Filesize

                                816KB

                                MD5

                                268514cf1a58782537ac3651d092f9df

                                SHA1

                                101110e64b24fd1d4c9a81d5b077be37332f9f6d

                                SHA256

                                40b5f2486e8a91de7d7a5ea273d24283ee45dcf26cb00ddafff2c2812b449706

                                SHA512

                                6d7a20cea2cd0361818e0804d05cbfbc461e6cb5885aafceef4c475a092898555b3a73870fea45af6353071b6b943ca884cdb9b92a178a5c0cbef9fb4b9b17a8

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                Filesize

                                281B

                                MD5

                                b79b696c92bfe650f95830f2b039dfcf

                                SHA1

                                85fa2ce915ca1d5f612ab6a87cc386cfc75fd9bd

                                SHA256

                                ab022c78a9566084796ef0b1e04d8048729341660d8feb644d94c37e36b45516

                                SHA512

                                939eef34029cfdd60c8511a5b2f4d688578d012969f586ba9bbf72e53081795eca02850c9a8718b861829b4f21e678ff7efae55c81daaad6d68c71d9101ea540

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                Filesize

                                328B

                                MD5

                                7cbe5e1eca4119208496ba24c4056df4

                                SHA1

                                0b8ad2e5a423926968a2025f5defa44c4b5ac876

                                SHA256

                                7f1f774e00da928d1c9026c114131ffdbe17289c44ecef101cc282ee134db24e

                                SHA512

                                6fddb38f06be156a0b268add346077056e1c397fe0b45a2e3252d924d8050e78d3665a6ac7082850dda96cf31958661001be35c9703cd136d24c7bb92b0c85fb

                              • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

                                Filesize

                                2B

                                MD5

                                f3b25701fe362ec84616a93a45ce9998

                                SHA1

                                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                SHA256

                                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                SHA512

                                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QQ0FXGRWMKQRMRUWYS6S.temp

                                Filesize

                                19KB

                                MD5

                                6fc6a95cd1504fda4ea39f507d8ee8ba

                                SHA1

                                fe705c717596cca71066e00fe2aea49a5e8a90b1

                                SHA256

                                dfc945478b55855c3b5111a63196e2a00322f69135103c29d6b141f15971cd2d

                                SHA512

                                ecb78ca91690983e6d26ed0adfcfc6adb87bfb5fa961d3e91b986ff8221c6474a886220e749b75b7f514782bce1ec5abb8f899d63a0327b56bfbc875c63e7c0b

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\AlternateServices.bin

                                Filesize

                                8KB

                                MD5

                                3396e8dcffbc05beac57ca093dd76713

                                SHA1

                                d470c361a4d80368154f59e18e361775508ef7f3

                                SHA256

                                cb5f489cdb9f3c23f7db496224c876c7647bdbfbf43e2f75a1a6a02dd8765f7b

                                SHA512

                                ba052a9f9140f54b19002540c5aa1b5b070519aaf39a0224d263b251599b101c5079097d41a433a54de9e43b9b885e404468098007d88cec20324a5186b88ea3

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\AlternateServices.bin

                                Filesize

                                12KB

                                MD5

                                8e72ef935d0a7dfee2f149a621903545

                                SHA1

                                f419be801d5c5d783b3254818c7912900810ecea

                                SHA256

                                5533f95b52f1319f1f49ab8d3efad72ba8d960e747e8aa86b2198fc4a4926372

                                SHA512

                                d936323c442578fc4edb3769603759eae298c27ae323f72cc10ef4fe947127791aeb1bcfd897677a8001a15096ee96a94a9b8edf5f7c19781a587998ebe98e8b

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                22KB

                                MD5

                                d8296b02096525772abbc615ad106f2b

                                SHA1

                                3765cee5068fd109ab36748513becb5afb08a438

                                SHA256

                                45a49036c1960b71a2fdce4ac2238b8b40e91acecbfd34a677aa62e813359a0b

                                SHA512

                                995feec6b75679755cde57e4b66f68cb8be961db7dec1eb3c45b8baf4ccaf17631fa0ca82b13a12e955b63d1e7328a947495277c9e2a769664be59ca2d3b2b9c

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                23KB

                                MD5

                                b788298eb47c74869d3282f2d5be74d9

                                SHA1

                                0116cc02d2b85555e49489497346ca35b294e0ca

                                SHA256

                                b8e18e5e72c068d88a362cf438dec61ba13c33fd67a3eb2a70896c093bb37e10

                                SHA512

                                126d57bb972515a4814ced009651f04af6f4eeeded66d68263f37409043e599e48df67beb7664a1ec893e74e58e8a5027a76b8a5c303b77c4c957a0a01c2b506

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                47KB

                                MD5

                                edda21b088d073677c0f31d4c9f2e498

                                SHA1

                                217c908b100b530169081daf0236c200069de524

                                SHA256

                                32f4b155320eb33736fe5e3525dd0a33953b50b260f35d1fa22459a36673d966

                                SHA512

                                41d0003ffdf815511a029a27dc030fd698253f8b38f585cbe5723cac8d3da868cf92d72884c91300f4df09351cfa3d655fc1071c3c56bba885697502ae55c55d

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                29KB

                                MD5

                                c31ecf6ddde78d8222dbc7842cfc72f7

                                SHA1

                                2854d58a3cb3df9fc70b088c94fa7c48d07c1677

                                SHA256

                                37d911a14c85449d94bf9a7702a6fb1d305a18e8aa59aef789d172fb82dfb070

                                SHA512

                                d19a689ccd7ab898c54cfb8516b5064a21b28e81c0a6409372dd0974d0bfe786b297af5aaaee1f6ecf29c2f6a33e7bad1797e82c3a34d558f3adbb0ab31c922a

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                74KB

                                MD5

                                99fdd24424f7c9df5141498c67acc17c

                                SHA1

                                7b34e762fe7c6ee0257579bafb203086778241b6

                                SHA256

                                2b86218c6a7e7f7c70775fe815f3b31f167f5f6fa6fd272c3f03a0f242307ea5

                                SHA512

                                9df805db1ed0dacdb3da6b77229e3b0869b10a843a04dc2d27ace2a9f01ef73a8acc59dba00992c980eba7bfab55bb923729e1cc92818ad59ce8ec52fc1d5eac

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                23KB

                                MD5

                                c6e2d1a4be54bd9656ca7dc74dbab8c6

                                SHA1

                                f57d24f690bea8fad715509aab291b8367632f07

                                SHA256

                                9f37322890cc882382e27df7532a8a27bea6d76f716b06bafc5034eea1634ac0

                                SHA512

                                c8f372dc174c4a3ae37e15a3c70751a31c4404959cfea8487a1ab9b91716dab814c028570aa09e3b4f1ba2af8f5743d907a51e09f4da93922b30350a686c38a4

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\pending_pings\383917b9-066d-4f50-98b4-353c769b646c

                                Filesize

                                659B

                                MD5

                                951f77a98d2f50523a2e56c052e37575

                                SHA1

                                037929bd9ba4bef3291b2968e96aeb64bf6db52d

                                SHA256

                                859679a29383145bd3607db3fe5b8f9fe9569878e6f61e425b5e64bb4d409181

                                SHA512

                                e4e5f11b26ab90dcc9a5ed23761d7ae3201bb48d961871b352aee311f18339c24bca63b43bc48ea5c393169fa0b3e2f82301f75a1d25ed56514718289c7c732c

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\pending_pings\66de34b9-ec5b-4671-835d-2f1db8963b35

                                Filesize

                                4KB

                                MD5

                                cb3e09375da5145a0a51974084502677

                                SHA1

                                5dace9595b2525784f60ac6700247efd7271a042

                                SHA256

                                cf55e49174a246c02f81d1c625a6bb17493831b4a2d3e45ef1c298c80b8cf2a0

                                SHA512

                                7ae9723ff7431100405c0378fe83175c1d60ab3ea4cff6de3b6281e26977dcbf943b33d0ac5234463d1facb4cf33d611ccc4e3a3381f53d6df14c62003bee684

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\pending_pings\73fba309-16f8-4703-928e-7ffceb306929

                                Filesize

                                847B

                                MD5

                                f0ed43d06a52180e3e3fb79fee9af515

                                SHA1

                                9a7c37ec15d962e4d7d07cf8a0a4fc654b602139

                                SHA256

                                e5f0c51b5c2f8e782f45772d7a322e9115a3c21f2617c68896947ec5182646ee

                                SHA512

                                37cd05e95bd5b9ad4dce210a4a4c5266f8d1cb34952fb73e4e6698ed95f65686574ade7be3cdb019c49e0563249bc2c753f64675b59157a0f0a89dab5049e282

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\pending_pings\91f79d37-51fd-4a34-b820-a7eeaed939b2

                                Filesize

                                19KB

                                MD5

                                f51ca63ee386c88c2428bd614cbbeef1

                                SHA1

                                9fef5f6bd049abe133201fd9ba27ac669dd45028

                                SHA256

                                4c984b8f7a49a0286d58d7a730295a99410f43ce0caaeef7313449927b4f7084

                                SHA512

                                21dcada41d30971e175609733343374166a621c0ca93cddd926fc565a6f89159a2a3d9aff7989f6c0f696c0b728dc0c49a6b7e8a71d10769ef33ca8dd8e84c3f

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\datareporting\glean\pending_pings\936dbf0b-d695-4e98-be26-e5f7a7213123

                                Filesize

                                982B

                                MD5

                                431fe2747f6711ac91a14ca1913eed64

                                SHA1

                                d97d1d1aa48d6f1085e1a59a9274e56de4cc8ef4

                                SHA256

                                42c54384dfcedb2f81f2b4d5aa4072fbc321c0d0192d51e8056be22088397d04

                                SHA512

                                f211d918788b5edeabf5e5077947b66485cf6f8205611beae09b14a4eb56804b0f80989d48321dbfa8a0f1fb35a6cf2517dc75ec496674d0bf31571975950daa

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                Filesize

                                1.1MB

                                MD5

                                842039753bf41fa5e11b3a1383061a87

                                SHA1

                                3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                SHA256

                                d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                SHA512

                                d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                Filesize

                                116B

                                MD5

                                2a461e9eb87fd1955cea740a3444ee7a

                                SHA1

                                b10755914c713f5a4677494dbe8a686ed458c3c5

                                SHA256

                                4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                SHA512

                                34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                Filesize

                                372B

                                MD5

                                bf957ad58b55f64219ab3f793e374316

                                SHA1

                                a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                SHA256

                                bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                SHA512

                                79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                Filesize

                                17.8MB

                                MD5

                                daf7ef3acccab478aaa7d6dc1c60f865

                                SHA1

                                f8246162b97ce4a945feced27b6ea114366ff2ad

                                SHA256

                                bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                SHA512

                                5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\prefs-1.js

                                Filesize

                                10KB

                                MD5

                                067c6e813c4a6549e855766e8cedec71

                                SHA1

                                feb0ddcb61f02e208fb221815809d74632d6d44d

                                SHA256

                                fd3a3f580e7c3571c1cb636a1d56d03fb2a133b4cd939c862060b76fd0de5d70

                                SHA512

                                03411c3be90974b9c5a2706263f5eace5a48de462414f527df88d78c231eda246ad0a4831c4da31875476df1290d0cea559346ef8a52e3a28ed299d29fc308bc

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\prefs-1.js

                                Filesize

                                11KB

                                MD5

                                ea9b7323d2eedbe311e055703a17c6be

                                SHA1

                                394df051223bef658cff2f228234b09920eb94dc

                                SHA256

                                66e53d7b0a990de96b9b426723968dac2c7d67cc03da4ee6fc140a767dcd5d93

                                SHA512

                                e85dca9aba601917ad53b05853137c49f96ee6cd37a1d7bd0c3cf8dcb9e435ddf6b79b9b268cf58e189e81d3940a0e2bf5e0f49388beae3ec4c36bfb29001a42

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\sessionstore-backups\recovery.baklz4

                                Filesize

                                1KB

                                MD5

                                ea2322ff06b7dd7f14552d57239eba75

                                SHA1

                                d9a6fafae3e734fcd9d66d1687d51cd443ce6b21

                                SHA256

                                94f3f9affa5b7d292b27a70186cffd1e1b42c648d55c54a3ad3433a3e8b61206

                                SHA512

                                0cedd5b48109edcaccb94ca1dc928a48725115651829e88332db1b26dc6ef60da4a6474c109ee6fb89e02f4ea2a4348277b9e04fd66a18276238fc2c2a3a0868

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\sessionstore-backups\recovery.baklz4

                                Filesize

                                4KB

                                MD5

                                fbf28fe110d27eb8ae99de652d922f2e

                                SHA1

                                9c40da567fe7d29826112e5ba6fff4a0b73d36af

                                SHA256

                                c590bb2104fcc297003dfdf0dcf580910d0edfcf12aadfa36ce6afccb5541556

                                SHA512

                                f4f89aebca6f808e4e7691ef36b6bbd554f20fe9d7427372c9fe262481f66c1b4d7655f81e9e77411b3ad76bf81856dc0a2af20bcea347382bb45f58aafab1d7

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\sessionstore-backups\recovery.baklz4

                                Filesize

                                8KB

                                MD5

                                67dbf9eb6c29fb998d4182a4432d54d7

                                SHA1

                                a51202d32af648e0f93be43bf9ce8de906e9cc08

                                SHA256

                                4d4e6f66e8f4e15ad5e1642d3067d3cbc40146cb2150b3d474c7cf23a80421ae

                                SHA512

                                5cac4d0ddeaa45a3c59a699e32f91388c0cc47bbda99f4419640dddbbca3a6888814ad0bfff1ab87436ee32b11e29f729f353554d89cb39874b3aca91a68bd2d

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\sessionstore-backups\recovery.baklz4

                                Filesize

                                3KB

                                MD5

                                d587d3d8e834a722062dcc47f373b719

                                SHA1

                                73e850af2b1e028652da319e6cea82189ae12b84

                                SHA256

                                70ba16d692d40bc1097e5030c7583394f48351553de6ee11853f13cc8068c4a6

                                SHA512

                                d891c487aecdab28f643aedc4da360f87cd972fe76b45d404cce80a43420def314eee55d045e84e963722355a33da8dfcfb3de4c7fc030d1347086a267263987

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\sessionstore-backups\recovery.baklz4

                                Filesize

                                2KB

                                MD5

                                c6d8780725d8372741121d4b637e4971

                                SHA1

                                b7c2070699e62fe6d08e4f0fc34344679a91dbce

                                SHA256

                                60fdb4bfcc77e337e606b0bc5c63a9917b30926b4031eeaf8e8230078287375e

                                SHA512

                                6d53acdeb6df556f3ff3d6e2a8064f20fdef0da72a4137cf4e3c6e8b11cffb18ee2542274a9e50661df07df03af4f26bbe01b25f43a1c1df9e3a477e385c0993

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tq9vu3av.default-release\sessionstore-backups\recovery.baklz4

                                Filesize

                                9KB

                                MD5

                                89f4e6474ffdc4d9391f551eb2021aee

                                SHA1

                                43e84fb980646f71ad297316c98d2bc056201247

                                SHA256

                                e8a4bec92302d753766c279a424269c8ad9cb3c4dbf6ddd103dce34d2ff92c12

                                SHA512

                                ef4300e7211fa3dca3d22fa6a62ee083b595c5aaa32a9f9011aaa516f9ba19d3eb40ef4f0a181081f415a68612618bfbf9ba3c7707458f1897f08217f809d769

                              • C:\Users\Admin\Desktop\THE-MA~1\BANKIN~1\DanaBot.dll

                                Filesize

                                2.4MB

                                MD5

                                7e76f7a5c55a5bc5f5e2d7a9e886782b

                                SHA1

                                fc500153dba682e53776bef53123086f00c0e041

                                SHA256

                                abd75572f897cdda88cec22922d15b509ee8c840fa5894b0aecbef6de23908a3

                                SHA512

                                0318e0040f4dbf954f27fb10a69bce2248e785a31d855615a1eaf303a772ad51d47906a113605d7bfd3c2b2265bf83c61538f78b071f85ee3c4948f5cde3fb24

                              • C:\Users\Admin\Desktop\The-MALWARE-Repo-master\Banking-Malware\629D5E00

                                Filesize

                                94KB

                                MD5

                                6a1549ff24a4926db26e48a2d5ee05ed

                                SHA1

                                e3a2aaf489df26fa6468ad57a3494b09c9357594

                                SHA256

                                e6848f4ee31229a2a1f6cf170eefa79d1f6182b00904ec1802ea61a6e9fe323e

                                SHA512

                                a765f6c7688bb9e48a75bee8edb2d6db7b9330ab9a7d16f01727e8a12d13697b5a38b5d8d736a046a498c858819107605d7c2b3dcec871c07ae79b98b3e6f44e

                              • C:\Windows\5050.tmp

                                Filesize

                                60KB

                                MD5

                                347ac3b6b791054de3e5720a7144a977

                                SHA1

                                413eba3973a15c1a6429d9f170f3e8287f98c21c

                                SHA256

                                301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

                                SHA512

                                9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

                              • C:\Windows\infpub.dat

                                Filesize

                                401KB

                                MD5

                                1d724f95c61f1055f0d02c2154bbccd3

                                SHA1

                                79116fe99f2b421c52ef64097f0f39b815b20907

                                SHA256

                                579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648

                                SHA512

                                f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113

                              • C:\Windows\infpub.dat

                                Filesize

                                401KB

                                MD5

                                c4f26ed277b51ef45fa180be597d96e8

                                SHA1

                                e9efc622924fb965d4a14bdb6223834d9a9007e7

                                SHA256

                                14d82a676b63ab046ae94fa5e41f9f69a65dc7946826cb3d74cea6c030c2f958

                                SHA512

                                afc2a8466f106e81d423065b07aed2529cbf690ab4c3e019334f1bedfb42dc0e0957be83d860a84b7285bd49285503bfe95a1cf571a678dbc9bdb07789da928e

                              • memory/544-1280-0x0000000000B30000-0x0000000000D9B000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/544-1114-0x0000000000B30000-0x0000000000D9B000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/544-1116-0x0000000000B30000-0x0000000000D9B000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/776-1292-0x0000000001000000-0x0000000001068000-memory.dmp

                                Filesize

                                416KB

                              • memory/776-1295-0x0000000001000000-0x0000000001068000-memory.dmp

                                Filesize

                                416KB

                              • memory/776-1285-0x0000000001000000-0x0000000001068000-memory.dmp

                                Filesize

                                416KB

                              • memory/1924-1691-0x0000000000F60000-0x0000000000FC8000-memory.dmp

                                Filesize

                                416KB

                              • memory/2204-1050-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/2204-1103-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/2204-1047-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/2204-1102-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/2204-1049-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/2204-1048-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/2204-1051-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/2204-1052-0x00007FFA72CF0000-0x00007FFA72D00000-memory.dmp

                                Filesize

                                64KB

                              • memory/2204-1053-0x00007FFA72CF0000-0x00007FFA72D00000-memory.dmp

                                Filesize

                                64KB

                              • memory/2204-1105-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/2204-1104-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/2256-1043-0x00007FFA96865000-0x00007FFA96866000-memory.dmp

                                Filesize

                                4KB

                              • memory/2256-1042-0x00007FFA965B0000-0x00007FFA96F51000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/2256-1035-0x000000001BA60000-0x000000001BB06000-memory.dmp

                                Filesize

                                664KB

                              • memory/2256-1036-0x00007FFA965B0000-0x00007FFA96F51000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/2256-1037-0x00007FFA965B0000-0x00007FFA96F51000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/2256-1038-0x000000001BFE0000-0x000000001C4AE000-memory.dmp

                                Filesize

                                4.8MB

                              • memory/2256-1034-0x00007FFA96865000-0x00007FFA96866000-memory.dmp

                                Filesize

                                4KB

                              • memory/2256-1039-0x000000001C5B0000-0x000000001C64C000-memory.dmp

                                Filesize

                                624KB

                              • memory/2256-1040-0x000000001B9F0000-0x000000001B9F8000-memory.dmp

                                Filesize

                                32KB

                              • memory/2256-1041-0x000000001C860000-0x000000001C8AC000-memory.dmp

                                Filesize

                                304KB

                              • memory/2256-1046-0x00007FFA965B0000-0x00007FFA96F51000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/2256-1045-0x00007FFA965B0000-0x00007FFA96F51000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/2256-1044-0x00007FFA965B0000-0x00007FFA96F51000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/3692-1121-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/3692-1279-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/3692-1278-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/3692-1277-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/3692-1276-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/3692-1117-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/3692-1123-0x00007FFA72CF0000-0x00007FFA72D00000-memory.dmp

                                Filesize

                                64KB

                              • memory/3692-1120-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/3692-1119-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/3692-1118-0x00007FFA75130000-0x00007FFA75140000-memory.dmp

                                Filesize

                                64KB

                              • memory/3692-1122-0x00007FFA72CF0000-0x00007FFA72D00000-memory.dmp

                                Filesize

                                64KB

                              • memory/3996-1115-0x0000000000400000-0x0000000000AAD000-memory.dmp

                                Filesize

                                6.7MB

                              • memory/4264-1111-0x0000000002720000-0x000000000298B000-memory.dmp

                                Filesize

                                2.4MB