Malware Analysis Report

2024-11-15 08:07

Sample ID 230722-tle5fsbg9v
Target Mercurial.Grabber.v1.03.rar
SHA256 3759744039346620e9613f40f90e8f318e5f54ad49c070e2bd23b667f7e65bf6
Tags
mercurialgrabber agilenet evasion spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3759744039346620e9613f40f90e8f318e5f54ad49c070e2bd23b667f7e65bf6

Threat Level: Known bad

The file Mercurial.Grabber.v1.03.rar was found to be: Known bad.

Malicious Activity Summary

mercurialgrabber agilenet evasion spyware stealer

Mercurial Grabber Stealer

Looks for VirtualBox Guest Additions in registry

Downloads MZ/PE file

Looks for VMWare Tools registry key

Reads user/profile data of web browsers

Executes dropped EXE

Checks BIOS information in registry

Obfuscated with Agile.Net obfuscator

Maps connected drives based on registry

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Drops file in Windows directory

Unsigned PE

Program crash

Opens file in notepad (likely ransom note)

Checks SCSI registry key(s)

Enumerates system info in registry

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Uses Task Scheduler COM API

Uses Volume Shadow Copy WMI provider

Checks processor information in registry

Suspicious behavior: EnumeratesProcesses

NTFS ADS

Suspicious use of WriteProcessMemory

Uses Volume Shadow Copy service COM API

Suspicious use of SendNotifyMessage

Suspicious use of FindShellTrayWindow

Modifies registry class

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-07-22 16:08

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-07-22 16:08

Reported

2023-07-22 16:38

Platform

win7-20230712-en

Max time kernel

796s

Max time network

1789s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"

Signatures

Mercurial Grabber Stealer

stealer mercurialgrabber

Looks for VirtualBox Guest Additions in registry

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions C:\Users\Admin\AppData\Local\Temp\nikario.exe N/A

Looks for VMWare Tools registry key

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools C:\Users\Admin\AppData\Local\Temp\nikario.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\nikario.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\nikario.exe N/A

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Reads user/profile data of web browsers

spyware stealer

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Description Indicator Process Target
N/A ip4.seeip.org N/A N/A
N/A ip4.seeip.org N/A N/A
N/A ip-api.com N/A N/A
N/A ip4.seeip.org N/A N/A

Maps connected drives based on registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Users\Admin\AppData\Local\Temp\nikario.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\nikario.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe C:\Program Files\Google\Chrome\Application\chrome.exe N/A
File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\system32\WerFault.exe C:\Users\Admin\AppData\Local\Temp\nikario.exe

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S C:\Users\Admin\AppData\Local\Temp\nikario.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer C:\Users\Admin\AppData\Local\Temp\nikario.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName C:\Users\Admin\AppData\Local\Temp\nikario.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 C:\Users\Admin\AppData\Local\Temp\nikario.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation C:\Users\Admin\AppData\Local\Temp\nikario.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\1\0\MRUListEx = ffffffff C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Mode = "1" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_Classes\Local Settings C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\MRUListEx = 00000000ffffffff C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\1\MRUListEx = ffffffff C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\1\0\NodeSlot = "6" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616193" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlot = "3" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0c00000050000000a66a63283d95d211b5d600c04fd918d00b0000007800000030f125b7ef471a10a5f102608c9eebac0e00000078000000 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\SniffedFolderType = "Generic" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\1 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 = 7400310000000000ec5635601100557365727300600008000400efbeee3a851aec5635602a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\NodeSlot = "4" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0 = 5200310000000000ec563560122041707044617461003c0008000400efbeec563560ec5635602a000000ed0100000000020000000000000000000000000000004100700070004400610074006100000016000000 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\NodeSlot = "1" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\1 = 4c00310000000000f6561d8110204c6f63616c00380008000400efbeec563560f6561d812a000000000200000000020000000000000000000000000000004c006f00630061006c00000014000000 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\1\NodeSlot = "5" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Opens file in notepad (likely ransom note)

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\NOTEPAD.EXE N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Mercurial.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2700 wrote to memory of 2916 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 2916 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 2916 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1076 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1656 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1656 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1656 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2700 wrote to memory of 1096 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Uses Task Scheduler COM API

persistence

Uses Volume Shadow Copy WMI provider

ransomware

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\Mercurial.exe

"C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c79758,0x7fef6c79768,0x7fef6c79778

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1480 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2276 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2284 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1420 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3176 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3200 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3536 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2716 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2544 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2824 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=696 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3772 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2820 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2832 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3860 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:8

C:\Windows\system32\NOTEPAD.EXE

"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\httpsdiscord.comapiwebhooks11222395.txt

C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\j24kc3sf\j24kc3sf.cmdline"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7B77.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE7B876DF102F47AFBE218D1DFA9965B3.TMP"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3840 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3828 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4108 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4336 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3796 --field-trial-handle=1356,i,13816367547384598155,12420097749147974427,131072 /prefetch:8

C:\Windows\explorer.exe

"C:\Windows\explorer.exe"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x480

C:\Users\Admin\AppData\Local\Temp\nikario.exe

"C:\Users\Admin\AppData\Local\Temp\nikario.exe"

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2380 -s 1768

Network

Country Destination Domain Proto
US 8.8.8.8:53 discord.com udp
US 162.159.138.232:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 anonfiles.com udp
SE 45.154.253.150:443 anonfiles.com tcp
SE 45.154.253.150:443 anonfiles.com tcp
US 8.8.8.8:53 apps.identrust.com udp
US 2.18.121.132:80 apps.identrust.com tcp
US 8.8.8.8:53 vjs.zencdn.net udp
US 151.101.2.217:443 vjs.zencdn.net tcp
US 151.101.2.217:443 vjs.zencdn.net tcp
US 8.8.8.8:53 djv99sxoqpv11.cloudfront.net udp
NL 13.227.211.114:443 djv99sxoqpv11.cloudfront.net tcp
SE 45.154.253.150:443 anonfiles.com tcp
SE 45.154.253.150:443 anonfiles.com tcp
SE 45.154.253.150:443 anonfiles.com tcp
SE 45.154.253.150:443 anonfiles.com tcp
US 8.8.8.8:53 baconaces.pro udp
US 52.20.131.174:443 baconaces.pro tcp
US 8.8.8.8:53 olularhenewrev.info udp
US 18.239.94.78:443 olularhenewrev.info tcp
US 8.8.8.8:53 epededonemil.info udp
US 52.20.131.174:443 epededonemil.info tcp
US 52.20.131.174:443 epededonemil.info tcp
US 8.8.8.8:53 pogothere.xyz udp
US 8.8.8.8:53 suchasricew.info udp
US 172.64.173.27:443 pogothere.xyz tcp
US 172.64.173.27:443 pogothere.xyz tcp
US 8.8.8.8:53 ghabovethec.info udp
US 8.8.8.8:53 hinkhimunpra.info udp
NL 65.9.86.127:443 suchasricew.info tcp
US 18.239.94.77:443 ghabovethec.info tcp
NL 65.9.86.127:443 suchasricew.info tcp
US 104.21.13.203:443 hinkhimunpra.info tcp
US 8.8.8.8:53 www.facebook.com udp
NL 157.240.201.35:443 www.facebook.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.179.141:443 accounts.google.com udp
US 104.21.13.203:443 hinkhimunpra.info udp
US 8.8.8.8:53 thronestep.website udp
US 104.21.51.152:443 thronestep.website tcp
US 8.8.8.8:53 101filed.com udp
US 104.21.10.148:443 101filed.com tcp
US 8.8.8.8:53 yourjsdelivery.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
NL 142.251.36.42:443 ajax.googleapis.com udp
US 172.67.74.130:443 yourjsdelivery.com tcp
US 104.21.10.148:443 101filed.com udp
US 8.8.8.8:53 nostop.go2cloud.org udp
US 52.205.36.237:443 nostop.go2cloud.org tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 cdn-149.anonfiles.com udp
SE 195.96.151.42:443 cdn-149.anonfiles.com tcp
SE 195.96.151.42:443 cdn-149.anonfiles.com tcp
US 162.159.138.232:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
SE 45.154.253.150:443 anonfiles.com tcp
SE 45.154.253.150:443 anonfiles.com tcp
SE 45.154.253.150:443 anonfiles.com tcp
US 8.8.8.8:53 api.anonfiles.com udp
SE 45.154.253.153:443 api.anonfiles.com tcp
US 8.8.8.8:53 content-autofill.googleapis.com udp
NL 142.250.179.138:443 content-autofill.googleapis.com tcp
US 8.8.8.8:53 ip4.seeip.org udp
US 23.128.64.141:443 ip4.seeip.org tcp
US 23.128.64.141:443 ip4.seeip.org tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 discord.com udp
US 162.159.135.232:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp

Files

memory/2284-54-0x00000000745F0000-0x0000000074CDE000-memory.dmp

memory/2284-55-0x0000000000D40000-0x000000000107A000-memory.dmp

memory/2284-56-0x0000000000C60000-0x0000000000CA0000-memory.dmp

memory/2284-57-0x00000000004B0000-0x00000000004CC000-memory.dmp

memory/2284-58-0x0000000000530000-0x0000000000550000-memory.dmp

memory/2284-59-0x0000000000560000-0x0000000000580000-memory.dmp

memory/2284-60-0x0000000000950000-0x0000000000960000-memory.dmp

memory/2284-61-0x00000000009F0000-0x0000000000A04000-memory.dmp

memory/2284-62-0x0000000000CA0000-0x0000000000D0E000-memory.dmp

memory/2284-63-0x0000000000B20000-0x0000000000B3E000-memory.dmp

memory/2284-64-0x0000000002480000-0x00000000024B6000-memory.dmp

memory/2284-65-0x0000000000D10000-0x0000000000D1E000-memory.dmp

memory/2284-66-0x0000000000D20000-0x0000000000D2E000-memory.dmp

memory/2284-67-0x0000000005310000-0x000000000545A000-memory.dmp

memory/2284-69-0x00000000024C0000-0x00000000024F0000-memory.dmp

memory/2284-68-0x0000000005460000-0x0000000005576000-memory.dmp

memory/2284-70-0x0000000000C60000-0x0000000000CA0000-memory.dmp

memory/2284-71-0x00000000064E0000-0x00000000064E8000-memory.dmp

memory/2284-72-0x0000000000C60000-0x0000000000CA0000-memory.dmp

memory/2284-73-0x0000000000C60000-0x0000000000CA0000-memory.dmp

memory/2284-74-0x00000000745F0000-0x0000000074CDE000-memory.dmp

memory/2284-75-0x0000000000C60000-0x0000000000CA0000-memory.dmp

memory/2284-76-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-77-0x0000000000C60000-0x0000000000CA0000-memory.dmp

memory/2284-78-0x0000000000C60000-0x0000000000CA0000-memory.dmp

memory/2284-79-0x0000000000C60000-0x0000000000CA0000-memory.dmp

memory/2284-80-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-81-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-82-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-83-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-84-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-85-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-86-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-87-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-88-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-89-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-90-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-91-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-92-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-93-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-94-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-95-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-96-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-97-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-98-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-99-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-100-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-101-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-102-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-103-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-104-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-105-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-106-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-107-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-108-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-109-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-110-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-111-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-112-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-113-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-114-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-115-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-116-0x000000000B990000-0x000000000BA90000-memory.dmp

memory/2284-117-0x000000000B990000-0x000000000BA90000-memory.dmp

\??\pipe\crashpad_2700_GHAGERNRKHVCYGMC

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

MD5 18e723571b00fb1694a3bad6c78e4054
SHA1 afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA256 8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA512 43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 d4fc2986398cb56a16dc70f6de290389
SHA1 92cab39ef2ce34a162588c2d84232f3d1fea682d
SHA256 58574421dcd158f87b9f703f2ba30be36a646dd150069309e758f2cf526c6d6a
SHA512 eb7bf9865d0240941a04e028cf758cfc2298a78c88b785a9d95b9a00aacfd43d28b1d0d80c367d4500d595eb3bc06257292511deaa582ec2fd4d5bfd58ca98f2

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 8318903ae23cfde18dd4b569ad0af07f
SHA1 a28dc91a27ea046e8fd27d46408ab6ddce2f3179
SHA256 adf9c03fa3145fa17a016a7cab361d2160679e6710db98b70b841ec2832e660a
SHA512 fb9277fba4c8cf5a7e7ffaa4c950e1661e455f09c98b737f1725b3b131bf587375319afe04a8008579c6c5fa56a0671b6c4bf0271330c0d03370dc1f298310e1

C:\Users\Admin\AppData\Local\Temp\Cab7966.tmp

MD5 3ac860860707baaf32469fa7cc7c0192
SHA1 c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256 d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512 d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

C:\Users\Admin\AppData\Local\Temp\Tar79E6.tmp

MD5 4ff65ad929cd9a367680e0e5b1c08166
SHA1 c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256 c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512 f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f77e1f1e685bb02ae80a05b27734597d
SHA1 8325f0e069cb033e2d17bee842fda9d9d26b4ecb
SHA256 f6c15b2f9c3611d64fb22e191cd05327de2ffa16097f309db5fab46e9b20ca34
SHA512 c43d877d9b5b36c1104cca97dc4a73fee7a94733cdcc74f882699b6da0eb267fb7e19baf6b64fae4536efa20df608ef24260b423316b9b4c3f704127cac75164

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7b9371d3abc35676487341af4d43d893
SHA1 eec1f194a0fb29843b7fb00544ccf9b8a206df83
SHA256 35d00e55bfce51702cb8244814c1a5054f87696354b771584f4f0407f59ddc77
SHA512 685a487185c2e07a12f86daecfa7e00952c48b3f05812791dd6bed58382f092ba90a5104ecf56a225eddd290ffcb9f01ba705201d4620006e12a8dfde9ad0dc8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ce0c38ed68f4d64323fd88601ea66477
SHA1 4cbdc78dcf29db0216c4c1bcccacfca52f948425
SHA256 4500cc81c3ee3f9b726179642a0372c829ee37439c1e741c485d600e80f9126d
SHA512 eb9da110d8a2d72ae7c6b6f1e90d98e0b36b48ae60f52698f875f4f047f097f7bbf5c5412fb335c7758932de1885eaa05aa0f329b5e6a21657d0bca57b47f642

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a64981ea6043c42f9a7b7a4bc3579214
SHA1 f9a40c0cd5f299b9214826a821b2a048c572e654
SHA256 32860cbde05359401d1dbcbd9091fb6dc5cbd0bb6964ddb3005eb1a79b30f8f3
SHA512 4b806647e8633e55c773ba8c6ae415f198c7c5eecee7d74fedba1d27aee977d4d6ff8d04a1908542c43d0b4da93a746c58d7cecf0c80547bde68b898abe3f083

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 95ecb88569eb462af31220213cfd7fa7
SHA1 5fb677aa7c16ecf06f5c78fbb068bb81fa4e4603
SHA256 464606aacc04520d8181aaf6ef26916a6b30daa66ca7d3f3cd162ae0fe3c78fe
SHA512 601e2b05cb54b85e3107315771003bd1ab4e0a0e435528ba0906a3fab769747f8d12baeeda11fa60177f010c6955e1ed48e0567b7cf234cf16a1f87ef45bee24

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_anonfiles.com_0.indexeddb.leveldb\CURRENT~RFf7d8391.TMP

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\000002.dbtmp

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 fc66db98539c79a6d2e49f3a278742de
SHA1 e92fdbb384167202585823f64028f369b6328ed8
SHA256 029aa4e30c11e8b81afe8e18f3d9d8e832801455f8168368950a5a8d74574ad9
SHA512 417e7a27cb7acae60196b5fc1adee8842d6c729c019d61d63ca3ea60f84d0fe526c0dcf6bdc4672189d858930729e09660129b0a6ecfbda62837d37f6cb2da3f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 b96f3b947de4478ad612ca128017454f
SHA1 e5b9261f1e097caa8df61ddc261b4a43215f1c19
SHA256 73aaef17b358e3ec6fb24fc0bc82aad5f0495fa4b3e924ea482dcb55bbf0b68b
SHA512 82b658a9ce4b2789c972447abe0bed8342adcab0d5b28a6ea5b86254cd18a989bd2f44b54a849c3e736dba8ee5f58fd35afe464704d9eecb27c8bdb43f24cc85

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 79163349a5ac8552bbfc8e5f8a78ca2b
SHA1 f87c92927e1ea0f314b9b45843e481fda65fb592
SHA256 7e32ed246d16cfbd174a1154f89829407e7773a4d6fe5909162efbb8d0366aa6
SHA512 f7eed7f580c199e998cc9b19f9de88e8a4a266e28c0de90bbb3e040d4997d9e7447ef6a5089eae95bc8144d04f4474e10806550ecc25489d0300151a2a6aff79

C:\Users\Admin\Downloads\httpsdiscord.comapiwebhooks11222395.txt

MD5 79ff8992f531159e5d4d826ed5934e23
SHA1 03a01f82f921e9bfbbba63033b3f3f1628bb930f
SHA256 2f98f355a04421813753e97556ecf07288a69858299b16f641a68ad8385d9120
SHA512 95dc1a3c61a8ce789695c42919adf93896c7b95fccab14de1ed0f809914185d3e72e8c73adeb96ca34c49727be660901d89b30863a132057fb5a79fb0c714926

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 1276607cf0ce3ce3422264bbc5440cb8
SHA1 d8c6679205f5b42573a24e0f416dc7b6d8d3454f
SHA256 82c764c100f5bae792519cf642642c59fa6427b93088af18b14c6c6aac15689d
SHA512 be3e2669905d738c2d64f9c6d804ab20ba34109aa86d26feb7289d02f03022851326df308f7d405e125cc27b6b64f70b764fc1b547603f04fb351addec66ba54

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 836e525bef3de20f673d6ba55e18e7eb
SHA1 89306404a893edc9d8fecbba9d2670aaaf641e85
SHA256 755cd0273d0e124628cd8cf32be8e8575f2fc8cb3ccdae08d0241772b0e45643
SHA512 9dbe009f1a1b30a31cda6899a1c1ee9c541a014997f33b769918e654aab88f6fe22c66c5ffe4d9d6d254c773cf9e5db5d01aab19b724c0425011b34d60661f9e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

MD5 f010709d06e7b82a201fc5d4bd42e96a
SHA1 ba6e34e130575ed119947de330b6a86a747451b0
SHA256 4b4a61b8bfbb11555313c146c98f7f513f7871533179b44f3dba8c280e197580
SHA512 1a5e24db5d4ef7949c9b45772fce6d35f5013841ee66813ee5929157543493b6966743f38ff7f39d1e7ba505aa410827db48368ca08fdda80b99fb570a36c883

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 8851d6cb9d8013879224e96895987f8c
SHA1 2bf38cfacc38f4eeab3f39e8bc5cd55b7036499e
SHA256 947fa593a3674068f5eec2f61bdbaab76cffcdb11eb5ec136549f82de47abfa1
SHA512 c11e83c548f1de27a326d4bbe2722028fb91d618cd859d98e50e098748c13a9c2c7348425a8c4e94e7391c4cc524f602b778f1f90936a14e014d6bca17609c7d

\??\c:\Users\Admin\AppData\Local\Temp\j24kc3sf\j24kc3sf.cmdline

MD5 dcf805911bf86b2b6a91f60f084f9dd7
SHA1 679dc1fe93e6bcb1d42caa89c24b947e7fab9555
SHA256 4853b2a3e2959039409706479d578694217d97cb2741348c2d486bc8f2f59e11
SHA512 d961342d55f3f5dcb2b51e88b9d6fa120947a9c767a1e36cf3b2b79e3b19e42944011470090a42096985fdc7c6ec9e7dbd663a4902657524d42f628615b7025d

\??\c:\Users\Admin\AppData\Local\Temp\j24kc3sf\j24kc3sf.0.cs

MD5 bfa89cacc659b9f1abd5cf12ae00551e
SHA1 a9118217d885f20968db9b72a1d825443e092f0f
SHA256 c5d1093c30f5f0a5dc88e197a4c538ce48e8e49506fec3909022997beb9747fb
SHA512 efb6789c8eb3511b335848e1af6eae0e916f058334a54ceda496a03b2f5c628aa79e8daf187b754ee3fd8d83dda8b6912a04a2515dd0a3ad5882c3c14d135dea

\??\c:\Users\Admin\AppData\Local\Temp\j24kc3sf\j24kc3sf.1.cs

MD5 8aab1997664a604aca551b20202bfd14
SHA1 279cf8f218069cbf4351518ad6df9a783ca34bc5
SHA256 029f57fa483bbcee0dd5464e0d4d89bd03032161424d0ffd1da2b3d5db15977f
SHA512 cf0efea853d7e1997dcfcc9a73668ed9a5ac01cf22cbb7082a05abc141fccc7c92a936b245666071df75389cd7ebe60dc99b3c21279173fe12888a99034a5eda

\??\c:\Users\Admin\AppData\Local\Temp\j24kc3sf\j24kc3sf.2.cs

MD5 6fdae9afc1f8e77e882f1ba6b5859a4e
SHA1 33eb96f75ffe9a1c4f94388e7465b997320265a5
SHA256 a365264dd2d3388acc38b2f5c8f3c267bbf83ca463f70fbf6c8459123a7cc33d
SHA512 97bb77e8c9c7a1a46fa416a917787ddced3439f72ea35558f22fa2450fbbd11928f3442baec0b33b14576683baa6c1c6b3e1376bd7742da358c808bf07db28e9

\??\c:\Users\Admin\AppData\Local\Temp\j24kc3sf\j24kc3sf.3.cs

MD5 6ba707982ee7e5f0ae55ce3fa5ccad17
SHA1 d094c98491058ed49861ce82701abe1f38385f18
SHA256 19af9bea270f830354af8250cd82db32fdcab6327d139e2720713fb7d43a5797
SHA512 d9cf480c32bfb806c72a2dc6fe211c4806388ccf548d55b059e633e8f814d46c80ef73eacfb02398fd3b1e75b7c44b8a1ba0b29476edbf9fe1b29322798d3cfa

\??\c:\Users\Admin\AppData\Local\Temp\j24kc3sf\j24kc3sf.4.cs

MD5 fae5458a5b3cee952e25d44d6eb9db85
SHA1 060d40137e9cce9f40adbb3b3763d1f020601e42
SHA256 240478bb9c522341906a0ef376e0188ce6106856a26a3ae0f7b58af07a377a06
SHA512 25f406f747518aef3a1c5c3d66e8bd474429b05ef994303c5f7bc5d3669d691d9dc21ea8f8a35e20b84f8c406bf89835f2f5007a8f743df755e67b4c380fa236

\??\c:\Users\Admin\AppData\Local\Temp\j24kc3sf\j24kc3sf.5.cs

MD5 42f157ad8e79e06a142791d6e98e0365
SHA1 a05e8946e04907af3f631a7de1537d7c1bb34443
SHA256 e30402cd45589982489719678adf59b016674faa6f7a9af074601e978cc9a0ed
SHA512 e214e1cd49e677e1ed632e86e4d1680b0d04a7a0086a273422c14c28485dc549cc5b4bde13e45336f0c4b842751dfd6ef702df3524bc6570c477a4f713db09dc

\??\c:\Users\Admin\AppData\Local\Temp\j24kc3sf\j24kc3sf.6.cs

MD5 8ec0f0e49ffe092345673ab4d9f45641
SHA1 401bd9e2894e9098504f7cc8f8d52f86c3ebe495
SHA256 93b9f783b5faed3ecfafbe20dfcf1bee3ce33f66909879cd39ae88c36acbdfac
SHA512 60363b36587a3ace9ae1dbc21ffd39f903e5f51945eebdcf0316904eee316c9d711d7a014b28977d54eef25dec13f659aab06325f761d9f3ce9baca3cb12f248

\??\c:\Users\Admin\AppData\Local\Temp\j24kc3sf\j24kc3sf.7.cs

MD5 05206d577ce19c1ef8d9341b93cd5520
SHA1 1ee5c862592045912eb45f9d94376f47b5410d3d
SHA256 e2bbdc7ba4236f9c4cb829d63137fdac3a308fd5da96acea35212beafe01b877
SHA512 4648fa7ea0a35a148e9dac1f659601ebf48910ca699ed9ef8d46614c7cbe14fcf47fa30dc87af53b987934a2a56cd71fd0e58182ef36a97ed47bd84637b54855

\??\c:\Users\Admin\AppData\Local\Temp\j24kc3sf\j24kc3sf.9.cs

MD5 380d15f61b0e775054eefdce7279510d
SHA1 47285dc55dafd082edd1851eea8edc2f7a1d0157
SHA256 bef491a61351ad58cda96b73dba70027fdbe4966917e33145ba5cfa8c83bc717
SHA512 d4cbaad29d742d55926fea6b3fa1cf754c3e71736e763d9271dc983e08fce5251fa849d4ecdc1187c29f92e27adab22b8f99791e46302b5d9c2e90b832c28c28

\??\c:\Users\Admin\AppData\Local\Temp\j24kc3sf\j24kc3sf.8.cs

MD5 7ae06a071e39d392c21f8395ef5a9261
SHA1 007e618097c9a099c9f5c3129e5bbf1fc7deb930
SHA256 00e152629bdbf25a866f98e6fc30626d2514527beef1b76ebb85b1f5f9c83718
SHA512 5203c937597e51b97273040fe441392e0df7841f680fcca0d761ac6d47b72d02c8918614f030fbf23d8a58cb5625b702546e4c6f93e130cc5d3b41c154c42655

\??\c:\Users\Admin\AppData\Local\Temp\CSCE7B876DF102F47AFBE218D1DFA9965B3.TMP

MD5 b66ab1f88f837f85783b9f534cafe8ad
SHA1 f3c35548441395f4554629e7acb3120e8150d4b3
SHA256 c08a50fabfdc0034efa1b7c62a551ada9068738d55fdc70683b2fb8f8b22fbd5
SHA512 bd26a0143d2f91d6223e2af859e2d0e9f4012cd5724c903b60521f65c64703c2cad1cbf0c8c2572401e4d296bb196d8d9c22ed9e2de4812dcf9d15da855bc0b7

C:\Users\Admin\AppData\Local\Temp\RES7B77.tmp

MD5 71e42bcb56d58cc6abb32b89e7de0d0b
SHA1 753979247a4256d076f26cd925a0333c6eb80a5c
SHA256 80f9ec766f65e8042a19da0bf0bcf6e2bf6ec115970b321d2aff1f339a1cf5fb
SHA512 84e056670cecab3e169cfa2128ab60535c9481236db76b210034d2d2d4089433c7e28050c80c9dd534f2b9338aee446c525317934ff7f0377e038b09a08119c2

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 df234ec65483d59898c0a790038e95f8
SHA1 86ec793f746eb4a1f7211e2bc92e6202ab4927ee
SHA256 7f7eb2ffe9159003a562d96888fd3dcd80af6d66cc8dbdbdb569bbeb3dff674e
SHA512 a9ee1159b16d4db0bc5c8e98d8dd36ee7ee08d9795dfc9c9edbbf700006827c7026f2d40ee1287d3111af1793c6f8b25bdc9bd0b0a08193ddd5277f4567e530f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 1c16d7631d3ca6cfb30520bdeeba88b0
SHA1 b987529372e8ee6abbe78b52b43f144e925f8b29
SHA256 e09152944e19eceba0d92017af7c2e0f135702f4d8fd85a58ed83fb085a112dc
SHA512 5cb5b49b7a5e3cc402377f87e162b752178ec3d699223e80a31801048fc361f66bad488c20754b4908f0bc611ae706bc4bf7b8ac39c838f9332125fcdaccf80e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

MD5 0082ee79a47a3e8e5e811cc8695dc6f6
SHA1 10eaacf2cd453af556fcbd6c0f35f32494d5f8b6
SHA256 f42ab0ace7258907d3ed53d50c7f7806368f95256b47a33477538e3992ce2423
SHA512 ddc31a4ff791ef29834bc49752423689d9ce54296141f7af8b4ad6227a178107ddce14b2b7f2814e39523db0a3dbbc73b4dd8b426e84a293c5b1b0933bffe45e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 2399ac9aa6e4bc5be21a0ae1adebd2b0
SHA1 11fa67a208b20bbaabdc9a675e1d0445b22ed7d5
SHA256 19e4ffae48614a849268c56ce585a3930a384b713c17f5c93bbd40ac1a5de4c3
SHA512 addb92f93fb82296b2c50816a17bb3c4b857b4ee2539f080eca4563fa2265fed9bd314b28ca4fd711aee92937d04613d75e7c74b4847ef5d9425e6dfc16faaff

C:\Users\Admin\AppData\Local\Temp\9f95c3c4-c00e-4123-b826-8c4059d8a429.tmp

MD5 14f9100d58669a4edd9673445fe61f04
SHA1 03822ecf397b09796f5632be71cd086e069c7cf7
SHA256 e077d3c4e32728b564b4fa6a5f519fbc1ebf6a3cd7a3fa3cc72d1b0ab200b89e
SHA512 96d9083aec89bb222fa69ec78d3ee8600f5d7ea80f5ab5658c2970dc7b6c40fc8a3c50c8145adb9345da07d2c3523758ea5629caf8de053484f70059ab676c69

C:\Users\Admin\AppData\Local\Temp\6eb99578-6a18-48fb-a738-f0ad5c7f99e7.tmp

MD5 098b8ad729f8df417ee860f4051a3c45
SHA1 2008250c8472c105a0c388e6efee87be226110c5
SHA256 eb355229a9ddd5ed76fc62f3a7156862d7798c21922f92b132cc096278d609e6
SHA512 b18f50a4766c1d1a37a6563ee21f651d4b0807b5b93e0d773f9627bba8769b8c7d7cdba0aa0d19f54e5c2213c8c40a40493a122dd28f0a74e3a1bac0e8402552

C:\Users\Admin\AppData\Local\Temp\nikario.exe

MD5 8e8049d9717c76375b250797c3b72693
SHA1 776f7c1801af7acc38b251193334514a2a21dac1
SHA256 0422d3cdf21719ea15d48ad333312351130fc9adaab9c92c10e638398232240f
SHA512 e53bb520c704631b6a5d473ad9403e4d318a4c8ad5371d789559aeedcfed4d382be326c956d7d3b7424cecc2a74b8b45cb1248324e546275cc1de8b639d1a44c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 f07b8dc83b44855b139bacfa12502a4a
SHA1 77e7efb33cf224c717b937d5c80762da58b91e50
SHA256 6157cb47d8fa2808e1d1caa4b2888da37cea6b76a2dd50ee736fcbd4d46ef894
SHA512 f488b9c1293e28a70b743eec244b1f9303e7ea9e9cfd168eae1d6048d12c690da0cb3f8e46c60568d586fd5115ed8263e31e9c69e36e5031264b279c2a5da888

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 d11fe5f272f6f3ffcc8a3e682989efe9
SHA1 591e516e49108764d7cac789ff95a09ed1885c60
SHA256 a28aede80deed1cc58b6e498c5b955c7fd64c5a1beef461270a4d1c257859834
SHA512 a0e593c6768ddb42fb5075e3407eb0a9fbece229583f3c8b2405a9def972f2d169faa8349f6bf49e74dd09e8066fc2d3e0aee74b936bde17ad214eb1420d4cd7

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 4e2f878c67a3985c218a6b7684b541b5
SHA1 f6ed5d48795017497f5940c67bad44ae6818735e
SHA256 7f872b354d2041e4842d9f8070e49c35d94047301aa0d9bf92df4aaa733f0262
SHA512 eb8acb12ff5becf19153a8866107f065f974e3e26bc17a09330fdd760cfde385f83b180fba99791444cf41dab7ba9208d553b0e7d4d4453aaa53d482be091fef

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 bfa6ac825163eaee54acf04b58b53102
SHA1 f7ec4cc6fc5aa956e45e4b9129cce50e57e946b5
SHA256 12a1dba26f2ca4118a795fca145b48fbdb6f1051fd0e2bf26973abef62bb46f2
SHA512 71c5b3449b7130fb327bb1d48de22f768b9a477a97ca754bf889276884354b6f5662d86ffc8a4cdb232ac780ce7ab13db3e30ba18be7db4506db483b93fb4dae

C:\Users\Admin\AppData\Local\Temp\nikario.exe

MD5 8e8049d9717c76375b250797c3b72693
SHA1 776f7c1801af7acc38b251193334514a2a21dac1
SHA256 0422d3cdf21719ea15d48ad333312351130fc9adaab9c92c10e638398232240f
SHA512 e53bb520c704631b6a5d473ad9403e4d318a4c8ad5371d789559aeedcfed4d382be326c956d7d3b7424cecc2a74b8b45cb1248324e546275cc1de8b639d1a44c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d543e5e39540bd658b18add48d3e0ab9
SHA1 11230cf9fa9eb8a8b432a1dc88dd81acffe57a16
SHA256 869b9ba21299c62f22f291def783fcd8fef85277698fc6957d8e78a172320da0
SHA512 60143cf186f07ca7a17c7e22c4db0371614ec16e5cf52e67730c424bf5caa8be222f2cb37bba21a413b52b89e7409b5580d88cb16b7043233b2b418105e7b9a7

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 aed6663a63ae10659b2fdf8349bc0673
SHA1 02abd563753f39172fd1fed095e439165ec2abb8
SHA256 be8bfc57eee642906f785b858520e053bc803c7ec4404067ea04ce492d71ed5f
SHA512 799027f57466a147e9e7fe553f82147b84e476fac1986864585502cfd3e2706c52a4ec8e4b8333af29b73196be1ad781d242a8ad560b36ba99537097a4e9298f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 a408c18d14dd5047b3e9acb0e5279716
SHA1 2cb942a56132f701c8c8b99710f7eded73bf3988
SHA256 8ff83b328bb760a855a0048fa7bd793b17ad0b2f350d355418ea9578b3141c83
SHA512 98dadf44ebabf29c175a368f3c437c4773690f9468797f9190d62ad092b313c7ebff02279a439e27a41819153fde113c477529679bb2b1495eccfaefe963c880

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 9ea1ecc7a3bf27caceb631ea37982259
SHA1 af541495f951b6a174d5ea51bf5d3de13171bd12
SHA256 121aedf55a8f0220721379e42d119c9bda92f94cc13389e52022ba8493c875a9
SHA512 4c545b3c25e2b1c8562a7c11d28072d0f7b6ad23e0dd497cb14422d2859d5dc3fec5275730af5ed2a5ac3a97332af33b9f1dbc1d3ae5d11e64032ca00ad74d56

Analysis: behavioral2

Detonation Overview

Submitted

2023-07-22 16:08

Reported

2023-07-22 16:38

Platform

win10v2004-20230703-en

Max time kernel

1551s

Max time network

1546s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"

Signatures

Mercurial Grabber Stealer

stealer mercurialgrabber

Looks for VirtualBox Guest Additions in registry

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions C:\Users\Admin\Downloads\nikario.exe N/A
Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions C:\Users\Admin\Downloads\nikario.exe N/A

Downloads MZ/PE file

Looks for VMWare Tools registry key

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools C:\Users\Admin\Downloads\nikario.exe N/A
Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools C:\Users\Admin\Downloads\nikario.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\Downloads\nikario.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\Downloads\nikario.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Downloads\nikario.exe N/A
N/A N/A C:\Users\Admin\Downloads\nikario.exe N/A

Reads user/profile data of web browsers

spyware stealer

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Description Indicator Process Target
N/A ip4.seeip.org N/A N/A
N/A ip4.seeip.org N/A N/A
N/A ip4.seeip.org N/A N/A
N/A ip4.seeip.org N/A N/A
N/A ip4.seeip.org N/A N/A
N/A ip-api.com N/A N/A

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\Downloads\nikario.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Users\Admin\Downloads\nikario.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\Downloads\nikario.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Users\Admin\Downloads\nikario.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S C:\Users\Admin\Downloads\nikario.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S C:\Users\Admin\Downloads\nikario.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature C:\Program Files\Mozilla Firefox\firefox.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 C:\Users\Admin\Downloads\nikario.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation C:\Users\Admin\Downloads\nikario.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer C:\Users\Admin\Downloads\nikario.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName C:\Users\Admin\Downloads\nikario.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 C:\Users\Admin\Downloads\nikario.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation C:\Users\Admin\Downloads\nikario.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer C:\Users\Admin\Downloads\nikario.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName C:\Users\Admin\Downloads\nikario.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\Local Settings C:\Program Files\Mozilla Firefox\firefox.exe N/A

NTFS ADS

Description Indicator Process Target
File created C:\Users\Admin\Downloads\nikario.exe:Zone.Identifier C:\Program Files\Mozilla Firefox\firefox.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Mercurial.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Downloads\nikario.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Downloads\nikario.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4100 wrote to memory of 3344 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4100 wrote to memory of 3344 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4100 wrote to memory of 3344 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4100 wrote to memory of 3344 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4100 wrote to memory of 3344 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4100 wrote to memory of 3344 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4100 wrote to memory of 3344 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4100 wrote to memory of 3344 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4100 wrote to memory of 3344 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4100 wrote to memory of 3344 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 4100 wrote to memory of 3344 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 4264 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 4264 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 3224 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 1968 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 1968 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3344 wrote to memory of 1968 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\Mercurial.exe

"C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -pss -s 448 -p 444 -ip 444

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 444 -s 768

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5036 -ip 5036

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 2132

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5036 -ip 5036

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 2132

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe"

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe"

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.0.1963693741\126151906" -parentBuildID 20221007134813 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 20938 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {aaade573-f616-4b9f-9036-b010f5530f27} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 1980 257dffd6b58 gpu

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.1.1065205095\228340428" -parentBuildID 20221007134813 -prefsHandle 2352 -prefMapHandle 2340 -prefsLen 20974 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6bff2165-03b5-47eb-af5b-16a9deea9461} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 2380 257cc272b58 socket

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.2.1075162452\1615549188" -childID 1 -isForBrowser -prefsHandle 2860 -prefMapHandle 2904 -prefsLen 21077 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {16d717df-a8bb-42de-aaf2-1b7449199ff7} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 3024 257e3fa8c58 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.3.1056426013\165528133" -childID 2 -isForBrowser -prefsHandle 3592 -prefMapHandle 3588 -prefsLen 26437 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c890fd51-1ab7-45b7-b53e-5c73953ac520} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 3604 257e27b2858 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.4.233670698\1224754770" -childID 3 -isForBrowser -prefsHandle 3840 -prefMapHandle 3836 -prefsLen 26496 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {30a2fc03-5d67-4e1d-9b24-d8dfb1d7a0ff} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 3852 257e4ddd558 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.5.739571939\1393588278" -childID 4 -isForBrowser -prefsHandle 4976 -prefMapHandle 5076 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a94fc242-962a-4520-ba7c-844171f44016} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 5084 257e5fd6758 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.6.1378961879\178027636" -childID 5 -isForBrowser -prefsHandle 5248 -prefMapHandle 5252 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0761952-a634-4c7b-9989-5bbe97663daa} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 5240 257e64aea58 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.7.58722991\104349569" -childID 6 -isForBrowser -prefsHandle 5440 -prefMapHandle 5444 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {91377c15-339e-44dd-89fc-0de0f5065b13} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 5432 257e64aff58 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.8.31410070\18437227" -parentBuildID 20221007134813 -prefsHandle 5140 -prefMapHandle 2840 -prefsLen 26921 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {69c811ad-4a0a-4f27-9c5a-d1780b91f684} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 1700 257cc265658 rdd

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.9.852127177\808048355" -childID 7 -isForBrowser -prefsHandle 4916 -prefMapHandle 2932 -prefsLen 26921 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1bc8083e-7e34-4d56-bbc8-9a28c66fb4be} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 2864 257e65a3f58 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.10.31157546\749522791" -childID 8 -isForBrowser -prefsHandle 5356 -prefMapHandle 5372 -prefsLen 27096 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d24c73de-cb5d-4049-b765-458579a425dc} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 5348 257e761a558 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.11.1078187207\1044921925" -childID 9 -isForBrowser -prefsHandle 5624 -prefMapHandle 6392 -prefsLen 27096 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f746c902-9247-42a3-9a2c-3ffce560a4c7} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 6384 257e6efa458 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.12.571768578\1195160043" -childID 10 -isForBrowser -prefsHandle 6584 -prefMapHandle 6568 -prefsLen 27096 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fbb05d90-0da3-4056-9b42-c026f7e6ec24} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 6592 257e8431b58 tab

C:\Users\Admin\Downloads\nikario.exe

"C:\Users\Admin\Downloads\nikario.exe"

C:\Users\Admin\Downloads\nikario.exe

"C:\Users\Admin\Downloads\nikario.exe"

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.13.45967577\1003144284" -parentBuildID 20221007134813 -sandboxingKind 1 -prefsHandle 6240 -prefMapHandle 6224 -prefsLen 30696 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02af3dfb-6842-4301-8a8b-ea8991a6bf47} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 5376 257e6ef9858 utility

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.15.339726959\2127863985" -childID 12 -isForBrowser -prefsHandle 6032 -prefMapHandle 6052 -prefsLen 30696 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab0f842d-bdee-4f4d-9f36-cc3e8645e2ed} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 5900 257e7640e58 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.14.1393390416\1139431599" -childID 11 -isForBrowser -prefsHandle 1780 -prefMapHandle 3848 -prefsLen 30696 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e58e7934-d2f9-49f1-aee3-a07b27ca143e} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 1456 257e761d558 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.16.1778336373\616228393" -childID 13 -isForBrowser -prefsHandle 6600 -prefMapHandle 6616 -prefsLen 30696 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5efeee4-7f7b-4474-852c-02a6b69e82b1} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 6700 257e3f86358 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.17.1593411617\1115516375" -childID 14 -isForBrowser -prefsHandle 6604 -prefMapHandle 6804 -prefsLen 30696 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72aa1474-ac1e-472c-a368-b2291c14916a} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 7560 257e8431b58 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.18.286391837\124505161" -childID 15 -isForBrowser -prefsHandle 4728 -prefMapHandle 7296 -prefsLen 30696 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3581efc3-bba6-4439-9be0-861b7f02d64f} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 3152 257e761ae58 tab

Network

Country Destination Domain Proto
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 74.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 assets.msn.com udp
FR 2.23.13.14:443 assets.msn.com tcp
US 8.8.8.8:53 14.13.23.2.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 63.13.109.52.in-addr.arpa udp
US 8.8.8.8:53 24.73.42.20.in-addr.arpa udp
N/A 127.0.0.1:62245 tcp
US 8.8.8.8:53 contile.services.mozilla.com udp
N/A 127.0.0.1:62251 tcp
US 34.117.237.239:443 contile.services.mozilla.com tcp
US 8.8.8.8:53 contile.services.mozilla.com udp
US 8.8.8.8:53 contile.services.mozilla.com udp
US 8.8.8.8:53 getpocket.cdn.mozilla.net udp
US 8.8.8.8:53 content-signature-2.cdn.mozilla.net udp
US 8.8.8.8:53 shavar.services.mozilla.com udp
US 35.160.58.197:443 shavar.services.mozilla.com tcp
US 8.8.8.8:53 push.services.mozilla.com udp
US 34.120.5.221:443 getpocket.cdn.mozilla.net tcp
US 8.8.8.8:53 firefox.settings.services.mozilla.com udp
US 8.8.8.8:53 shavar.prod.mozaws.net udp
US 34.160.144.191:443 content-signature-2.cdn.mozilla.net tcp
US 8.8.8.8:53 prod.pocket.prod.cloudops.mozgcp.net udp
US 34.149.100.209:443 firefox.settings.services.mozilla.com tcp
US 8.8.8.8:53 autopush.prod.mozaws.net udp
US 8.8.8.8:53 shavar.prod.mozaws.net udp
US 8.8.8.8:53 autopush.prod.mozaws.net udp
US 8.8.8.8:53 prod.content-signature-chains.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 prod.pocket.prod.cloudops.mozgcp.net udp
US 34.117.65.55:443 autopush.prod.mozaws.net tcp
US 8.8.8.8:53 prod.content-signature-chains.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 prod.remote-settings.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 prod.remote-settings.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 197.58.160.35.in-addr.arpa udp
US 8.8.8.8:53 anonfiles.com udp
SE 45.154.253.151:443 anonfiles.com tcp
US 8.8.8.8:53 anonfiles.com udp
US 8.8.8.8:53 anonfiles.com udp
US 8.8.8.8:53 vjs.zencdn.net udp
US 151.101.2.217:443 vjs.zencdn.net tcp
US 8.8.8.8:53 dualstack.osff.map.fastly.net udp
SE 45.154.253.151:443 anonfiles.com tcp
SE 45.154.253.151:443 anonfiles.com tcp
SE 45.154.253.151:443 anonfiles.com tcp
SE 45.154.253.151:443 anonfiles.com tcp
US 8.8.8.8:53 dualstack.osff.map.fastly.net udp
SE 45.154.253.151:443 anonfiles.com tcp
US 151.101.2.217:443 dualstack.osff.map.fastly.net tcp
US 8.8.8.8:53 djv99sxoqpv11.cloudfront.net udp
US 8.8.8.8:53 djv99sxoqpv11.cloudfront.net udp
US 8.8.8.8:53 djv99sxoqpv11.cloudfront.net udp
NL 13.227.211.186:443 djv99sxoqpv11.cloudfront.net tcp
US 34.149.100.209:443 prod.remote-settings.prod.webservices.mozgcp.net tcp
US 8.8.8.8:53 prod.content-signature-chains.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 151.253.154.45.in-addr.arpa udp
US 8.8.8.8:53 217.2.101.151.in-addr.arpa udp
US 8.8.8.8:53 186.211.227.13.in-addr.arpa udp
US 8.8.8.8:53 baconaces.pro udp
US 52.20.131.174:443 baconaces.pro tcp
US 8.8.8.8:53 baconaces.pro udp
US 8.8.8.8:53 baconaces.pro udp
US 8.8.8.8:53 pogothere.xyz udp
US 172.64.173.27:443 pogothere.xyz tcp
US 8.8.8.8:53 pogothere.xyz udp
US 172.64.173.27:443 pogothere.xyz tcp
US 8.8.8.8:53 pogothere.xyz udp
US 8.8.8.8:53 suchasricew.info udp
US 8.8.8.8:53 hinkhimunpra.info udp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 suchasricew.info udp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 star-mini.c10r.facebook.com udp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 suchasricew.info udp
US 8.8.8.8:53 hinkhimunpra.info udp
US 8.8.8.8:53 star-mini.c10r.facebook.com udp
US 8.8.8.8:53 hinkhimunpra.info udp
GB 18.244.140.90:443 suchasricew.info tcp
NL 142.250.179.141:443 accounts.google.com tcp
US 172.67.133.22:443 hinkhimunpra.info tcp
NL 142.250.179.141:443 accounts.google.com tcp
GB 18.244.140.90:443 suchasricew.info tcp
US 172.67.133.22:443 hinkhimunpra.info tcp
GB 18.244.140.90:443 suchasricew.info tcp
US 172.64.173.27:443 pogothere.xyz udp
NL 142.250.179.141:443 accounts.google.com udp
US 8.8.8.8:53 174.131.20.52.in-addr.arpa udp
US 8.8.8.8:53 27.173.64.172.in-addr.arpa udp
US 8.8.8.8:53 90.140.244.18.in-addr.arpa udp
US 8.8.8.8:53 22.133.67.172.in-addr.arpa udp
US 8.8.8.8:53 141.179.250.142.in-addr.arpa udp
US 172.67.133.22:443 hinkhimunpra.info udp
NL 157.240.201.35:443 www.facebook.com tcp
NL 157.240.201.35:443 www.facebook.com udp
US 8.8.8.8:53 rganization.info udp
NL 108.156.60.23:443 rganization.info tcp
US 8.8.8.8:53 rganization.info udp
US 8.8.8.8:53 rganization.info udp
US 8.8.8.8:53 epededonemil.info udp
US 8.8.8.8:53 epededonemil.info udp
US 54.162.51.18:443 epededonemil.info tcp
US 8.8.8.8:53 epededonemil.info udp
US 8.8.8.8:53 35.201.240.157.in-addr.arpa udp
US 8.8.8.8:53 23.60.156.108.in-addr.arpa udp
US 54.162.51.18:443 epededonemil.info tcp
US 8.8.8.8:53 18.51.162.54.in-addr.arpa udp
GB 18.244.140.90:443 suchasricew.info tcp
US 8.8.8.8:53 thronestep.website udp
US 104.21.51.152:443 thronestep.website tcp
US 8.8.8.8:53 thronestep.website udp
US 8.8.8.8:53 thronestep.website udp
US 104.21.51.152:443 thronestep.website udp
US 8.8.8.8:53 101filed.com udp
US 104.21.10.148:443 101filed.com tcp
US 8.8.8.8:53 101filed.com udp
US 8.8.8.8:53 101filed.com udp
US 104.21.10.148:443 101filed.com udp
US 8.8.8.8:53 152.51.21.104.in-addr.arpa udp
US 8.8.8.8:53 148.10.21.104.in-addr.arpa udp
US 8.8.8.8:53 yourjsdelivery.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 nostop.go2cloud.org udp
NL 216.58.214.10:443 ajax.googleapis.com tcp
US 8.8.8.8:53 ajax.googleapis.com udp
US 104.26.4.109:443 yourjsdelivery.com tcp
US 8.8.8.8:53 yourjsdelivery.com udp
US 8.8.8.8:53 nostop.go2cloud.org udp
US 8.8.8.8:53 yourjsdelivery.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 nostop.go2cloud.org udp
US 52.20.195.125:443 nostop.go2cloud.org tcp
NL 216.58.214.10:443 ajax.googleapis.com udp
US 8.8.8.8:53 106.208.58.216.in-addr.arpa udp
US 8.8.8.8:53 10.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 109.4.26.104.in-addr.arpa udp
US 8.8.8.8:53 125.195.20.52.in-addr.arpa udp
US 8.8.8.8:53 131.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 cdn-145.anonfiles.com udp
SE 195.96.151.38:443 cdn-145.anonfiles.com tcp
US 8.8.8.8:53 cdn-145.anonfiles.com udp
US 8.8.8.8:53 cdn-145.anonfiles.com udp
US 8.8.8.8:53 38.151.96.195.in-addr.arpa udp
US 8.8.8.8:53 ip4.seeip.org udp
US 23.128.64.141:443 ip4.seeip.org tcp
US 23.128.64.141:443 ip4.seeip.org tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 discord.com udp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 233.128.159.162.in-addr.arpa udp
US 8.8.8.8:53 141.64.128.23.in-addr.arpa udp
US 162.159.128.233:443 discord.com tcp
US 23.128.64.141:443 ip4.seeip.org tcp
US 23.128.64.141:443 ip4.seeip.org tcp
US 208.95.112.1:80 ip-api.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 aus5.mozilla.org udp
US 35.244.181.201:443 aus5.mozilla.org tcp
US 8.8.8.8:53 prod.balrog.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 prod.balrog.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 content-signature-2.cdn.mozilla.net udp
US 8.8.8.8:53 prod.content-signature-chains.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 ciscobinary.openh264.org udp
US 8.8.8.8:53 201.181.244.35.in-addr.arpa udp
DE 23.55.161.185:80 ciscobinary.openh264.org tcp
US 8.8.8.8:53 a19.dscg10.akamai.net udp
US 8.8.8.8:53 a19.dscg10.akamai.net udp
US 8.8.8.8:53 redirector.gvt1.com udp
GB 216.58.208.110:443 redirector.gvt1.com tcp
US 8.8.8.8:53 redirector.gvt1.com udp
US 8.8.8.8:53 redirector.gvt1.com udp
GB 216.58.208.110:443 redirector.gvt1.com udp
US 8.8.8.8:53 r2---sn-5hneknee.gvt1.com udp
US 8.8.8.8:53 r2.sn-5hneknee.gvt1.com udp
NL 74.125.8.71:443 r2.sn-5hneknee.gvt1.com tcp
US 8.8.8.8:53 r2.sn-5hneknee.gvt1.com udp
NL 74.125.8.71:443 r2.sn-5hneknee.gvt1.com udp
US 8.8.8.8:53 185.161.55.23.in-addr.arpa udp
US 8.8.8.8:53 110.208.58.216.in-addr.arpa udp
US 8.8.8.8:53 71.8.125.74.in-addr.arpa udp
US 8.8.8.8:53 firefox-settings-attachments.cdn.mozilla.net udp
US 34.117.121.53:443 firefox-settings-attachments.cdn.mozilla.net tcp
US 34.117.121.53:443 firefox-settings-attachments.cdn.mozilla.net tcp
US 34.117.121.53:443 firefox-settings-attachments.cdn.mozilla.net tcp
US 8.8.8.8:53 attachments.prod.remote-settings.prod.webservices.mozgcp.net udp
US 34.117.121.53:443 attachments.prod.remote-settings.prod.webservices.mozgcp.net tcp
US 34.117.121.53:443 attachments.prod.remote-settings.prod.webservices.mozgcp.net tcp
US 34.117.121.53:443 attachments.prod.remote-settings.prod.webservices.mozgcp.net tcp
US 8.8.8.8:53 attachments.prod.remote-settings.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 53.121.117.34.in-addr.arpa udp
US 34.117.121.53:443 attachments.prod.remote-settings.prod.webservices.mozgcp.net tcp
US 34.117.237.239:443 contile.services.mozilla.com tcp
SE 45.154.253.151:443 anonfiles.com tcp
US 8.8.8.8:53 vjs.zencdn.net udp
US 151.101.2.217:443 vjs.zencdn.net tcp
SE 45.154.253.150:443 anonfiles.com tcp
SE 45.154.253.150:443 anonfiles.com tcp
SE 45.154.253.150:443 anonfiles.com tcp
SE 45.154.253.150:443 anonfiles.com tcp
SE 45.154.253.150:443 anonfiles.com tcp
US 8.8.8.8:53 dualstack.osff.map.fastly.net udp
US 8.8.8.8:53 vjs.zencdn.net udp
US 8.8.8.8:53 djv99sxoqpv11.cloudfront.net udp
US 151.101.2.217:443 vjs.zencdn.net tcp
US 8.8.8.8:53 dualstack.osff.map.fastly.net udp
US 8.8.8.8:53 djv99sxoqpv11.cloudfront.net udp
NL 13.227.211.186:443 djv99sxoqpv11.cloudfront.net tcp
US 8.8.8.8:53 djv99sxoqpv11.cloudfront.net udp
US 52.20.131.174:443 epededonemil.info tcp
US 8.8.8.8:53 baconaces.pro udp
US 8.8.8.8:53 150.253.154.45.in-addr.arpa udp
US 172.64.173.27:443 pogothere.xyz tcp
US 8.8.8.8:53 pogothere.xyz udp
US 172.64.173.27:443 pogothere.xyz tcp
US 8.8.8.8:53 suchasricew.info udp
US 172.67.133.22:443 hinkhimunpra.info tcp
NL 142.250.179.141:443 accounts.google.com tcp
NL 142.250.179.141:443 accounts.google.com tcp
US 8.8.8.8:53 hinkhimunpra.info udp
US 172.64.173.27:443 pogothere.xyz udp
NL 65.9.86.113:443 suchasricew.info tcp
NL 65.9.86.113:443 suchasricew.info tcp
NL 65.9.86.113:443 suchasricew.info tcp
NL 142.250.179.141:443 accounts.google.com udp
US 8.8.8.8:53 suchasricew.info udp
US 172.67.133.22:443 hinkhimunpra.info udp
US 8.8.8.8:53 suchasricew.info udp
US 8.8.8.8:53 olularhenewrev.info udp
US 18.239.94.20:443 olularhenewrev.info tcp
US 8.8.8.8:53 olularhenewrev.info udp
US 8.8.8.8:53 olularhenewrev.info udp
NL 142.250.179.141:443 accounts.google.com udp
SE 45.154.253.151:443 anonfiles.com tcp
US 54.162.51.18:443 epededonemil.info tcp
US 8.8.8.8:53 epededonemil.info udp
US 172.67.133.22:443 hinkhimunpra.info udp
US 8.8.8.8:53 113.86.9.65.in-addr.arpa udp
US 8.8.8.8:53 20.94.239.18.in-addr.arpa udp
US 54.162.51.18:443 epededonemil.info tcp
US 8.8.8.8:53 content-signature-2.cdn.mozilla.net udp
US 8.8.8.8:53 prod.content-signature-chains.prod.webservices.mozgcp.net udp
US 34.160.144.191:443 prod.content-signature-chains.prod.webservices.mozgcp.net tcp
US 8.8.8.8:53 aus5.mozilla.org udp
US 35.244.181.201:443 aus5.mozilla.org tcp
US 8.8.8.8:53 prod.balrog.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 prod.balrog.prod.cloudops.mozgcp.net udp

Files

memory/5036-133-0x0000000075250000-0x0000000075A00000-memory.dmp

memory/5036-134-0x00000000002F0000-0x000000000062A000-memory.dmp

memory/5036-135-0x0000000005720000-0x0000000005CC4000-memory.dmp

memory/5036-136-0x0000000004F00000-0x0000000004F92000-memory.dmp

memory/5036-137-0x0000000005160000-0x0000000005170000-memory.dmp

memory/5036-138-0x0000000004EE0000-0x0000000004EEA000-memory.dmp

memory/5036-139-0x0000000005160000-0x0000000005170000-memory.dmp

memory/5036-140-0x0000000005160000-0x0000000005170000-memory.dmp

memory/5036-141-0x0000000075250000-0x0000000075A00000-memory.dmp

memory/5036-142-0x0000000005160000-0x0000000005170000-memory.dmp

memory/5036-143-0x0000000005160000-0x0000000005170000-memory.dmp

memory/5036-144-0x0000000005160000-0x0000000005170000-memory.dmp

memory/5036-145-0x0000000005160000-0x0000000005170000-memory.dmp

memory/5036-146-0x0000000005160000-0x0000000005170000-memory.dmp

memory/5036-147-0x0000000005160000-0x0000000005170000-memory.dmp

memory/5036-148-0x0000000005160000-0x0000000005170000-memory.dmp

memory/5036-149-0x0000000005160000-0x0000000005170000-memory.dmp

memory/5036-150-0x000000000D150000-0x000000000D250000-memory.dmp

memory/5036-151-0x000000000D150000-0x000000000D250000-memory.dmp

memory/5036-152-0x000000000D150000-0x000000000D250000-memory.dmp

memory/5036-153-0x000000000D150000-0x000000000D250000-memory.dmp

memory/5036-154-0x000000000D150000-0x000000000D250000-memory.dmp

memory/5036-155-0x000000000D150000-0x000000000D250000-memory.dmp

memory/5036-156-0x000000000D150000-0x000000000D250000-memory.dmp

memory/5036-157-0x0000000005160000-0x0000000005170000-memory.dmp

memory/5036-158-0x000000000D150000-0x000000000D250000-memory.dmp

memory/5036-159-0x0000000005160000-0x0000000005170000-memory.dmp

memory/5036-160-0x000000000D150000-0x000000000D250000-memory.dmp

memory/5036-161-0x000000000D150000-0x000000000D250000-memory.dmp

memory/5036-162-0x000000000D150000-0x000000000D250000-memory.dmp

memory/5036-163-0x000000000D150000-0x000000000D250000-memory.dmp

memory/5036-164-0x0000000075250000-0x0000000075A00000-memory.dmp

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\activity-stream.discovery_stream.json.tmp

MD5 1481941820afc5bb92769dfb6eba7f80
SHA1 71158b4808c6d8a793cf9a543123e5a29eb78715
SHA256 5e6a13d665be75e663c4567be6d5d559ecf501683c1ed89610bc6e473eabbd44
SHA512 b9361270253fa5ce5d8e764147834b455cf053af9314bb5141996c0e79bc28652a399fb7600ca2097af635c6b00719c9d94079fc2ee39564b5bf032dbbcfc255

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\prefs.js

MD5 d95ea1e5e99ac506bef8fe0a1c52948d
SHA1 3cd316915ee34039174930f44b922b97069073f2
SHA256 24b22fe756f81fd8eefc65cd840e2d620af42b7d6ee796cf0d3e602a704d9154
SHA512 c4664557b394196c6b32522d729f096044379d5c24f963acd100489dc1d1ca3306c29cfc361aca7b3c41e3f1f4fedcaf611e2cd5ce035cfee6609db3e277b3cc

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\prefs-1.js

MD5 026b54ad29d9a695a5dd786b30bb491d
SHA1 ac1596738c3d15ddad5d4fd6625d554b2f055d9d
SHA256 94b81cc30ef43677288d4beefc3af4efee6d7bf3e96cf0cbe1d1c8dc486cfa0c
SHA512 b43b652856930c2f150b42833ce6d9fa34b31602ab2bec4c7893a999d1eed12539affb6e169d7dbeb63e20e5e7f71fc631d536c9fe8d539cf88fe1e7725a3e08

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\sessionstore-backups\recovery.jsonlz4

MD5 15a2b14e3ef4a1919a18c33e31997927
SHA1 6c9fe008a474f57a55e988469f19ade6c0583b83
SHA256 de373a6afda409fcd646251c2410e48afc88dca96fdabeecd85bf2cb5345fc89
SHA512 1063c846ebc2cc4c96155044e8ec42354dab88867844d794a334b4d0024fc04796ada15370891566ad60d47866ed9df5893cb1fc50dcca62f37529b033408492

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\prefs-1.js

MD5 28e28fd2a6b47cd6973e820d0d080d51
SHA1 f8eef54c0f2eb687b363637578defa54b1db13b4
SHA256 f36b5873e70ad396a8fa7d34b0d40ab57dad0cb9fc2c08d77286cb1dc07eda5f
SHA512 2217c55a1dd1f4ace50b2b1d2ae8a0b8b56dfa1b29a53999304efa100c20af567e1cfe0789ba4a984bb83c8d84d8edfb670bcffdbadbcabc62edf55425f14d10

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\sessionstore-backups\recovery.jsonlz4

MD5 50ef7ed1745d622b38f68a3b0baac841
SHA1 c4af984252a23de2b439c44a0e9c55cf06900552
SHA256 30855ddd35b4fd39eac7d6b105b97e22cb90693ae5aa705efb0adb4879d296d2
SHA512 b9b91e7605b8e1d83ca1891ec10d171b330d2ef1ab24e7c480a0860c601433a6cbe25447171a370b73f6ebfc215572ba894a0bc95741006254e6e8c608b9ba63

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\storage\default\https+++anonfiles.com\cache\morgue\234\{4cc039e4-efee-47e5-98e6-d3ce58160cea}.final

MD5 7509101d3b592c9336f130526a5dcc65
SHA1 b01f59b0e4326318c0c6d7b5c19e57093e11a31f
SHA256 7279a0d506c71496d08227fdaeef4d2503186298977186367cf631fa8e8eaa65
SHA512 533f642b3a2e18bdd3f48d70cc134acb2b8d9881d24fc1f6dfd0cb9a68a3889ac232f36238be365a1144c27033a4f5a610dda4b15bef44a627cdb019bfe59e5a

C:\Users\Admin\Downloads\nikario.exe

MD5 8e8049d9717c76375b250797c3b72693
SHA1 776f7c1801af7acc38b251193334514a2a21dac1
SHA256 0422d3cdf21719ea15d48ad333312351130fc9adaab9c92c10e638398232240f
SHA512 e53bb520c704631b6a5d473ad9403e4d318a4c8ad5371d789559aeedcfed4d382be326c956d7d3b7424cecc2a74b8b45cb1248324e546275cc1de8b639d1a44c

C:\Users\Admin\Downloads\nikario.exe

MD5 8e8049d9717c76375b250797c3b72693
SHA1 776f7c1801af7acc38b251193334514a2a21dac1
SHA256 0422d3cdf21719ea15d48ad333312351130fc9adaab9c92c10e638398232240f
SHA512 e53bb520c704631b6a5d473ad9403e4d318a4c8ad5371d789559aeedcfed4d382be326c956d7d3b7424cecc2a74b8b45cb1248324e546275cc1de8b639d1a44c

C:\Users\Admin\Downloads\nikario.exe

MD5 8e8049d9717c76375b250797c3b72693
SHA1 776f7c1801af7acc38b251193334514a2a21dac1
SHA256 0422d3cdf21719ea15d48ad333312351130fc9adaab9c92c10e638398232240f
SHA512 e53bb520c704631b6a5d473ad9403e4d318a4c8ad5371d789559aeedcfed4d382be326c956d7d3b7424cecc2a74b8b45cb1248324e546275cc1de8b639d1a44c

memory/4348-421-0x00000000005F0000-0x0000000000600000-memory.dmp

memory/4348-422-0x00007FFA1AD50000-0x00007FFA1B811000-memory.dmp

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\sessionstore-backups\recovery.jsonlz4

MD5 0aa3a319d18fbf94b59a6510a93aa872
SHA1 9930685d3944349b298d0e39cc325956d5551806
SHA256 36ca66df8ce322516a112a986967daca55a45a6c14e91477cab7fe4263c3c7d9
SHA512 aa8b4f07165c4dbc1bbd6020d8397684015bd7ee745c4609048d0efdaff448546fe2d8e836592796bc2d63b52ca74ee6c8171f22d095e522b41e6abbc4739c3f

memory/4348-439-0x00007FFA1AD50000-0x00007FFA1B811000-memory.dmp

memory/4348-440-0x000000001B310000-0x000000001B320000-memory.dmp

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\sessionstore-backups\recovery.jsonlz4

MD5 a8320d95addef0bb2a23b25d213a29d2
SHA1 b2184eda6610fa91be9411941b7be5f5ea3330d1
SHA256 1a232c934b82dd0e68edbc06eb1d489a2b8abfb0c45b6bd149fcb5bcbaaf0bf3
SHA512 4362c0e83041011310b6831571562558a5b9ae91b58edea4c8bdd47f01e941c9e5ba7d8634f7ebab7afc8893a6dbc7c1a52799c2f17105f2b943f0b0dcf9a5ca

C:\Users\Admin\Downloads\nikario.exe

MD5 8e8049d9717c76375b250797c3b72693
SHA1 776f7c1801af7acc38b251193334514a2a21dac1
SHA256 0422d3cdf21719ea15d48ad333312351130fc9adaab9c92c10e638398232240f
SHA512 e53bb520c704631b6a5d473ad9403e4d318a4c8ad5371d789559aeedcfed4d382be326c956d7d3b7424cecc2a74b8b45cb1248324e546275cc1de8b639d1a44c

memory/4816-455-0x00007FFA1AD50000-0x00007FFA1B811000-memory.dmp

memory/4816-456-0x000000001B7E0000-0x000000001B7F0000-memory.dmp

memory/4816-464-0x00007FFA1AD50000-0x00007FFA1B811000-memory.dmp

memory/4816-466-0x000000001B7E0000-0x000000001B7F0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpaddon

MD5 85430baed3398695717b0263807cf97c
SHA1 fffbee923cea216f50fce5d54219a188a5100f41
SHA256 a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA512 06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

MD5 fe3355639648c417e8307c6d051e3e37
SHA1 f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA256 1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA512 8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

MD5 3d33cdc0b3d281e67dd52e14435dd04f
SHA1 4db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256 f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512 a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

MD5 88cc2f0bc4cf813cf272279fbd2098f0
SHA1 7f7ed55b9ec20e5aaa2948d3e2056ffe16eeb4eb
SHA256 58c7f560e2f2d2b1b285f14e4858b8d8504627c52996969ee79bbdcbe7021ba3
SHA512 b21d509aa15892a06188d239f063c3b2d80f970e4a57d25a4e4865467697e67b2cae7b59f33143677a6def8a66e3078ed90f68afbdad636603a1136d682a15c9

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\cache2\entries\ED9826654AE8BD972BDE17A9E0A449D3F881E430

MD5 1c66584e2f1a2784593690b63a7c40bf
SHA1 9e062cee6b859143a63e15073c725be74e84ae30
SHA256 3feb24a190fa28880a826dc4276759905780da2227be7f018bbbad128c4b9045
SHA512 9e4b55b9b2448eb08e8252a947e211b80f04bda534b01d86afa13a0d1eff5c0f0f896211b29b03e04c78f56e6b50ea8a5a2b81a3a2002a86f573431df5f081f2

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\prefs-1.js

MD5 a34abb5524559c94e79804947f7705bc
SHA1 7a5a24c51e6904da916f193e132f68196368e40e
SHA256 a16206a92a4d3f291ea7ff22613816123cf8528fa2b4f63fdc1f004354cdec53
SHA512 2d48bc30cafc8ab099b2d43d9d9282abd4b1c4aee61438d05bc8288c722a2bc983429c46b1abd16169b5edd0c95c7debf58ff6347967debc40617ad9d126cb94

C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

MD5 a01c5ecd6108350ae23d2cddf0e77c17
SHA1 c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256 345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512 b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

MD5 8be33af717bb1b67fbd61c3f4b807e9e
SHA1 7cf17656d174d951957ff36810e874a134dd49e0
SHA256 e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA512 6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

MD5 49ddb419d96dceb9069018535fb2e2fc
SHA1 62aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA256 2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA512 48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

MD5 33bf7b0439480effb9fb212efce87b13
SHA1 cee50f2745edc6dc291887b6075ca64d716f495a
SHA256 8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512 d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

MD5 688bed3676d2104e7f17ae1cd2c59404
SHA1 952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA256 33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA512 7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

MD5 937326fead5fd401f6cca9118bd9ade9
SHA1 4526a57d4ae14ed29b37632c72aef3c408189d91
SHA256 68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512 b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms

MD5 733d182a8a732d130b0828dc903adc7f
SHA1 77ea43d42425cdb4429f3ea857031dcf586922e2
SHA256 14a1def86604a7f7beb57ebbf925fdd4a8d85ffc7e69026d7f1de83b88c181ea
SHA512 01a26f88cfaf6cd3e0e21430e82ad531f0f478fe67e5f020b30fb0931e376bf76bf8831f048a5c5a248189a17065329bfedac7db76b31018ff825c435b2757ca

memory/4348-2318-0x00007FFA1AD50000-0x00007FFA1B811000-memory.dmp

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\prefs-1.js

MD5 b09235b38467c79b30c10019dcbaef75
SHA1 6d79a1276487685c3d8186a2559c4217b39c5822
SHA256 debb7184ec95e0dd6d1bef0cc02b3a3ef13a1c0511385eff2473f4148469f9f5
SHA512 773a750750cfe7fb42e37031a1c29927074ea3203bc3b293dfe75f05c6726c91a0d2f8da6dfbc5d47770ef079f0cfc6c500f54cc136cc4795a236143eda852dd

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\cache2\entries\57A21233465DD9AAC0FC714659FF75F2F2B0CBB3

MD5 7ecfe3d9d01bfc5b63b0c1af297a7617
SHA1 c12c6d1c2de8212777693f1b7b6a218a3c82fcbb
SHA256 7ebd752151c1acc13b029cd4cc5cc06c4bccf006370867e0024310c372cca40c
SHA512 6e898731212bd14ad020ca27cebff782661a62771835111183f52eb2d206dcb3b2457fc111071492c4dfa0af339da9321fb188c6af44dfe002cfa6b643cab81d

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\broadcast-listeners.json

MD5 afede308edcc0eec476b1f2adc2d1ff6
SHA1 b844155365c0f6595d79b5b9acd9defd6ec46407
SHA256 b0268f965fb4d531abdf774e1bf2fffd5e9a01fe165a7dc6593acce9d86ff8bd
SHA512 5210f9241e4f8149aa2a89c4ac6ab8cbe4d018395091755e71ed12e50d55e8c25d4f159ac171289dafa10f060e52e589b771ea168cde78a105974a0edbb4166b

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\sessionCheckpoints.json

MD5 c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA1 5942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA256 00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA512 71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\targeting.snapshot.json

MD5 0cf00e687b725955c06308f63ba8cc25
SHA1 34c9982cfd60a6097fad84c72c8b62ceff2e0349
SHA256 af9cdcd89baff447323d4546fa3ac943e7fc065dd07898c6b49cb5a8a5d48638
SHA512 892fe3cea15351d0350e3e5877f64d913e4ef088c80c9ddec84c45ec129f2b36ffd4f4af117bbc60c190ebf92dc5c338c19c281fc00671d2dffd40542d8a277e

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\recipe_attachment.json

MD5 be3d0f91b7957bbbf8a20859fd32d417
SHA1 fbc0380fe1928d6d0c8ab8b0a793a2bba0722d10
SHA256 fc07d42847eeaf69dcbf1b9a16eb48b141c11feb67aa40724be2aee83cb621b7
SHA512 8da24afcf587fbd4f945201702168e7cfc12434440200d00f09ddcd1d1d358a5e01065ac2a411fdf96a530e94db3697e3530578b392873cf874476b5e65d774a

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\xulstore.json

MD5 1995825c748914809df775643764920f
SHA1 55c55d77bb712d2d831996344f0a1b3e0b7ff98a
SHA256 87835b1bd7d0934f997ef51c977349809551d47e32c3c9224899359ae0fce776
SHA512 c311970610d836550a07feb47bd0774fd728130d0660cbada2d2d68f2fcfbe84e85404d7f5b8ab0f71a6c947561dcffa95df2782a712f4dcb7230ea8ba01c34c

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_arts_and_entertainment.json

MD5 6c651609d367b10d1b25ef4c5f2b3318
SHA1 0abcc756ea415abda969cd1e854e7e8ebeb6f2d4
SHA256 960065cc44a09bef89206d28048d3c23719d2f5e9b38cfc718ca864c9e0e91e9
SHA512 3e084452eefe14e58faa9ef0d9fda2d21af2c2ab1071ae23cde60527df8df43f701668ca0aa9d86f56630b0ab0ca8367803c968347880d674ad8217fba5d8915

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_sports.json

MD5 ce4e75385300f9c03fdd52420e0f822f
SHA1 85c34648c253e4c88161d09dd1e25439b763628c
SHA256 44da98b03350e91e852fe59f0fc05d752fc867a5049ab0363da8bb7b7078ad14
SHA512 d119dc4706bbf3b6369fe72553cfacf1c9b2688e0188a7524b56d3e2ac85582a18bbee66d5594e0fb40767432646c23bf3e282090bd9b4c29f989a374aeae61f

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_computers_and_electronics.json

MD5 6ccd943214682ac8c4ec08b7ec6dbcbd
SHA1 18417647f7c76581d79b537a70bf64f614f60fa2
SHA256 ab20b97406b0d9bf4f695e5ec7db4ebad5efb682311e74ca757d45b87ffc106b
SHA512 e57573d6f494df8aa7e8e6a20427a18f6868e19dc853b441b8506998158b23c7a4393b682c83b3513aae5075a21148dd8ca854a11dabcea6a0a0db8f2e6828b8

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_food_and_drink.json

MD5 70ba02dedd216430894d29940fc627c2
SHA1 f0c9aa816c6b0e171525a984fd844d3a8cabd505
SHA256 905357002f2eced8bba1be2285a9b83198f60d2f9bb1144b5c119994f2ec6e34
SHA512 3ae60d0bf3c45d28e340d97106790787be2cc80ba579d313b5414084664b86e89879391c99e94b6e33bdc5508ea42a9fd34f48ca9b1e7adfa7b6dd22c783c263

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_science.json

MD5 7a8fd079bb1aeb4710a285ec909c62b9
SHA1 8429335e5866c7c21d752a11f57f76399e5634b6
SHA256 9606ce3988b2d2a4921b58ac454f54e53a9ea8f358326522a8b1dcc751b50b32
SHA512 8fc1546e509b5386c9e1088e0e3a1b81f288ef67f1989f3e83888057e23769907a2b184d624a4e4c44fcd5b88d719bd4cca94dfb33798804a721b8be022ec0c6

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_jobs_and_education.json

MD5 2d69892acde24ad6383082243efa3d37
SHA1 d8edc1c15739e34232012bb255872991edb72bc7
SHA256 29080288b2130a67414ecb296a53ddd9f0a4771035e3c1b2112e0ce656a7481a
SHA512 da391152e1fbce1f03607b486c5dea9a298a438e58e440ebb7b871bd5c62d7339b540eed115b4001b9840de1ba3898c6504872ff9094ba4d6a47455051c3f1c5

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_real_estate.json

MD5 9899942e9cd28bcb9bf5074800eae2d0
SHA1 15e5071e5ed58001011652befc224aed06ee068f
SHA256 efcf6b2d09e89b8c449ffbcdb5354beaa7178673862ebcdd6593561f2aa7d99a
SHA512 9f7a5fbe6d46c694e8bc9b50e7843e9747ea3229cf4b00b8e95f1a5467bd095d166cbd523b3d9315c62e9603d990b8e56a018ba4a11d30ad607f5281cc42b4cd

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_shopping.json

MD5 97d4a0fd003e123df601b5fd205e97f8
SHA1 a802a515d04442b6bde60614e3d515d2983d4c00
SHA256 bfd7e68ddca6696c798412402965a0384df0c8c209931bbadabf88ccb45e3bb6
SHA512 111e8a96bc8e07be2d1480a820fc30797d861a48d80622425af00b009512aacb30a2df9052c53bfbf4ee0800b6e6f5b56daa93d33f30fecb52e2f3850dfa9130

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_people_and_society.json

MD5 b1bd26cf5575ebb7ca511a05ea13fbd2
SHA1 e83d7f64b2884ea73357b4a15d25902517e51da8
SHA256 4990a5d17bea15617624c48a0c7c23d16e95f15e2ec9dd1d82ee949567bbaec0
SHA512 edcede39c17b494474859bc1a9bbf18c9f6abd3f46f832086db3bb1337b01d862452d639f89f9470ca302a6fcb84a1686853ebb4b08003cb248615f0834a1e02

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_autos_and_vehicles.json

MD5 39b73a66581c5a481a64f4dedf5b4f5c
SHA1 90e4a0883bb3f050dba2fee218450390d46f35e2
SHA256 022f9495f8867fea275ece900cfa7664c68c25073db4748343452dbc0b9eda17
SHA512 cfb697958e020282455ab7fabc6c325447db84ead0100d28b417b6a0e2455c9793fa624c23cb9b92dfea25124f59dcd1d5c1f43bf1703a0ad469106b755a7cdd

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_internet_and_telecom.json

MD5 36689de6804ca5af92224681ee9ea137
SHA1 729d590068e9c891939fc17921930630cd4938dd
SHA256 e646d43505c9c4e53dbaa474ef85d650a3f309ccf153d106f328d9b6aeb66d52
SHA512 1c4f4aa02a65a9bbdf83dc5321c24cbe49f57108881616b993e274f5705f0466be2dd3389055a725b79f3317c98bdf9f8d47f86d62ebd151e4c57cc4dca2487c

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_pets_and_animals.json

MD5 5b26aca80818dd92509f6a9013c4c662
SHA1 31e322209ba7cc1abd55bbb72a3c15bc2e4a895f
SHA256 dd537bfb1497eb9457c0c8ecbd2846f325e13ddef3988fd293a29e68ab0b2671
SHA512 29038f9f3b9b12259fb42daa93cdefabb9fb32a10f0d20f384a72fe97214eff1864b7fa2674c37224b71309d7d9cea4e36abd24a45a0e65f0c61dc5ca161ec7c

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_online_communities.json

MD5 37a74ab20e8447abd6ca918b6b39bb04
SHA1 b50986e6bb542f5eca8b805328be51eaa77e6c39
SHA256 11b6084552e2979b5bc0fd6ffdc61e445d49692c0ae8dffedc07792f8062d13f
SHA512 49c6b96655ba0b5d08425af6815f06237089ec06926f49de1f03bc11db9e579bd125f2b6f3eaf434a2ccf10b262c42af9c35ab27683e8e9f984d5b36ec8f59fd

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_books_and_literature.json

MD5 df96946198f092c029fd6880e5e6c6ec
SHA1 9aee90b66b8f9656063f9476ff7b87d2d267dcda
SHA256 df23a5b6f583ec3b4dce2aca8ff53cbdfadfd58c4b7aeb2e397eade5ff75c996
SHA512 43a9fc190f4faadef37e01fa8ad320940553b287ed44a95321997a48312142f110b29c79eed7930477bfb29777a5a9913b42bf22ce6bb3e679dda5af54a125ea

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_games.json

MD5 4182a69a05463f9c388527a7db4201de
SHA1 5a0044aed787086c0b79ff0f51368d78c36f76bc
SHA256 35e67835a5cf82144765dfb1095ebc84ac27d08812507ad0a2d562bf68e13e85
SHA512 40023c9f89e0357fae26c33a023609de96b2a0b439318ef944d3d5b335b0877509f90505d119154eaa81e1097ecfb5aa44dd8bb595497cdecfc3ee711a1fe1d5

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_beauty_and_fitness.json

MD5 0ed0473b23b5a9e7d1116e8d4d5ca567
SHA1 4eb5e948ac28453c4b90607e223f9e7d901301c4
SHA256 eed46e8fe6ff20f89884b4fc68a81e8d521231440301a01bb89beec8ebad296b
SHA512 464508d7992edfa0dfb61b04cfc5909b7daacf094fc81745de4d03214b207224133e48750a710979445ee1a65bb791bf240a2b935aacaf3987e5c67ff2d8ba9c

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_finance.json

MD5 e95c2d2fc654b87e77b0a8a37aaa7fcf
SHA1 b4b00c9554839cab6a50a7ed8cd43d21fdaf35dc
SHA256 384bf5fcc6928200c7ebb1f03f99bf74f6063e78d3cd044374448f879799318e
SHA512 9696998a8d0e3a85982016ff0a22bb8ae1790410f1f6198bb379c0a192579f24c75c25c7648b76b00d25a32ac204178acaccd744ee78846dfc62ebf70bf7b93a

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_law_and_government.json

MD5 80c49b0f2d195f702e5707ba632ae188
SHA1 e65161da245318d1f6fdc001e8b97b4fd0bc50e7
SHA256 257ee9a218a1b7f9c1a6c890f38920eb7e731808e3d9b9fc956f8346c29a3e63
SHA512 972e95de7fe330c61cd22111bd3785999d60e7c02140809122d696a1f1f76f2cd0d63d6d92f657cdec24366d66b681e24f2735a8aabb8bcecec43c74e23fb4f5

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_health.json

MD5 11711337d2acc6c6a10e2fb79ac90187
SHA1 5583047c473c8045324519a4a432d06643de055d
SHA256 150f21c4f60856ab5e22891939d68d062542537b42a7ce1f8a8cec9300e7c565
SHA512 c2301ed72f623b22f05333c5ecc5ebf55d8a2d9593167cc453a66d8f42c05ff7c11e2709b6298912038a8ea6175f050bbc6d1fc4381f385f7ad7a952ad1e856b

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_business_and_industrial.json

MD5 a92a0fffc831e6c20431b070a7d16d5a
SHA1 da5bbe65f10e5385cbe09db3630ae636413b4e39
SHA256 8410809ebac544389cf27a10e2cbd687b7a68753aa50a42f235ac3fc7b60ce2c
SHA512 31a8602e1972900268651cd074950d16ad989b1f15ff3ebbd8e21e0311a619eef4d7d15cdb029ea8b22cf3b8759fa95b3067b4faaadcb90456944dbc3c9806a9

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_reference.json

MD5 567eaa19be0963b28b000826e8dd6c77
SHA1 7e4524c36113bbbafee34e38367b919964649583
SHA256 3619daa64036d1f0197cdadf7660e390d4b6e8c1b328ed3b59f828a205a6ea49
SHA512 6766919b06ca209eaed86f99bee20c6dad9cc36520fc84e1c251a668bcfe0afcf720ea6c658268dc3bbaaf602bfdf61eb237c68e08d5252ea6e5d1d2a373b9fe

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_home_and_garden.json

MD5 250acc54f92176775d6bdd8412432d9f
SHA1 a6ad9ad7519e5c299d4b4ba458742b1b4d64cb65
SHA256 19edd15ebce419b83469d2ab783c0c1377d72a186d1ff08857a82bca842eea54
SHA512 a52c81062f02c15701f13595f4476f0a07735034fcf177b1a65b001394a816020ee791fed5afae81d51de27630b34a85efa717fe80da733556fdda8739030f49

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_blogging_resources_and_services.json

MD5 c82700fcfcd9b5117176362d25f3e6f6
SHA1 a7ad40b40c7e8e5e11878f4702952a4014c5d22a
SHA256 c9f2a779dba0bc886cc1255816bd776bdc2e8a6a8e0f9380495a92bb66862780
SHA512 d38e65ab55cee8fef538ad96448cd0c6b001563714fc7b37c69a424d0661ec6b7d04892cf4b76b13ddbc7d300c115e87e0134d47c3f38ef51617e5367647b217

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_hobbies_and_leisure.json

MD5 bb45971231bd3501aba1cd07715e4c95
SHA1 ea5bfd43d60a3d30cda1a31a3a5eb8ea0afa142a
SHA256 47db7797297a2a81d28c551117e27144b58627dbac1b1d52672b630d220f025d
SHA512 74767b1badbd32cacd3f996b8172df9c43656b11fea99f5a51fff38c6c6e2120fae8bdd0dd885234a3f173334054f580164fdf8860c27cbcf5fb29c5bcdc060d

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_travel.json

MD5 48139e5ba1c595568f59fe880d6e4e83
SHA1 5e9ea36b9bb109b1ecfc41356cd5c8c9398d4a78
SHA256 4336ac211a822b0a5c3ce5de0d4730665acc351ee1965ea8da1c72477e216dfa
SHA512 57e826f0e1d9b12d11b05d47e2f5ae4f5787537862f26e039918cb14faff4bc854298c0b7de3023e371756a331c0f3ee1aa7cebbbf94ec70cdfc29e00a900ed1

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\nikario.exe.log

MD5 5f10caf9a498ac924666a121c4b9c7d5
SHA1 f1e58e157b3fdffab2addc930918dd78c0020535
SHA256 71ad6cc77afd5f7b1e21f9d5946363ebe61662b4dab23d232c5d5d0c0324eeec
SHA512 7cdcef79f9df361ba030c7b48cfb8c14e10468b0ef07bb03549c1a528e9a61d80f0b4035360e0c376ecd8bc217918d089e133e3c6908f1f0110b8feca9067411

memory/4816-2657-0x00007FFA1AD50000-0x00007FFA1B811000-memory.dmp

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\storage\default\https+++anonfiles.com^userContextId=5\idb\2728594770keeryovtasl-.sqlite

MD5 d6af715172ab8637158dd78ecd8f08f6
SHA1 b9d9b7454324f95c63be28ef9b77ed51928a69f1
SHA256 5bfc88bef1e5d02c5ca3379210551ae310c03c87095ebe545f2fc69fc6931da4
SHA512 751fee0a620c21dafc2373d4c5aec6c265016ab39bbe01c313843332f85df6459266e5cbe042b6d188f7a35bb42dd74915c012583a1283d49235e9fb11304ee7

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\bookmarkbackups\bookmarks-2023-07-22_11_5lvUX4VxtZi9DpjFVZtFkw==.jsonlz4

MD5 e8b3e1f3bb85aeb75ae5fcb3e798158b
SHA1 3f357ac30496aca6ed2644caae8a022b774549c1
SHA256 22b5d59d809830530b77326409cd68abc78602cba31b0f5f263e947cb5b3d441
SHA512 34afdc8ba538494190a4d6ea8e42566babe5e4d88b4a4f8a1cfb4a8608329bb256aa3284d5b36998597935798cdf609abb3f98c144ca291b27a2bb220509b51c

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms

MD5 521dbcafde10228e9c0e20e3495c0846
SHA1 fa910c18ab0a293303874e993e350d1c6478e4fa
SHA256 b43a7f587a0e8c0bd3109068805a7fe54722f4533c9d664f73b6fcd94db60a72
SHA512 fad6e08d443201d5eeecbd8afa0b7af09c8de85d27b972efae98a0fbaf38df571707e147150eb6c5d866162221d3d73750fdbf1b4c722a5a9112cf2f90c5e32a