Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/08/2024, 19:54

General

  • Target

    rama.exe

  • Size

    1.8MB

  • MD5

    6e5042ff1ec6df9aee18f4eea7864524

  • SHA1

    19e4eaaec31c8512b191138a439b6c4c7ba73d18

  • SHA256

    420a1ba2737e39704e52e1ea0c2494d8c232f10e2b40971923959da4708b3b0c

  • SHA512

    ac5c8537bfd0a509ab49911cdf180778e9e47f9f9fb600933b2ba03f939f9bc9834db5a106840382ee648b289cddaf69b55cf969f51b9f89c49c678f1edc202c

  • SSDEEP

    49152:2M3rvEOaXgE3YC8ZtDYYuyVcBUpxOePEEmeweNX9:24E9QiYC2DYscuEEmdu

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

c7817d

C2

http://31.41.244.10

Attributes
  • install_dir

    0e8d0864aa

  • install_file

    svoutse.exe

  • strings_key

    5481b88a6ef75bcf21333988a4e47048

  • url_paths

    /Dem7kTu/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\rama.exe
    "C:\Users\Admin\AppData\Local\Temp\rama.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
      "C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:824
      • C:\Users\Admin\AppData\Local\Temp\1000008001\e737ceb6fd.exe
        "C:\Users\Admin\AppData\Local\Temp\1000008001\e737ceb6fd.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5004
        • C:\Windows\System32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\88A8.tmp\88A9.tmp\88AA.bat C:\Users\Admin\AppData\Local\Temp\1000008001\e737ceb6fd.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:700
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password"
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3092
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd8,0xdc,0xe0,0xb4,0xe4,0x7ffa97e39758,0x7ffa97e39768,0x7ffa97e39778
              6⤵
                PID:2428
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:2
                6⤵
                  PID:4888
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:8
                  6⤵
                    PID:4508
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:8
                    6⤵
                      PID:4436
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:1
                      6⤵
                        PID:560
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:1
                        6⤵
                          PID:1276
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3740 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:1
                          6⤵
                            PID:5860
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4540 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:8
                            6⤵
                              PID:6088
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:8
                              6⤵
                                PID:6096
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1852 --field-trial-handle=1860,i,18003414588618333654,8225964402001882004,131072 /prefetch:2
                                6⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2260
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password"
                              5⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2668
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
                                6⤵
                                • Checks processor information in registry
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:1964
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.0.478225866\1831676892" -parentBuildID 20221007134813 -prefsHandle 1696 -prefMapHandle 1468 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a5bf694-8769-4307-9591-48e60d658196} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 1776 18fff1d2758 gpu
                                  7⤵
                                    PID:2116
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.1.478242823\974961008" -parentBuildID 20221007134813 -prefsHandle 2116 -prefMapHandle 2112 -prefsLen 21608 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0bc61418-0250-40ee-b083-bf18d9846c1e} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 2152 18fff105f58 socket
                                    7⤵
                                      PID:1780
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.2.1424877838\449644872" -childID 1 -isForBrowser -prefsHandle 2984 -prefMapHandle 2980 -prefsLen 21646 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d14b9ab6-4a9a-4986-b5a3-b0f58ee98eaa} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 2996 18f85dddf58 tab
                                      7⤵
                                        PID:4448
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.3.1103291512\186717952" -childID 2 -isForBrowser -prefsHandle 3428 -prefMapHandle 3424 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8bc62a7f-b5b0-48d5-8b4c-f20b6e861ada} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 3440 18f86ccc758 tab
                                        7⤵
                                          PID:3124
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.4.1960885520\2037834240" -childID 3 -isForBrowser -prefsHandle 4876 -prefMapHandle 4864 -prefsLen 26249 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ed100ef-3906-4539-889a-1dfe7b765295} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 4888 18f88acd858 tab
                                          7⤵
                                            PID:5396
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.5.1168708190\2076733528" -childID 4 -isForBrowser -prefsHandle 5048 -prefMapHandle 5052 -prefsLen 26249 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {779b7542-663e-4ac0-8acc-34bac236b349} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 5040 18f88acc358 tab
                                            7⤵
                                              PID:5404
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.6.31744013\343241851" -childID 5 -isForBrowser -prefsHandle 5232 -prefMapHandle 5236 -prefsLen 26249 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b172a555-76c5-413a-b866-c3d83440ac2d} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 5220 18f88acde58 tab
                                              7⤵
                                                PID:5412
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1964.7.1186868383\171008461" -childID 6 -isForBrowser -prefsHandle 5220 -prefMapHandle 5408 -prefsLen 26424 -prefMapSize 233444 -jsInitHandle 1092 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {95595e0f-3be3-4994-995a-d3502babd657} 1964 "\\.\pipe\gecko-crash-server-pipe.1964" 4868 18f89b56258 tab
                                                7⤵
                                                  PID:5992
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      1⤵
                                        PID:4336
                                      • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                        C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2768
                                      • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                        C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5272

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        336B

                                        MD5

                                        0263204b714aa7a5ccc44c82455040b7

                                        SHA1

                                        580cba5e0a8b615f555b5b1ee3ff6998bd71b643

                                        SHA256

                                        f578cf12d8110a6e5027024fc63a1cccdd665343b8ceb62ae0148b878dbb23eb

                                        SHA512

                                        39f365bbc11c658e9ad3a989589533f55ca92a1d4ff8e684403b5d24363d18e4176d62f43e87c456609bc8759e74b92dc85fe15432bb6961ce7fd9a432966102

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                        Filesize

                                        1KB

                                        MD5

                                        617dba8c532247b888d52b3773f70006

                                        SHA1

                                        8adcd0cf75e6a0452d89632a59f4672239b1cca6

                                        SHA256

                                        ca89628013588635fbf4d2d2c0d64e65048f0f91d060f1bee8de69c6fb7c545f

                                        SHA512

                                        65bde66f1c3e88efe3f583544e0d561b03325f58cea07b727559910a6cc17f6f6218a59733bea63d3d927cc270e0f8784075df5ddfee8a177508bc50b972f5dc

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                        Filesize

                                        2KB

                                        MD5

                                        9c7aaf1bf611cf391156e8e813733882

                                        SHA1

                                        c533b0a33d9e0af5c00b85dfc099454491662880

                                        SHA256

                                        441e41ece768aed095623957accab36fcbea6dd50b9c6509d2bb9199ba06b0d5

                                        SHA512

                                        b4beb8f124b19dd3b7780143b4b11f8180116097d6ee4bccfe0114675bb5324a624304ad7c1e2ec4703eadada4d938fcb98d5485d6e238fae8b86701fe785319

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        371B

                                        MD5

                                        48010154a3dbfd39bacba40ddb75fea3

                                        SHA1

                                        f418ec856515f8aedc82e40859a3b37215dff04d

                                        SHA256

                                        2cac22a9f143a2fa55d60f1dc7fce5a7fbc2668385fa7af8a15fcab0a1eedfc3

                                        SHA512

                                        25dbd5cccf4f2f3d00e584d96801bbec2082da5f4f3bf52af6bb5cb6f3fb4098772077f4ca9bb098b8cd9150400e46246e7017c01973ba83054be07ae2ecc600

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        371B

                                        MD5

                                        9ee214a32bd56d88b670a06df6bc5501

                                        SHA1

                                        aa3bd99177690e1997cec5766b0dc0983e0bec3e

                                        SHA256

                                        c7a5d1da66e7eb1b5ac19b82ee0bda4419941b18c42ac574758100f403e9614a

                                        SHA512

                                        664831c400e96acaf5a7172a44fd78daace3070fbc1fe41eccef80ad61e5375d7feae7bba2ab3561a55365e02a330fe50e1e02109645c7714ae537389a673ba9

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        564a3e67929c21dd08e95b7140443a0b

                                        SHA1

                                        9a77b5269926ebced36102b273ad75d0f9d3fb7e

                                        SHA256

                                        42cea72dc31d60970605153b554aab0d5181b739f6b5b5515019dbc7f555f5be

                                        SHA512

                                        75ba08c426dc0e331e9f210c1e279db40d559911cd814a40699af738ce5b8c87ef8589d605a9f424b9f662e3cf23fb49360d5856e7b4379f339f3dd33e96e765

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        198c8f574939f60516dc612ea4fc0890

                                        SHA1

                                        8b1c927695f006ea0777328f01dcb9ae8803ca18

                                        SHA256

                                        d26af5eb7f181857084f50694c51db0c5ebda8ffd384a87f19965f0d5cef73f9

                                        SHA512

                                        70a2ed3287651600e3a567e4d1c34255a7f935db1980b9ccd56d2eed963e8a1fdd5466d814f6db8b31a6c2f9bb3b30cd8e009f3248c64153185109c179875d1e

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        e3b44c24b32640a47df70fcb4687c6df

                                        SHA1

                                        6edc741361e7b2664ea270634cf4f3507ee1ea43

                                        SHA256

                                        db19e51e661422ae8ceff08f0d7fd7bc4980105d4657e34118e0ab63da626614

                                        SHA512

                                        769ecec40f9137c75556193a0c4e73426bb325e3ff4ff757f2eaeed2674a38e38f33e5ce90ba1a11a28d1b0fe0a0725ca123a58804b89a359caa7e35b67fed4e

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        294KB

                                        MD5

                                        8796cd25c7200627b28016094202d772

                                        SHA1

                                        289b155856b22706f16c2b563bf0c68c172386fe

                                        SHA256

                                        03762d1d8fb46e75d120e4c967ef1915c864997a9fd9a2899361d72100e84d9a

                                        SHA512

                                        b0eca936a93ce03d20a64209a07ac2e8cc27196821df687fe949978fb94deaeb06f354c83c502e4240baaabc9352fec0f3082fc933c591f6a72b83c8c919c4e5

                                      • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

                                        Filesize

                                        1.8MB

                                        MD5

                                        6e5042ff1ec6df9aee18f4eea7864524

                                        SHA1

                                        19e4eaaec31c8512b191138a439b6c4c7ba73d18

                                        SHA256

                                        420a1ba2737e39704e52e1ea0c2494d8c232f10e2b40971923959da4708b3b0c

                                        SHA512

                                        ac5c8537bfd0a509ab49911cdf180778e9e47f9f9fb600933b2ba03f939f9bc9834db5a106840382ee648b289cddaf69b55cf969f51b9f89c49c678f1edc202c

                                      • C:\Users\Admin\AppData\Local\Temp\1000008001\e737ceb6fd.exe

                                        Filesize

                                        89KB

                                        MD5

                                        cc86773e8d2f2c3ade17e0b062aecddb

                                        SHA1

                                        5e7790ca0b918b8e74e4e85af0c08f81cb4ade0f

                                        SHA256

                                        51f4ab5d835ea80224cd5ceec0fcd7cbae80ffc1216b3da35c498cf4b01224cd

                                        SHA512

                                        9f5bc37e717063dd0758bbcd77789038aed67b191a0ff23ee6f408a08c9b9992f298643108ed148eacbaaf9322b65acc82f3737e3da664f7a44b96796a1b4350

                                      • C:\Users\Admin\AppData\Local\Temp\88A8.tmp\88A9.tmp\88AA.bat

                                        Filesize

                                        2KB

                                        MD5

                                        4ac6a9d9e192f54598f8b67cf299ea5e

                                        SHA1

                                        c3c63fc731603f581ab71bab7651a4d5112b04e6

                                        SHA256

                                        f1179bc15a8c644c353af64d6c6c3f13fd2d48eed2fb0b709a167185d2ed806e

                                        SHA512

                                        3ff1226c147403aa5afdc515f260849196dec92166273206256ce8437a98dc1dd3b2cf913861e7537ccf36d6bc53537bd49b600e9adb1671f4bdb3d6e3da23a5

                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                        Filesize

                                        442KB

                                        MD5

                                        85430baed3398695717b0263807cf97c

                                        SHA1

                                        fffbee923cea216f50fce5d54219a188a5100f41

                                        SHA256

                                        a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                        SHA512

                                        06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                        Filesize

                                        8.0MB

                                        MD5

                                        a01c5ecd6108350ae23d2cddf0e77c17

                                        SHA1

                                        c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                        SHA256

                                        345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                        SHA512

                                        b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\datareporting\glean\db\data.safe.bin

                                        Filesize

                                        2KB

                                        MD5

                                        663dfd0f491e13879d0f057f4bd7376b

                                        SHA1

                                        b2755371abbd09f93ef4c32519b00da85ea3b262

                                        SHA256

                                        d902c7b393a7715969c9e1374466c2508045bd3a82bc262249d7e83f56a56fab

                                        SHA512

                                        86066577dccf9d446b7de878f92cc2a9d4d5c25654f1d3d35fa38e31f57cd8b0c437fcec5ec522086594b6f372260c4d42f96d966ea64d28ecec62916f7eaf93

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\datareporting\glean\pending_pings\2609f8b5-17c3-412b-9b70-eaaa72440aff

                                        Filesize

                                        746B

                                        MD5

                                        c242e4f577ab04d031ba32802fe2eb67

                                        SHA1

                                        55017e152ee1714b0eb9bb76900e7d923a57fcdb

                                        SHA256

                                        2f4af955c0b4038d57c2bd3eef9b4922b55f22a6cc6251b1bda3d368e971917b

                                        SHA512

                                        a9a97cf0bc42408021560c4e78706a22cc531721f56438f472c15c3602f6293af9cd9131d61ee7db8cd6c6dee015d8434ba5cac4afa17730867fde94f023acae

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\datareporting\glean\pending_pings\7fa5904d-003c-4008-a67e-101644a793a8

                                        Filesize

                                        10KB

                                        MD5

                                        c9fe950ad5a58ca7df2532063fd52666

                                        SHA1

                                        e87ed8d40ac532bad5ce6fba623fbb06185e80f5

                                        SHA256

                                        39e59e7394b9254aa467aa61c05d85fe4e53ca3164303c502530c2ceba53c77c

                                        SHA512

                                        8dbfe30a674dbc0ffa701f3f77978514715f8da01bd47e46f7aa3ef8d10a285ebc7a4c624a6b981b74f504ac0c83a96aba9ad2aefaefedeccbd03d531befbdbb

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                        Filesize

                                        997KB

                                        MD5

                                        fe3355639648c417e8307c6d051e3e37

                                        SHA1

                                        f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                        SHA256

                                        1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                        SHA512

                                        8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                        Filesize

                                        116B

                                        MD5

                                        3d33cdc0b3d281e67dd52e14435dd04f

                                        SHA1

                                        4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                        SHA256

                                        f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                        SHA512

                                        a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                        Filesize

                                        479B

                                        MD5

                                        49ddb419d96dceb9069018535fb2e2fc

                                        SHA1

                                        62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                        SHA256

                                        2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                        SHA512

                                        48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                        Filesize

                                        372B

                                        MD5

                                        8be33af717bb1b67fbd61c3f4b807e9e

                                        SHA1

                                        7cf17656d174d951957ff36810e874a134dd49e0

                                        SHA256

                                        e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                        SHA512

                                        6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                        Filesize

                                        11.8MB

                                        MD5

                                        33bf7b0439480effb9fb212efce87b13

                                        SHA1

                                        cee50f2745edc6dc291887b6075ca64d716f495a

                                        SHA256

                                        8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                        SHA512

                                        d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                        Filesize

                                        1KB

                                        MD5

                                        688bed3676d2104e7f17ae1cd2c59404

                                        SHA1

                                        952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                        SHA256

                                        33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                        SHA512

                                        7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                        Filesize

                                        1KB

                                        MD5

                                        937326fead5fd401f6cca9118bd9ade9

                                        SHA1

                                        4526a57d4ae14ed29b37632c72aef3c408189d91

                                        SHA256

                                        68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                        SHA512

                                        b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\prefs-1.js

                                        Filesize

                                        6KB

                                        MD5

                                        57d49adc916249154b5d6bde8176d576

                                        SHA1

                                        5ebfab1f01f7dec5e866551dd63e5a5030a0c911

                                        SHA256

                                        84e89a235e6160e5a4964baaa14502049b53e78658a09319b2b0bd0acd2259d6

                                        SHA512

                                        73f450238bc93b08406e5c2468b2532ca6f96e5e377cc0b7edeecbe832e5235bd214e0fdf1b55cc88478ccc3575a54d12481e2b9d9e36b2cf87c4ecc6d974cbd

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\prefs-1.js

                                        Filesize

                                        7KB

                                        MD5

                                        228009da8525eadc341cfcebab95f84f

                                        SHA1

                                        b69c24ced6c36d4ee8c70bfbea5c780a0d2b4e77

                                        SHA256

                                        d613b86201101506bb4f7288b7b69c3b407075144216892f84da81947aabab86

                                        SHA512

                                        b776317db04d01705b7a45fd69fbefc75a84e83b6caaff16587e285d5004711f33a0f0a156016e4ee63ea354583ae278b6ab5b24709559397a819a8c2e67465c

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\prefs-1.js

                                        Filesize

                                        6KB

                                        MD5

                                        edf3099ff68bea98eb3051110ed28c06

                                        SHA1

                                        cc9d1b84643143fcde03108979c0b3c7ad31cea2

                                        SHA256

                                        379c01dfd1bc481b66d8fcc7e0479512080e227d92358faaf1f4ed07a9578f07

                                        SHA512

                                        2829681689a1de44cde975f48015f56a5d610df76e37858ddf34086ddf4f18090e1eaeb56c7b2d7bb1a8501087fbcfc644139f8f9be08294da5ca72f4987ea99

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\prefs.js

                                        Filesize

                                        6KB

                                        MD5

                                        58f60148e4d61828b777e75506e53689

                                        SHA1

                                        13ff6ee6a19740da3401a1419803f54c3e773a16

                                        SHA256

                                        7b28cdd32011be8a96b2b74611838ce659e810aa65f57b01a5771bd118a88ff1

                                        SHA512

                                        003fb201160c1661225201c0d0889a89ea560bb56ee013ec289a4eb992dde69c96369706d46994dce0e1d568e1c4f42e1ca20df75b675c2667210e3fb0f88f6a

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\sessionstore-backups\recovery.jsonlz4

                                        Filesize

                                        4KB

                                        MD5

                                        0cf53f99c56eada06e104807cff828d2

                                        SHA1

                                        a1082063d90eadd4747d4c529056b3a0bfdc1a85

                                        SHA256

                                        20d7c22db0a229211155ae2b91d585af6c7751a98730e61b9f6e165fd35e5a81

                                        SHA512

                                        1e62075e6ca0931ff6c38fec9274c7a24bf883e87b430aed6e158e6a2f18fad1073be9fee0e3c8d4b8c775eb3b44e2c47a77b1accf66f8cc0b67b3bf185a9ebd

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\sessionstore-backups\recovery.jsonlz4

                                        Filesize

                                        4KB

                                        MD5

                                        a04756c71725e06e87f1cd72928626b0

                                        SHA1

                                        7b96f2fa008f046f0f5f8edd81e8130ec494bd72

                                        SHA256

                                        8252acca55fc3131cdfde6c035ac6540105c4c1de6a3424709df66d0241b41ee

                                        SHA512

                                        82bbcae2120d257f9ec7cc353e119f1eb76ab4eb565de93b0aa49943955dad403753ad1db586e5e63fa312a6429645971db36457941c45f3372c2c5117cee4b8

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                        Filesize

                                        184KB

                                        MD5

                                        a4627d94b477e3f653435fcf27e2663d

                                        SHA1

                                        d5dc31c0165277e469d92453c556786995e2800d

                                        SHA256

                                        7c1ea6cee0386d6af3cb7523167c2b880592657ceacc4e56edbc2394575c5c69

                                        SHA512

                                        7619d8f8f790c6b47faa75eb3f834640fe6ab684209f2eeb6eff26017c7ebb44972018463bb15d0e7955bed5bde4ebff809754b3c2057d7749bafe82dbe48455

                                      • memory/824-372-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-354-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-203-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-405-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-386-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-257-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-19-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-18-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-17-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-16-0x0000000000F91000-0x0000000000FBF000-memory.dmp

                                        Filesize

                                        184KB

                                      • memory/824-378-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-204-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-339-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-14-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-349-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-197-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-357-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-377-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-376-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-237-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/824-373-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2768-283-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4920-3-0x00000000003F0000-0x00000000008AF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4920-5-0x00000000003F0000-0x00000000008AF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4920-13-0x00000000003F0000-0x00000000008AF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4920-0-0x00000000003F0000-0x00000000008AF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4920-2-0x00000000003F1000-0x000000000041F000-memory.dmp

                                        Filesize

                                        184KB

                                      • memory/4920-1-0x0000000076F94000-0x0000000076F95000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/5272-375-0x0000000000F90000-0x000000000144F000-memory.dmp

                                        Filesize

                                        4.7MB