Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 18:10

General

  • Target

    file.exe

  • Size

    1.7MB

  • MD5

    a701ff816a94c1e54f8b2175d9fcfd19

  • SHA1

    10d6f38310770edf01970e9572a111377c21d829

  • SHA256

    9d52d6333a4b985ec7d0baece9f1c0c99c1cf4ea503f7b8bbce0fe38694d0a32

  • SHA512

    ee1aa73fad205b7af497d8b6e9635b741ad3b487ae57d7572218c4f571515529a380f443d7cf80658e89f56ab41c91d7ab0eba25c2f2212b72d11e5bf9a7f070

  • SSDEEP

    49152:VJsTOoPfF0soK6KfVOBOHWGguR42KXFLhVwc5pxhTdQ:TkOahPltk2yu+VvwypfdQ

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 13 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 11 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
      2⤵
      • Uses browser remote debugging
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc801bcc40,0x7ffc801bcc4c,0x7ffc801bcc58
        3⤵
          PID:3492
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1904 /prefetch:2
          3⤵
            PID:212
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:3
            3⤵
              PID:2024
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1852,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2284 /prefetch:8
              3⤵
                PID:2556
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:3428
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3364 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:2860
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4636,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4584 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:2288
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4760,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4792 /prefetch:8
                3⤵
                  PID:1768
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4680,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4812 /prefetch:8
                  3⤵
                    PID:5064
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                  2⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  PID:920
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc801c46f8,0x7ffc801c4708,0x7ffc801c4718
                    3⤵
                    • Checks processor information in registry
                    • Enumerates system info in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2596
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:2
                    3⤵
                      PID:2816
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1212
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:8
                      3⤵
                        PID:4140
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                        3⤵
                        • Uses browser remote debugging
                        PID:3960
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                        3⤵
                        • Uses browser remote debugging
                        PID:3216
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                        3⤵
                        • Uses browser remote debugging
                        PID:3620
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:1
                        3⤵
                        • Uses browser remote debugging
                        PID:4516
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsDAAFBAKECA.exe"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:3812
                      • C:\Users\Admin\DocumentsDAAFBAKECA.exe
                        "C:\Users\Admin\DocumentsDAAFBAKECA.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:208
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Adds Run key to start application
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3124
                          • C:\Users\Admin\AppData\Local\Temp\1008816001\82da05e945.exe
                            "C:\Users\Admin\AppData\Local\Temp\1008816001\82da05e945.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Checks processor information in registry
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4448
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                              6⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of AdjustPrivilegeToken
                              PID:872
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xdc,0x104,0x7ffc80c1cc40,0x7ffc80c1cc4c,0x7ffc80c1cc58
                                7⤵
                                  PID:5256
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2284,i,13384106732259456239,10803818240989208819,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2276 /prefetch:2
                                  7⤵
                                    PID:5608
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1724,i,13384106732259456239,10803818240989208819,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2332 /prefetch:3
                                    7⤵
                                      PID:5612
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1900,i,13384106732259456239,10803818240989208819,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2448 /prefetch:8
                                      7⤵
                                        PID:5624
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,13384106732259456239,10803818240989208819,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:1
                                        7⤵
                                        • Uses browser remote debugging
                                        PID:6056
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3204,i,13384106732259456239,10803818240989208819,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3280 /prefetch:1
                                        7⤵
                                        • Uses browser remote debugging
                                        PID:5904
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4644,i,13384106732259456239,10803818240989208819,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3652 /prefetch:1
                                        7⤵
                                        • Uses browser remote debugging
                                        PID:4768
                                    • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                      "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      PID:6108
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:5760
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 1292
                                      6⤵
                                      • Program crash
                                      PID:4260
                                  • C:\Users\Admin\AppData\Local\Temp\1008821001\b9109a6886.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1008821001\b9109a6886.exe"
                                    5⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2384
                                  • C:\Users\Admin\AppData\Local\Temp\1008822001\7059f8aad9.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1008822001\7059f8aad9.exe"
                                    5⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1452
                                  • C:\Users\Admin\AppData\Local\Temp\1008823001\f4761c225c.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1008823001\f4761c225c.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:3672
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM firefox.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3088
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM chrome.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1116
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM msedge.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1852
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM opera.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:852
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM brave.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4460
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                      6⤵
                                        PID:1628
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                          7⤵
                                          • Checks processor information in registry
                                          • Modifies registry class
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of SetWindowsHookEx
                                          PID:224
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2012 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fa23589-a927-4e88-9fdc-3441a7085c95} 224 "\\.\pipe\gecko-crash-server-pipe.224" gpu
                                            8⤵
                                              PID:1568
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {98d6a234-9133-4a31-9a65-22ec1a0b1e83} 224 "\\.\pipe\gecko-crash-server-pipe.224" socket
                                              8⤵
                                                PID:380
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3268 -childID 1 -isForBrowser -prefsHandle 2812 -prefMapHandle 1800 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a83a91a9-70df-4e39-b81d-c961e5be1d61} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab
                                                8⤵
                                                  PID:2580
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3628 -childID 2 -isForBrowser -prefsHandle 3620 -prefMapHandle 3616 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {58b89a89-820c-4f55-828f-2a8d249c12b7} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab
                                                  8⤵
                                                    PID:1496
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4740 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4736 -prefMapHandle 4732 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4898eaec-27b7-41fa-bca8-d1135e1f7b64} 224 "\\.\pipe\gecko-crash-server-pipe.224" utility
                                                    8⤵
                                                    • Checks processor information in registry
                                                    PID:5196
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5368 -childID 3 -isForBrowser -prefsHandle 5388 -prefMapHandle 5348 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {967fee2b-9391-47e5-a02a-a77c9df48743} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab
                                                    8⤵
                                                      PID:5896
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 4 -isForBrowser -prefsHandle 5504 -prefMapHandle 5404 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3dbe36fd-7357-4375-8120-e2614ed1e157} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab
                                                      8⤵
                                                        PID:5908
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5696 -childID 5 -isForBrowser -prefsHandle 5704 -prefMapHandle 5708 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a2043bd-6675-4194-a9fa-3743002c81e5} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab
                                                        8⤵
                                                          PID:5920
                                                  • C:\Users\Admin\AppData\Local\Temp\1008824001\e031295939.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1008824001\e031295939.exe"
                                                    5⤵
                                                    • Modifies Windows Defender Real-time Protection settings
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Windows security modification
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5824
                                                  • C:\Users\Admin\AppData\Local\Temp\1008825001\boARaXv.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1008825001\boARaXv.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4508
                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                            1⤵
                                              PID:5016
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                              1⤵
                                                PID:1784
                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4108
                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                1⤵
                                                  PID:3580
                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5492
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4448 -ip 4448
                                                  1⤵
                                                    PID:3332

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\ProgramData\mozglue.dll

                                                    Filesize

                                                    593KB

                                                    MD5

                                                    c8fd9be83bc728cc04beffafc2907fe9

                                                    SHA1

                                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                    SHA256

                                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                    SHA512

                                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                  • C:\ProgramData\nss3.dll

                                                    Filesize

                                                    2.0MB

                                                    MD5

                                                    1cc453cdf74f31e4d913ff9c10acdde2

                                                    SHA1

                                                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                    SHA256

                                                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                    SHA512

                                                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    40B

                                                    MD5

                                                    800547b40b40a6d57a70b74809b450fa

                                                    SHA1

                                                    310a064c7ba82120f80af50892dcbe61b53f9d70

                                                    SHA256

                                                    a562ff4b14badc73b0804883bf4ccfd9972e485123de5e5949981794f66ed936

                                                    SHA512

                                                    39630e3b5069d0c66ea44069358cf01f180bf25103968f77d483a27deb7e91e796a1718ce9af2f438bebe8207537e735cd402d649e2adfa2ca7748faae2db949

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7eaccb1f-171f-44b3-a6cc-18a2f72ed360.tmp

                                                    Filesize

                                                    1B

                                                    MD5

                                                    5058f1af8388633f609cadb75a75dc9d

                                                    SHA1

                                                    3a52ce780950d4d969792a2559cd519d7ee8c727

                                                    SHA256

                                                    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                    SHA512

                                                    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                    Filesize

                                                    649B

                                                    MD5

                                                    c9413a6f2b1eaadd900c479277b31ed7

                                                    SHA1

                                                    5052c2e13d4d8de5a49fdd4c2c6d44e63754cdc0

                                                    SHA256

                                                    3720de782aeecb4fccb34c4f091148d27dde4fced29f3d8bfe0666f1ad25fcfc

                                                    SHA512

                                                    689210816a39ee807db0aa2ac007191b67e1cc2e48959e984c646055f59c720433b5670f7077f882ca48ba77e70b64408b905be45b848e64baf49834e82311de

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0

                                                    Filesize

                                                    44KB

                                                    MD5

                                                    9063d8bfd1ee460cd5f2a209485fa66c

                                                    SHA1

                                                    0afd8138f9795640956624e7d00419f5c16c35f7

                                                    SHA256

                                                    2c05f905205eb0f5d7d8acc160c53d6f5192f4768d5c1a9d7d295337f742f6f4

                                                    SHA512

                                                    1a849cce6a94760dae8162eeb228e32d1565f24ce43e273f063a71c03c7a17568a98e8f67dfbb898d0d6565c61740b61924769452b51e35748bca21f9f2d7848

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    bc31dd98c62bd5fe8b60e210c7f15295

                                                    SHA1

                                                    6a57af508cb2a41d111a523d2838db079aae8370

                                                    SHA256

                                                    807df9826cbcb18bfcb77714451aadbc1603c126988f1f2c3e5c1a1093f3e008

                                                    SHA512

                                                    77f686d0b0715e574c39151428e031c38eef5dbf73819cf043a67955b142aa7eed08cad02a1b0e60a26493a38b9326f099107e46c2546a5a6fb81c73d75d4597

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3

                                                    Filesize

                                                    4.0MB

                                                    MD5

                                                    7c2add234aaaa10e08d17d8869c753ea

                                                    SHA1

                                                    796d21d32467c36fe4e3be8791b9ee7311d7d037

                                                    SHA256

                                                    914728830a47cb01a0411067f8fa9f368972d7f8682bf9729210e62adb6ba071

                                                    SHA512

                                                    feb8ba2f4ee5353577859f64010e5a6ef3ac2a22107677495216111c83367b424aa1c44647b68225fb81e5c78a66d9b66b0e32c912da08fcf66e6fd12529d38b

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG

                                                    Filesize

                                                    317B

                                                    MD5

                                                    a2cf9277da6afff2e4c52ee37dd3221f

                                                    SHA1

                                                    b9bfe249d3fdc1079e5d8ab60e4e5374d5aa7356

                                                    SHA256

                                                    309cd17ef4e2a394f58e72fc695eeb589584ba60191dcb39c37b376358045223

                                                    SHA512

                                                    a27ce47ed91363fb8d2d683134bb219f54e9c4841f4f391fe9f7d0e6d828ab135512ad2859ccac368ea5b20eb255ff944a688f8096fb5d840e7ec6b28d436e69

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0

                                                    Filesize

                                                    44KB

                                                    MD5

                                                    7406c5edf0ca60b700c825e9a4fb935e

                                                    SHA1

                                                    794aac0c753dc733bc0e244f852413e11787b13b

                                                    SHA256

                                                    c4419abfaa08549c6f619bf46b53903d92294b883afdd1e2a0bd8db12cc6f542

                                                    SHA512

                                                    21bd544cb04b9b6ee4d9e42d016a736b0a0cc9fe2dd9e409aaaae8c5c49333a74cf4d515395f364a9d67eb97f90b3141e8308bcb497f07ed87efbca7c6d027c5

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    9a4b923af6765501424e33f6d6dbea0f

                                                    SHA1

                                                    2e152ec3c33449bd42bf605b7c872b3c50b70cd4

                                                    SHA256

                                                    f7ad6354b0c0ff850e75def060a2f1997da53201c6658c9e0ac833f6526f7059

                                                    SHA512

                                                    61b7606f932f65ca5b16de30412b47903cd241d1a57935bb0b38e2a3d3f0c14aa8438c384268a6d76b47b0937e524262f944bdb1182f6a098d00f2e0ffbf82e6

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2

                                                    Filesize

                                                    1.0MB

                                                    MD5

                                                    fe993339a25710ebec86c051941d462c

                                                    SHA1

                                                    1a7a578b7a32bbe2102a789c2321090d406838d1

                                                    SHA256

                                                    59ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443

                                                    SHA512

                                                    b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_3

                                                    Filesize

                                                    4.0MB

                                                    MD5

                                                    d6b0609c4b6edb45553ff9afbfc95e33

                                                    SHA1

                                                    2697657b75906d3653f48080ec1f3993c07bd8bf

                                                    SHA256

                                                    eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e

                                                    SHA512

                                                    db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                                    Filesize

                                                    329B

                                                    MD5

                                                    06089ed7726a900b94b048c9b635dc17

                                                    SHA1

                                                    7df94bff13465a729e254b426966945f9435bacd

                                                    SHA256

                                                    3548fced1a1021317e54640d7a76f283e833ac4677ca0dc95eb7dd698f9ea09c

                                                    SHA512

                                                    e018216906dfc51cf17bee3ad9695cf589d6081c4412e6b91fcf98749fa27f1c7af4b2e58b14222ac81b5406e74ef7398806280880dd3e45a70a4ee31bda8dfe

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    e58ae855e22313b8e85c3266970d9921

                                                    SHA1

                                                    0cf2914a55a86f0b61cdc445ba5a1bca3691c2c3

                                                    SHA256

                                                    40b7482f96c1f0d82a2d81b78f11d3cd9a35dc4ce3c3fccb54f4e6d2ff16951e

                                                    SHA512

                                                    ff5521e5b52285720751614f8f04c3bbeb48392aad264fb7633411a77a898606f997feec699c003bbb1ee5ff043ed7e6cc15c5190601477d21c3936a492bbf71

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                    Filesize

                                                    354B

                                                    MD5

                                                    96dee4b1a01dd249c19340fbabb8575e

                                                    SHA1

                                                    f9cd0945ed2f204cd67ce80321229cf5b41e20d1

                                                    SHA256

                                                    0159c08d2671b308e59fc2aec5ec6c3ab388cafce43906997c02f3e1779eab79

                                                    SHA512

                                                    fb7efc043d2043915a9ffca9c2a8ef919793bae3e26474e4eb0db1ebeaa85ada5d3b50347d9fa1201a7a1e81f8425844e445d837a3a345c313f03ff2b050edfb

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG

                                                    Filesize

                                                    333B

                                                    MD5

                                                    7e51dabfe30515b29b5be0051b07f194

                                                    SHA1

                                                    e6e0c0cbaf66537d46465d5ccf49750cdeee9959

                                                    SHA256

                                                    ea4927ac01d486a0b56567ae56258e07ae1306b115e3958fb5c3a0ce1795097b

                                                    SHA512

                                                    49fc5a138e579de9f60d775d2d319f314eab95ec61f7dd241e409e3050a08144f6f3b2ec3a21b6072830b6961f523c3d95c3c2556a9ea33d3ef3881d42734c92

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.log

                                                    Filesize

                                                    308B

                                                    MD5

                                                    4e7982b86b3d7d916b7722aa3b3f0669

                                                    SHA1

                                                    ce4e874903cb71d9012cc7654ca7a6ba5e4f7efd

                                                    SHA256

                                                    cbee1100a2c9add47776b7e416b58a809f6feb9fe458bef8185b0c176b5db340

                                                    SHA512

                                                    c4dda8b36e90a327061dab901730f47fc23cca129b02a157f1ed0c566a1d6dddf272a4e74d3acbf14eb3a7fac0820387a584db9e19ca299724ed7f3030f891bb

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG

                                                    Filesize

                                                    317B

                                                    MD5

                                                    61b717a814f8df1cb9a9a832435d8447

                                                    SHA1

                                                    cb616747feeae3dd600df160f9e8e7d7151379ee

                                                    SHA256

                                                    314d2089bc41605a75502660e09f782394d5e80e960e7500f5ecf3d52f23bd65

                                                    SHA512

                                                    50731f9c937671c09d4303091b78484ee7925d0153f7b39fc26487c6837004dc699e1a501b7ac80376f3086eb4d705989f369aed1b54635ba1dbd38f99bdd565

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                                    Filesize

                                                    348B

                                                    MD5

                                                    07996f03e0ccdb33a08cee240f4419aa

                                                    SHA1

                                                    694d4a9efa483da094750e455c03a2def1ce5abb

                                                    SHA256

                                                    5c05ca812d1a770ab6455a42155d6699621377211f3f64e8e0d1d4492dc71d43

                                                    SHA512

                                                    893369ebbbf8db601627eac0477552fac25102ab20d35d927df1511c726e631bfe341723501d7bf4fd047779453e47bbc617ab5478395e80bb064c7e1cbaaaa9

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                                    Filesize

                                                    321B

                                                    MD5

                                                    5011eb37d7f5f58774a028bd4c75e4cc

                                                    SHA1

                                                    0fc75fdba7e58def30f90e49b174c622bc0581ac

                                                    SHA256

                                                    566fa4675465545a8f00a33091a2c6d0fce5ab4789b52e2ef33c0cc97042147d

                                                    SHA512

                                                    ef1a03bb6a87818ef7b351e319da44d938ad417a2404cbf37108cab81f588803ca1c692aa02952da6447a8eb13170a01330f9bd855bd998b2fecbf5ade2151ca

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager-journal

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    84332f16ffbd05320cdb851f941484bb

                                                    SHA1

                                                    1bff38e59c5857d5e57561d2ba66a931ad859268

                                                    SHA256

                                                    8fff74bb61683e92483ffc2e62ececd07f6266b1d17302cbb57ea17da1c65469

                                                    SHA512

                                                    469d4e74667cf75430cd39e657b3bc3dd363e1591becf47763ddc88f99b0bbe903e913410bd1660b99377e60c764a49648eb24fdeed73c456c99060b1191f899

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    20fca59dba0087612d7d9dcf06f3b811

                                                    SHA1

                                                    ec34a9b5c61bd67e1a00d15e1a125271f692af74

                                                    SHA256

                                                    edab0e44592f706a89f3cc23ffd2c6070e0a7bc855071c06fc3f299bb0abc9f3

                                                    SHA512

                                                    def26beeba2c1f947d60074d44f743845ef87a389ad25f6641b52ec97737b65b18e484eeca10a34506dbe1b25d20293a49305927a6a51d26b4eed336d787681b

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                                    Filesize

                                                    317B

                                                    MD5

                                                    c94d887239d12edb1c26e6e38b5d32c2

                                                    SHA1

                                                    ee294ac9e7b12bef77a3ecc767636101add69d8d

                                                    SHA256

                                                    91fd05e6e9d4c5d2d9547edda1083063c3b44eeefc0eb6d5c67b47670bcbce62

                                                    SHA512

                                                    90725b7ef0a305241762757ca12cbfb3485b3e902929c4049d35d434562c044963f2b0d292af7339cd806731cf0b3ae27eca767debe40871f1013ed47e18ee7f

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.log

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    5d4170fc4610647c9841057aa0e7102d

                                                    SHA1

                                                    517090b546695c52b79fa9af0c29d85c6dfebda8

                                                    SHA256

                                                    d005782c29b049ed6c52e95c70c873d491297e6ee36b2a269b162099f80f5e09

                                                    SHA512

                                                    9b83aca1983d2c329b9b894d3e5378fb1e674b2d8f1b97b25edc9c4fc993d1bb087434d9dd0522f05726d1c9d57024fe25391ddcbb5ae90cc7d735aeaf0ccd2e

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                                    Filesize

                                                    335B

                                                    MD5

                                                    f45886b1d72d24184f7683b06fe2cd50

                                                    SHA1

                                                    27a420899ab200dde79c3aaf6994e1c7465ed4e0

                                                    SHA256

                                                    be27d6a195b282df262aa9fec821fd4a04e9663e0c3c4bb353ea971a77c6bd59

                                                    SHA512

                                                    0b36eb8483672a198bbccc57901c27715913a1411daacd5efae5543ff0c51946685c0ad8c3aee4809b82ba599e8ba003e148c0af35c43e6fca29784b9ee5cf0c

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0

                                                    Filesize

                                                    44KB

                                                    MD5

                                                    b3efded82ef6232998957b06a1f124cc

                                                    SHA1

                                                    2828d6e43d9e9011ce51848f83061ae06d6c50ee

                                                    SHA256

                                                    d0b700530abe4ab314ff72d0ebf2f3b2a4ad77ed3023a92d2111d05ed0b9ac1f

                                                    SHA512

                                                    1a5f4f98bb4a1ab8c76b10fb0f17f22c4804d5c94bbeeca8111604a55964420d4a8c83032379901ac1cac67c1e178cb4e8e637e102c3b1b3619b4169b4ce3dfa

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    07a66a574f38c7e441b78221b47207d0

                                                    SHA1

                                                    8c5ca5037427f3f0dce0569a4240248d820fbfc1

                                                    SHA256

                                                    d8564fb884946ca93204d8e6d0682f57a2aa39bd5af5e874f25dbba6fbf3213e

                                                    SHA512

                                                    6e021f2dd8334b33b96f8e498b0e2ba5936f704d4d760364a16092c5d39fa77bc8d5c3731fd88e092eb93a69f81bd32bd9523a96be4b6b82a746caecf2935798

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3

                                                    Filesize

                                                    4.0MB

                                                    MD5

                                                    e39f95ae48a87705c07abeae9503e503

                                                    SHA1

                                                    7780349ff35b9620ac9cfbcf777e193c57b12802

                                                    SHA256

                                                    509e3fcd7404238039ff0030133c191fbd2fe48cf8e7295a796b18cc958b2d75

                                                    SHA512

                                                    9e91d63ee8b4812e0c59572cff2b7e88f0f816de5b5a36201ca39c633ef8a019af4f0ec456c545ed4614b82f84e6e16d160337be9fede0b5865a1152d2b7cfeb

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                    Filesize

                                                    14B

                                                    MD5

                                                    ef48733031b712ca7027624fff3ab208

                                                    SHA1

                                                    da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                                    SHA256

                                                    c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                                    SHA512

                                                    ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                    Filesize

                                                    86B

                                                    MD5

                                                    f732dbed9289177d15e236d0f8f2ddd3

                                                    SHA1

                                                    53f822af51b014bc3d4b575865d9c3ef0e4debde

                                                    SHA256

                                                    2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                                    SHA512

                                                    b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    37f660dd4b6ddf23bc37f5c823d1c33a

                                                    SHA1

                                                    1c35538aa307a3e09d15519df6ace99674ae428b

                                                    SHA256

                                                    4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                                    SHA512

                                                    807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    d7cb450b1315c63b1d5d89d98ba22da5

                                                    SHA1

                                                    694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                                    SHA256

                                                    38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                                    SHA512

                                                    df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    f2fcbf9b608f63ac2bae98bcc77b75ba

                                                    SHA1

                                                    f19f7c184ba876e832b54443e788cce2216aeb8e

                                                    SHA256

                                                    aef8625999dab73ae0b2768e02901e4c566363dc1453f15796f743e79a80fa37

                                                    SHA512

                                                    0e9d420e5304a59070a9381a0ef0ebfc7bf5be3c52d0bda4047e1783796d4d9f66b504e205f1469da023c890767c549367b43c61fbc186c152899b76962d699e

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json

                                                    Filesize

                                                    19KB

                                                    MD5

                                                    a737d596182a3914a0123bc01a815864

                                                    SHA1

                                                    d8a3f2346f1f4b3598cd2c9773491e9fc4b04fdc

                                                    SHA256

                                                    ca573285a0da49717bbbe7b188ff1d9031e48259b097d621de2221d867cbfaf4

                                                    SHA512

                                                    e6e57fb4cd987b0576376ebc34fb1067eb82465290302b3ee38b1a7775ca53bec85a92c39805539e0d87a063a8e23f57b2dc99585d8ab903664d3455debf7569

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                                    Filesize

                                                    13KB

                                                    MD5

                                                    6f323f03642f9627dcfaeed81e40572c

                                                    SHA1

                                                    31dcecf6346977673b9c3ebdc66169373c8e5143

                                                    SHA256

                                                    0e841fdf27252955fd4c9491ac2bb0f47ace6268868a9930b79db737ba938c98

                                                    SHA512

                                                    98039505cc146d6cec999f5fa01aaa1b686de5781d3dcd7d0b6eb0c349b327437fa2c20b5261d36d9815c9b8d93ee0797d7c71fa55ce286e8a72a827b2e81e0b

                                                  • C:\Users\Admin\AppData\Local\Temp\1008816001\82da05e945.exe

                                                    Filesize

                                                    4.2MB

                                                    MD5

                                                    3b098936d2ba04149e255a50f61b5415

                                                    SHA1

                                                    271d4427a66a5169e0928535dc93b230fafdd916

                                                    SHA256

                                                    b67cb8c91c159ad18db1de834b32e3d17c42f6b595762905c015eba800b93a3b

                                                    SHA512

                                                    810e6b83732f7c3426768348390cde9c5b3ffecf958edc832982475c91bfd5747960477270c7594dd01d310c436ec1da51f277dff5bf6b58d1c13b28d8042d7f

                                                  • C:\Users\Admin\AppData\Local\Temp\1008821001\b9109a6886.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    30ac2811f15dd4a4d830235681c124f6

                                                    SHA1

                                                    2ed722e15cd0d8c29bd024d486db4662c859a38a

                                                    SHA256

                                                    6f41c9632c76b5e8dd707ec555d72b71b3d1c0527d66992466a515a62240e06e

                                                    SHA512

                                                    cac78ac03b179f2800cb7e6663a353a012944ce910162547679c0d26cf7c9e8d27b504dd2a3bcb1cfe0dac9f522f24324aeb8c4ffae11dbe159b98567e4c4314

                                                  • C:\Users\Admin\AppData\Local\Temp\1008822001\7059f8aad9.exe

                                                    Filesize

                                                    1.7MB

                                                    MD5

                                                    a701ff816a94c1e54f8b2175d9fcfd19

                                                    SHA1

                                                    10d6f38310770edf01970e9572a111377c21d829

                                                    SHA256

                                                    9d52d6333a4b985ec7d0baece9f1c0c99c1cf4ea503f7b8bbce0fe38694d0a32

                                                    SHA512

                                                    ee1aa73fad205b7af497d8b6e9635b741ad3b487ae57d7572218c4f571515529a380f443d7cf80658e89f56ab41c91d7ab0eba25c2f2212b72d11e5bf9a7f070

                                                  • C:\Users\Admin\AppData\Local\Temp\1008823001\f4761c225c.exe

                                                    Filesize

                                                    900KB

                                                    MD5

                                                    587faaf19f7fa53b96b91b9e6032e993

                                                    SHA1

                                                    3c6d63966fd31e0cba33aefaad3d67cfb34091b3

                                                    SHA256

                                                    08bf0d1c8f6edfc2bc55fbb23660a542e68fac2808c0ea9563730a7cbef25d2f

                                                    SHA512

                                                    404d5d56d0fb82a43299687758641f0f5be9f2fb95c8dc4396070eb8fd89b7d2b8e74c013ac24224f34c2d70a8f16473aa7b116afb6dc3100580e47be7f217d5

                                                  • C:\Users\Admin\AppData\Local\Temp\1008824001\e031295939.exe

                                                    Filesize

                                                    2.7MB

                                                    MD5

                                                    fe168eb5d702f0ea1e25ccfbce08b723

                                                    SHA1

                                                    c20abcb826c1e995ee1df414c4850148e83d4b61

                                                    SHA256

                                                    e839bd20efafea7d0f975479f0913e41ae34d0b3525d3b876493b0d4e4036820

                                                    SHA512

                                                    cbe692862d282af94d71a51807ec30ecfc0997e99dc5b4623b7d3494edb5de61a43e0ae6c2d67dee4afe436c77a9ab1ac62a1c8e43f5e201ba6b698d1f3d1168

                                                  • C:\Users\Admin\AppData\Local\Temp\1008825001\boARaXv.exe

                                                    Filesize

                                                    307KB

                                                    MD5

                                                    53507455bbb8e1f5183464a47d8890d7

                                                    SHA1

                                                    b83af2fad512986dc91bb2099a227e058697dabb

                                                    SHA256

                                                    b9644de579b105d38748c88d27e75600c9f3f07076e7bde4bc13ae32ded2db86

                                                    SHA512

                                                    07f8e5171812a02eea2315424595ab374784d92ab995763ede720b577255dfb7c80e64a3fadaf9a281c72fe330fbbbacd8e06d2db87a21b5a2336a87a7d2e506

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                    Filesize

                                                    479KB

                                                    MD5

                                                    09372174e83dbbf696ee732fd2e875bb

                                                    SHA1

                                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                                    SHA256

                                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                    SHA512

                                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                    Filesize

                                                    13.8MB

                                                    MD5

                                                    0a8747a2ac9ac08ae9508f36c6d75692

                                                    SHA1

                                                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                    SHA256

                                                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                    SHA512

                                                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    e7adb0e90825d2a5eb4ed3754c088047

                                                    SHA1

                                                    4899be66f2f0270042ac733b7c389cdbba2dc27e

                                                    SHA256

                                                    df4623f186f9258571eb0ffea69d10a1ed0b785c35e2e1adec70eeb6e4889e8c

                                                    SHA512

                                                    cc688357e4678c5569562544253e70c4bd14bc2ecb289ea37b0d6755cedd4b8672abcfc31a7c19e66fe8e107f6fa9347d3c482904ace71196392b04e00731e7e

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    99ee6f67c70dba6f6b849476a11f4bd0

                                                    SHA1

                                                    7fa88953b71e6f55a9e783c51ef33aaea15c9982

                                                    SHA256

                                                    713d197b6022848d6fdead0bb1e5b83eb2d27667b6b3ea80c1d15546f76651fe

                                                    SHA512

                                                    803a2732fe262f6c30a15686bc4433ec6510c76a6cd9d8e3f0dc4a55d452de59c53d8de6a130400e6f7d4d01fd68e5d3767ee8e8f368acd98fb24579fb95f3dd

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    91fe850c8f88e602dec8a4c27fac4902

                                                    SHA1

                                                    8fb2748346ef5af8446a5204eef5bb0988af2176

                                                    SHA256

                                                    984c53fe06ba10dd2bd324d8ff887fdbca5711457540c4aecb07a95485f32825

                                                    SHA512

                                                    f31a86b888096e1f87141f1233ce77dfb5c973b84936f2f67482cbda2dd952de3d79fcac1e5955f9d955d4028e9ffb4cf2790dc164e303c523e9aca1e25fb90e

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    16KB

                                                    MD5

                                                    80b00b285c71f68c7a3caf5766ac0d9a

                                                    SHA1

                                                    0aec2c849bc63459c81d0afa31cfb7aa6ab796a0

                                                    SHA256

                                                    4d4a4238b6a270322050974f3f82e716e270fc8f6282d4b56934c08d0d5536a6

                                                    SHA512

                                                    ae08b051dc79ccdb765aa27e1187a9c38dfedd29d8343df9b9fd88624ea7655c2a0f34ad96a5130a294e5a5e1d6abac8f998d4b6c986fc02019b9e7878cbf772

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    16KB

                                                    MD5

                                                    41f175432f066c65dccad0ed0aef89d2

                                                    SHA1

                                                    b6369d35d77f96c3993a22ac8be245f231390a2b

                                                    SHA256

                                                    6bc2538162aca29ac039fbaccd83c9b48b9b4702cd380f45301d8b012301a79d

                                                    SHA512

                                                    a1d7de46b203b7986be6807ff240643511670379e1a629527e824809af60078202680da91b1d51754f9a55aceee3f673524c40385865b26e6478b7011cb45ce9

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    c06830ec70b3028cb57933f7ac91ea52

                                                    SHA1

                                                    7c21293bc67573c59ad82ca27f06c4f10c726781

                                                    SHA256

                                                    4f850e4ee4250d40671e614b7d8cffedea894f9d24a07920244841eb283c0ce5

                                                    SHA512

                                                    8f4ceeb227fb79332767acc8cf7e165ac76d8f495470ab0795346d09b7d1fe5758a917f2d55b7413ac91008de4315081e6fa63aa1ce444de20d938db190f38e9

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    9e97d82a92bce86189634745640aa857

                                                    SHA1

                                                    2cc222e23fff1325ba5de0e9dfb1c784a3293c1e

                                                    SHA256

                                                    b3143a4bdfa9c456543d469ee8e18b23286f8d18e9205de2221c75b99aa950bb

                                                    SHA512

                                                    b3bcee76d8956a32c7441ebec359d93fcd27eab767e5b2f3811412e0bfaaec90faadefa97bd734e7257c52458d4599d1ae78938c4f3d6749cda0ef33b0ae0f66

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\2309598c-0eaa-45ef-9d07-f897801d46cb

                                                    Filesize

                                                    671B

                                                    MD5

                                                    551324fd5ae0f5ca73ac7ec8b29e9bc4

                                                    SHA1

                                                    b72527668f5d343b3c4cea767c1706f3f5695f64

                                                    SHA256

                                                    792505f471223b1ad651d6ddf08161e7afd7041c25e5ab530744b8fc9c0be1e8

                                                    SHA512

                                                    a7c8f4c12c685649cd515edda73ee5eb56a5c10617ad996b2aa3ea1f1d5e1c6c1235b7ca446682038f122ba25162be5bc4b092c9449fcf531045787781e4a693

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\4af6e9f8-8442-4473-88a4-37b133f50eee

                                                    Filesize

                                                    982B

                                                    MD5

                                                    d05367db0442aa3f799456a28ba3a2f6

                                                    SHA1

                                                    69ca87780a86671d4ffbb0d27e70b1cc1d76c720

                                                    SHA256

                                                    860b3706d89cb0fa50afcba5df62c07ed9bb759052d5592203c9b94e1351c41b

                                                    SHA512

                                                    0b4cea32ddbf64d119efb11d48af96d57c34079aa1bd624dc40d1b723fc80011edf48ab19b20583b0376482d4f57140b079e064a845510c3db1260b1f9f3ccc8

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\58e8e9c7-61e3-41db-9f80-3aae2b0e5056

                                                    Filesize

                                                    25KB

                                                    MD5

                                                    4435e988acb95e78ec773a5d4f6c9e97

                                                    SHA1

                                                    79b49357b8b5d271d71ac3ba3d99335d17910494

                                                    SHA256

                                                    4f697a6525d420e8d7de215e2e036a3091e131ee66da26b3851a60fd1945a7fa

                                                    SHA512

                                                    577dc2b5e21738b3826c3181beb14082f56d8760ed67ac1353e774110c2dc1fc715692575f44bc90d58217269e4ac8a23497ceff160ee531b2933536ff44d4a1

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                    Filesize

                                                    1.1MB

                                                    MD5

                                                    842039753bf41fa5e11b3a1383061a87

                                                    SHA1

                                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                    SHA256

                                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                    SHA512

                                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                    Filesize

                                                    116B

                                                    MD5

                                                    2a461e9eb87fd1955cea740a3444ee7a

                                                    SHA1

                                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                                    SHA256

                                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                    SHA512

                                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                    Filesize

                                                    372B

                                                    MD5

                                                    bf957ad58b55f64219ab3f793e374316

                                                    SHA1

                                                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                    SHA256

                                                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                    SHA512

                                                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                    Filesize

                                                    17.8MB

                                                    MD5

                                                    daf7ef3acccab478aaa7d6dc1c60f865

                                                    SHA1

                                                    f8246162b97ce4a945feced27b6ea114366ff2ad

                                                    SHA256

                                                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                    SHA512

                                                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    a2195b52ebb002eb096f46688725e93d

                                                    SHA1

                                                    dfbbcb16e475f165c1fb9ad1147d71bb8139dcb1

                                                    SHA256

                                                    4a351e004e9a7d400c105809d8342ad6bbd1c5ef2c294b0fa1394b4d9ede7743

                                                    SHA512

                                                    dcd741dbcf2261179fc717722e00f48b59940d689d80797e2c61c8cf00ac90a945dcd158c35f33b5bcdfee68d0a0070607e062496c5a0da209b604ec5bb0995b

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    9b6bd18bf6015692bb11ac4ad7ccb83d

                                                    SHA1

                                                    416fb53fde42f2e0c6e736a37e991f31362e2579

                                                    SHA256

                                                    c39b7c94629360c907c232c64dde09cfb3e94d4dbcdb1dacbef903fdb0ab21b9

                                                    SHA512

                                                    5e1563bf22e9b5cdade567f316fcd6fb3c468ae54f12434a228342c59f920f715695aba3fa9806fda11770e6787eb2d9c35966747f0b7e76aaa307c5fe52d2d3

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    3234c7bc757815846a1e6d83775df7dc

                                                    SHA1

                                                    71e7a441f121891bb3fa9886a4e1da9f5bd0a9b1

                                                    SHA256

                                                    54d2f0ebf15d9efb9740b143a3c8d87d567e6d91103df2a92a2c0bf45cd3a67a

                                                    SHA512

                                                    f20d77a793bc8b2733dd92a8d022bb65a1e570beadf2ba667d3eeac1287734892fa69a5829a98f0dacd290d204b9b09f63e1e6437977881eb443ca05cc65749c

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    29809f330e19421c04d08a319e329ffa

                                                    SHA1

                                                    e33fceee40b40895c3af6c7d9c44698bd58972f5

                                                    SHA256

                                                    ea0cb2c28287f7cb6c8d713de12d52fcc67e3ed4cb2aef19ace1e9c7b009da52

                                                    SHA512

                                                    263273914fd5c7e6737bbd5e4643d116ec6e03572dd4fa897df305c7fc51b52569383d9303d524ac47640f939379ba6430d52e93938177a53aea59d16d7190cd

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    dd89f55c9d1733e5793525c12e882082

                                                    SHA1

                                                    0666848994d7671c43d19849ab12c8d71aecf9f0

                                                    SHA256

                                                    95737a5c0578759f75c75936f7a2d0a8000f8176605a1d3eba13daceaee4e976

                                                    SHA512

                                                    8dbe9e585c5b29d01437a2dd510ba717cb5c1e52641b9f425a4c629bc14247d8fdecc2cffa7e2a8f6bf0088bbb3454216f48ac7d5644a503fd058cd032632e04

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                                                    Filesize

                                                    14KB

                                                    MD5

                                                    0f63e151f675f306135f4e80cfad0c77

                                                    SHA1

                                                    d897fbf5d49e6c5c083bc6937d6e5a7d89a65def

                                                    SHA256

                                                    0364341d42f2f63d88b5074acd32b7afd8e9bea8407b9134fe524d470946f9f3

                                                    SHA512

                                                    1177b09de165b5d5354131f31a5b8e1d60d1c98743c0ec953ef3162881f19bfdfcd3b5222006dc8eb168022ee2eb02308b1a8f5e45084e0bb4d44b9272d01e86

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                    Filesize

                                                    3.0MB

                                                    MD5

                                                    66def7f63792023f161f490f4f655eaa

                                                    SHA1

                                                    cda6eb5916b7d1f94cd518912a511383fa98595d

                                                    SHA256

                                                    6933890f52ffa18e1b767d7c5dfe78595acbe391f9dcecd9c3c5c81d56228c48

                                                    SHA512

                                                    eaaa21665a300c663fd82599f68ee633f998358cfa4b0aa845f993b8cc5c24b190b3a7562fed2f2c05cc5a5176fe24d6fb39a12916490f8baefaa3ceb35c1eda

                                                  • C:\Users\Admin\DocumentsDAAFBAKECA.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    a497ac328ebe667e4502871394265720

                                                    SHA1

                                                    c9cc92bfec36d6608b79c062f3fd69c86800fc06

                                                    SHA256

                                                    7a3739af1f97eeb953e104354d454b85f6c395b19817b59f014f86520e2501c3

                                                    SHA512

                                                    37956d11c549da390e3b78de2a28688389e06f34525770ce6b709422d086d021c3cd64c31ed5c28a7c02f8080feadf87bd857207d69ac898a7405cd864ffe030

                                                  • memory/208-160-0x0000000000E40000-0x0000000001302000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/208-146-0x0000000000E40000-0x0000000001302000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/1452-213-0x0000000000490000-0x0000000000B34000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/1452-215-0x0000000000490000-0x0000000000B34000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/2384-198-0x00000000008C0000-0x0000000000D6E000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2384-236-0x00000000008C0000-0x0000000000D6E000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3124-181-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/3124-237-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/3124-3017-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/3124-2880-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/3124-668-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/3124-2135-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/3124-1494-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/3124-789-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/3124-653-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/3124-161-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/3124-190-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/3396-0-0x0000000000030000-0x00000000006D4000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3396-1-0x0000000077064000-0x0000000077066000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/3396-96-0x0000000000030000-0x00000000006D4000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3396-46-0x0000000000030000-0x00000000006D4000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3396-50-0x0000000000030000-0x00000000006D4000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3396-2-0x0000000000031000-0x0000000000048000-memory.dmp

                                                    Filesize

                                                    92KB

                                                  • memory/3396-4-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                    Filesize

                                                    972KB

                                                  • memory/3396-113-0x0000000000030000-0x00000000006D4000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3396-3-0x0000000000030000-0x00000000006D4000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3396-114-0x0000000000030000-0x00000000006D4000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3396-51-0x0000000000030000-0x00000000006D4000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3396-147-0x0000000000030000-0x00000000006D4000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/3396-139-0x0000000000030000-0x00000000006D4000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/4108-163-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4108-164-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4448-1321-0x0000000000DE0000-0x0000000001A28000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/4448-667-0x0000000000DE0000-0x0000000001A28000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/4448-216-0x0000000000DE0000-0x0000000001A28000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/4448-225-0x0000000000DE0000-0x0000000001A28000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/4448-699-0x0000000000DE0000-0x0000000001A28000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/4448-180-0x0000000000DE0000-0x0000000001A28000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/4448-2986-0x0000000000DE0000-0x0000000001A28000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/4448-646-0x0000000000DE0000-0x0000000001A28000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/4448-673-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                                    Filesize

                                                    10.4MB

                                                  • memory/4448-2659-0x0000000000DE0000-0x0000000001A28000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/4448-2005-0x0000000000DE0000-0x0000000001A28000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/5492-1499-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/5492-1518-0x0000000000340000-0x0000000000802000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/5824-574-0x0000000000670000-0x0000000000928000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/5824-666-0x0000000000670000-0x0000000000928000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/5824-663-0x0000000000670000-0x0000000000928000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/5824-573-0x0000000000670000-0x0000000000928000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/5824-542-0x0000000000670000-0x0000000000928000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/6108-3015-0x0000000000D00000-0x0000000000D12000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/6108-3016-0x0000000072D20000-0x0000000072E54000-memory.dmp

                                                    Filesize

                                                    1.2MB