Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 08:59

General

  • Target

    file.exe

  • Size

    1.7MB

  • MD5

    a62bffb1a78766dd18aaa1cb856f9c21

  • SHA1

    d146e08616599e4a2024045d5319b66cf7af883e

  • SHA256

    b8a2bb778644dd41401f31fa15dfe75332502811d5bff1003d4595c04ce9e544

  • SHA512

    d2d7ca6f6e28a9c3c17631bf9c2f1ace1d2dcd338071e1b200b9c2e7acdfa413bf6e12801b7e07571bfdfd4d4c7124a3914132c5e035cad82a844c70600dc36d

  • SSDEEP

    49152:7iz+8OencRA3qkCGJPuwhK3I5KCjQrCF+Yriy:K+aGn0JPuwhK67r

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 12 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 11 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
      2⤵
      • Uses browser remote debugging
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4472
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc1cbccc40,0x7ffc1cbccc4c,0x7ffc1cbccc58
        3⤵
          PID:3784
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2040,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2036 /prefetch:2
          3⤵
            PID:2776
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1852,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2052 /prefetch:3
            3⤵
              PID:4984
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2204,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:8
              3⤵
                PID:2304
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3204 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:3608
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3252 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:4724
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4412,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:2056
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4712,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4716 /prefetch:8
                3⤵
                  PID:1364
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4972,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4964 /prefetch:8
                  3⤵
                    PID:4016
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                  2⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  PID:2376
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1cbd46f8,0x7ffc1cbd4708,0x7ffc1cbd4718
                    3⤵
                    • Checks processor information in registry
                    • Enumerates system info in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4408
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:2
                    3⤵
                      PID:3672
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3328
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:8
                      3⤵
                        PID:2872
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                        3⤵
                        • Uses browser remote debugging
                        PID:2432
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:1
                        3⤵
                        • Uses browser remote debugging
                        PID:2300
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:1
                        3⤵
                        • Uses browser remote debugging
                        PID:4028
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:1
                        3⤵
                        • Uses browser remote debugging
                        PID:2940
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsGHJEGCAEGI.exe"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:1396
                      • C:\Users\Admin\DocumentsGHJEGCAEGI.exe
                        "C:\Users\Admin\DocumentsGHJEGCAEGI.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        PID:776
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Adds Run key to start application
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4148
                          • C:\Users\Admin\AppData\Local\Temp\1008982001\c4c75c2722.exe
                            "C:\Users\Admin\AppData\Local\Temp\1008982001\c4c75c2722.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Checks processor information in registry
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3156
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                              6⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2896
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0bcdcc40,0x7ffc0bcdcc4c,0x7ffc0bcdcc58
                                7⤵
                                  PID:4652
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2348,i,15962877516169607281,16905105222487449750,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2344 /prefetch:2
                                  7⤵
                                    PID:5128
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1748,i,15962877516169607281,16905105222487449750,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2380 /prefetch:3
                                    7⤵
                                      PID:3312
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2016,i,15962877516169607281,16905105222487449750,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2484 /prefetch:8
                                      7⤵
                                        PID:5156
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,15962877516169607281,16905105222487449750,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:1
                                        7⤵
                                        • Uses browser remote debugging
                                        PID:5844
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,15962877516169607281,16905105222487449750,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3204 /prefetch:1
                                        7⤵
                                        • Uses browser remote debugging
                                        PID:5856
                                    • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                      "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      PID:4640
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:4280
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 1296
                                      6⤵
                                      • Program crash
                                      PID:1732
                                  • C:\Users\Admin\AppData\Local\Temp\1008983001\0faaf08952.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1008983001\0faaf08952.exe"
                                    5⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2108
                                  • C:\Users\Admin\AppData\Local\Temp\1008984001\cfd435e93e.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1008984001\cfd435e93e.exe"
                                    5⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4448
                                  • C:\Users\Admin\AppData\Local\Temp\1008985001\d87b23084c.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1008985001\d87b23084c.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:1496
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM firefox.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4920
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM chrome.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5072
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM msedge.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4220
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM opera.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1960
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM brave.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1460
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                      6⤵
                                        PID:1772
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                          7⤵
                                          • Checks processor information in registry
                                          • Modifies registry class
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of SetWindowsHookEx
                                          PID:4488
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2044 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {338fa9ac-fb8d-496c-a4ae-f4479d2b9360} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" gpu
                                            8⤵
                                              PID:1984
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8725f1ca-1cf9-4b1c-823f-6252f1ce74fc} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" socket
                                              8⤵
                                                PID:3964
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3084 -childID 1 -isForBrowser -prefsHandle 3052 -prefMapHandle 3136 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4a9578e-a02b-4905-8d63-3bbb732d477c} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab
                                                8⤵
                                                  PID:1464
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3968 -childID 2 -isForBrowser -prefsHandle 3912 -prefMapHandle 3908 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7160ee5d-de7c-4ab3-a7a4-1e44182395f3} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab
                                                  8⤵
                                                    PID:852
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4592 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4584 -prefMapHandle 4580 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e16e904a-9357-4d7f-98b2-70ee1a56f3a4} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" utility
                                                    8⤵
                                                    • Checks processor information in registry
                                                    PID:5532
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5240 -childID 3 -isForBrowser -prefsHandle 5200 -prefMapHandle 5164 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3026e57-befc-40ad-a71a-a896e69c7ea5} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab
                                                    8⤵
                                                      PID:5176
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5384 -childID 4 -isForBrowser -prefsHandle 5464 -prefMapHandle 5460 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb46a969-3a3c-4795-bce3-d81390802b8b} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab
                                                      8⤵
                                                        PID:5148
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5360 -childID 5 -isForBrowser -prefsHandle 5608 -prefMapHandle 5616 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5935e69-5982-4a11-8174-216521fe27b1} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab
                                                        8⤵
                                                          PID:5220
                                                  • C:\Users\Admin\AppData\Local\Temp\1008986001\da71d1dc7b.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1008986001\da71d1dc7b.exe"
                                                    5⤵
                                                    • Modifies Windows Defender Real-time Protection settings
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Windows security modification
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2640
                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                            1⤵
                                              PID:2128
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                              1⤵
                                                PID:1936
                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                1⤵
                                                  PID:3572
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3156 -ip 3156
                                                  1⤵
                                                    PID:2412
                                                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                    C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    PID:5780

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\ProgramData\mozglue.dll

                                                    Filesize

                                                    593KB

                                                    MD5

                                                    c8fd9be83bc728cc04beffafc2907fe9

                                                    SHA1

                                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                    SHA256

                                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                    SHA512

                                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                  • C:\ProgramData\nss3.dll

                                                    Filesize

                                                    2.0MB

                                                    MD5

                                                    1cc453cdf74f31e4d913ff9c10acdde2

                                                    SHA1

                                                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                    SHA256

                                                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                    SHA512

                                                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    40B

                                                    MD5

                                                    73d076263128b1602fe145cd548942d0

                                                    SHA1

                                                    69fe6ab6529c2d81d21f8c664da47c16c2e663ae

                                                    SHA256

                                                    f2dd7199b48e34d54ee1a221f654ad9c04d8b606c02bdbe77b33b82fb2df6b29

                                                    SHA512

                                                    e371083407ee6a1e3436a3d1ea4e6a84f211c6ad7c501f7a09916a9ada5b50a39dcb9e8be7a4dee664ea88ec33be8c6197c2f0ac2eabe3c0691bc9d0ed4e415d

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7ed1264f-06b9-4523-8de7-726b4ffe96d2.tmp

                                                    Filesize

                                                    1B

                                                    MD5

                                                    5058f1af8388633f609cadb75a75dc9d

                                                    SHA1

                                                    3a52ce780950d4d969792a2559cd519d7ee8c727

                                                    SHA256

                                                    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                    SHA512

                                                    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                    Filesize

                                                    649B

                                                    MD5

                                                    f9357274de57fe816730d53331b53ee5

                                                    SHA1

                                                    8ff73c30f3fe2edcefddf00648273b996d405902

                                                    SHA256

                                                    dd15264aa637fce648ab52250c65ffb3b4fc80a618aea6f38844362a7ec75082

                                                    SHA512

                                                    311721a5f60b6f66980205443a4b90f4b777f018a12de0a842b3aec03a7276680b16beb8f994556b1a4291505ec04b6a54dcda5fabb93f00b2f2a840c398c4f1

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0

                                                    Filesize

                                                    44KB

                                                    MD5

                                                    13b5f0f938bcf94b53abce5b44474ba0

                                                    SHA1

                                                    989cac03aca51744090ae523d8b1a56110591af0

                                                    SHA256

                                                    d923fbc2ad1c7255c0e107e9d68e5c20a09acdafe30feb5514deb6362edc2417

                                                    SHA512

                                                    9c88f958f01835aff384462effaac67f0252641040d44579f5c366916e702cf78f4c4e55e8c40a98ff542e68afb45e6dbea0f56534fb0c1d7b4066a3be2b95b9

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    a8c87d1e3fdd581629e1191cdeec7278

                                                    SHA1

                                                    cbf6c156a0d3e93da0854f001dd99a59e2b8dac2

                                                    SHA256

                                                    295ac087d3eefaf0f3c1d90b94b99adbe63cfcd363f7074a1a6096383115261f

                                                    SHA512

                                                    ef8dfbc271888e65cee3b6456a2fc2627306806f951fdb87dc49117ac4bfd1dbae9d7909b0c71ec7a9e66ece9bc124b9f11b8ca15b29dc72bd55dba2070353f7

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3

                                                    Filesize

                                                    4.0MB

                                                    MD5

                                                    c64b8a11096e49ce2cf0bc03fdb2ba99

                                                    SHA1

                                                    5606affd665fc9bbd209ee5f1228fc8eef8e3285

                                                    SHA256

                                                    d96408fdf6822bacf35116ad7cfb12d6bfaf473e8e95742f22c2e4d99b5e7a42

                                                    SHA512

                                                    bf4da10cc5d41a22f83b34bbf5fb5546f7def8c05e4c68ec00bcfed8e8230a6d0e7700606ea8137e20384a2f0602cb2308b3134f1b11cd0f83e60faff7430d27

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG

                                                    Filesize

                                                    317B

                                                    MD5

                                                    7b7f7c317081357070a522ad9beaf698

                                                    SHA1

                                                    e0e3ef308f406836383d288e23417c098aa8b23c

                                                    SHA256

                                                    16f721a80bfe97e0b1d78c2f13a8c19e6f466cb2c1edf060c270eeac86cfd060

                                                    SHA512

                                                    c7fd9f8eb4c5544e62cd12c9255d1b1074a4f2337b138862f5695448890ce8213e9877581774471f85d354586a4ac36a53dfb5221d577ff848fd4857727c7a6c

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0

                                                    Filesize

                                                    44KB

                                                    MD5

                                                    6d07ef441352aaa0f44b7aec7d0b35a1

                                                    SHA1

                                                    f2d5a1d8a335014fb3b605824ea1e7b21de91f55

                                                    SHA256

                                                    c3af3559c03a30ea6f22c6fe47d6885601d15d813a5c7e4161288a4c21fd8fe0

                                                    SHA512

                                                    b1b0339d7d5ebd450bd537ca3a8b5eb2768a17c25e4fcb9d0c11ded0609e9cc4118fdce11360b70d191f190ba4a38acaf4be4be62f30d72db6087bd1e3f738bd

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    57499b466412a440c07fec0f47022d51

                                                    SHA1

                                                    d9226875ae2dfd2bfe8e25423d52649393277dba

                                                    SHA256

                                                    453eba4a12157982526c0afcef2c9dd4d93e5d162b51c802257d90348a803680

                                                    SHA512

                                                    3ed2bbccacee7337e33a0ecb627646c5de75f1cf8728c83079e6403ae798c65ce79af1d45c35925fd498d4f906bca08af67d24c057d9b304d96f459ddd62b1a5

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2

                                                    Filesize

                                                    1.0MB

                                                    MD5

                                                    4e2e997da0ae227057e074c67afdb7fa

                                                    SHA1

                                                    0a0b4db63b5a84f0bbbd8b0d472e665be69697cb

                                                    SHA256

                                                    e8fca9c48d54e3405ad60c23ca5eaf2f15fb9a1d59b3936f178fcfac70a967e4

                                                    SHA512

                                                    cb721fb2c0a687fdf89041d9baac042e45991bdd57b1093968e16ba5230741f027c358c8e9f45bab4bf16461fd9145dfacf596e418f4cfda60694af4237ced3f

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_3

                                                    Filesize

                                                    4.0MB

                                                    MD5

                                                    c73ceb946a84dd65c7571e065361ff89

                                                    SHA1

                                                    0188249b60156917726cece1be3ed2c5157841c4

                                                    SHA256

                                                    5ac5fb30df32a601b6b949cb1a86f869a07ee8b35df9d4cf2a2187681e699483

                                                    SHA512

                                                    f67fc989f0af95783654b6258b8061ec4eb69abb9065db26731eb76e735e6914ffd25b6ebbf4e018fc6899dbaa711af689e62fae4cac97d75d913f2047c2ced4

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                                    Filesize

                                                    332B

                                                    MD5

                                                    ceb46e5159eeb938e8965244d57b9a8c

                                                    SHA1

                                                    3bf5d94e1f39bbb56030f03851d5862e4ef99fd0

                                                    SHA256

                                                    1fe1dfeb57771e1249f3170841cab8eaff8361fd2d0e56559bb7506032bb6b0f

                                                    SHA512

                                                    05b57e474f79a2c129192c6e954d1632098df6b8798d34e5e85b39998beafc6c37a47ab776f7a32058e8f366496486a96a07212775cd11aa85561e308d09ef99

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\defde679-cb5e-412b-b8a3-d89e6d37e65e.tmp

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG

                                                    Filesize

                                                    333B

                                                    MD5

                                                    f903ca5e90af3cbbb598f7c34c01cba5

                                                    SHA1

                                                    44514eaf30ce0a8f6bb608a08011c1fb2b47b6f8

                                                    SHA256

                                                    b0dc30736a6dbc504cd1d527c5fce496b1f9850db9c6bd53551aefa39f32b424

                                                    SHA512

                                                    2f16610792c3c65d2407333ba6f91de7ee3c6cdc06cb2de100a52363290ddf04fb46da8c980ee4d83324aae65f8b046e66d1e5760ff26c80e0c1a1117063204b

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.log

                                                    Filesize

                                                    289B

                                                    MD5

                                                    541c42f1c98b3e1b011d22eba854e707

                                                    SHA1

                                                    db30188de1f22e3077e7044be1386a5d0ecaed9d

                                                    SHA256

                                                    0768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b

                                                    SHA512

                                                    47828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG

                                                    Filesize

                                                    320B

                                                    MD5

                                                    18ffac425e1e62be43d54ecd614a63d3

                                                    SHA1

                                                    755fe6b73d469da36a4401a892adc7048963145a

                                                    SHA256

                                                    b4a55172e676e5532b9e2b4753fb6633cda009901062554ffb212c23aa958fd7

                                                    SHA512

                                                    889d903e4e36b85cfe96d71c99bbf6360a3fd3967efbde7f0ddcb043cf3856180cc3ae38d5f505bd7f7cb85d517c5c0bea4d5cdc3d81879293623b24a5227fb7

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                                    Filesize

                                                    345B

                                                    MD5

                                                    d4a913e198bb8b0407fccb70dd0ea0da

                                                    SHA1

                                                    27b15872f17fe3d2ae6bf35e304bba3ac915e5ba

                                                    SHA256

                                                    92c754426a0db241d53cb036c03726a0739978a623bc80ff4ae92e5d94cb95f8

                                                    SHA512

                                                    b1cb24028a4d72e7b99b49efcb3b114492b1f722dbfb96d490c3089bb5dcc674dc63da1c1b9c9c211e2f3d32540f760ac135337454d7498cf611d019ccd1de7f

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                                    Filesize

                                                    324B

                                                    MD5

                                                    af19c2b084d171316e3396efe1bfec9a

                                                    SHA1

                                                    a6aa548fb782414d92d72983fa6854149358b8dc

                                                    SHA256

                                                    46f954705a3e2a74c238fabe179e1ce9fedc22ea001c671845b3b0b8533d0ae8

                                                    SHA512

                                                    b59f5a2c6cd18b6acaf4b02b40a209aadda17535589c42247527d58fbd35a87b6dc5007b9dd882d010f6c901b93bc6dd1c7eed015968e003b7bb2b49c6aafddd

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager-journal

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    6b2e805240f93a5d0e8a69de480fdd38

                                                    SHA1

                                                    aecb854e51bc24883183db880e4d35429fd6bc56

                                                    SHA256

                                                    0b81ac0922c7e5ef5a603e6f096b89a9fac82e61a006ff10a52fcdc0df21c2e7

                                                    SHA512

                                                    518280949c83ada7332ca840fc8cb3d6414bc91c653af930338f403b96b0956fd127201c476f9504405cbeacbf18451c2f0c7da1c0086c43f12081c407579e6d

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    0d69fa7321cc646fc344c383f7faac33

                                                    SHA1

                                                    3d97fc5586c9c1b58db2b215f3d56aaf05d94e6d

                                                    SHA256

                                                    f36bfc714567a82d02b9ca86a392f314211a9aa1bdae36f0bde749106c5a6f02

                                                    SHA512

                                                    a54e60446f0b3be6989a823c2b3fbdd061500f028d2f994155cad9839c81687f6632eddaeefda7cb4178ad1d4b0aef60fb054558b0b0a36fcf856e65d9172dda

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                                    Filesize

                                                    317B

                                                    MD5

                                                    4ae2f855017c29520e1976c8065c83ef

                                                    SHA1

                                                    14afb8b5951ae9c2631486a2625dde7c41963aec

                                                    SHA256

                                                    303c1a20b41cb0e08ba06ca94fb01bcea7e037be6e6a9dd23eb66b0d75f1ad28

                                                    SHA512

                                                    9096acc7084359e5e8f0d68cc7346e230b8ca0a3a80f2e253020209080af68f4cb03ad1eed404993d5acf63ddd8be3fb34b460abed51aa789644af0fa907b925

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.log

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    e99c26c4c0cca685c6b0ff4709b57cd7

                                                    SHA1

                                                    437d67e170863eb0f926a467d89e4ad88d7e065d

                                                    SHA256

                                                    427e6466401f0f2a14669fe96fa57333fe381faa1708db4734cf409039a83bab

                                                    SHA512

                                                    cb8daf5284df7b25391b4dc4cd7df296facc99db399fc76194ff34e47b2f737dfe71aaf62ede0458ded03152a7c4a2fac5c01ae626af7dabfc6001218f7ccb56

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                                    Filesize

                                                    335B

                                                    MD5

                                                    363f9edeb255ee8ba3d719efcb182f36

                                                    SHA1

                                                    c77cad57ea94c8bda849a034cbe874433028eeeb

                                                    SHA256

                                                    08519886fb243da5c2115c6daa5627bca8d82ebb95c9fab0ce4db6a7a4ece481

                                                    SHA512

                                                    13be651274c82629b3636dc319ab2e4fa72afe8609a309a4de7de3953ff71abe6fd872d03f4401cc61fbab843ddf5137e529cef345f13dfcf887f66d95fbb88d

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0

                                                    Filesize

                                                    44KB

                                                    MD5

                                                    9882f3ae9ec7e091fbb38b583ccee14c

                                                    SHA1

                                                    0d2754f3f4b587799b6e8ce3c820cede3fc2bd15

                                                    SHA256

                                                    4513608ecce453dabbf49105712ba4f58e02fd3be11b3b15a9b4eb227a5008e2

                                                    SHA512

                                                    53f06ab4bf6fb098894f74b23c4cd66967ab4994885171c74963d6c0b583d12bfb60f773c484b9457d88d8b1515a8c50a51a02713e0fabf313361f2305057ed6

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    256140206824490d123d4769a1b7d6db

                                                    SHA1

                                                    049223a8b10523ad1bcc0e29467cbd783bf94ceb

                                                    SHA256

                                                    9df2dcc0968401a00035c9d3f17b3f6386f777651c3c938683787c5c656aeea4

                                                    SHA512

                                                    f2b3dd6c9ff30a5088b5ef955c82cf32680b5d251efae2f02cba9962f756c5818d39da2e5dc08698efbafec672a6f1ffb767ba9974b5ac06676be9c7237f7c65

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3

                                                    Filesize

                                                    4.0MB

                                                    MD5

                                                    755aebd35ed6d7b087ffffa978f6c677

                                                    SHA1

                                                    b6cca1dd22034b59defef639c74783efcc530cef

                                                    SHA256

                                                    db631dbaba233658ef2cc73aa12fb624781310f8f006dac23b51c3cdfd58988d

                                                    SHA512

                                                    2b9e0d98e5af0daf29c92c58be48896e96e3dc2e63def553ae75108646c41458068ca2b91b463bcf7bdbef6163f58e5899c0e80d95891a7a24a8a19e0aff1ed7

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                    Filesize

                                                    14B

                                                    MD5

                                                    ef48733031b712ca7027624fff3ab208

                                                    SHA1

                                                    da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                                    SHA256

                                                    c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                                    SHA512

                                                    ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                    Filesize

                                                    86B

                                                    MD5

                                                    f732dbed9289177d15e236d0f8f2ddd3

                                                    SHA1

                                                    53f822af51b014bc3d4b575865d9c3ef0e4debde

                                                    SHA256

                                                    2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                                    SHA512

                                                    b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    e443ee4336fcf13c698b8ab5f3c173d0

                                                    SHA1

                                                    9bf70b16f03820cbe3158e1f1396b07b8ac9d75a

                                                    SHA256

                                                    79e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b

                                                    SHA512

                                                    cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    56a4f78e21616a6e19da57228569489b

                                                    SHA1

                                                    21bfabbfc294d5f2aa1da825c5590d760483bc76

                                                    SHA256

                                                    d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb

                                                    SHA512

                                                    c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    a844c52e8ce3d5ec72a004d1cd33b45d

                                                    SHA1

                                                    a2b06e52f684138452ffed28b81579dcb6cbb0aa

                                                    SHA256

                                                    145481420e90a65634911548178f85e587e34cd06130ae95696559692bb09ed2

                                                    SHA512

                                                    cb0b403b3a9379ef8b009b4bc9678baab449fbcc9c5c6cbe7eec2fa1f3cb2fc890cc4eafa3dc7aef78760b36e9388aae6598d6437881b3bfdeac7548d2a4c632

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json

                                                    Filesize

                                                    24KB

                                                    MD5

                                                    4a5f77bcbbc2ee5279d1ab7ffbc401b3

                                                    SHA1

                                                    340a61df22cd06ce9ad615f4d0dd744fd4a47a28

                                                    SHA256

                                                    594dc0e8e93192fbbaf9438ef4ce5639275c77915625d513aea78517166cdb36

                                                    SHA512

                                                    cffe19a992095e61ed76239c12cbf18cb6138a5d6a86dcd93042773479dc7ed65d1fdb1da4f67b80a8592bca4b940ea62c6bbfa5912610cc123f7437ecaedb20

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                                    Filesize

                                                    13KB

                                                    MD5

                                                    2a8d26505368dee6d85a8ce501880267

                                                    SHA1

                                                    ceeedeaf821df1cf7f869561eb69d8c30576bf8c

                                                    SHA256

                                                    6fbec65bc95f890904e14cfffc2974b05307937e448797793e61648a3feeea7a

                                                    SHA512

                                                    e699f46a49a38ce774566b36b82a3e92b4afd09e877ade4234b53fcb12bd403e8501721c76f65fe60341331a84d43a7cc61915f05fb8022b20f097fac8e1ae7f

                                                  • C:\Users\Admin\AppData\Local\Temp\1008982001\c4c75c2722.exe

                                                    Filesize

                                                    4.2MB

                                                    MD5

                                                    88d3b1255894e7039c67b2272b3386df

                                                    SHA1

                                                    84fd4519dbb0270ca681451ca7092b8e803677bf

                                                    SHA256

                                                    ec85e681b765cf685363a2aa3a5b8a86837d0d8923d2ecba7b35e67d74b29265

                                                    SHA512

                                                    c6f51d6ca7e9002a4a7806d347f91b3a17d70926a9d34971a07a40fe2121593469ae8388c47f0c2abbc9f3e29329f39b01ca7a07fd5b55c2d86260d4f4d514ac

                                                  • C:\Users\Admin\AppData\Local\Temp\1008983001\0faaf08952.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    23adcd6f93e0c2a939cfab75ca300a6c

                                                    SHA1

                                                    f95e1c0f9f637dd74eba23d3eea6f4946f31d89d

                                                    SHA256

                                                    5c56c5ceabda5482517297ba465922395e14ac785a8c5580f011383114988a0f

                                                    SHA512

                                                    7489853089841297805721b354b4fa322a392ad07aa90f80582b1bdecc68fddb5552622e87bbae2fc57966cd9c5fcabb34648aee627bde8b9ce9ea0cda12ab63

                                                  • C:\Users\Admin\AppData\Local\Temp\1008984001\cfd435e93e.exe

                                                    Filesize

                                                    1.7MB

                                                    MD5

                                                    a62bffb1a78766dd18aaa1cb856f9c21

                                                    SHA1

                                                    d146e08616599e4a2024045d5319b66cf7af883e

                                                    SHA256

                                                    b8a2bb778644dd41401f31fa15dfe75332502811d5bff1003d4595c04ce9e544

                                                    SHA512

                                                    d2d7ca6f6e28a9c3c17631bf9c2f1ace1d2dcd338071e1b200b9c2e7acdfa413bf6e12801b7e07571bfdfd4d4c7124a3914132c5e035cad82a844c70600dc36d

                                                  • C:\Users\Admin\AppData\Local\Temp\1008985001\d87b23084c.exe

                                                    Filesize

                                                    900KB

                                                    MD5

                                                    868731dd0f8cf02ef9d137ac61017e94

                                                    SHA1

                                                    21b42b2f1296720dda515c1055d3bcf7aa7cda51

                                                    SHA256

                                                    d77cba60c77c83093f4c3e1f7f563c95aa0eba7d55755051120792a4fb98565b

                                                    SHA512

                                                    c674f18c59842756763934bcf4f809797d7119e8aaea9c5426622d692805fea02d3513ba505ab414b88fe6737ec2cb188c5afe29d64485856c540087f1b86455

                                                  • C:\Users\Admin\AppData\Local\Temp\1008986001\da71d1dc7b.exe

                                                    Filesize

                                                    2.7MB

                                                    MD5

                                                    8458bdd71b8280bfa42081fc46fe8c8f

                                                    SHA1

                                                    824a05f220e8f4684855d3c960388ebbf9b3ecff

                                                    SHA256

                                                    d9289b9fb61365b83901f5ac635ff5754e3389b5c49d46d12d73f7969fafe3e8

                                                    SHA512

                                                    669fb61e5f1e0425c98ae296776b59392fcc654785f9d6ca61dec17850a10477b636a7b3dab942e2db59d4e1cb2232f9073bdfd43b5102c771f17ce8a628ed78

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                    Filesize

                                                    479KB

                                                    MD5

                                                    09372174e83dbbf696ee732fd2e875bb

                                                    SHA1

                                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                                    SHA256

                                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                    SHA512

                                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                    Filesize

                                                    13.8MB

                                                    MD5

                                                    0a8747a2ac9ac08ae9508f36c6d75692

                                                    SHA1

                                                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                    SHA256

                                                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                    SHA512

                                                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    6ef25b8c1a7c80f51ef3a2e73f4112c5

                                                    SHA1

                                                    6e54b372ba9aee80b2294afc71af8eaa6993ed8b

                                                    SHA256

                                                    bc44776b2fa917a0606892205848400540ef73b55c1020e77cf62ba89167f546

                                                    SHA512

                                                    66fba6e63e8dfbe1f6690234e1f4d54376e2169f9273725a580527e0db6ec7d1508ae2d78891fe2d3774b35f8df6ea1523578654233f3d4367154c20a9f0def0

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    bf9d936f718384eb6fd4fe6737b845fe

                                                    SHA1

                                                    7f9bb01752a07cdf2849c00d9623cbf43eb1f544

                                                    SHA256

                                                    69ab160900c2a17dab9f7c1a64625e1911226152199a215238a12108ad758918

                                                    SHA512

                                                    8efe5a7c2d53e0a9831d4256ca71ebbaf7406d7028bad9abe882d64e8dcc887453bd81f271f96adb7986403cde6a1276d615339e83e24052df6976533fe34171

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    1961b310b2ba22e8d40b717e5ceed205

                                                    SHA1

                                                    7a71dbc3d919d7e46176f748fe852cc148b00a96

                                                    SHA256

                                                    f0bbc8a15cae4b95466f8d9e018c8e09f3d03753a6059a034e94b40bf6003eb6

                                                    SHA512

                                                    0e04f48bd03a877d31b889847b64312875765219d24856574594ba2a3799e251f698335d42e5e5096a43bc67668149ae29f729faee5a2e5d80d13ce016e7b27f

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    82e748b1fc98364d164eeb8868cc6c43

                                                    SHA1

                                                    afb4d81382e116d7d1021bb0603c17c5594687ed

                                                    SHA256

                                                    056ce2575c8cbf437b5ce956491d7ebe158a4e956d0c845191bf5f95c368baac

                                                    SHA512

                                                    7681b8f36295ca6cb01a2e6d1e862116d14bb97e0de6b51724200c986298b939f38f5338cb77e53ffc019543a208023eb6e7766bfb375a20adfd2f81a4c61f82

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\20fa047d-b190-44a0-816e-eb2495cffad2

                                                    Filesize

                                                    982B

                                                    MD5

                                                    5dfa5e3c03f33e9e1e0bdd0f60eb0f59

                                                    SHA1

                                                    3be98b2420b5974919c576ff805afa7f1949f1aa

                                                    SHA256

                                                    484c47b0c36fd9cd9478d953264a72e2dea31df12de77b610be1980d02bf9e3d

                                                    SHA512

                                                    13b1fb612f04e092ddc1de07bf08d7c179fb798262c582beb3aba5599674052554710fe7ea9d37562830253c4e0159db7b4c2cfbe231f0f213ab4ddc33c6a350

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\de3e77fb-e588-4e12-b6c4-e3523971280d

                                                    Filesize

                                                    671B

                                                    MD5

                                                    58702f0d43cc360ff306a45ca2c91734

                                                    SHA1

                                                    9c58ce7c9da453c6d6bc108a9b1ec3e19baad5d2

                                                    SHA256

                                                    996f8fc0c7b6188a752979fffe0fab9351595f4bd496ac68fab3736f6072a436

                                                    SHA512

                                                    998776f3695735161621c0064f8b18515aaaea6e585ad29aeb5b1779f2352c0f0eb37f670aefd54d3b1b358035f200cea119ee5594b9fad4324e1a7fb9c9f148

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\e90cf296-f8d9-4eca-b089-2abc5117f49a

                                                    Filesize

                                                    27KB

                                                    MD5

                                                    ea98f97a08c1bc44c30e3edbc5aec7b7

                                                    SHA1

                                                    1ace8d45ea1fd3862571bdd106cffb7d75418efc

                                                    SHA256

                                                    09a242e957a3b3cd02878db9c6e98e26baa8058f9fef58d54383f0595fee4a0c

                                                    SHA512

                                                    3bb8bfa839158394137f25de74bd5b17bdd878b73d97a4e0f06d6ae2465c2dd9a844941d28d52dff9db26ee6c3e2508593bb44b534c0b667a51c4a106d5e2e2f

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                    Filesize

                                                    1.1MB

                                                    MD5

                                                    842039753bf41fa5e11b3a1383061a87

                                                    SHA1

                                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                    SHA256

                                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                    SHA512

                                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                    Filesize

                                                    116B

                                                    MD5

                                                    2a461e9eb87fd1955cea740a3444ee7a

                                                    SHA1

                                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                                    SHA256

                                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                    SHA512

                                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                    Filesize

                                                    372B

                                                    MD5

                                                    bf957ad58b55f64219ab3f793e374316

                                                    SHA1

                                                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                    SHA256

                                                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                    SHA512

                                                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                    Filesize

                                                    17.8MB

                                                    MD5

                                                    daf7ef3acccab478aaa7d6dc1c60f865

                                                    SHA1

                                                    f8246162b97ce4a945feced27b6ea114366ff2ad

                                                    SHA256

                                                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                    SHA512

                                                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                                                    Filesize

                                                    12KB

                                                    MD5

                                                    128550f6e3dcae1fec020ae45363fe21

                                                    SHA1

                                                    2ea690080650bce775df6497f07996866815f50e

                                                    SHA256

                                                    70cee412f84e4435242ac743914a016ac406aa7363c81170efe4cd6dcd6c6862

                                                    SHA512

                                                    f8647c12a6f769cb14e5729d9d001cda7a29035ce28818ddbf99d5f897259b8a514a9acaa61ddd7746c37f091893bf2356c0a90b8cc37c30acf72f98241e6be0

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    ca88678ee616870683f8fb76474b00c1

                                                    SHA1

                                                    3d76fcd5d53fadc3cc9decbe40f745da8d096604

                                                    SHA256

                                                    6bc3c6f0a6a0f4ffdddbcef673d1ef70236a584f8d284a06c31f2ba6aaae4231

                                                    SHA512

                                                    e208946b1e791a3f6eac1044db77394e21cf3b69c5bbc6555e435ee29bc136faedd864e061a20aaeff5b6d419709bc032e36d9219a3cab2371d780dfc004f381

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    74c3dcbbe2cf72a6b05f66afd0d40efc

                                                    SHA1

                                                    1b028c5d1ed7ac5f5f7c7030e78147f1e6d7f251

                                                    SHA256

                                                    597e63aa86a653753f362dfda40e0605a4087636f20e726977d2f55295cd4fdc

                                                    SHA512

                                                    1154714b14745925a8b6d04af27a9fc955da1298bb7b7edcb49e3a32b0f9a8f33384225929b26e37ac8a16a6b2162219751b1caf7a2dfe2fd106423889d207f7

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    09bdc4035000b143210617950d9d1577

                                                    SHA1

                                                    70dd5e613acd18bdc5e52830ae80fe49d35cce76

                                                    SHA256

                                                    7125ea068087297bf9bc9663c58526161732666ee97044f41536d57623211fea

                                                    SHA512

                                                    6fb68a333ed65525344f7232093bd374025892eac1eb4e3652f498507de65e9b12dabc416bba9f292cde56eadaded263c2a817b81b41c5d0f9267a3d7978aa31

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs.js

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    f5b4a55186d98856d323b400572ac094

                                                    SHA1

                                                    e9506e34eae8e67445cba52b2c73859b33008ed1

                                                    SHA256

                                                    bc67a419a447282664ca93867df76c5672bb503a1a59f4ce14f73b4f2a48635c

                                                    SHA512

                                                    f93e281f03200c0f6f79701521cd526c650e35bbaabe3be8ac5c2be80e56224d594dc7b6933b1512764a6a755f4ed8e4a209b122df2dd335586e6d73e64b2bc1

                                                  • C:\Users\Admin\DocumentsGHJEGCAEGI.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    9ec3d5ed65bf8dc11d766f25c0860001

                                                    SHA1

                                                    dc7c8af390895418dc67e9fbd9cce4010b71478d

                                                    SHA256

                                                    c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b

                                                    SHA512

                                                    d4f87ff7eeb3eeaf96247ebaa70a5e774d23664c3226bc5fd49fc2523eceac433dd9d0d2121247128c2e59cb4d9ee24747ca26a2bc35db09252087dc8427827c

                                                  • \??\pipe\crashpad_4472_DCNWAQMDRVCUOMES

                                                    MD5

                                                    d41d8cd98f00b204e9800998ecf8427e

                                                    SHA1

                                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                    SHA256

                                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                    SHA512

                                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                  • memory/776-143-0x0000000000B50000-0x0000000001011000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/776-159-0x0000000000B50000-0x0000000001011000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2108-192-0x00000000005B0000-0x0000000000A54000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/2108-220-0x00000000005B0000-0x0000000000A54000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/2640-508-0x0000000000430000-0x00000000006E4000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2640-273-0x0000000000430000-0x00000000006E4000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2640-718-0x0000000000430000-0x00000000006E4000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2640-727-0x0000000000430000-0x00000000006E4000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2640-521-0x0000000000430000-0x00000000006E4000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/3156-221-0x0000000000E00000-0x0000000001A4D000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/3156-707-0x0000000000E00000-0x0000000001A4D000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/3156-971-0x0000000000E00000-0x0000000001A4D000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/3156-194-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                                    Filesize

                                                    10.4MB

                                                  • memory/3156-728-0x0000000000E00000-0x0000000001A4D000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/3156-223-0x0000000000E00000-0x0000000001A4D000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/3156-1042-0x0000000000E00000-0x0000000001A4D000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/3156-174-0x0000000000E00000-0x0000000001A4D000-memory.dmp

                                                    Filesize

                                                    12.3MB

                                                  • memory/4148-1015-0x0000000000F90000-0x0000000001451000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4148-3134-0x0000000000F90000-0x0000000001451000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4148-176-0x0000000000F90000-0x0000000001451000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4148-177-0x0000000000F90000-0x0000000001451000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4148-3137-0x0000000000F90000-0x0000000001451000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4148-730-0x0000000000F90000-0x0000000001451000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4148-157-0x0000000000F90000-0x0000000001451000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4148-242-0x0000000000F90000-0x0000000001451000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4148-3130-0x0000000000F90000-0x0000000001451000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4148-3124-0x0000000000F90000-0x0000000001451000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4148-3118-0x0000000000F90000-0x0000000001451000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4148-2125-0x0000000000F90000-0x0000000001451000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4148-710-0x0000000000F90000-0x0000000001451000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/4448-218-0x00000000002B0000-0x000000000092B000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/4448-222-0x00000000002B0000-0x000000000092B000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/4640-1759-0x0000000000A90000-0x0000000000AA2000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/4640-1760-0x0000000073680000-0x00000000737B4000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/5084-3-0x00000000002C0000-0x000000000093B000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/5084-2-0x00000000002C1000-0x00000000002D8000-memory.dmp

                                                    Filesize

                                                    92KB

                                                  • memory/5084-1-0x0000000077D84000-0x0000000077D86000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/5084-4-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                    Filesize

                                                    972KB

                                                  • memory/5084-49-0x00000000002C0000-0x000000000093B000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/5084-50-0x00000000002C0000-0x000000000093B000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/5084-57-0x00000000002C0000-0x000000000093B000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/5084-112-0x00000000002C0000-0x000000000093B000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/5084-145-0x00000000002C0000-0x000000000093B000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/5084-0-0x00000000002C0000-0x000000000093B000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/5780-3127-0x0000000000A90000-0x0000000000AA2000-memory.dmp

                                                    Filesize

                                                    72KB