Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2024 08:05

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    40fbf66fe2c47dcd8d2de9191b48b355

  • SHA1

    eb7260a1cf345b9a225fa6250727db32e391ffd6

  • SHA256

    c5723c29a13feb389fd9e72e6e81d914c0693d9846c2810d1d0bad4e3307eb78

  • SHA512

    2d4328dea1251bd7694c4f1b42f7bf5efad6b8712364bd42db6f8ba612dffd430b6e4bc158756c5e68d9aa24b0904cdff7ac7fde06cdf2826f062077415d0690

  • SSDEEP

    49152:tai5lapixRQLHDfUG2XIBlCE7MFKMM68xbEYGXxhA:gi58iLU32YBlCE7MFld8aYGXj

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://property-imper.sbs

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 16 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 27 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
      2⤵
      • Uses browser remote debugging
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d59758,0x7fef6d59768,0x7fef6d59778
        3⤵
          PID:772
        • C:\Windows\system32\ctfmon.exe
          ctfmon.exe
          3⤵
            PID:2968
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 --field-trial-handle=2136,i,4646810706028975861,11798193255488594048,131072 /prefetch:2
            3⤵
              PID:1996
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1360 --field-trial-handle=2136,i,4646810706028975861,11798193255488594048,131072 /prefetch:8
              3⤵
                PID:1724
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1436 --field-trial-handle=2136,i,4646810706028975861,11798193255488594048,131072 /prefetch:8
                3⤵
                  PID:2032
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1976 --field-trial-handle=2136,i,4646810706028975861,11798193255488594048,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:2728
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1988 --field-trial-handle=2136,i,4646810706028975861,11798193255488594048,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:2788
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2448 --field-trial-handle=2136,i,4646810706028975861,11798193255488594048,131072 /prefetch:2
                  3⤵
                    PID:1696
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1120 --field-trial-handle=2136,i,4646810706028975861,11798193255488594048,131072 /prefetch:1
                    3⤵
                    • Uses browser remote debugging
                    PID:2344
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3728 --field-trial-handle=2136,i,4646810706028975861,11798193255488594048,131072 /prefetch:8
                    3⤵
                      PID:1856
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsBFCAAEHJDB.exe"
                    2⤵
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:2768
                    • C:\Users\Admin\DocumentsBFCAAEHJDB.exe
                      "C:\Users\Admin\DocumentsBFCAAEHJDB.exe"
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Loads dropped DLL
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      PID:1400
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                        4⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Loads dropped DLL
                        • Adds Run key to start application
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Modifies system certificate store
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2952
                        • C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe
                          "C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"
                          5⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:1988
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c copy Appreciate Appreciate.cmd && Appreciate.cmd
                            6⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:2940
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              7⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:336
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /I "wrsa opssvc"
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:1208
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              7⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1644
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:1956
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c md 397506
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:1368
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c copy /b ..\Concept + ..\Mix + ..\Trunk + ..\Answers + ..\Bufing + ..\Benefits + ..\Ram + ..\Guides k
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:1836
                            • C:\Users\Admin\AppData\Local\Temp\397506\Mesa.com
                              Mesa.com k
                              7⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Checks processor information in registry
                              • Modifies system certificate store
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:2728
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                8⤵
                                • Uses browser remote debugging
                                • Enumerates system info in registry
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                PID:1524
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5df9758,0x7fef5df9768,0x7fef5df9778
                                  9⤵
                                    PID:2680
                                  • C:\Windows\system32\ctfmon.exe
                                    ctfmon.exe
                                    9⤵
                                      PID:796
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1216,i,2535004560638909938,12497703129464164877,131072 /prefetch:2
                                      9⤵
                                        PID:588
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1216,i,2535004560638909938,12497703129464164877,131072 /prefetch:8
                                        9⤵
                                          PID:2544
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1572 --field-trial-handle=1216,i,2535004560638909938,12497703129464164877,131072 /prefetch:8
                                          9⤵
                                            PID:2592
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1476 --field-trial-handle=1216,i,2535004560638909938,12497703129464164877,131072 /prefetch:1
                                            9⤵
                                            • Uses browser remote debugging
                                            PID:1996
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2388 --field-trial-handle=1216,i,2535004560638909938,12497703129464164877,131072 /prefetch:1
                                            9⤵
                                            • Uses browser remote debugging
                                            PID:1076
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1164 --field-trial-handle=1216,i,2535004560638909938,12497703129464164877,131072 /prefetch:2
                                            9⤵
                                              PID:2964
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3328 --field-trial-handle=1216,i,2535004560638909938,12497703129464164877,131072 /prefetch:1
                                              9⤵
                                              • Uses browser remote debugging
                                              PID:1564
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3728 --field-trial-handle=1216,i,2535004560638909938,12497703129464164877,131072 /prefetch:8
                                              9⤵
                                                PID:2028
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\397506\Mesa.com" & rd /s /q "C:\ProgramData\AAKJEGCFBGDH" & exit
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2344
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout /t 10
                                                9⤵
                                                • System Location Discovery: System Language Discovery
                                                • Delays execution with timeout.exe
                                                PID:2684
                                          • C:\Windows\SysWOW64\choice.exe
                                            choice /d y /t 5
                                            7⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2668
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1009351041\PeRVAzl.ps1"
                                        5⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1876
                                      • C:\Users\Admin\AppData\Local\Temp\1009551001\knotc.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1009551001\knotc.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:680
                                        • C:\Users\Admin\AppData\Local\Temp\1009551001\knotc.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1009551001\knotc.exe"
                                          6⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:2916
                                      • C:\Users\Admin\AppData\Local\Temp\1009552001\2879339004.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1009552001\2879339004.exe"
                                        5⤵
                                        • Enumerates VirtualBox registry keys
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:540
                                      • C:\Users\Admin\AppData\Local\Temp\1009557001\25e9d277fe.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1009557001\25e9d277fe.exe"
                                        5⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Modifies system certificate store
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3060
                                      • C:\Users\Admin\AppData\Local\Temp\1009558001\4d10dc4f99.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1009558001\4d10dc4f99.exe"
                                        5⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2992
                                      • C:\Users\Admin\AppData\Local\Temp\1009559001\d031a638c4.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1009559001\d031a638c4.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SendNotifyMessage
                                        PID:1732
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM firefox.exe /T
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1536
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM chrome.exe /T
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1500
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM msedge.exe /T
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2580
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM opera.exe /T
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3000
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM brave.exe /T
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2544
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                          6⤵
                                            PID:1988
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                              7⤵
                                              • Checks processor information in registry
                                              • Modifies registry class
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of SendNotifyMessage
                                              PID:2280
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2280.0.1243103421\148516893" -parentBuildID 20221007134813 -prefsHandle 1240 -prefMapHandle 1232 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2170131f-eacd-4ce9-80e1-912b3014aa1b} 2280 "\\.\pipe\gecko-crash-server-pipe.2280" 1304 104db158 gpu
                                                8⤵
                                                  PID:2964
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2280.1.1171579236\1658158543" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb7bf65d-07c6-4d9b-b439-5d86c52cda71} 2280 "\\.\pipe\gecko-crash-server-pipe.2280" 1516 e72d58 socket
                                                  8⤵
                                                    PID:2028
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2280.2.1890826941\1009494921" -childID 1 -isForBrowser -prefsHandle 2096 -prefMapHandle 2092 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf12f091-2706-4f26-b49e-3a80cad6f642} 2280 "\\.\pipe\gecko-crash-server-pipe.2280" 2108 1045e258 tab
                                                    8⤵
                                                      PID:2184
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2280.3.2129675268\208695256" -childID 2 -isForBrowser -prefsHandle 2964 -prefMapHandle 2960 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e295a75-151e-4279-8edc-af4d83914450} 2280 "\\.\pipe\gecko-crash-server-pipe.2280" 2976 1c505958 tab
                                                      8⤵
                                                        PID:2032
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2280.4.144765005\54894285" -childID 3 -isForBrowser -prefsHandle 3716 -prefMapHandle 3592 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3608f996-8a95-47b7-8769-9da72c2a3d7b} 2280 "\\.\pipe\gecko-crash-server-pipe.2280" 3728 1cdd4f58 tab
                                                        8⤵
                                                          PID:2864
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2280.5.1744662535\305564002" -childID 4 -isForBrowser -prefsHandle 3864 -prefMapHandle 3868 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae292873-e35c-46f8-9ed0-719ca4f94e3b} 2280 "\\.\pipe\gecko-crash-server-pipe.2280" 3852 1cdd5b58 tab
                                                          8⤵
                                                            PID:2760
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2280.6.1201888105\79324620" -childID 5 -isForBrowser -prefsHandle 3908 -prefMapHandle 3904 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7fe341ac-3c70-42f8-946f-1328bde3b459} 2280 "\\.\pipe\gecko-crash-server-pipe.2280" 3920 1b844858 tab
                                                            8⤵
                                                              PID:236
                                                      • C:\Users\Admin\AppData\Local\Temp\1009560001\c0d5371b15.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1009560001\c0d5371b15.exe"
                                                        5⤵
                                                        • Modifies Windows Defender Real-time Protection settings
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Windows security modification
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1848
                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                1⤵
                                                  PID:2800
                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                  1⤵
                                                    PID:2368

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\ProgramData\AAKJEGCFBGDH\JEHDHI

                                                    Filesize

                                                    92KB

                                                    MD5

                                                    102841a614a648b375e94e751611b38f

                                                    SHA1

                                                    1368e0d6d73fa3cee946bdbf474f577afffe2a43

                                                    SHA256

                                                    c82ee2a0dc2518cb1771e07ce4b91f5ef763dd3dd006819aece867e82a139264

                                                    SHA512

                                                    ca18a888dca452c6b08ad9f14b4936eb9223346c45c96629c3ee4dd6742e947b6825662b42e793135e205af77ad35e6765ac6a2b42cefed94781b3463a811f0a

                                                  • C:\ProgramData\AAKJEGCFBGDH\KJJJJD

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    57d817fbdadce24100bf6db7c793e097

                                                    SHA1

                                                    182f0c8e4a83a4d9676681473b0a85698d9e5a75

                                                    SHA256

                                                    dd1698441d677fcbe398d02e8e5f4469efca7a81ef7c560aabf2d87a5220f8e0

                                                    SHA512

                                                    b4d0fef9d7efef2d8fc07590328b0e6b341523982c88d62cbf4a7f9fc308b2dd30e539fee5c67f984051f1bf31098a54ca94ef214a8147efc22a97ee6e6775b9

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    0b7a8929890bae1566c5c43f03a9178d

                                                    SHA1

                                                    848d71c553134da4356c87ed13290d87a805580f

                                                    SHA256

                                                    2d4a84e48cc5692d678b425cedf7999212bf60e7c12ebf1ccd06fa5ffef97d15

                                                    SHA512

                                                    55c17188dd069afaf70ea6d10a5a5aedddac1878df5d6bef2baee9cb17a24405c7d72b1b3ae4a2ed900300f52e89cb1af8a3669d20689ffcbf2636391089239f

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    b24dfc7830762bcc186513681b78b47c

                                                    SHA1

                                                    c1efdc68a8be92bb4e399073b481647604b1d53f

                                                    SHA256

                                                    905bbcbfa6d5aeb7c5abb064baa8dce7404851fc50a1d28994c24e3afe1a5949

                                                    SHA512

                                                    859d6e9d8ab8008d6edadf44ad969e0f5f7d6a9bbc49dc8f8f37991789dad3c45bde7f2404c8a4198515e9a648aee1547f39276686479333ce0a9cf95ec5aa09

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                    Filesize

                                                    342B

                                                    MD5

                                                    00ef245e1c43b9c3e2408a572c3b2fd5

                                                    SHA1

                                                    d8c2f8d4ae13258b17ab2b5f6dd97a4d1ce58af5

                                                    SHA256

                                                    e97201731649e3fb9803656a4fc4ab414bda44151f95ce84a4c22d06bc8f8591

                                                    SHA512

                                                    c740ae9affe6ee4f4f7c54f17d02dfee7195aa39bcbae6462a5fe202bf9697168294608803ab39e04f8a023a04c00a876f9e281848985c612a514fd0de0ebdf4

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    40B

                                                    MD5

                                                    29acc7d11d4391748f3d1253849a2e0b

                                                    SHA1

                                                    3ff5749dfe8a28085a4a40cb88a60e498cbd9175

                                                    SHA256

                                                    8e133e9d24921ee093ae9b9b18270faa284d0adb2d88ee326ec85cb0642ba8e5

                                                    SHA512

                                                    0a6eec4b96e4f9f9886f5607684d94a603f240d5a2964e9f5698bdb8c93eada7c7c6959d0a339c2ebc5c21069412074199b26ef82969222ae1700150134eeaac

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000009.dbtmp

                                                    Filesize

                                                    16B

                                                    MD5

                                                    979c29c2917bed63ccf520ece1d18cda

                                                    SHA1

                                                    65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                                    SHA256

                                                    b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                                    SHA512

                                                    e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                                    Filesize

                                                    16B

                                                    MD5

                                                    aefd77f47fb84fae5ea194496b44c67a

                                                    SHA1

                                                    dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                                    SHA256

                                                    4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                                    SHA512

                                                    b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000008.dbtmp

                                                    Filesize

                                                    16B

                                                    MD5

                                                    589c49f8a8e18ec6998a7a30b4958ebc

                                                    SHA1

                                                    cd4e0e2a5cb1fd5099ff88daf4f48bdba566332e

                                                    SHA256

                                                    26d067dbb5e448b16f93a1bb22a2541beb7134b1b3e39903346d10b96022b6b8

                                                    SHA512

                                                    e73566a037838d1f7db7e9b728eba07db08e079de471baca7c8f863c7af7beb36221e9ff77e0a898ce86d4ef4c36f83fb3af9c35e342061b7a5442ca3b9024d2

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    f50f89a0a91564d0b8a211f8921aa7de

                                                    SHA1

                                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                    SHA256

                                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                    SHA512

                                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                                    Filesize

                                                    136B

                                                    MD5

                                                    5ecbe14a95703a1ea45585bed0512ae3

                                                    SHA1

                                                    a68e9e986e97c66779f718cb04e37cba080e4589

                                                    SHA256

                                                    7babdf34d1ca25703f405681fc51bcc6c890e405c1498b66858c3cd1ca8016e9

                                                    SHA512

                                                    67b899dcdcc6dd30df4658a5a2f676e2554805d161149bb296183e79295c1b917addd607803e16bdae9f2ace9bf973df1762e77b78c8bb107f849f233b80d57c

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000006

                                                    Filesize

                                                    50B

                                                    MD5

                                                    78c55e45e9d1dc2e44283cf45c66728a

                                                    SHA1

                                                    88e234d9f7a513c4806845ce5c07e0016cf13352

                                                    SHA256

                                                    7b69a2bee12703825dc20e7d07292125180b86685d2d1b9fd097df76fc6791ec

                                                    SHA512

                                                    f2ad4594024871286b98a94223b8e7155c7934ef4ebb55f25a4a485a059f75b572d21bc96e9b48ed394be8a41fe0208f7bfb6e28a79d75640c5b684f0c848fe3

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                                    Filesize

                                                    136B

                                                    MD5

                                                    23ed54ca631a2e834a67cee58c87b948

                                                    SHA1

                                                    256641b295bc6a46a2073d44ca943b38160685cb

                                                    SHA256

                                                    03a6cecb29aaef1c4dd7d5c980205d7cf56d94f88637d6dc7b9069bf66ecbcd7

                                                    SHA512

                                                    4d5bcbbae73ac356b2068d3cfc8b91472d359bfe762ecc7149906410b437efc84346b7b02bfbf83a2d54692079b9c981eadcc654366ef93f28dcf4f48cf01c39

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\MANIFEST-000007

                                                    Filesize

                                                    107B

                                                    MD5

                                                    22b937965712bdbc90f3c4e5cd2a8950

                                                    SHA1

                                                    25a5df32156e12134996410c5f7d9e59b1d6c155

                                                    SHA256

                                                    cad3bbec41899ea5205612fc1494fa7ba88847fb75437a2def22211a4003e2eb

                                                    SHA512

                                                    931427ad4609ab4ca12b2ee852d4965680f58602b00c182a2d340acf3163d888be6cfad87ca089f2b47929ddfa66be03ab13a6d24922397334d6997d4c8ede3b

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                                    Filesize

                                                    16B

                                                    MD5

                                                    18e723571b00fb1694a3bad6c78e4054

                                                    SHA1

                                                    afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                    SHA256

                                                    8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                    SHA512

                                                    43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000008.ldb

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    b598df23549718d247a3b994e466a285

                                                    SHA1

                                                    e01c4faca55b1a8edfcbf6451f1d1fc12c65b984

                                                    SHA256

                                                    de8696de18260272e6a37e4f80bc00cddc34f4bc7835c9ecc5dd4e9ba096b50d

                                                    SHA512

                                                    b5985edbf24623d4356ee157aae6bb43b7412dc2221bfb214756050f3be001cc528a2ce16740d7e8b6a5383530bb83fa414cbaaef428e413c6d954baf974f6d4

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000009.log

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    95414a5209f87e66d276e533a0d6494c

                                                    SHA1

                                                    acaa7564a4951debdfc72e60cbccf9967ae14bb0

                                                    SHA256

                                                    d1defc1ba88cbb0fbea24378710e04d03f364523bca580ff2aa8da923edd3096

                                                    SHA512

                                                    09c0bae1343e1480edd2d6d921a54b346c7e5bed12ccf86f4e112eb300d6095e448c340aead92477d5c0a5122628ff66128b17184a489ad6748fd66b8d4f6735

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                                    Filesize

                                                    250B

                                                    MD5

                                                    a480caf08f5f7e69e59ccd36fcc686b8

                                                    SHA1

                                                    f490a820f86a1b9a108938676b141f6ea931a1f8

                                                    SHA256

                                                    4ef133d564347e16cbf98be8cb78437568a0b4d73b35506a6c1649032e2fccce

                                                    SHA512

                                                    859c07249e7c4e3df855e3fd6661a5f3810d4fd56c0782c29964845544a57f76eed6df97dd2315aa49e24163adee984811d50c0c625cb403fd61386bb0c69146

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\MANIFEST-000007

                                                    Filesize

                                                    250B

                                                    MD5

                                                    17955c6a1bfe62d0dc5fef82ef990a13

                                                    SHA1

                                                    c4bc3f9ccf3fa9626c9279ecb1a4cbfbf4a0fcf5

                                                    SHA256

                                                    1cba135964cd409db09911c7cd4699112622596ff633cea868a83c54088c03a7

                                                    SHA512

                                                    5fb73bb4f7eb1c9e26f34e5d0f310783c7e629e717760ee38731a52a8e3fba6831d77abf0f37631fed820839a00c9242a582e59266de08d3c92c5c4f83c8e7a3

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                                    Filesize

                                                    249B

                                                    MD5

                                                    27654494286755f6317ab073e91cbbc2

                                                    SHA1

                                                    ce4bb80688b7c679568bdce8ffd8e44807cd8cdc

                                                    SHA256

                                                    bedf0223bea95a16a31f42411d022df1e79fb322a53a9e002b1be559a2f78c60

                                                    SHA512

                                                    bbf80026905c613b17673a007a0acab63e6a48b733fb5834b3f78bc4c349549f3b0771b30e631d6efa4dbc3ae67a7d69bda3fa1eccc766559478664bb3569ffb

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\MANIFEST-000007

                                                    Filesize

                                                    98B

                                                    MD5

                                                    1c0c23649f958fa25b0407c289db12da

                                                    SHA1

                                                    5f6b10cd5a39fe8c30353bcf4cd4e4a60ef35574

                                                    SHA256

                                                    d5134b804a775cfb79c6166d15b5721d38ffc2da11948a6c1263595d6c2941cf

                                                    SHA512

                                                    b691e882018833a108bd286bc76c55a140d00d5a266617a3a381af1ceff01aefaef17acef29d14dec931d7051455726cde8974cd04cc07302f1c3cc452fe2f52

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000009.log

                                                    Filesize

                                                    34B

                                                    MD5

                                                    fe62c64b5b3d092170445d5f5230524e

                                                    SHA1

                                                    0e27b930da78fce26933c18129430816827b66d3

                                                    SHA256

                                                    1e1a9ca70503efd8c607f9bc7131f08aba0476d75f2586dadb4da5485a5315d4

                                                    SHA512

                                                    924daccfbfb0c0464b4c5fd769e01a8f2e96fe28b635aa27ab4cd91766b05b03bbf941af14c017436107673f01bad815ce1fac2a649e745c76b3c736994b4fd2

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000010.dbtmp

                                                    Filesize

                                                    16B

                                                    MD5

                                                    60e3f691077715586b918375dd23c6b0

                                                    SHA1

                                                    476d3eab15649c40c6aebfb6ac2366db50283d1b

                                                    SHA256

                                                    e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                                    SHA512

                                                    d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                                    Filesize

                                                    249B

                                                    MD5

                                                    ef1988c40c68077d8bd57a8a6d316256

                                                    SHA1

                                                    4a82c863cf6bb975803a0ea052bd3a2878729992

                                                    SHA256

                                                    6471e95dc9f507ab3479047878dc5550b5d0e82641bc7155989f5a63daec7c66

                                                    SHA512

                                                    1470d479ed7e959b3c22bff00d64a182ae36efbbdd008282c6f0e3cc8c72ecf4c77f0df13822fa5d6c2c85ce8d2788198e090d7dc6ad3fb6a1f2ca4d04afb3d4

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\MANIFEST-000007

                                                    Filesize

                                                    118B

                                                    MD5

                                                    d5842b6fb90a67708c353f0f3a33be85

                                                    SHA1

                                                    48a9e06c9bcf2791ac6376622d6dea179689255e

                                                    SHA256

                                                    c63523f14d423eee3b43947283056d5219edd0c63318007b1b876e24ab101d03

                                                    SHA512

                                                    1a5f288211bfdceedc802fe9de9cda4596d3db06222a742600a67262671f5084feb4ac797d39a10c02854590f680d47df39cd81bd41312a0807db597beabbaec

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                    Filesize

                                                    14B

                                                    MD5

                                                    9eae63c7a967fc314dd311d9f46a45b7

                                                    SHA1

                                                    caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf

                                                    SHA256

                                                    4288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d

                                                    SHA512

                                                    bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                    Filesize

                                                    86B

                                                    MD5

                                                    961e3604f228b0d10541ebf921500c86

                                                    SHA1

                                                    6e00570d9f78d9cfebe67d4da5efe546543949a7

                                                    SHA256

                                                    f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed

                                                    SHA512

                                                    535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                    Filesize

                                                    2B

                                                    MD5

                                                    99914b932bd37a50b983c5e7c90ae93b

                                                    SHA1

                                                    bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                    SHA256

                                                    44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                    SHA512

                                                    27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\activity-stream.discovery_stream.json.tmp

                                                    Filesize

                                                    32KB

                                                    MD5

                                                    b02e04c15b57ec90b725641166520ff3

                                                    SHA1

                                                    3b8b09afd65c111fca3d5147e864353439d47a3c

                                                    SHA256

                                                    db4c71e8602a3b80630109a4c2ec1f79e1ac5705fcf3732ad9da3de72497fb27

                                                    SHA512

                                                    644010160c031e93b78303b408dbeb31f72b1a1041aeea4d71e52a63f64cff241130a81abe3e87d87d810c5b6500d155f26cd51b671b6141e3a4956d24590369

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                    Filesize

                                                    13KB

                                                    MD5

                                                    f99b4984bd93547ff4ab09d35b9ed6d5

                                                    SHA1

                                                    73bf4d313cb094bb6ead04460da9547106794007

                                                    SHA256

                                                    402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069

                                                    SHA512

                                                    cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759

                                                  • C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe

                                                    Filesize

                                                    1.1MB

                                                    MD5

                                                    7f8c660bbf823d65807e4164a91dd058

                                                    SHA1

                                                    97ac83cbe12b04fbe1b4d98e812480e1f66d577d

                                                    SHA256

                                                    5a45b35e922d52f1bc47530634465ed1f989d9916684bf9591006a6172542509

                                                    SHA512

                                                    89872cc15ca3a91d43b0b4261b04c38b8ac545c9b4afdb47d2b0288167b512fbe709de04fd2d1809ca1afee67a5a799aa7943f5aff65a5aa3197f9e10545c919

                                                  • C:\Users\Admin\AppData\Local\Temp\1009351041\PeRVAzl.ps1

                                                    Filesize

                                                    3.0MB

                                                    MD5

                                                    2b918bf4566595e88a664111ce48b161

                                                    SHA1

                                                    e32fbdf64bb71dc870bfad9bbd571f11c6a723f4

                                                    SHA256

                                                    48492827286d403668996ae3814b2216b3b616f2fb4af2022bf3d2fc3f979a26

                                                    SHA512

                                                    e3d58adbe13befe91fb950cc52b16d6d2fcb8f6d65bab4020222713207b07ce78b76e2e2532cf3de23149e934ba1e1cb9046a95a18424a668bfa4a355af6f44a

                                                  • C:\Users\Admin\AppData\Local\Temp\1009551001\knotc.exe

                                                    Filesize

                                                    22.3MB

                                                    MD5

                                                    719dcf184f232c140a40a69f05ae2ae7

                                                    SHA1

                                                    ac1e40daf79114c78ca756f2cfe5619cd2804cc2

                                                    SHA256

                                                    5b5856719e14b1dcf6297e51e69b147263a72203e2f7bc5d938ae41f01312270

                                                    SHA512

                                                    36ec8a14ee9f579f221662f29f08882f6f9dc59637100a99bc782cddbdf3aa1c27925ca5ff94e7b3e52e092a789104713e781226050466841d01cc04960bf2a5

                                                  • C:\Users\Admin\AppData\Local\Temp\1009552001\2879339004.exe

                                                    Filesize

                                                    4.3MB

                                                    MD5

                                                    0473a8e8e6d92ece5fe21d23552391d2

                                                    SHA1

                                                    5f8b811f0df1a5c7c5de0d7d20965809b120e034

                                                    SHA256

                                                    42c6787fac49fff1f3b622983357d0346048598dd8c7f790fcabd5ed5503a127

                                                    SHA512

                                                    7672688ee9e1c7a204b03d611c110c2930b7a46559111379b34d5abac2d0ce6b38dcc52060fc855e6620cc5fff54ae5783358b0b7d2df24d4e5439427efaa0b7

                                                  • C:\Users\Admin\AppData\Local\Temp\1009557001\25e9d277fe.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    2c82b5398fb301bc2a2b3a9716e214ef

                                                    SHA1

                                                    540d9ac0bdba4130643627dbb578004a71b68302

                                                    SHA256

                                                    ae0615aebbe333c96a367f391103f4079076aba81341abf0081247addbb5c208

                                                    SHA512

                                                    04f8e6fa29b442642bbea31e8759472f6faabf61a038ec0579401599bc123cc3bbf3f8376df44045ad0a8b721a916723ee4d35e5d4701cdb49828e1ede57ef65

                                                  • C:\Users\Admin\AppData\Local\Temp\1009558001\4d10dc4f99.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    40fbf66fe2c47dcd8d2de9191b48b355

                                                    SHA1

                                                    eb7260a1cf345b9a225fa6250727db32e391ffd6

                                                    SHA256

                                                    c5723c29a13feb389fd9e72e6e81d914c0693d9846c2810d1d0bad4e3307eb78

                                                    SHA512

                                                    2d4328dea1251bd7694c4f1b42f7bf5efad6b8712364bd42db6f8ba612dffd430b6e4bc158756c5e68d9aa24b0904cdff7ac7fde06cdf2826f062077415d0690

                                                  • C:\Users\Admin\AppData\Local\Temp\1009559001\d031a638c4.exe

                                                    Filesize

                                                    900KB

                                                    MD5

                                                    9c130f43a75b749916375fada08cf486

                                                    SHA1

                                                    b0787ab9ce67d0954c9027d58c2fb7782a42a11e

                                                    SHA256

                                                    95cdc1cb2dc25c23029e61e302deb9f5f1607d382a204f487e9b2eb4d52b3044

                                                    SHA512

                                                    0f29a5634383206fbff2779a505e327e7468bf3c3d07825e615cb442513531cea2862a264d8b2cf47bb849e4978865902445b483172b635b1f4358587320bf3e

                                                  • C:\Users\Admin\AppData\Local\Temp\1009560001\c0d5371b15.exe

                                                    Filesize

                                                    2.7MB

                                                    MD5

                                                    9ec7150c51a4d30753fbab8a457121ee

                                                    SHA1

                                                    5a18ca834905608395d17b6ac0e3c90fd982a67c

                                                    SHA256

                                                    27574e7abdb7c3ee82ac007aa592e907b1c101b58e16263a629750be72c978d2

                                                    SHA512

                                                    0ee554a5a05536fc59ad14f339e374d324ee0b5ea2b17cc3621d9e83422aa0b745471eeac47409d8295fa46c30b866c3f5987f2e63d170e91998ae739e9a5197

                                                  • C:\Users\Admin\AppData\Local\Temp\397506\k

                                                    Filesize

                                                    540KB

                                                    MD5

                                                    c3f398f77bbc21294aa17caf6b0e6994

                                                    SHA1

                                                    9753fe7ddb15ab965155838192ca6aed909ff56b

                                                    SHA256

                                                    776d72e984f777c04609464a94576539908202dece7b8631feee29ab5b6ece50

                                                    SHA512

                                                    6b43a9bc32725c3e25abae17f6a7accb83b13f446479f1253630b72ab3c4ccb3dd4e36be26cf65b910f36f3bf3b48138c3c2684782dd361477a7e4e2bb4ac463

                                                  • C:\Users\Admin\AppData\Local\Temp\Answers

                                                    Filesize

                                                    97KB

                                                    MD5

                                                    287cadd3b072c264654b2e6e2566fb2b

                                                    SHA1

                                                    5e382082ef2dcfcb9b0312b9d8d76ac07625449e

                                                    SHA256

                                                    c3bcb56ffda3326608d754fdae6fa5785161206d8c9f06abbfa6f0cf3a05e459

                                                    SHA512

                                                    3c3988f6810772f112f2d05b8b4baf31c23ac1e0b441be93c9552fb2f64eec8d8779b3da2d08515cdbbf41140e8500a2982712fefbd6c8b03ad3168b1b21c734

                                                  • C:\Users\Admin\AppData\Local\Temp\Appreciate

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    cf4a755aa7bfb2afae9d7b0bae7a56cb

                                                    SHA1

                                                    f6fe9d88779c3277c86c52918fc050c585007d93

                                                    SHA256

                                                    2853c2f9d3db94ea67286c50a896f30c0eb4914763d8d74b450ac3faeea2c5d2

                                                    SHA512

                                                    bc185b1886fe438418b282df25d234b92f80386697bdd743d568849de572776439d0336263b3b9ffc4d6994e79316747e4483067ead4c5b8ec5ed09f6f592967

                                                  • C:\Users\Admin\AppData\Local\Temp\Benefits

                                                    Filesize

                                                    51KB

                                                    MD5

                                                    31772333ac1e8ac850ac86b9fda3ee23

                                                    SHA1

                                                    153a8bf471248744befd0fff259d515c875b4b1f

                                                    SHA256

                                                    a9101d5b78c38b72c53eed0ec896c4fbaa3bfdc9f72cd5c44688b48d66e31b6c

                                                    SHA512

                                                    7ebfe1dab4d62a0174487b70ccb7befdab182d1bc6f2f0319a27a7bc7b398e87968bbc6b59e4bf3058a5ebfabb2efe96561535c6b01d44943ab82ea26e0a488b

                                                  • C:\Users\Admin\AppData\Local\Temp\Bufing

                                                    Filesize

                                                    59KB

                                                    MD5

                                                    8d89a2fed5fe22eb7fd25f7f84feefc1

                                                    SHA1

                                                    7f9b5b806071b312b4d9e95391d6d96dbd66dde3

                                                    SHA256

                                                    5c16191e8d38db8381d2e67a324d0dc481c97f2647010a1b343e26277ab2d689

                                                    SHA512

                                                    88b04c9030d1ad1844f05134682c3a9b3adfabdfb22d1145d730a6508ff4ea0a81e21e46f493ff715acb9d3a4e6bb341c885d8b735cea601a86b8e54e9a52b12

                                                  • C:\Users\Admin\AppData\Local\Temp\Cab41.tmp

                                                    Filesize

                                                    70KB

                                                    MD5

                                                    49aebf8cbd62d92ac215b2923fb1b9f5

                                                    SHA1

                                                    1723be06719828dda65ad804298d0431f6aff976

                                                    SHA256

                                                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                    SHA512

                                                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                  • C:\Users\Admin\AppData\Local\Temp\Concept

                                                    Filesize

                                                    74KB

                                                    MD5

                                                    ba279e43bc3824f4dd387a5a6c15bd60

                                                    SHA1

                                                    857ce7750d1bf83461965e5069f6734c483ceae4

                                                    SHA256

                                                    fff37d64d11ab1cd68e00abf6774656e314388b6cca79fc19e01e33e7bd8c688

                                                    SHA512

                                                    c91b53e8c4b674ab7219e0b41899f95828aecf32b86733174a20700f9d70e658063b1ee26368412c977dd1b3aa812b82073d8d2d3321c3504c4d68c3cb50b784

                                                  • C:\Users\Admin\AppData\Local\Temp\Filter

                                                    Filesize

                                                    872KB

                                                    MD5

                                                    6ee7ddebff0a2b78c7ac30f6e00d1d11

                                                    SHA1

                                                    f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2

                                                    SHA256

                                                    865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4

                                                    SHA512

                                                    57d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0

                                                  • C:\Users\Admin\AppData\Local\Temp\Guides

                                                    Filesize

                                                    51KB

                                                    MD5

                                                    1214c7903301b6105f1751d35f8677a6

                                                    SHA1

                                                    43097cbab70e5007ed435eca7839cf693310a632

                                                    SHA256

                                                    9021d861a44500218566588391a3a17f1b1f0b00ab781b27fad7f57a1aa46c52

                                                    SHA512

                                                    93e1b42da3aa5bf7809ac8e4c51fe9bbffc53b54997b0e877c2adeb3d2459f8cde91ab3cd7913146491d5ded88a6b6815fc3b44f4d59844d7e4baa78e6ed37bc

                                                  • C:\Users\Admin\AppData\Local\Temp\Mix

                                                    Filesize

                                                    92KB

                                                    MD5

                                                    ebcaa458524017b6b69e50610fdcdfdc

                                                    SHA1

                                                    dde54c9c52267d42df70d932182413757a524050

                                                    SHA256

                                                    95365d774498df62fb358077e847f1dbad95ba6d09b1d6cc76c22d35b0bc9118

                                                    SHA512

                                                    dd146de78e15a86184350ef355cf48b63abbdeda20c10d6bc7507a8699f55e1bc80250986a9cb091f621e9cc5b34cdac552f7ad95f6aed7b09c3988d89471e22

                                                  • C:\Users\Admin\AppData\Local\Temp\Ram

                                                    Filesize

                                                    66KB

                                                    MD5

                                                    d6e907bcb5843d6825949565bb20cab4

                                                    SHA1

                                                    722862a965ce62a21ee20b0b1fb80aa3ca1fdead

                                                    SHA256

                                                    5339cbc5d3fc6aacdcf8a4ff313696b3c23af83a6823f779d769a647df85750b

                                                    SHA512

                                                    f1563a7b3a2f102fc6eff61b35736c2cc3d0bde304532485afb88c434152d283096415905d5c7accf0ea6394fd3e8c1c5b34957688241f14befdba88a0d7bcea

                                                  • C:\Users\Admin\AppData\Local\Temp\Tar54.tmp

                                                    Filesize

                                                    181KB

                                                    MD5

                                                    4ea6026cf93ec6338144661bf1202cd1

                                                    SHA1

                                                    a1dec9044f750ad887935a01430bf49322fbdcb7

                                                    SHA256

                                                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                    SHA512

                                                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                  • C:\Users\Admin\AppData\Local\Temp\Trunk

                                                    Filesize

                                                    50KB

                                                    MD5

                                                    63b9ae899f5a5c8bfe0ab9d6d583bd01

                                                    SHA1

                                                    013d6416534001cb5be061efd020af56e47eea1f

                                                    SHA256

                                                    e0cfff56e7141f31a568781504048ad5e0308b22227629d4e2885a58a0499b18

                                                    SHA512

                                                    bcadf064b072a29a34ef4593161d8ee7bbe3e1079b1bf08dc7422249fe4181e881084a98b5ac3edbbacbe9de0c3d6804c7f4b2694a51f74840e89f6bca117e3d

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                    Filesize

                                                    442KB

                                                    MD5

                                                    85430baed3398695717b0263807cf97c

                                                    SHA1

                                                    fffbee923cea216f50fce5d54219a188a5100f41

                                                    SHA256

                                                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                    SHA512

                                                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                    Filesize

                                                    8.0MB

                                                    MD5

                                                    a01c5ecd6108350ae23d2cddf0e77c17

                                                    SHA1

                                                    c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                    SHA256

                                                    345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                    SHA512

                                                    b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\db\data.safe.bin

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    11d561cd72447d5d11cb7391464a9e53

                                                    SHA1

                                                    07c7b0c26926d4a8bafa40ce74bc33b17f5807b8

                                                    SHA256

                                                    0d0a13791319f4bb131b9bc6714e5cd421dbafb4747f9d1d733a4a03a5f7a786

                                                    SHA512

                                                    63eedf53bfffdc3ac6fa8073a7ada5d42ea3976521aa3abde5df3e3bcdb3c7f81b4207ff83c41d5681f428f270313255dc9320b21e71f72a220ae07b08db69b5

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\bdedd8e5-2cf0-441e-8110-d590c48eab51

                                                    Filesize

                                                    12KB

                                                    MD5

                                                    ebdbe6a2efe4e1c7dae4230fa639d3b5

                                                    SHA1

                                                    8930a909ae3950a376b0dd13eeb9b7a66cf9aaab

                                                    SHA256

                                                    0f7731da6ec00dd84253127fa9659f96b8517170cca41452fd4accb1ecc81b6e

                                                    SHA512

                                                    a3917a27576079ab951153b3d02fddf965d02e4a0b9da7745590c53746c2e97a98304dbfa2d4dfab58ce5d2479121b2fdc06272b50c98fd9c30423291c2a8508

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\c86d6003-4e76-473a-bece-96666b5600b0

                                                    Filesize

                                                    745B

                                                    MD5

                                                    eb33d7431ebed572e6eefce261d60cd7

                                                    SHA1

                                                    3be5cbdebd65dacd2a3ebf42216d81ce4b28bded

                                                    SHA256

                                                    16d0ee5dd887ec59d8f53d6f46977e4538bc4d156a30177829c703f8006c3a17

                                                    SHA512

                                                    3860b35389096558bf3f739f36a1c0ba947e200f592a67ad58d68c7861c2ea9dde3ec08193981a72efcad08f37c1fc4bf06dfc7ac850c8e71032b69f9753c7dc

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                    Filesize

                                                    997KB

                                                    MD5

                                                    fe3355639648c417e8307c6d051e3e37

                                                    SHA1

                                                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                    SHA256

                                                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                    SHA512

                                                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                    Filesize

                                                    116B

                                                    MD5

                                                    3d33cdc0b3d281e67dd52e14435dd04f

                                                    SHA1

                                                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                    SHA256

                                                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                    SHA512

                                                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                    Filesize

                                                    479B

                                                    MD5

                                                    49ddb419d96dceb9069018535fb2e2fc

                                                    SHA1

                                                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                    SHA256

                                                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                    SHA512

                                                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                    Filesize

                                                    372B

                                                    MD5

                                                    8be33af717bb1b67fbd61c3f4b807e9e

                                                    SHA1

                                                    7cf17656d174d951957ff36810e874a134dd49e0

                                                    SHA256

                                                    e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                    SHA512

                                                    6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                    Filesize

                                                    11.8MB

                                                    MD5

                                                    33bf7b0439480effb9fb212efce87b13

                                                    SHA1

                                                    cee50f2745edc6dc291887b6075ca64d716f495a

                                                    SHA256

                                                    8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                    SHA512

                                                    d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    688bed3676d2104e7f17ae1cd2c59404

                                                    SHA1

                                                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                    SHA256

                                                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                    SHA512

                                                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    937326fead5fd401f6cca9118bd9ade9

                                                    SHA1

                                                    4526a57d4ae14ed29b37632c72aef3c408189d91

                                                    SHA256

                                                    68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                    SHA512

                                                    b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs-1.js

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    01f6c2afda928bc46cc4a98f6547cb33

                                                    SHA1

                                                    88b000d7402d36b9513cc802af8b59ee35cf906f

                                                    SHA256

                                                    79014707ce049258bb4591702cad9e361a8ffbe710992e836eefc5ec4a78b0fb

                                                    SHA512

                                                    d4604218c9428139f12a7029d4c409ad50c8410003fd1d37f0a41a61d8abb881fd96a0523f219c058cac93f676a1c1954ea078a757d6a18502842ea2ab50e62f

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs.js

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    03d795d9e7bdf0e040f79313b27d6cb2

                                                    SHA1

                                                    5fdeb6694f0483388c833e4b57b617671d94549b

                                                    SHA256

                                                    8f4773495d77ff4cdf1c03a59d57640e2795767b38b2ff594df0b862f6db1928

                                                    SHA512

                                                    bd8eb75c0157442200729c9a0d39a3ba7dfd0ee9726df20c54b07adb857b9c911d8618e9bc01d96e9d07a3579b5defbfc0b4c11d5f2ca9df0dd7f48c361c88b6

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs.js

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    a00b40bf08454cbfa5a26fb3966c827d

                                                    SHA1

                                                    86ea3ea83d38915b07194718cd09255e5669b008

                                                    SHA256

                                                    e17dcee613b7656f05b1748bd13e1fcdee6944370749ae985b9b93125693a878

                                                    SHA512

                                                    aa36dbea8073b662c6c047cb469f12a235be56aae20035a9fd6812399c82617f0307ea652a93a96d9f1802dbf954defff25eba5f578848ef9f9f336ee8f8da3a

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\sessionstore-backups\recovery.jsonlz4

                                                    Filesize

                                                    4KB

                                                    MD5

                                                    56897c7e968764efc773cffc182f40be

                                                    SHA1

                                                    4fd7bdeb58b73c6f0a21612c4e71b2295a0cc46a

                                                    SHA256

                                                    44bac755cbddb8164c33e654c190f4b8e30e085acb882e02705501bbc43083a0

                                                    SHA512

                                                    b25870c800691738b82850d309671a96028fd269a75e29a2c0035255fdf8cd9ea49214339f3d70feb3a5d139972903b727d6aa238a119cd6c3b1208595e9f2a3

                                                  • \??\pipe\crashpad_532_BPRNREZPGMWMETSZ

                                                    MD5

                                                    d41d8cd98f00b204e9800998ecf8427e

                                                    SHA1

                                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                    SHA256

                                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                    SHA512

                                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                  • \ProgramData\mozglue.dll

                                                    Filesize

                                                    593KB

                                                    MD5

                                                    c8fd9be83bc728cc04beffafc2907fe9

                                                    SHA1

                                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                    SHA256

                                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                    SHA512

                                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                  • \ProgramData\nss3.dll

                                                    Filesize

                                                    2.0MB

                                                    MD5

                                                    1cc453cdf74f31e4d913ff9c10acdde2

                                                    SHA1

                                                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                    SHA256

                                                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                    SHA512

                                                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                  • \Users\Admin\DocumentsBFCAAEHJDB.exe

                                                    Filesize

                                                    1.9MB

                                                    MD5

                                                    fa098b363f56394eb669a96201d3521d

                                                    SHA1

                                                    76ecc170b800c1ec06e738a7b5e36e71233f8f2a

                                                    SHA256

                                                    40fc948cd1a58cb92a7a43d066fd250ef34ad52984efb82950c20bd60e7cf21f

                                                    SHA512

                                                    0c16d78ab94169f9b82dbbe5fabba0a1b4d8dc7294bb8cd7186334cd9e324a1b09d12bc40c10e661101247f85fdae1c1a409750d4d906b1a54ec59b9a030b66f

                                                  • memory/540-1010-0x0000000000A70000-0x00000000016FF000-memory.dmp

                                                    Filesize

                                                    12.6MB

                                                  • memory/540-1158-0x0000000000A70000-0x00000000016FF000-memory.dmp

                                                    Filesize

                                                    12.6MB

                                                  • memory/1400-144-0x0000000006ED0000-0x00000000073A1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/1400-143-0x0000000006ED0000-0x00000000073A1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/1400-147-0x0000000000FF0000-0x00000000014C1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/1848-1487-0x0000000000A40000-0x0000000000CF6000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/1848-1510-0x0000000000A40000-0x0000000000CF6000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/1848-1488-0x0000000000A40000-0x0000000000CF6000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/1848-1486-0x0000000000A40000-0x0000000000CF6000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2728-561-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-560-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-1014-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-763-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-1033-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-1037-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-1056-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-1059-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-1154-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-1155-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-1156-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-1006-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-977-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-933-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-559-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-973-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-564-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-563-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-954-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-562-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-723-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-1249-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-743-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2728-744-0x0000000003B60000-0x0000000003DCD000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2768-128-0x00000000022D0000-0x00000000027A1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2816-131-0x0000000000E80000-0x0000000001534000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2816-0-0x0000000000E80000-0x0000000001534000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2816-1-0x0000000076F50000-0x0000000076F52000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2816-2-0x0000000000E81000-0x0000000000E98000-memory.dmp

                                                    Filesize

                                                    92KB

                                                  • memory/2816-3-0x0000000000E80000-0x0000000001534000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2816-4-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                    Filesize

                                                    972KB

                                                  • memory/2816-70-0x0000000000E80000-0x0000000001534000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2816-81-0x0000000000E80000-0x0000000001534000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2816-83-0x0000000000E80000-0x0000000001534000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2816-100-0x0000000000E80000-0x0000000001534000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2952-1485-0x0000000006910000-0x0000000006BC6000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2952-1271-0x0000000006910000-0x0000000006DBF000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2952-1489-0x00000000013E0000-0x00000000018B1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2952-1617-0x00000000013E0000-0x00000000018B1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2952-1511-0x00000000013E0000-0x00000000018B1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2952-1615-0x00000000013E0000-0x00000000018B1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2952-550-0x00000000013E0000-0x00000000018B1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2952-148-0x00000000013E0000-0x00000000018B1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2952-1009-0x0000000006910000-0x000000000759F000-memory.dmp

                                                    Filesize

                                                    12.6MB

                                                  • memory/2952-1007-0x00000000013E0000-0x00000000018B1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2952-1548-0x00000000013E0000-0x00000000018B1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2952-1188-0x0000000006910000-0x0000000006DBF000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2952-1235-0x0000000006910000-0x000000000759F000-memory.dmp

                                                    Filesize

                                                    12.6MB

                                                  • memory/2952-1482-0x0000000006910000-0x0000000006FC4000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2952-1247-0x0000000006910000-0x0000000006FC4000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2952-1604-0x00000000013E0000-0x00000000018B1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2952-742-0x00000000013E0000-0x00000000018B1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2952-1250-0x00000000013E0000-0x00000000018B1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2952-1603-0x00000000013E0000-0x00000000018B1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2952-1602-0x00000000013E0000-0x00000000018B1000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/2992-1252-0x00000000010D0000-0x0000000001784000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/2992-1248-0x00000000010D0000-0x0000000001784000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/3060-1231-0x00000000002F0000-0x000000000079F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3060-1189-0x00000000002F0000-0x000000000079F000-memory.dmp

                                                    Filesize

                                                    4.7MB