Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 05:46

General

  • Target

    file.exe

  • Size

    1.7MB

  • MD5

    ce78eaec6bc30509ef921f275b86768c

  • SHA1

    ac84430b471a1a6753915d13ca079fabc8486b58

  • SHA256

    67f7dca1221431e72579b4f33f19c37264a7066c504f360d56d1c09ac22c3c1e

  • SHA512

    f28e96fe8d720e4c4a4bf8141d962eafa9b996aa71f5082178c8670d31c2bf16f84ba23110a394e5dbed8c91acb7f32d02354a34f906b759bdb291c18c69a314

  • SSDEEP

    49152:PVrPpjK6NLewAJSPjPLvswV0aFSetq6GGIS4:drZ7QrwjLlV0aFBtql7S4

Malware Config

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 16 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
      2⤵
      • Uses browser remote debugging
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6619758,0x7fef6619768,0x7fef6619778
        3⤵
          PID:1048
        • C:\Windows\system32\ctfmon.exe
          ctfmon.exe
          3⤵
            PID:2420
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1084 --field-trial-handle=1360,i,9962559427388539178,8228662925720448866,131072 /prefetch:2
            3⤵
              PID:2624
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1360,i,9962559427388539178,8228662925720448866,131072 /prefetch:8
              3⤵
                PID:1092
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1360,i,9962559427388539178,8228662925720448866,131072 /prefetch:8
                3⤵
                  PID:1464
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2156 --field-trial-handle=1360,i,9962559427388539178,8228662925720448866,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:2836
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2464 --field-trial-handle=1360,i,9962559427388539178,8228662925720448866,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:1500
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2472 --field-trial-handle=1360,i,9962559427388539178,8228662925720448866,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:1864
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1456 --field-trial-handle=1360,i,9962559427388539178,8228662925720448866,131072 /prefetch:2
                  3⤵
                    PID:1900
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1360,i,9962559427388539178,8228662925720448866,131072 /prefetch:8
                    3⤵
                      PID:2772
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                    2⤵
                    • Uses browser remote debugging
                    • Enumerates system info in registry
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    PID:2104
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5e59758,0x7fef5e59768,0x7fef5e59778
                      3⤵
                        PID:2248
                      • C:\Windows\system32\ctfmon.exe
                        ctfmon.exe
                        3⤵
                          PID:1556
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1104 --field-trial-handle=1284,i,12058853087969292099,6795293120838879967,131072 /prefetch:2
                          3⤵
                            PID:952
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1284,i,12058853087969292099,6795293120838879967,131072 /prefetch:8
                            3⤵
                              PID:2528
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1284,i,12058853087969292099,6795293120838879967,131072 /prefetch:8
                              3⤵
                                PID:2724
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2096 --field-trial-handle=1284,i,12058853087969292099,6795293120838879967,131072 /prefetch:1
                                3⤵
                                • Uses browser remote debugging
                                PID:2252
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2604 --field-trial-handle=1284,i,12058853087969292099,6795293120838879967,131072 /prefetch:1
                                3⤵
                                • Uses browser remote debugging
                                PID:2880
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2616 --field-trial-handle=1284,i,12058853087969292099,6795293120838879967,131072 /prefetch:1
                                3⤵
                                • Uses browser remote debugging
                                PID:560
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1296 --field-trial-handle=1284,i,12058853087969292099,6795293120838879967,131072 /prefetch:2
                                3⤵
                                  PID:1200
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4088 --field-trial-handle=1284,i,12058853087969292099,6795293120838879967,131072 /prefetch:8
                                  3⤵
                                    PID:2464
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\AKJEGCFBGD.exe"
                                  2⤵
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  PID:888
                                  • C:\Users\Admin\Documents\AKJEGCFBGD.exe
                                    "C:\Users\Admin\Documents\AKJEGCFBGD.exe"
                                    3⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Loads dropped DLL
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of FindShellTrayWindow
                                    PID:2732
                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                      4⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Loads dropped DLL
                                      • Adds Run key to start application
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1148
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1011155041\CewMt20.ps1"
                                        5⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3064
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1011161041\6JTjKQS.ps1"
                                        5⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2404
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1011164041\ml3y93U.ps1"
                                        5⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1552
                                      • C:\Users\Admin\AppData\Local\Temp\1011165001\tR7DLnB.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1011165001\tR7DLnB.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        • Accesses Microsoft Outlook profiles
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        • outlook_office_path
                                        • outlook_win_path
                                        PID:2928
                                      • C:\Users\Admin\AppData\Local\Temp\1011197001\4cdf5f0149.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1011197001\4cdf5f0149.exe"
                                        5⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:9748
                                      • C:\Users\Admin\AppData\Local\Temp\1011198001\3ab0b72f70.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1011198001\3ab0b72f70.exe"
                                        5⤵
                                        • Enumerates VirtualBox registry keys
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3076
                                      • C:\Users\Admin\AppData\Local\Temp\1011199001\02a81bce14.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1011199001\02a81bce14.exe"
                                        5⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Modifies system certificate store
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:4640
                                      • C:\Users\Admin\AppData\Local\Temp\1011200001\0cade74165.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1011200001\0cade74165.exe"
                                        5⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2864
                                      • C:\Users\Admin\AppData\Local\Temp\1011201001\73649fb33d.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1011201001\73649fb33d.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:4240
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM firefox.exe /T
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4364
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM chrome.exe /T
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4544
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM msedge.exe /T
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:9732
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM opera.exe /T
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2992
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /IM brave.exe /T
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1916
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                          6⤵
                                            PID:4780
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                              7⤵
                                              • Checks processor information in registry
                                              • Modifies registry class
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:4796
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4796.0.1938050381\225856424" -parentBuildID 20221007134813 -prefsHandle 1228 -prefMapHandle 1220 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {88838b36-f2d1-4fe0-a722-096180d25afa} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" 1292 12fd5b58 gpu
                                                8⤵
                                                  PID:5292
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4796.1.1485420895\735378494" -parentBuildID 20221007134813 -prefsHandle 1496 -prefMapHandle 1492 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0e7f7e2-72a7-4e18-bb4f-70049bc91445} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" 1508 e71258 socket
                                                  8⤵
                                                    PID:5476
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4796.2.730695256\280153014" -childID 1 -isForBrowser -prefsHandle 2112 -prefMapHandle 2108 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {04f616cc-e105-4e56-ad97-517c1a1c972d} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" 2124 1a9a7258 tab
                                                    8⤵
                                                      PID:9876
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4796.3.930950384\1800397581" -childID 2 -isForBrowser -prefsHandle 2960 -prefMapHandle 2932 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b6c786b-8417-4822-b296-c89f65f6afa9} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" 2972 1b8fb258 tab
                                                      8⤵
                                                        PID:3948
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4796.4.1865618784\937517936" -childID 3 -isForBrowser -prefsHandle 3652 -prefMapHandle 3584 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ebba732e-d90f-4ee1-9c72-b8f6d572be46} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" 3668 1bf0eb58 tab
                                                        8⤵
                                                          PID:3372
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4796.5.570153353\1366463490" -childID 4 -isForBrowser -prefsHandle 3840 -prefMapHandle 3844 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {43d48573-f5be-48fb-b4fe-80fb0881cbd1} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" 3828 1f574e58 tab
                                                          8⤵
                                                            PID:3428
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4796.6.1281029265\2126752961" -childID 5 -isForBrowser -prefsHandle 4008 -prefMapHandle 4012 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 824 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e369f6e-783e-45cb-9c8f-78432d0e1f27} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" 3996 1f577e58 tab
                                                            8⤵
                                                              PID:3748
                                                      • C:\Users\Admin\AppData\Local\Temp\1011202001\d116542b8c.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1011202001\d116542b8c.exe"
                                                        5⤵
                                                        • Modifies Windows Defender Real-time Protection settings
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Windows security modification
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3668
                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                1⤵
                                                  PID:2520
                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                  1⤵
                                                    PID:1292

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    40B

                                                    MD5

                                                    29acc7d11d4391748f3d1253849a2e0b

                                                    SHA1

                                                    3ff5749dfe8a28085a4a40cb88a60e498cbd9175

                                                    SHA256

                                                    8e133e9d24921ee093ae9b9b18270faa284d0adb2d88ee326ec85cb0642ba8e5

                                                    SHA512

                                                    0a6eec4b96e4f9f9886f5607684d94a603f240d5a2964e9f5698bdb8c93eada7c7c6959d0a339c2ebc5c21069412074199b26ef82969222ae1700150134eeaac

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                                    Filesize

                                                    16B

                                                    MD5

                                                    18e723571b00fb1694a3bad6c78e4054

                                                    SHA1

                                                    afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                    SHA256

                                                    8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                    SHA512

                                                    43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000009.dbtmp

                                                    Filesize

                                                    16B

                                                    MD5

                                                    979c29c2917bed63ccf520ece1d18cda

                                                    SHA1

                                                    65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                                    SHA256

                                                    b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                                    SHA512

                                                    e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000010.dbtmp

                                                    Filesize

                                                    16B

                                                    MD5

                                                    60e3f691077715586b918375dd23c6b0

                                                    SHA1

                                                    476d3eab15649c40c6aebfb6ac2366db50283d1b

                                                    SHA256

                                                    e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                                    SHA512

                                                    d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Affiliation Database

                                                    Filesize

                                                    32KB

                                                    MD5

                                                    69e3a8ecda716584cbd765e6a3ab429e

                                                    SHA1

                                                    f0897f3fa98f6e4863b84f007092ab843a645803

                                                    SHA256

                                                    e0c9f1494a417f356b611ec769b975a4552c4065b0bc2181954fcbb4b3dfa487

                                                    SHA512

                                                    bb78069c17196da2ce8546046d2c9d9f3796f39b9868b749ecada89445da7a03c9b54a00fcf34a23eb0514c871e026ac368795d2891bbf37e1dc5046c29beaaa

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\wasm\index

                                                    Filesize

                                                    24B

                                                    MD5

                                                    54cb446f628b2ea4a5bce5769910512e

                                                    SHA1

                                                    c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                                                    SHA256

                                                    fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                                                    SHA512

                                                    8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Extension Scripts\000003.log

                                                    Filesize

                                                    76B

                                                    MD5

                                                    cc4a8cff19abf3dd35d63cff1503aa5f

                                                    SHA1

                                                    52af41b0d9c78afcc8e308db846c2b52a636be38

                                                    SHA256

                                                    cc5dacf370f324b77b50dddf5d995fd3c7b7a587cb2f55ac9f24c929d0cd531a

                                                    SHA512

                                                    0e9559cda992aa2174a7465745884f73b96755008384d21a0685941acf099c89c8203b13551de72a87b8e23cdaae3fa513bc700b38e1bf3b9026955d97920320

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Extension Scripts\LOG

                                                    Filesize

                                                    192B

                                                    MD5

                                                    7367252507bc7992f57eaccea84e8cd4

                                                    SHA1

                                                    f900c60da8cd9cd142257a7e5a063e8b094a39a5

                                                    SHA256

                                                    27718cd81b396994eed3ea5e391678967b771359f1adc8c5b9d649084fd07f82

                                                    SHA512

                                                    5e6607a4d088afb74386e2dc90d79904c8cbde2e4bec8c9ff9a3613c772bbe38136432ca8963cefbcf6cb2a9b0afbc27b58bfe2087a612b96ed5b6ef410ec09d

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Extension Scripts\MANIFEST-000002

                                                    Filesize

                                                    50B

                                                    MD5

                                                    22bf0e81636b1b45051b138f48b3d148

                                                    SHA1

                                                    56755d203579ab356e5620ce7e85519ad69d614a

                                                    SHA256

                                                    e292f241daafc3df90f3e2d339c61c6e2787a0d0739aac764e1ea9bb8544ee97

                                                    SHA512

                                                    a4cf1f5c74e0df85dda8750be9070e24e19b8be15c6f22f0c234ef8423ef9ca3db22ba9ef777d64c33e8fd49fada6fcca26c1a14ba18e8472370533a1c65d8d0

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Favicons

                                                    Filesize

                                                    20KB

                                                    MD5

                                                    3eea0768ded221c9a6a17752a09c969b

                                                    SHA1

                                                    d17d8086ed76ec503f06ddd0ac03d915aec5cdc7

                                                    SHA256

                                                    6923fd51e36b8fe40d6d3dd132941c5a693b02f6ae4d4d22b32b5fedd0e7b512

                                                    SHA512

                                                    fb5c51adf5a5095a81532e3634f48f5aedb56b7724221f1bf1ccb626cab40f87a3b07a66158179e460f1d0e14eeb48f0283b5df6471dd7a6297af6e8f3efb1f9

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\History

                                                    Filesize

                                                    148KB

                                                    MD5

                                                    90a1d4b55edf36fa8b4cc6974ed7d4c4

                                                    SHA1

                                                    aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                                    SHA256

                                                    7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                                    SHA512

                                                    ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Login Data

                                                    Filesize

                                                    46KB

                                                    MD5

                                                    02d2c46697e3714e49f46b680b9a6b83

                                                    SHA1

                                                    84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                    SHA256

                                                    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                    SHA512

                                                    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\000003.log

                                                    Filesize

                                                    40B

                                                    MD5

                                                    148079685e25097536785f4536af014b

                                                    SHA1

                                                    c5ff5b1b69487a9dd4d244d11bbafa91708c1a41

                                                    SHA256

                                                    f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8

                                                    SHA512

                                                    c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\LOG

                                                    Filesize

                                                    204B

                                                    MD5

                                                    6f79a719c2d365a98ba816fd9a4c5450

                                                    SHA1

                                                    12a7d9206dd4b10cb4bac026fd3d9a15e23a373b

                                                    SHA256

                                                    f92eb6f6b82b2324cae5f4cca9733b9b1de64dda4cf8bf86ec4556e2932158da

                                                    SHA512

                                                    17e314e968576e30a8e4d70f0f662444e09d93ee0c11a93e4ebb73ca3c418fca1c483e80157e0a5aa7ef4ca7fccc95fdf36a282bc5a749435057a4a08785a1ed

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\000003.log

                                                    Filesize

                                                    46B

                                                    MD5

                                                    90881c9c26f29fca29815a08ba858544

                                                    SHA1

                                                    06fee974987b91d82c2839a4bb12991fa99e1bdd

                                                    SHA256

                                                    a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a

                                                    SHA512

                                                    15f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    46295cac801e5d4857d09837238a6394

                                                    SHA1

                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                    SHA256

                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                    SHA512

                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\LOG

                                                    Filesize

                                                    192B

                                                    MD5

                                                    f567ddcea491744278d684acdc724dcd

                                                    SHA1

                                                    9a0394aa8b933aacac3370fa004c20ed47d7460e

                                                    SHA256

                                                    f315854004de2b58c37ee8b5b9e53832cb397f84f753d3d949e1652f0b1bf9d8

                                                    SHA512

                                                    1b3493cca2f79dbb393eb2ac3e75a2fe3db94ac05c43206521c2900fed124d5bfbdee83fca70fe863b916c42eff5be762dfdd140246b2873cd3ac7b2056e3a87

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\MANIFEST-000001

                                                    Filesize

                                                    41B

                                                    MD5

                                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                                    SHA1

                                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                                    SHA256

                                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                    SHA512

                                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Visited Links

                                                    Filesize

                                                    128KB

                                                    MD5

                                                    9799b32a10f32b0b9fcd91671c80e678

                                                    SHA1

                                                    07d110ea2d595ad5557a1c1a318751c7e0c53a5c

                                                    SHA256

                                                    53f9cecd331ec0a8b42b5b7548f1f8895a30fa5246e8bf5045c66c01951a0660

                                                    SHA512

                                                    7aa82a0d7dfd4626a90468be30ae31890692d71bd34407ef8b11e836befbde20ad8d3c99a2a3457a0010aa554cfd1251095a43f707f0046583d3aa714f6751c3

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                    Filesize

                                                    14B

                                                    MD5

                                                    9eae63c7a967fc314dd311d9f46a45b7

                                                    SHA1

                                                    caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf

                                                    SHA256

                                                    4288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d

                                                    SHA512

                                                    bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                    Filesize

                                                    264KB

                                                    MD5

                                                    f50f89a0a91564d0b8a211f8921aa7de

                                                    SHA1

                                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                    SHA256

                                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                    SHA512

                                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\js\index-dir\temp-index

                                                    Filesize

                                                    48B

                                                    MD5

                                                    5e807c6753db8da28d3370c0bcb7319c

                                                    SHA1

                                                    8aab688c2d72ac3c46490ec10da19ca6cb54da09

                                                    SHA256

                                                    f83ed6b009d4ae4182da68f9cbe3bdf4117f50670fd54bce250cdd564ebdfaf3

                                                    SHA512

                                                    c3901497745eff6d41c7329e229c36d32845af9bff280b47180a7683621f499df3f844474d474d0dc794e0928384a05de7128aef26fb5ebb4452add930d8a783

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\000004.dbtmp

                                                    Filesize

                                                    16B

                                                    MD5

                                                    6752a1d65b201c13b62ea44016eb221f

                                                    SHA1

                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                    SHA256

                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                    SHA512

                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\LOG

                                                    Filesize

                                                    193B

                                                    MD5

                                                    45d3e631a8482c70eca5385ed4d4b5a5

                                                    SHA1

                                                    7b6372680edb53c00f7aa5dd2ae72e8f3f415fe1

                                                    SHA256

                                                    511e14f1ecbfae592353bbf61eb8a63794ac21fb529ed3d37fd0e1e2e3a7367a

                                                    SHA512

                                                    5de5fd0ae3554ac42ae35a42eea1b1c4f666f88902c29d3d965b05d319150bd3fd0e3467cd30baf2169ba573f966390fb8322d66cf4b33557c2cbbdf082ec33e

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000002.dbtmp

                                                    Filesize

                                                    16B

                                                    MD5

                                                    206702161f94c5cd39fadd03f4014d98

                                                    SHA1

                                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                    SHA256

                                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                    SHA512

                                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\LOG

                                                    Filesize

                                                    205B

                                                    MD5

                                                    9b058b00289c361ea04f22e4c222f771

                                                    SHA1

                                                    42787989d1ea42bb86866a072789394302e20e99

                                                    SHA256

                                                    b4935268b967ddbf80624c8d32321053fcaa15318c373cf48aa230ec743a5566

                                                    SHA512

                                                    59ea702af3b15472cc3b795a4b69b201883fda31251cfdfa517354b9c28b2b3ca39a1c0f4022e6f6f27435f822ca020d16c5b81d70c546350625ff4e8969b2dd

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\LOG

                                                    Filesize

                                                    193B

                                                    MD5

                                                    a6531c77674a425b1bb580a5361ba652

                                                    SHA1

                                                    a0bf2780b28a53937580ed0436546dec536568e2

                                                    SHA256

                                                    d035fea21e7cf2f41273800b9bd4cb2b3abba73bf5ab30266848e1d6347a3309

                                                    SHA512

                                                    478074a5d9c674a24f0a43cfd608cc6136650b29f20337ad1dbc05781a25c6c99791b0640b4df939800caac4d172c81e3c61fea14ca6527fd9df22f2320fc586

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Visited Links

                                                    Filesize

                                                    128KB

                                                    MD5

                                                    ccbfe1c29f0a16c5605cc2fcde9b24c5

                                                    SHA1

                                                    7dd9a2aebbaa80a1b5632da20de2a65b8fb98d61

                                                    SHA256

                                                    ec3a00aca13690d721a77782dd7680fdd05eeca0c3fef83f52a480b9cd2640f2

                                                    SHA512

                                                    abad8f026dcee15a8ed77f2ca5dded79fff62444830f89460854653ecee098fb839a8cad47f8c7faebf53414c997ee3b949f987c8e01888f6e773b85a6d756f9

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Web Data

                                                    Filesize

                                                    92KB

                                                    MD5

                                                    563ff92a8248e2865973d855bc53af7b

                                                    SHA1

                                                    0a8b9ef81f0be517e5f08d002b13d38937ce91f3

                                                    SHA256

                                                    5c67cd769f671f68c8784b6927f9a69135f0b15e70a8e5cbf4c86d27616228b4

                                                    SHA512

                                                    087973549282ce4cd25e53749be26e0556c1b28144e54bbfa47af25b56f537f9521870777d94a8daa3458a62427d210bed9e22b7d1900caf8c258960bfae672a

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\shared_proto_db\LOG

                                                    Filesize

                                                    191B

                                                    MD5

                                                    00d568af6a819f82b612653738ee0ef7

                                                    SHA1

                                                    9534d85dbdd91cfef9e5a6514f1025e4347e1cf3

                                                    SHA256

                                                    efdd5d2ce9c7536638245e6580962732cb20b5920ce332d3da382e2845549347

                                                    SHA512

                                                    ff26711869eb79f975eab1065cddd30e2b06b5d2369ce16bb5ea1626d2df0507a28ff4f4eb680a32cdbd8665f50a7c0c73783b8b70e9d2d736df9b4e2c1c68e0

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\shared_proto_db\metadata\000003.log

                                                    Filesize

                                                    184B

                                                    MD5

                                                    ef1ad94d12e3c67f516d3a0c49596056

                                                    SHA1

                                                    9767dcdf6ff8471fdebec419fdb1b94e387f0fba

                                                    SHA256

                                                    d47b06c9062c95f26d242b6e3b95e881f30380f31e7152e2113a513421fc6dd9

                                                    SHA512

                                                    a52d07aa6e8d856e2acdce31d0fcfc91cdf8080eb644a5797140ea73180a315033e6026a044a3de2caac1b3c52c636f40bc66091b515c914c5eae4a00abf8f5a

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\shared_proto_db\metadata\LOG

                                                    Filesize

                                                    200B

                                                    MD5

                                                    a892086d1eee1238150b95080a484687

                                                    SHA1

                                                    a563ba9dd989409e34c2a8382bba39419c1dd85f

                                                    SHA256

                                                    a1c8b23ad2d6e8000ed1721c77b2cd80013418d739dd8b13ee42d82020e4fff0

                                                    SHA512

                                                    5011aab6a2920223e1a6cd18678a3094393231357ecfb30be850723d316b591f84c9290b138e205df497dc84499032aa7cde56870890fd7b6cbb9b9acbafe31b

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                    Filesize

                                                    86B

                                                    MD5

                                                    f732dbed9289177d15e236d0f8f2ddd3

                                                    SHA1

                                                    53f822af51b014bc3d4b575865d9c3ef0e4debde

                                                    SHA256

                                                    2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                                    SHA512

                                                    b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                    Filesize

                                                    2B

                                                    MD5

                                                    99914b932bd37a50b983c5e7c90ae93b

                                                    SHA1

                                                    bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                    SHA256

                                                    44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                    SHA512

                                                    27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9UR26M8S\download[1].htm

                                                    Filesize

                                                    1B

                                                    MD5

                                                    cfcd208495d565ef66e7dff9f98764da

                                                    SHA1

                                                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                    SHA256

                                                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                    SHA512

                                                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZKZ95V4R\random[1].exe

                                                    Filesize

                                                    1.9MB

                                                    MD5

                                                    870c92cf89253baeaf80574aaad15adc

                                                    SHA1

                                                    feefb55fa434ceb4aa10997bedfccd5597852078

                                                    SHA256

                                                    65238eee07b00d608d030a601ebe0878656466084e1f55e9e41258bec1370b59

                                                    SHA512

                                                    fe1cf7efa897c4c4fada01ba67ef38e7491d96870ab32354b0acbf2bb0cfa32faf914d05037d6e813fcc9b1241466acdaa178adeacc2451ea371f1189e7923c6

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\activity-stream.discovery_stream.json.tmp

                                                    Filesize

                                                    32KB

                                                    MD5

                                                    920a49a75f5a2e28430f3986ae3195c7

                                                    SHA1

                                                    c792910313ab97a83d3cff371b1f118ecb14205f

                                                    SHA256

                                                    c4c631c86d14b920e29b21aee17796a5f3de4b43baa95ead9f50720324bf23d1

                                                    SHA512

                                                    d17570d91f1312307905d661eb2717f7883947c1c851244d7a673ab47f13b9ef2124b77f4c3fe8ed47bc16a2388870d56a9a3c8eaf7a47e660fdaa6b6e177aba

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                    Filesize

                                                    13KB

                                                    MD5

                                                    f99b4984bd93547ff4ab09d35b9ed6d5

                                                    SHA1

                                                    73bf4d313cb094bb6ead04460da9547106794007

                                                    SHA256

                                                    402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069

                                                    SHA512

                                                    cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759

                                                  • C:\Users\Admin\AppData\Local\Temp\1011155041\CewMt20.ps1

                                                    Filesize

                                                    612B

                                                    MD5

                                                    e3eb0a1df437f3f97a64aca5952c8ea0

                                                    SHA1

                                                    7dd71afcfb14e105e80b0c0d7fce370a28a41f0a

                                                    SHA256

                                                    38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521

                                                    SHA512

                                                    43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf

                                                  • C:\Users\Admin\AppData\Local\Temp\1011165001\tR7DLnB.exe

                                                    Filesize

                                                    1.4MB

                                                    MD5

                                                    03757138d540ad9e87a345bf3b63aebf

                                                    SHA1

                                                    83a0b3ce46a7178456763e5356bf4940efa41cd1

                                                    SHA256

                                                    659ef7c3fd01df95231975c36e8e45444f6329da33a70e58690f2ee75c7a722f

                                                    SHA512

                                                    0f08c40ff45829c608a42a6d0d12c1b2a726d315c28f0b4330320a7585506474f72eca550a90b042eece41911174859e95d4b5056c77999a1acf14d43e5279ca

                                                  • C:\Users\Admin\AppData\Local\Temp\1011198001\3ab0b72f70.exe

                                                    Filesize

                                                    4.2MB

                                                    MD5

                                                    818532da27c6ed97768ab94607612f66

                                                    SHA1

                                                    99216af849b745434d0e728400a5da9ea0eac96f

                                                    SHA256

                                                    0db9cd98808b856cc4e61818330ff6a1ec46621ab9b30e779078f2fb78feb36c

                                                    SHA512

                                                    ae6d4008ad40a08ad23b7b460c53af287c923171973cd8c090e5abe0b3b67f14aa291f8ece578697405e6c263c3316c5f19c8a94c64a8cbe4b7496dc345b6224

                                                  • C:\Users\Admin\AppData\Local\Temp\1011199001\02a81bce14.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    2426e5ac8ee0bbb03e63d7467cba1df2

                                                    SHA1

                                                    6cfd84d6f98b4a9d1b9d5bd724ec59cd4e8533c3

                                                    SHA256

                                                    4b6f652aa6df9d8078f869655c18ac854262d94c3b3a547488a2ece1b184a7b5

                                                    SHA512

                                                    5697de737cf9ee10433c57a1f0d214b0d8344ad33306b243624542ead2375e6c3a4ca5a8d4e3b806cb5bbad17b1612881b1f1064d03b18da01c5f96c57e9751c

                                                  • C:\Users\Admin\AppData\Local\Temp\1011200001\0cade74165.exe

                                                    Filesize

                                                    1.7MB

                                                    MD5

                                                    ce78eaec6bc30509ef921f275b86768c

                                                    SHA1

                                                    ac84430b471a1a6753915d13ca079fabc8486b58

                                                    SHA256

                                                    67f7dca1221431e72579b4f33f19c37264a7066c504f360d56d1c09ac22c3c1e

                                                    SHA512

                                                    f28e96fe8d720e4c4a4bf8141d962eafa9b996aa71f5082178c8670d31c2bf16f84ba23110a394e5dbed8c91acb7f32d02354a34f906b759bdb291c18c69a314

                                                  • C:\Users\Admin\AppData\Local\Temp\1011201001\73649fb33d.exe

                                                    Filesize

                                                    948KB

                                                    MD5

                                                    18772a4aca8e95be213d6f825579de05

                                                    SHA1

                                                    e72b7e15117659a77abb6fc21402db2e04a7ad5f

                                                    SHA256

                                                    b65abdaeed9cd811d5736f88179eaabf9de61f0bb3e144c1e5c1432ac97cc0ac

                                                    SHA512

                                                    cf84aea1b44c7c079a7ee57c7eda99fa6ef150cb26d109d56b2485453fce3f770f6c79886451937f67b920622eb0307684d9fe098f71b2bb098af621ccc2efa5

                                                  • C:\Users\Admin\AppData\Local\Temp\1011202001\d116542b8c.exe

                                                    Filesize

                                                    2.6MB

                                                    MD5

                                                    281122ce54c51fe0ab6e175607d25c23

                                                    SHA1

                                                    fd55a85a6e96e78d173d4c905700c941ad3ab306

                                                    SHA256

                                                    6ad8f4e246d246ff6aaf159a6f4a35eff4b0a85a9493e31cdcb2cd1523b31f58

                                                    SHA512

                                                    fd5572bed591193f361c20bd9a9480fc037afee693b0de48d57edbf8607527d040fe91b11747f976e2b8ea9ed60da7b9667f8c0f093630e0d323d84c2fb35da0

                                                  • C:\Users\Admin\AppData\Local\Temp\CabA749.tmp

                                                    Filesize

                                                    70KB

                                                    MD5

                                                    49aebf8cbd62d92ac215b2923fb1b9f5

                                                    SHA1

                                                    1723be06719828dda65ad804298d0431f6aff976

                                                    SHA256

                                                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                    SHA512

                                                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                  • C:\Users\Admin\AppData\Local\Temp\TarA76B.tmp

                                                    Filesize

                                                    181KB

                                                    MD5

                                                    4ea6026cf93ec6338144661bf1202cd1

                                                    SHA1

                                                    a1dec9044f750ad887935a01430bf49322fbdcb7

                                                    SHA256

                                                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                    SHA512

                                                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    af4166216d6e312daac33b01cc2cf73d

                                                    SHA1

                                                    1bc59703d7b023c7b1d2e06e0fc98a47e2be44a3

                                                    SHA256

                                                    53ee4f481b989f6e20f72f10d439f3165d8afcd55f24e50c0addb93d8cc8729a

                                                    SHA512

                                                    beb38207d0e9a7b525d13865afa75e95f0099ea97e61747a9d8633842be6900af6abfefb2798944f8d1cd5a9f55a2fcf0917212026abac16f2dc521d310e68cc

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                    Filesize

                                                    442KB

                                                    MD5

                                                    85430baed3398695717b0263807cf97c

                                                    SHA1

                                                    fffbee923cea216f50fce5d54219a188a5100f41

                                                    SHA256

                                                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                    SHA512

                                                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                    Filesize

                                                    8.0MB

                                                    MD5

                                                    a01c5ecd6108350ae23d2cddf0e77c17

                                                    SHA1

                                                    c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                    SHA256

                                                    345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                    SHA512

                                                    b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\F5O4VC08DE1ZS6XDJ5FJ.temp

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    e55b1e2d33430a002b5b534200c22985

                                                    SHA1

                                                    c059b00f4ee811c8f1117b2ab8b37871fe37e57a

                                                    SHA256

                                                    1b6a909919ab9897b0264d1b810dfdf0346e4ee06fd40d26443d1d40eea775de

                                                    SHA512

                                                    5deabd40b3600c3fc0662c3a605c0c0a94000ae02170f459ad3531667b27b4ce9a51e4b88dd5f30a18b4cdd36b98018fc4e9d9def0857a91adf7a9876c6992fe

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\db\data.safe.bin

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    551cac48fb44397f2d6cc2f0f4ff4296

                                                    SHA1

                                                    675e8f7d526484fdb5cd9d14391bbaf0215614bf

                                                    SHA256

                                                    447e799e05fca9573fa6df9fe9d57bce80047432323555c13b2c1eab85322d6b

                                                    SHA512

                                                    dfaa6836a2900494c4e2fcf374383d5b3ebc3016254f043f29f5d74c3d5a930207d0fef9427142e57aa08b7322abdc5f99a7c6dd88b05a62db3a439de3ec47a1

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\449b8b23-5744-46e4-b7c0-7b9902d771cd

                                                    Filesize

                                                    745B

                                                    MD5

                                                    bee45669739e1e5ace6807e549ffda3c

                                                    SHA1

                                                    4560858a8e896b5ed5878510ca2b09c77e0148a8

                                                    SHA256

                                                    58d9b53e2f95f1d74dcbd84283d3ccde9f36a1f649e0bc73265918cb871cd03b

                                                    SHA512

                                                    58106a74e4a6122aa9735fb92953aab70ec3ff4aea63a97f17c0e3681eed3fcefb8a59cc76bdd8dc73aa22e0710aa1afb8e872de2beb8d339fadae55c66b346b

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\dfee186c-bcb6-40e8-b475-03f239a8996b

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    f14413b45b4e468f0eb61e5227efb3ea

                                                    SHA1

                                                    348f5d9f305fd3e48d2f193017b63617b3a047f2

                                                    SHA256

                                                    0cfd84036912eb37674a603923f94735fa931fff02b693bc37d5ea4f136e31a0

                                                    SHA512

                                                    148954044a5e74e04012f21f8187e2b5caa31cf8b403d2f24509ec43795de6198de83de9d8495c5c50d58799e07325079385682941a715a9266504ab4f5dd79b

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                    Filesize

                                                    997KB

                                                    MD5

                                                    fe3355639648c417e8307c6d051e3e37

                                                    SHA1

                                                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                    SHA256

                                                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                    SHA512

                                                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                    Filesize

                                                    116B

                                                    MD5

                                                    3d33cdc0b3d281e67dd52e14435dd04f

                                                    SHA1

                                                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                    SHA256

                                                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                    SHA512

                                                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                    Filesize

                                                    479B

                                                    MD5

                                                    49ddb419d96dceb9069018535fb2e2fc

                                                    SHA1

                                                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                    SHA256

                                                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                    SHA512

                                                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                    Filesize

                                                    372B

                                                    MD5

                                                    8be33af717bb1b67fbd61c3f4b807e9e

                                                    SHA1

                                                    7cf17656d174d951957ff36810e874a134dd49e0

                                                    SHA256

                                                    e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                    SHA512

                                                    6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                    Filesize

                                                    11.8MB

                                                    MD5

                                                    33bf7b0439480effb9fb212efce87b13

                                                    SHA1

                                                    cee50f2745edc6dc291887b6075ca64d716f495a

                                                    SHA256

                                                    8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                    SHA512

                                                    d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    688bed3676d2104e7f17ae1cd2c59404

                                                    SHA1

                                                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                    SHA256

                                                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                    SHA512

                                                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    937326fead5fd401f6cca9118bd9ade9

                                                    SHA1

                                                    4526a57d4ae14ed29b37632c72aef3c408189d91

                                                    SHA256

                                                    68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                    SHA512

                                                    b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs-1.js

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    a0e8b5339cee9521569618984659bc02

                                                    SHA1

                                                    ed09cd15bcc94bed7e1161c80effd801427fc678

                                                    SHA256

                                                    63508b05e0032bce5229a5baa26fbc61d867487c6128afd768a3685ee23eea87

                                                    SHA512

                                                    dc256ef797377b0e59c05bab8b1747d42e434e679a245851cd05a53c527e9c360d7dc2c5c8e334b8d4cb6193d96de93264f577f758f3ab1068af5ae9be97a050

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs-1.js

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    bfcb3121239b02e28301eeb7cace2a1a

                                                    SHA1

                                                    b16893361648c1e73bc417321386315573b7bcb6

                                                    SHA256

                                                    f66239f41db2fbcc8515a7ca16e5f46438a3366249ed2e288be055b7677451ee

                                                    SHA512

                                                    e26bf5498a43ed6c29406e37bb404298e1c96ab567b51eb3da84c763236398cdc61e3a889960a437cdd5b4c3ac68581419737d149598b732b81836076458dd11

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs-1.js

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    7e03257c6d07de313fdd6b59de6a5be4

                                                    SHA1

                                                    6e0f2f1adeb4334babadfa5b03e54e9eac946298

                                                    SHA256

                                                    2260fcae43d8f5a7b9e2c635dadf442df32c600395de7e092527c6ba6203cc5f

                                                    SHA512

                                                    912adc5ae28bf4ab1ab59c58db7d166c2a297affa3791446d8f6d1ed39c3c71d95601baadc772dc1e512e1257951862178bbfb00fb440018678e332d94254184

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs.js

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    46ca3382ad354c85d563b44347c98683

                                                    SHA1

                                                    c8b483eacca275420cdf042d3a7cc08d78aa4fd5

                                                    SHA256

                                                    17fa737e0fd9614850ddc3ebd4e3fe3d4abfdf29f97e3c072dc5f08c5f385cb7

                                                    SHA512

                                                    036e12d93ea6dc04fe8f60f39017b5da99526f6f551769636971a503079f8cee2a80ec4cc849bd24d22966aed529f2f1e833920379375ca93e8c68a553f02018

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\sessionstore-backups\recovery.jsonlz4

                                                    Filesize

                                                    4KB

                                                    MD5

                                                    9580623162c5bf2e31e6465f3659e924

                                                    SHA1

                                                    b073305bdcd5d9a68dbdd69d33b9c8b54c2d0a72

                                                    SHA256

                                                    520958b22c4013182fcefc148cfc4bc99287ca7bf34a805e1693444fbee9e041

                                                    SHA512

                                                    7fafb7c73fd4075e0ae93407e506df7055b3258253feb3ef62c2f5e4f2ed184b788990d25d6a4f38a8c9d51966cf37d05e182e568b68af126d5f8f665c6b4c80

                                                  • memory/1148-8915-0x0000000006710000-0x0000000006BAF000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/1148-538-0x0000000000910000-0x0000000000DBF000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1148-8898-0x0000000006E10000-0x000000000767C000-memory.dmp

                                                    Filesize

                                                    8.4MB

                                                  • memory/1148-8916-0x0000000006710000-0x0000000006BAF000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/1148-8888-0x0000000006E10000-0x0000000007A77000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/1148-8920-0x0000000006E10000-0x0000000007A77000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/1148-8899-0x0000000006E10000-0x000000000767C000-memory.dmp

                                                    Filesize

                                                    8.4MB

                                                  • memory/1148-8988-0x0000000006710000-0x0000000006BAF000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/1148-579-0x0000000000910000-0x0000000000DBF000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1148-3852-0x0000000006E10000-0x000000000767C000-memory.dmp

                                                    Filesize

                                                    8.4MB

                                                  • memory/1148-3851-0x0000000006E10000-0x000000000767C000-memory.dmp

                                                    Filesize

                                                    8.4MB

                                                  • memory/1148-568-0x0000000000910000-0x0000000000DBF000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2444-242-0x0000000001360000-0x00000000019E3000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/2444-526-0x0000000001360000-0x00000000019E3000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/2444-500-0x0000000001360000-0x00000000019E3000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/2444-296-0x0000000001360000-0x00000000019E3000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/2444-254-0x0000000001360000-0x00000000019E3000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/2444-4-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                    Filesize

                                                    972KB

                                                  • memory/2444-0-0x0000000001360000-0x00000000019E3000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/2444-3-0x0000000001360000-0x00000000019E3000-memory.dmp

                                                    Filesize

                                                    6.5MB

                                                  • memory/2444-2-0x0000000001361000-0x0000000001378000-memory.dmp

                                                    Filesize

                                                    92KB

                                                  • memory/2444-1-0x0000000077000000-0x0000000077002000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2732-537-0x00000000011C0000-0x000000000166F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2732-524-0x00000000011C0000-0x000000000166F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2928-616-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-592-0x0000000004C30000-0x0000000004D74000-memory.dmp

                                                    Filesize

                                                    1.3MB

                                                  • memory/2928-614-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-606-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-604-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-612-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-3855-0x0000000005EF0000-0x0000000005FE2000-memory.dmp

                                                    Filesize

                                                    968KB

                                                  • memory/2928-602-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-608-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-618-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-620-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-622-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-600-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-624-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-1769-0x00000000011D0000-0x0000000001286000-memory.dmp

                                                    Filesize

                                                    728KB

                                                  • memory/2928-626-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-628-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-632-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-630-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-598-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-591-0x00000000012A0000-0x000000000140A000-memory.dmp

                                                    Filesize

                                                    1.4MB

                                                  • memory/2928-610-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-1770-0x0000000000DA0000-0x0000000000DEC000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/2928-596-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-1773-0x0000000005580000-0x0000000005618000-memory.dmp

                                                    Filesize

                                                    608KB

                                                  • memory/2928-594-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2928-1772-0x00000000053A0000-0x000000000540E000-memory.dmp

                                                    Filesize

                                                    440KB

                                                  • memory/2928-1771-0x0000000004D70000-0x0000000004DC4000-memory.dmp

                                                    Filesize

                                                    336KB

                                                  • memory/2928-593-0x0000000004C30000-0x0000000004D6E000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/3076-9182-0x0000000001190000-0x0000000001DF7000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/3076-8921-0x0000000001190000-0x0000000001DF7000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/3076-8889-0x0000000001190000-0x0000000001DF7000-memory.dmp

                                                    Filesize

                                                    12.4MB

                                                  • memory/3668-9131-0x0000000000040000-0x00000000002EC000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/3668-9134-0x0000000000040000-0x00000000002EC000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/4640-8974-0x0000000000120000-0x00000000005BF000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4640-8917-0x0000000000120000-0x00000000005BF000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/9748-8900-0x0000000000400000-0x0000000000C6C000-memory.dmp

                                                    Filesize

                                                    8.4MB

                                                  • memory/9748-3853-0x0000000000400000-0x0000000000C6C000-memory.dmp

                                                    Filesize

                                                    8.4MB