Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 19:14

General

  • Target

    cc9109ffeede3b8f3117ccb1bae82347c4506e08e2a06c3bffd15608dad16cfd.exe

  • Size

    1.7MB

  • MD5

    66bcb6e17b5fb8da5c8791b5fd6cadec

  • SHA1

    a7ef8cd29018bce43618425c1f211ab4d7d3c88e

  • SHA256

    cc9109ffeede3b8f3117ccb1bae82347c4506e08e2a06c3bffd15608dad16cfd

  • SHA512

    76708812f23247c7ab921adb69f1fe3c79e3bef5f2fd374021ab120644a7c4e9768b202c3283edcfb9b7b42647e86f880021eb340594b0cbc0b07938408a8aed

  • SSDEEP

    49152:Vs9In8t4aEJdUgUxvGCCIrdCYoPYdViYRGrO/eZ/BX1:1CvqIrgLPl6GrO/M

Malware Config

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 16 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc9109ffeede3b8f3117ccb1bae82347c4506e08e2a06c3bffd15608dad16cfd.exe
    "C:\Users\Admin\AppData\Local\Temp\cc9109ffeede3b8f3117ccb1bae82347c4506e08e2a06c3bffd15608dad16cfd.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
      2⤵
      • Uses browser remote debugging
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef70f9758,0x7fef70f9768,0x7fef70f9778
        3⤵
          PID:2892
        • C:\Windows\system32\ctfmon.exe
          ctfmon.exe
          3⤵
            PID:2600
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1284,i,47437011138240,6964185399755128745,131072 /prefetch:2
            3⤵
              PID:2348
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1284,i,47437011138240,6964185399755128745,131072 /prefetch:8
              3⤵
                PID:1708
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1284,i,47437011138240,6964185399755128745,131072 /prefetch:8
                3⤵
                  PID:1616
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2176 --field-trial-handle=1284,i,47437011138240,6964185399755128745,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:2424
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2436 --field-trial-handle=1284,i,47437011138240,6964185399755128745,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:2064
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2444 --field-trial-handle=1284,i,47437011138240,6964185399755128745,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:2052
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1460 --field-trial-handle=1284,i,47437011138240,6964185399755128745,131072 /prefetch:2
                  3⤵
                    PID:1196
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                  2⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:2724
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6869758,0x7fef6869768,0x7fef6869778
                    3⤵
                      PID:2752
                    • C:\Windows\system32\ctfmon.exe
                      ctfmon.exe
                      3⤵
                        PID:1536
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1244,i,509998813564282987,15929713910835892373,131072 /prefetch:2
                        3⤵
                          PID:968
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1244,i,509998813564282987,15929713910835892373,131072 /prefetch:8
                          3⤵
                            PID:804
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1652 --field-trial-handle=1244,i,509998813564282987,15929713910835892373,131072 /prefetch:8
                            3⤵
                              PID:780
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2376 --field-trial-handle=1244,i,509998813564282987,15929713910835892373,131072 /prefetch:1
                              3⤵
                              • Uses browser remote debugging
                              PID:928
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2764 --field-trial-handle=1244,i,509998813564282987,15929713910835892373,131072 /prefetch:1
                              3⤵
                              • Uses browser remote debugging
                              PID:1092
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2876 --field-trial-handle=1244,i,509998813564282987,15929713910835892373,131072 /prefetch:1
                              3⤵
                              • Uses browser remote debugging
                              PID:1932
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1256 --field-trial-handle=1244,i,509998813564282987,15929713910835892373,131072 /prefetch:2
                              3⤵
                                PID:1112
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1308 --field-trial-handle=1244,i,509998813564282987,15929713910835892373,131072 /prefetch:8
                                3⤵
                                  PID:1844
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\JECGIIIDAK.exe"
                                2⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:2976
                                • C:\Users\Admin\Documents\JECGIIIDAK.exe
                                  "C:\Users\Admin\Documents\JECGIIIDAK.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Loads dropped DLL
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  PID:2528
                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                    4⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Loads dropped DLL
                                    • Adds Run key to start application
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2516
                                    • C:\Users\Admin\AppData\Local\Temp\1012102001\0c0ddfee4b.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1012102001\0c0ddfee4b.exe"
                                      5⤵
                                      • Enumerates VirtualBox registry keys
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1244
                                    • C:\Users\Admin\AppData\Local\Temp\1012103001\rhnew.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1012103001\rhnew.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Modifies system certificate store
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1144
                                    • C:\Users\Admin\AppData\Local\Temp\1012104001\303ad38b0d.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1012104001\303ad38b0d.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Modifies system certificate store
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2016
                                    • C:\Users\Admin\AppData\Local\Temp\1012105001\427922e3ad.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1012105001\427922e3ad.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1900
                                    • C:\Users\Admin\AppData\Local\Temp\1012106001\a11ad2be82.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1012106001\a11ad2be82.exe"
                                      5⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:1856
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM firefox.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:340
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM chrome.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2872
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM msedge.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1816
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM opera.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1564
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM brave.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1752
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                        6⤵
                                          PID:2060
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                            7⤵
                                            • Checks processor information in registry
                                            • Modifies registry class
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:2980
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2980.0.894378815\202393814" -parentBuildID 20221007134813 -prefsHandle 1200 -prefMapHandle 1192 -prefsLen 20937 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8718b3a0-670c-4913-bf8e-014caa680235} 2980 "\\.\pipe\gecko-crash-server-pipe.2980" 1288 104f7458 gpu
                                              8⤵
                                                PID:2700
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2980.1.841863556\146834987" -parentBuildID 20221007134813 -prefsHandle 1472 -prefMapHandle 1468 -prefsLen 21798 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {33155ce3-4c3b-4998-97f4-46b940e9cac6} 2980 "\\.\pipe\gecko-crash-server-pipe.2980" 1484 f6f9858 socket
                                                8⤵
                                                  PID:596
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2980.2.1372939235\1668696771" -childID 1 -isForBrowser -prefsHandle 2116 -prefMapHandle 2112 -prefsLen 21901 -prefMapSize 233414 -jsInitHandle 652 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2d54fbd-5f3e-403b-a025-bafcd1abfe8e} 2980 "\\.\pipe\gecko-crash-server-pipe.2980" 2128 142b2158 tab
                                                  8⤵
                                                    PID:1948
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2980.3.180857741\955686130" -childID 2 -isForBrowser -prefsHandle 596 -prefMapHandle 560 -prefsLen 26214 -prefMapSize 233414 -jsInitHandle 652 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {92b693e3-cb93-4412-8c1b-f0f651f7ed64} 2980 "\\.\pipe\gecko-crash-server-pipe.2980" 2672 1c153858 tab
                                                    8⤵
                                                      PID:2420
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2980.4.257513640\1121813680" -childID 3 -isForBrowser -prefsHandle 3728 -prefMapHandle 3732 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 652 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {da178cf0-d347-49f4-8d39-67d4bd4d4154} 2980 "\\.\pipe\gecko-crash-server-pipe.2980" 3752 1f57ed58 tab
                                                      8⤵
                                                        PID:380
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2980.5.1260902285\718978925" -childID 4 -isForBrowser -prefsHandle 3860 -prefMapHandle 3864 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 652 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee250995-76a8-4668-9799-0ccaef8fe3e2} 2980 "\\.\pipe\gecko-crash-server-pipe.2980" 3848 1f6c4c58 tab
                                                        8⤵
                                                          PID:2328
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2980.6.486535618\1854408930" -childID 5 -isForBrowser -prefsHandle 3972 -prefMapHandle 3976 -prefsLen 26273 -prefMapSize 233414 -jsInitHandle 652 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb42bd1c-f887-4549-8da3-12cc64904fb7} 2980 "\\.\pipe\gecko-crash-server-pipe.2980" 3964 1f6c5558 tab
                                                          8⤵
                                                            PID:2388
                                                    • C:\Users\Admin\AppData\Local\Temp\1012107001\6e49cc933c.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1012107001\6e49cc933c.exe"
                                                      5⤵
                                                      • Modifies Windows Defender Real-time Protection settings
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Windows security modification
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3728
                                                    • C:\Users\Admin\AppData\Local\Temp\1012108001\dc01b9f4eb.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1012108001\dc01b9f4eb.exe"
                                                      5⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:3964
                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                              1⤵
                                                PID:2476
                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                1⤵
                                                  PID:2268

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  40B

                                                  MD5

                                                  6440e5b4ea3156744e4a29d42c8a2bd7

                                                  SHA1

                                                  da7b625fdca100cadf355ded3e112a57f8d25866

                                                  SHA256

                                                  c06f6986514f9e2a2853949c3809aa06a2d39594470ed4ffc77b5a9552565fb7

                                                  SHA512

                                                  960de88d405bccc917ad98c1cc04b9a3cb2daddd7a53ab5934e27e3bb2b1638dfa81688239db0910b53af711521a998a788ffabcdcaecf36caa0df2a31582d7a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                                  Filesize

                                                  16B

                                                  MD5

                                                  18e723571b00fb1694a3bad6c78e4054

                                                  SHA1

                                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                  SHA256

                                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                  SHA512

                                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000009.dbtmp

                                                  Filesize

                                                  16B

                                                  MD5

                                                  979c29c2917bed63ccf520ece1d18cda

                                                  SHA1

                                                  65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                                  SHA256

                                                  b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                                  SHA512

                                                  e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000010.dbtmp

                                                  Filesize

                                                  16B

                                                  MD5

                                                  60e3f691077715586b918375dd23c6b0

                                                  SHA1

                                                  476d3eab15649c40c6aebfb6ac2366db50283d1b

                                                  SHA256

                                                  e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                                  SHA512

                                                  d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Affiliation Database

                                                  Filesize

                                                  32KB

                                                  MD5

                                                  69e3a8ecda716584cbd765e6a3ab429e

                                                  SHA1

                                                  f0897f3fa98f6e4863b84f007092ab843a645803

                                                  SHA256

                                                  e0c9f1494a417f356b611ec769b975a4552c4065b0bc2181954fcbb4b3dfa487

                                                  SHA512

                                                  bb78069c17196da2ce8546046d2c9d9f3796f39b9868b749ecada89445da7a03c9b54a00fcf34a23eb0514c871e026ac368795d2891bbf37e1dc5046c29beaaa

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  48B

                                                  MD5

                                                  f794ce60babb0df0e8adc995e787f158

                                                  SHA1

                                                  a9d683c190cb37d7ee9a3e44b7a6c800c6482f09

                                                  SHA256

                                                  a018f24928afc956c482e8176fcedef896d3ea61251dcbd6370a5577ebe7d58b

                                                  SHA512

                                                  bab0dc28b82447b1af275d65012c7ff36cee31ce56f624cbdd2a0c87286854527d545f408d9b4ea7e3b0a7ab886dd475098ad86c2c87472f93089dbaa123f3b3

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\wasm\index-dir\the-real-index

                                                  Filesize

                                                  48B

                                                  MD5

                                                  6212e293b47fa6e2d550daa276ed376a

                                                  SHA1

                                                  4cdf19422d7cdc9f8c87c1d284cd5eef691aade4

                                                  SHA256

                                                  4d5fe214f10dd5bfbfe54a033b2cc9e46c169dd6360453aad74404163e4c864a

                                                  SHA512

                                                  007e091f9f6f8cbcceec586673ee40b81bd3e07847d1144a1e0df68339a1ae6f37889686124774cbbde75ef66bb17e48257b67944c9ee7c63631b4b9ad22d187

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Extension Scripts\000003.log

                                                  Filesize

                                                  76B

                                                  MD5

                                                  cc4a8cff19abf3dd35d63cff1503aa5f

                                                  SHA1

                                                  52af41b0d9c78afcc8e308db846c2b52a636be38

                                                  SHA256

                                                  cc5dacf370f324b77b50dddf5d995fd3c7b7a587cb2f55ac9f24c929d0cd531a

                                                  SHA512

                                                  0e9559cda992aa2174a7465745884f73b96755008384d21a0685941acf099c89c8203b13551de72a87b8e23cdaae3fa513bc700b38e1bf3b9026955d97920320

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Extension Scripts\LOG

                                                  Filesize

                                                  192B

                                                  MD5

                                                  ba7394129fa37391b860cde63ea17dc3

                                                  SHA1

                                                  dc1e8ee99b302cc3d811e6c25a7e3b6947d66554

                                                  SHA256

                                                  7a018d3fd37865951c9028043167aea0ea1b80c2594ea649c5af23586b68858d

                                                  SHA512

                                                  1ef12a3d80ab7bf259b87287e18d11a39ea74853b1b13914c89b0173e51d103400d4bc9f50ee0defb8409c5a33aea40ae55f0ae79074cdce401b60eb90c998fa

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Extension Scripts\MANIFEST-000002

                                                  Filesize

                                                  50B

                                                  MD5

                                                  22bf0e81636b1b45051b138f48b3d148

                                                  SHA1

                                                  56755d203579ab356e5620ce7e85519ad69d614a

                                                  SHA256

                                                  e292f241daafc3df90f3e2d339c61c6e2787a0d0739aac764e1ea9bb8544ee97

                                                  SHA512

                                                  a4cf1f5c74e0df85dda8750be9070e24e19b8be15c6f22f0c234ef8423ef9ca3db22ba9ef777d64c33e8fd49fada6fcca26c1a14ba18e8472370533a1c65d8d0

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Favicons

                                                  Filesize

                                                  20KB

                                                  MD5

                                                  3eea0768ded221c9a6a17752a09c969b

                                                  SHA1

                                                  d17d8086ed76ec503f06ddd0ac03d915aec5cdc7

                                                  SHA256

                                                  6923fd51e36b8fe40d6d3dd132941c5a693b02f6ae4d4d22b32b5fedd0e7b512

                                                  SHA512

                                                  fb5c51adf5a5095a81532e3634f48f5aedb56b7724221f1bf1ccb626cab40f87a3b07a66158179e460f1d0e14eeb48f0283b5df6471dd7a6297af6e8f3efb1f9

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\History

                                                  Filesize

                                                  148KB

                                                  MD5

                                                  90a1d4b55edf36fa8b4cc6974ed7d4c4

                                                  SHA1

                                                  aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                                  SHA256

                                                  7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                                  SHA512

                                                  ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Local Storage\leveldb\LOG

                                                  Filesize

                                                  196B

                                                  MD5

                                                  566a8777f7fb79b92d122d2e32af773f

                                                  SHA1

                                                  398a172ad277c999ad810c45988554a4fc76d93c

                                                  SHA256

                                                  2c9cedf6b58b76be3a807f7fedd8f5948493635bcb0e09ce363690a4f893a6f2

                                                  SHA512

                                                  4be6b7e71031d1a1101c4a44c23902ef7783d17cbe0afeea4b4856ee84be4c541f0d6bd484e0189027d513fc49faac0769666e35713484a7d882694ca57ca0b7

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Login Data For Account

                                                  Filesize

                                                  46KB

                                                  MD5

                                                  02d2c46697e3714e49f46b680b9a6b83

                                                  SHA1

                                                  84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                  SHA256

                                                  522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                  SHA512

                                                  60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\000002.dbtmp

                                                  Filesize

                                                  16B

                                                  MD5

                                                  206702161f94c5cd39fadd03f4014d98

                                                  SHA1

                                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                  SHA256

                                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                  SHA512

                                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\000003.log

                                                  Filesize

                                                  40B

                                                  MD5

                                                  148079685e25097536785f4536af014b

                                                  SHA1

                                                  c5ff5b1b69487a9dd4d244d11bbafa91708c1a41

                                                  SHA256

                                                  f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8

                                                  SHA512

                                                  c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\LOG

                                                  Filesize

                                                  204B

                                                  MD5

                                                  e0b75f669b77f9310a6242aeb0e3c015

                                                  SHA1

                                                  d810f992139e475de2a2751a846b970dc9d4b244

                                                  SHA256

                                                  d01e4db6deb97d07de316cb32f234e6649e06db365501d11eeab490eee5237cb

                                                  SHA512

                                                  8c52bb06885956f719ea49919af3ec20039a78859cbcbca27fb30236a0df564cbbd186bae38ae707be1e5384a7b3e867faad2258071a690d497a64b9ebc637c1

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\000003.log

                                                  Filesize

                                                  46B

                                                  MD5

                                                  90881c9c26f29fca29815a08ba858544

                                                  SHA1

                                                  06fee974987b91d82c2839a4bb12991fa99e1bdd

                                                  SHA256

                                                  a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a

                                                  SHA512

                                                  15f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\000004.dbtmp

                                                  Filesize

                                                  16B

                                                  MD5

                                                  6752a1d65b201c13b62ea44016eb221f

                                                  SHA1

                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                  SHA256

                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                  SHA512

                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\CURRENT~RFf76c533.TMP

                                                  Filesize

                                                  16B

                                                  MD5

                                                  46295cac801e5d4857d09837238a6394

                                                  SHA1

                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                  SHA256

                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                  SHA512

                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\LOG

                                                  Filesize

                                                  192B

                                                  MD5

                                                  c5b1908a2ebc6f28041e7542f7d49a00

                                                  SHA1

                                                  207f403aabe00c59e4e8dcea7b8f7bb06f68ea78

                                                  SHA256

                                                  f48d7623354746801a6606f5131237bbf1e0bad519c9adbec7ef9f15f2280b37

                                                  SHA512

                                                  2b2f93a7b7b1093adea6cbbfe88ea9df1f6570e723678eb9fb48d3a62a37c4ccdd5ca5263a914a020d2da3550d9b13aee99790d66a958e65f6b673e7198781f3

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Visited Links

                                                  Filesize

                                                  128KB

                                                  MD5

                                                  2c70c0a2799a194d3b519a624e0dde2d

                                                  SHA1

                                                  6da7efc144d99d28494343e9fdec341bfaa1c2fa

                                                  SHA256

                                                  17973f375bde62a031f6a31b05aaba7f028b54604e2868405989bfe9b0579aec

                                                  SHA512

                                                  d206014f83bd3b45874fb3195d50538ec52f273f9acbad7d3f112794533fb67de32072f473e66178b98b0ee55b6cea341655bcbc08e68d38da1c22b31ae9fd45

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Web Data

                                                  Filesize

                                                  92KB

                                                  MD5

                                                  37ae21d4a9fa32fcbf3b0418c294ac0a

                                                  SHA1

                                                  59823abfe4d49ee528c78a98b9dc7a3206f8d5b2

                                                  SHA256

                                                  33b6178982e99b2e05f8e6c05cc268fc37a3231c7bf3f79ef28533dbbd665849

                                                  SHA512

                                                  0e8ca33e101fba4163b14e73241312b22147dd13202c97c104750c58a0882d57c0038b9abd2dd2f5fb00e518516ccba911f822941bf462b906736c6f16f97396

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                  Filesize

                                                  14B

                                                  MD5

                                                  9eae63c7a967fc314dd311d9f46a45b7

                                                  SHA1

                                                  caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf

                                                  SHA256

                                                  4288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d

                                                  SHA512

                                                  bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                  Filesize

                                                  264KB

                                                  MD5

                                                  f50f89a0a91564d0b8a211f8921aa7de

                                                  SHA1

                                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                  SHA256

                                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                  SHA512

                                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\wasm\index

                                                  Filesize

                                                  24B

                                                  MD5

                                                  54cb446f628b2ea4a5bce5769910512e

                                                  SHA1

                                                  c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                                                  SHA256

                                                  fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                                                  SHA512

                                                  8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\wasm\index-dir\the-real-index

                                                  Filesize

                                                  48B

                                                  MD5

                                                  1146743d8242482847999bda5af557d3

                                                  SHA1

                                                  340e204f3f9054741fbe864ba282dad735e65fa1

                                                  SHA256

                                                  beb8b550299ef1777e154d10e411439faba06cf629eed4e2f191fc470fc24dce

                                                  SHA512

                                                  8d2e6d184c4ad8d6b6acd804c7837ca881d428b37be0495008bddde67e9039d45423127d660ccf18052d469034838196909b8f8f3c179baae0ee622c60c2f7c6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\LOG

                                                  Filesize

                                                  193B

                                                  MD5

                                                  b7cd95bce707a4a22e24450a505f5f48

                                                  SHA1

                                                  955a6ba3a59beebf04c01c94b7f2ded5eb37bfc7

                                                  SHA256

                                                  6f6524dc0c094c0645174cc7c20390d4b685c638850ef2b7c73bf8b6179b4d44

                                                  SHA512

                                                  713495cae1d34ec213874cf1aca9d6a7bf880319f388f4b2832c819968c63298073cb8953172875ae2f06e1b1be0096521844bff3d00f93df0bf2c6764abdb6a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Local Storage\leveldb\LOG

                                                  Filesize

                                                  197B

                                                  MD5

                                                  e551b4fe0aeec1e5451da992b59b06cc

                                                  SHA1

                                                  bab03053496f22c8515c3abc28c8a53feffbf7ba

                                                  SHA256

                                                  3f6d0a5c3fa21f89cb0f747e289404efd0fa39022f9985193fd38b4ab8eb9910

                                                  SHA512

                                                  7f9573e36dee1c1046538045e584ded042104a61f31c1322b1d9e22a0ce03d86ee4e17965a8870e69c25a73e0f415f195398ff1f2dd61fc6f3af315c703e3529

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\LOG

                                                  Filesize

                                                  205B

                                                  MD5

                                                  08eef077683c6363a1d9ef4b1f89f2af

                                                  SHA1

                                                  47ac764ce28f0951c377f84eb45c78272ed5d3c9

                                                  SHA256

                                                  c436a144e396f630cfea807e23b2ff98f6af3fe8eb682993e9cba3d091b0073c

                                                  SHA512

                                                  4b689384b3ff040ffaacba4d36de8a07db0398c089adcd9ef9a36ba98fd2a014b349891d8428024efd1fc12d64f601ea3341cf41c03887b376dd2395effe1d50

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\LOG

                                                  Filesize

                                                  193B

                                                  MD5

                                                  88d662a482c1bb31d854b522e0f53161

                                                  SHA1

                                                  ebb8c87f3c7047a997160542375255924327e345

                                                  SHA256

                                                  f6e19fa754e26f73fceee28cdf4f2d78589d8e7f7bcde0304abe670bb5976d44

                                                  SHA512

                                                  cf52c1277a03551db0d5c14cfcf10fe0d069ba37988e942b3cf4be5c786420080c25b43bddce72a02bb8c9e3206c2e17614d82bf8fc3993f5b510648725199e3

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\MANIFEST-000001

                                                  Filesize

                                                  41B

                                                  MD5

                                                  5af87dfd673ba2115e2fcf5cfdb727ab

                                                  SHA1

                                                  d5b5bbf396dc291274584ef71f444f420b6056f1

                                                  SHA256

                                                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                  SHA512

                                                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Visited Links

                                                  Filesize

                                                  128KB

                                                  MD5

                                                  2f2a071407e9c2a1384789aed9478773

                                                  SHA1

                                                  cdd887a4db6c619c0ac7ceff8875f18eaa67bac3

                                                  SHA256

                                                  6e4a1d7fe55318158b9777844579de7d38979719b7900a9874095bddb77ed93e

                                                  SHA512

                                                  105b705f16b0d269a9463dd6ab062698f868fc06f48a222f45f5e0933d414a292d8f3212fe8bfaf667e4df2a8898301eeb51db4a881c4101d0a550f5e3c195bf

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                  Filesize

                                                  86B

                                                  MD5

                                                  961e3604f228b0d10541ebf921500c86

                                                  SHA1

                                                  6e00570d9f78d9cfebe67d4da5efe546543949a7

                                                  SHA256

                                                  f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed

                                                  SHA512

                                                  535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\d18c1a34-670c-4811-b038-44e388ce1a61.tmp

                                                  Filesize

                                                  2B

                                                  MD5

                                                  99914b932bd37a50b983c5e7c90ae93b

                                                  SHA1

                                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                  SHA256

                                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                  SHA512

                                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\activity-stream.discovery_stream.json.tmp

                                                  Filesize

                                                  23KB

                                                  MD5

                                                  3a4905570e14973f3f60424cb7de5a6f

                                                  SHA1

                                                  c6b925a80e3698e4ecebba6715fa22ed01b16050

                                                  SHA256

                                                  2e92c09bc801c860eaeb486559a47014e65e9de6673579f24e466b4b0135148e

                                                  SHA512

                                                  b46a519c51cbd932577ea7e9ee167066e4f5e2ef5497acd8e0f27ceea0b7c9cfe01ec3fd6ff2de37aae6cb8e14cd0802ec9f3bac4da198434bd3cfb806236464

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  96c542dec016d9ec1ecc4dddfcbaac66

                                                  SHA1

                                                  6199f7648bb744efa58acf7b96fee85d938389e4

                                                  SHA256

                                                  7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                  SHA512

                                                  cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                • C:\Users\Admin\AppData\Local\Temp\1012102001\0c0ddfee4b.exe

                                                  Filesize

                                                  4.2MB

                                                  MD5

                                                  7f86796ba277db70ce5d280c2a6f714c

                                                  SHA1

                                                  fed01f3abd8ff316007fea40970aa18bc3b996b6

                                                  SHA256

                                                  6098007d86bda32edb4dbeac787639b623cca631501eba60d29042d5dfbee3ff

                                                  SHA512

                                                  124a578cbe99d5747cfe8841c37e658d0670d558bc706f1b5bcd5543b57306c9ec355c6a6ffb541bc130d934efbae11a182c75f17037ad7d1154088f283b6703

                                                • C:\Users\Admin\AppData\Local\Temp\1012103001\rhnew.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  a84456172908e096d0ac6272b9503e08

                                                  SHA1

                                                  8b64d38bae9fc390e621323e9e91eb8f7def421c

                                                  SHA256

                                                  4f95dff270ac4172d470789c3fce9ae2c656565a3887afc86507ec49981bd128

                                                  SHA512

                                                  3237f19915957327d3debd46de1c52531622fba5dbb2e06c9685ca336bd4febf19c2f3dd533c5046b0e676d21f10ba10478b3bbe9dbb31823b7dc118a6413800

                                                • C:\Users\Admin\AppData\Local\Temp\1012104001\303ad38b0d.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  c6e96783dd6f08a3a00e2ea7e1eac128

                                                  SHA1

                                                  5e3df4657737cd899a2d4f0ebf8ac24c5a477adb

                                                  SHA256

                                                  5d1a9be77f64b034b967213e1b70377bba1cd012ff75c4f171fab1f67968551e

                                                  SHA512

                                                  b05a1b2a4ccc0b456659db8f906922d388e005cd08e89834ab8f020370f8d7a9426e0543a5ebd380e331939c52d544f56be199cbe56e4ad6d5bc5579c961f5bc

                                                • C:\Users\Admin\AppData\Local\Temp\1012105001\427922e3ad.exe

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  3cf0b2a24e8ae8d6d755e0dbe1c1b4d8

                                                  SHA1

                                                  c56485438c0b2ec56f3ae37eb8c69da0f14d879a

                                                  SHA256

                                                  009da59cac8ae7ea574215a17ed9bd673d2506481ea60eb9d198f047523a3ee3

                                                  SHA512

                                                  cf6b5734f25e231710ca504ce35ac39ad2b1503941b5e31d05d1c98c0b32f46b58d969bd280efe2a13aa90b319890dd891de6c1def17d72a160b2ef4b85e432d

                                                • C:\Users\Admin\AppData\Local\Temp\1012106001\a11ad2be82.exe

                                                  Filesize

                                                  949KB

                                                  MD5

                                                  db8d876ffb59b0fc6774244f27143130

                                                  SHA1

                                                  8403396abf624defcbe5d034b19eb0d295c2a200

                                                  SHA256

                                                  45d0587403ec5e0caba5212231c99e9fa65fa22b6f6a2bfe4cbbbc5406432f9d

                                                  SHA512

                                                  c9b2006d1e1afd650b781c441df2aac4a352aace329e5c753f5f0002cd4ea9e578fd3d14ade49119fe0c09164d3abc4e490adf4f79a01210490c069562c313cc

                                                • C:\Users\Admin\AppData\Local\Temp\1012107001\6e49cc933c.exe

                                                  Filesize

                                                  2.7MB

                                                  MD5

                                                  a4659df10cd9740666ab572597253aed

                                                  SHA1

                                                  41a1f17a26bcb410aa288a317c5fe25efc661e6d

                                                  SHA256

                                                  5e323399670cfbbf8b20f593acbc0af0092b57900c96b4cb168d87ae189e8058

                                                  SHA512

                                                  3bfac9f2c86d6489c63478b89d4f173fdb9d681c92d2af35a54a835d07639bd5d52b2a0fa28d7187afd893a8ef7ea18e1417a3bd8b0f31ad14028d8eeb05d0d4

                                                • C:\Users\Admin\AppData\Local\Temp\1012108001\dc01b9f4eb.exe

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  7f5a4d072a8a04f671be634f958fd98f

                                                  SHA1

                                                  ff8de037e06004e1728e6d699f1be00b9139d795

                                                  SHA256

                                                  a9e92705e50c5ee6795eb54011a4e1f68bdc6f15dd5effc25abf3cf7ea5c35fe

                                                  SHA512

                                                  23ce79a762f80cfb3f1711dc9f2c22561cfcff65ed13bbf08919780eb86858e59aa8889f6409743501536eda07bd12cfb080120563f57a45e873e1add0f73eb6

                                                • C:\Users\Admin\AppData\Local\Temp\Cab6C1D.tmp

                                                  Filesize

                                                  70KB

                                                  MD5

                                                  49aebf8cbd62d92ac215b2923fb1b9f5

                                                  SHA1

                                                  1723be06719828dda65ad804298d0431f6aff976

                                                  SHA256

                                                  b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                  SHA512

                                                  bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                • C:\Users\Admin\AppData\Local\Temp\Tar6C40.tmp

                                                  Filesize

                                                  181KB

                                                  MD5

                                                  4ea6026cf93ec6338144661bf1202cd1

                                                  SHA1

                                                  a1dec9044f750ad887935a01430bf49322fbdcb7

                                                  SHA256

                                                  8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                  SHA512

                                                  6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                  Filesize

                                                  3.1MB

                                                  MD5

                                                  9cbdd3caa1ae69bc40c0309f428f4cb1

                                                  SHA1

                                                  4d6219a933917d27210266996adba5eb312f2e7e

                                                  SHA256

                                                  64a426318376eacf9f53f757bc4e775f7a65ee5c7d3f1130112295c4078cdfb3

                                                  SHA512

                                                  3123d2f0c2842af6a3d6e3121c73fba03d73d6ab00ab0420cfcfa575d295431c27a47f0312ded7b55cf42f39b910b0ad6808b8fa0666d287e56852565324eba9

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                  Filesize

                                                  442KB

                                                  MD5

                                                  85430baed3398695717b0263807cf97c

                                                  SHA1

                                                  fffbee923cea216f50fce5d54219a188a5100f41

                                                  SHA256

                                                  a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                  SHA512

                                                  06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                  Filesize

                                                  8.0MB

                                                  MD5

                                                  a01c5ecd6108350ae23d2cddf0e77c17

                                                  SHA1

                                                  c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                  SHA256

                                                  345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                  SHA512

                                                  b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\db\data.safe.bin

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  e9f033b21f3fa0433ebf26bd30a3353b

                                                  SHA1

                                                  7004ea4c8948a63709c68bc8dcf37f4b553d42a2

                                                  SHA256

                                                  5610b97f19aa3f95008ab95ea442382b853c56545ff8b0dd24f9613f1375ab35

                                                  SHA512

                                                  7216470701a49e084f76e05a38011bc10190a99b8d67e24cfb5077dc068554054eba38a8947394bcab24c34c8af0872480efe7d7a7d984c7c9ba685a387c339e

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\2b8e309a-a4cb-48d4-a2ba-851b05890a07

                                                  Filesize

                                                  745B

                                                  MD5

                                                  47c93d675a2317b832f31dd767a69fb3

                                                  SHA1

                                                  1b6aa71b6f5b957c3330b512b01caec6df13224f

                                                  SHA256

                                                  a4048026890c92f21b108d71011e8649e9b09b5ca79ceeb0a2e90235e3702403

                                                  SHA512

                                                  6f1ea3703caadd1ab26789df3eeae873ad44fa9afbb3e42802d0acab58fafa60d054bf946c84742d7908bb96e0048db93395a37776e448213c997ab37417a69a

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\77af5e85-9144-4562-908b-b80eb22761cc

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  8846c9a8926cad63f747c2e750b769f7

                                                  SHA1

                                                  46415d1d48ce34140b9e45e576656b1995f7b400

                                                  SHA256

                                                  c8b32843694017491102b862cfdaad0bb93305d05f0ec92297dc3a40548fcc8d

                                                  SHA512

                                                  c321b33e2c89ff9e5a13af91ffa501e34caa49889c455359ffdb5c3d1a6d35d9f39d9bada12e455fa91664d88013c0397e1679a1e56b63a419d1d3ebbd1e1dbc

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                  Filesize

                                                  997KB

                                                  MD5

                                                  fe3355639648c417e8307c6d051e3e37

                                                  SHA1

                                                  f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                  SHA256

                                                  1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                  SHA512

                                                  8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                  Filesize

                                                  116B

                                                  MD5

                                                  3d33cdc0b3d281e67dd52e14435dd04f

                                                  SHA1

                                                  4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                  SHA256

                                                  f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                  SHA512

                                                  a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                  Filesize

                                                  479B

                                                  MD5

                                                  49ddb419d96dceb9069018535fb2e2fc

                                                  SHA1

                                                  62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                  SHA256

                                                  2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                  SHA512

                                                  48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                  Filesize

                                                  372B

                                                  MD5

                                                  8be33af717bb1b67fbd61c3f4b807e9e

                                                  SHA1

                                                  7cf17656d174d951957ff36810e874a134dd49e0

                                                  SHA256

                                                  e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                  SHA512

                                                  6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                  Filesize

                                                  11.8MB

                                                  MD5

                                                  33bf7b0439480effb9fb212efce87b13

                                                  SHA1

                                                  cee50f2745edc6dc291887b6075ca64d716f495a

                                                  SHA256

                                                  8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                  SHA512

                                                  d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  688bed3676d2104e7f17ae1cd2c59404

                                                  SHA1

                                                  952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                  SHA256

                                                  33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                  SHA512

                                                  7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  937326fead5fd401f6cca9118bd9ade9

                                                  SHA1

                                                  4526a57d4ae14ed29b37632c72aef3c408189d91

                                                  SHA256

                                                  68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                  SHA512

                                                  b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  168b91e7e4c96c2b999b405c37492bce

                                                  SHA1

                                                  035b818e572330b0f9ec94580dea4da01a86cb30

                                                  SHA256

                                                  661e42159d721b736f164fea07e030a4e8d236cb320b4e9f41bc43a6170424dd

                                                  SHA512

                                                  92fbdaf29fa873b4420711d70b26de8c2f7b0decd0db662f6bab1d7e3c660e6a944b9b6d38f551b250e8e9d0383ba71e0eb58f853c1201617beb049a2054d44c

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  79d1a640e01d19eab205340d8ababfba

                                                  SHA1

                                                  b4711f80963e8f005209cb3fe851828516af0d29

                                                  SHA256

                                                  659eb641ee97097b8d46d6b4af40ca4cb4d69dcf474e1084010ded58adf5a2f1

                                                  SHA512

                                                  c4e5b6e5443cb00f5984cdd7b15f9acd87fd34a3cae07dfd40dbc9ad9f64fa218d7f80e02c9fafa40f1fbf20afddae81f75b2b914c114d45c87e684d08d7fdfb

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs.js

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  6d359c219ceb6840ad04f29a5cccf4b9

                                                  SHA1

                                                  0f0bc3c9e6c8f903652816d2d3cd5b7f394d85b2

                                                  SHA256

                                                  60fc14a82f864ff815cf398beebced9191c4e72335f92a531d2aeb7964812b9c

                                                  SHA512

                                                  ab8ab78af93817e3cf50e60bc7056f945b42b891e5259df6f31fea3770addde1dc8df63596ccce656942cf02ada494a2755bf30badfdd8454127bfa6eb1e2df6

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs.js

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  7c9a2b6ad2d853b103caddad903a6152

                                                  SHA1

                                                  edcd338fb15a5c32957e108b4e38f8b96634dd66

                                                  SHA256

                                                  544d664396f9c2b6f6a5fd61c5e4bfbfe288b00252d9d91b5db64edfa9b6659d

                                                  SHA512

                                                  04fb854d68b00f3e69c44de7179f6b88f99666370d53d63880ec586a9d55080ba461155104c88ae8152ba5d0bd96be602b5a4c9f9ecee466f02f041f770e8f46

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\sessionstore-backups\recovery.jsonlz4

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  6bf82fa8c0595b32cc7dc1e1014927ea

                                                  SHA1

                                                  38e1ce77b24bb746713ad346587f60160ac590ad

                                                  SHA256

                                                  75b04818039e8ceaa50e47fbcd04454d2757468498cad474552c13d9dabacf6a

                                                  SHA512

                                                  26f2f7199f7c37647741177270ee8bf82c146187e0919b478b6753455f4fdae334bf5aca3438c42bd891e9747fe2d94c28f265b22cb4002ee51e3eef9b261472

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                  Filesize

                                                  192KB

                                                  MD5

                                                  286c54cadaa643d945cae5074ec93a02

                                                  SHA1

                                                  21c95a09b5570e4ba4e34b51713068f9c9df5542

                                                  SHA256

                                                  32574d9034c88053dee2d0da01e9aae0c744326589074428333e84053296a50d

                                                  SHA512

                                                  b2f4dc6196cd42d0447d9eaefb8c9d0543882f69db59afff52c4b24fb77ef1dc4530e6fdbc9eacdcdc65fbc0cd05474ed5ab73a744e45e3a02d7e6ba8b2be011

                                                • memory/1144-616-0x0000000000D20000-0x00000000011BF000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1144-949-0x0000000000D20000-0x00000000011BF000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1144-874-0x0000000000D20000-0x00000000011BF000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1144-563-0x0000000000D20000-0x00000000011BF000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1144-580-0x0000000000D20000-0x00000000011BF000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1144-997-0x0000000000D20000-0x00000000011BF000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1144-584-0x0000000000D20000-0x00000000011BF000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1144-999-0x0000000000D20000-0x00000000011BF000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1144-842-0x0000000000D20000-0x00000000011BF000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1244-546-0x0000000000A80000-0x000000000173B000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/1244-566-0x0000000000A80000-0x000000000173B000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/1244-567-0x0000000000A80000-0x000000000173B000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/1244-565-0x0000000000A80000-0x000000000173B000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/1380-242-0x0000000001000000-0x0000000001681000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/1380-3-0x0000000001000000-0x0000000001681000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/1380-1-0x0000000077A50000-0x0000000077A52000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/1380-517-0x0000000001000000-0x0000000001681000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/1380-511-0x0000000001000000-0x0000000001681000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/1380-0-0x0000000001000000-0x0000000001681000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/1380-490-0x0000000001000000-0x0000000001681000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/1380-291-0x0000000001000000-0x0000000001681000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/1380-249-0x0000000001000000-0x0000000001681000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/1380-2-0x0000000001001000-0x0000000001018000-memory.dmp

                                                  Filesize

                                                  92KB

                                                • memory/1380-4-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                  Filesize

                                                  972KB

                                                • memory/1900-601-0x00000000000D0000-0x0000000000763000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/1900-599-0x00000000000D0000-0x0000000000763000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2016-582-0x00000000013E0000-0x0000000001875000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2016-946-0x00000000013E0000-0x0000000001875000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2016-824-0x00000000013E0000-0x0000000001875000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2016-1001-0x00000000013E0000-0x0000000001875000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2016-603-0x00000000013E0000-0x0000000001875000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2016-996-0x00000000013E0000-0x0000000001875000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2016-865-0x00000000013E0000-0x0000000001875000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2016-615-0x00000000013E0000-0x0000000001875000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2516-579-0x0000000006B10000-0x0000000006FAF000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2516-560-0x0000000006B10000-0x00000000077CB000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/2516-1016-0x00000000010A0000-0x00000000013B1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2516-864-0x00000000064F0000-0x00000000067AA000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/2516-1009-0x00000000010A0000-0x00000000013B1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2516-1002-0x00000000010A0000-0x00000000013B1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2516-529-0x00000000010A0000-0x00000000013B1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2516-838-0x00000000064F0000-0x00000000067AA000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/2516-875-0x00000000010A0000-0x00000000013B1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2516-790-0x0000000006B10000-0x00000000071A3000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2516-743-0x0000000006B10000-0x00000000071A3000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2516-622-0x00000000010A0000-0x00000000013B1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2516-998-0x00000000010A0000-0x00000000013B1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2516-602-0x0000000006B10000-0x0000000006FA5000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2516-600-0x0000000006B10000-0x00000000071A3000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2516-598-0x0000000006B10000-0x00000000071A3000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2516-583-0x00000000010A0000-0x00000000013B1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2516-581-0x0000000006B10000-0x0000000006FA5000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2516-564-0x00000000010A0000-0x00000000013B1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2516-843-0x00000000010A0000-0x00000000013B1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2516-561-0x0000000006B10000-0x0000000006FAF000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2516-562-0x0000000006B10000-0x0000000006FAF000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2516-950-0x00000000010A0000-0x00000000013B1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2516-545-0x0000000006B10000-0x00000000077CB000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/2516-533-0x00000000010A0000-0x00000000013B1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2528-531-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2528-527-0x00000000067C0000-0x0000000006AD1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2528-528-0x00000000067C0000-0x0000000006AD1000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/2528-515-0x0000000000A50000-0x0000000000D61000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/3728-868-0x0000000000C50000-0x0000000000F0A000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/3728-841-0x0000000000C50000-0x0000000000F0A000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/3728-839-0x0000000000C50000-0x0000000000F0A000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/3728-840-0x0000000000C50000-0x0000000000F0A000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/3964-1000-0x0000000000400000-0x0000000000C73000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/3964-1003-0x0000000000400000-0x0000000000C73000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/3964-960-0x0000000000400000-0x0000000000C73000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/3964-1015-0x0000000000400000-0x0000000000C73000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/3964-902-0x0000000000400000-0x0000000000C73000-memory.dmp

                                                  Filesize

                                                  8.4MB