Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 08:39

General

  • Target

    file.exe

  • Size

    1.7MB

  • MD5

    3e7d4e856f6a4c800c481c951a8ce7d5

  • SHA1

    57b05e2bd2deda1edeab15d6fcf6cfd12f575af7

  • SHA256

    da0b13d14e49b1d1b3382af1ace372f32a29d452ce3ea03e5a7b9bece44b03a7

  • SHA512

    355c0225eba742a1f59b528b91b62ea66d05b97d82fcb8f4376fb6d0d12f6d1bc97c1dd31c4c1fdfcf6287d8576d0c6db7d4fd61627977c4530dca1f662bd651

  • SSDEEP

    49152:p82JsfCB6T3uU8lHq+5JVRSHlnucgfi8RAL+Jb:pUTeU8Hq+5RSHlutRzJb

Malware Config

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 15 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
      2⤵
      • Uses browser remote debugging
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ba9758,0x7fef6ba9768,0x7fef6ba9778
        3⤵
          PID:2868
        • C:\Windows\system32\ctfmon.exe
          ctfmon.exe
          3⤵
            PID:2504
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=976,i,15761176412439331453,12928630825339392961,131072 /prefetch:2
            3⤵
              PID:896
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=976,i,15761176412439331453,12928630825339392961,131072 /prefetch:8
              3⤵
                PID:1780
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=976,i,15761176412439331453,12928630825339392961,131072 /prefetch:8
                3⤵
                  PID:1964
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2180 --field-trial-handle=976,i,15761176412439331453,12928630825339392961,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:868
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2496 --field-trial-handle=976,i,15761176412439331453,12928630825339392961,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:2368
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2504 --field-trial-handle=976,i,15761176412439331453,12928630825339392961,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:2156
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1688 --field-trial-handle=976,i,15761176412439331453,12928630825339392961,131072 /prefetch:2
                  3⤵
                    PID:2484
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                  2⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:2808
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6069758,0x7fef6069768,0x7fef6069778
                    3⤵
                      PID:2724
                    • C:\Windows\system32\ctfmon.exe
                      ctfmon.exe
                      3⤵
                        PID:2856
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1128 --field-trial-handle=1304,i,9190653324374166956,17903015718152076334,131072 /prefetch:2
                        3⤵
                          PID:2412
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1304,i,9190653324374166956,17903015718152076334,131072 /prefetch:8
                          3⤵
                            PID:2748
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1304,i,9190653324374166956,17903015718152076334,131072 /prefetch:8
                            3⤵
                              PID:2952
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1304,i,9190653324374166956,17903015718152076334,131072 /prefetch:1
                              3⤵
                              • Uses browser remote debugging
                              PID:1508
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1520 --field-trial-handle=1304,i,9190653324374166956,17903015718152076334,131072 /prefetch:1
                              3⤵
                              • Uses browser remote debugging
                              PID:2504
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2616 --field-trial-handle=1304,i,9190653324374166956,17903015718152076334,131072 /prefetch:1
                              3⤵
                              • Uses browser remote debugging
                              PID:2148
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1336 --field-trial-handle=1304,i,9190653324374166956,17903015718152076334,131072 /prefetch:2
                              3⤵
                                PID:920
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3776 --field-trial-handle=1304,i,9190653324374166956,17903015718152076334,131072 /prefetch:8
                                3⤵
                                  PID:1604
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\AAFIJKKEHJ.exe"
                                2⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:1596
                                • C:\Users\Admin\Documents\AAFIJKKEHJ.exe
                                  "C:\Users\Admin\Documents\AAFIJKKEHJ.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Loads dropped DLL
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  PID:2880
                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                    4⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Loads dropped DLL
                                    • Adds Run key to start application
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2864
                                    • C:\Users\Admin\AppData\Local\Temp\1012306001\rhnew.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1012306001\rhnew.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Modifies system certificate store
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:816
                                    • C:\Users\Admin\AppData\Local\Temp\1012311001\d32d84338d.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1012311001\d32d84338d.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:612
                                    • C:\Users\Admin\AppData\Local\Temp\1012312001\a8a8cb8718.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1012312001\a8a8cb8718.exe"
                                      5⤵
                                      • Enumerates VirtualBox registry keys
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1624
                                    • C:\Users\Admin\AppData\Local\Temp\1012313001\fe72e784df.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1012313001\fe72e784df.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Modifies system certificate store
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2416
                                    • C:\Users\Admin\AppData\Local\Temp\1012314001\f96a9261eb.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1012314001\f96a9261eb.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2664
                                    • C:\Users\Admin\AppData\Local\Temp\1012315001\1bd73d5204.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1012315001\1bd73d5204.exe"
                                      5⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:1856
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM firefox.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1728
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM chrome.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2792
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM msedge.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:944
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM opera.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1844
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM brave.exe /T
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1724
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                        6⤵
                                          PID:2908
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                            7⤵
                                            • Checks processor information in registry
                                            • Modifies registry class
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:2460
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2460.0.2060070896\318034349" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e28366c6-7745-480a-9d2b-ca7b4fb92017} 2460 "\\.\pipe\gecko-crash-server-pipe.2460" 1332 102f9258 gpu
                                              8⤵
                                                PID:2044
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2460.1.1534322910\947576936" -parentBuildID 20221007134813 -prefsHandle 1468 -prefMapHandle 1464 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e79c8690-cac0-4642-9a8f-54318508634b} 2460 "\\.\pipe\gecko-crash-server-pipe.2460" 1496 e74258 socket
                                                8⤵
                                                  PID:1980
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2460.2.1835625294\549105591" -childID 1 -isForBrowser -prefsHandle 2052 -prefMapHandle 2044 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4fec2210-2801-4460-8a1f-2a04e10f2d1e} 2460 "\\.\pipe\gecko-crash-server-pipe.2460" 2064 19dad958 tab
                                                  8⤵
                                                    PID:2756
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2460.3.1296337114\1001115102" -childID 2 -isForBrowser -prefsHandle 2896 -prefMapHandle 2892 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f4f445f-f99c-42d7-9df8-c81d1d2851a9} 2460 "\\.\pipe\gecko-crash-server-pipe.2460" 2908 e63958 tab
                                                    8⤵
                                                      PID:2120
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2460.4.1962682998\2098942271" -childID 3 -isForBrowser -prefsHandle 3736 -prefMapHandle 3732 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d919370-852b-473c-9149-49bcbc52b566} 2460 "\\.\pipe\gecko-crash-server-pipe.2460" 3752 1f64a358 tab
                                                      8⤵
                                                        PID:2956
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2460.5.1539661727\1727926433" -childID 4 -isForBrowser -prefsHandle 3868 -prefMapHandle 3872 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c9e6217-2313-4799-80e6-31df5eb1a8ac} 2460 "\\.\pipe\gecko-crash-server-pipe.2460" 3856 1f6da358 tab
                                                        8⤵
                                                          PID:812
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2460.6.1445192940\921685499" -childID 5 -isForBrowser -prefsHandle 3984 -prefMapHandle 3988 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee8334ef-a90c-4ebd-b576-e72b4b76adf8} 2460 "\\.\pipe\gecko-crash-server-pipe.2460" 3972 1f6d8258 tab
                                                          8⤵
                                                            PID:2272
                                                    • C:\Users\Admin\AppData\Local\Temp\1012316001\cf636a4fbe.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1012316001\cf636a4fbe.exe"
                                                      5⤵
                                                      • Modifies Windows Defender Real-time Protection settings
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Windows security modification
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3068
                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                              1⤵
                                                PID:788
                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                1⤵
                                                  PID:2472

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  40B

                                                  MD5

                                                  44691fdf709576c5467bd86b9d95cecb

                                                  SHA1

                                                  9c0e49c662f20cdd89217f1bb4b4ba701e659697

                                                  SHA256

                                                  bbeef7deae86cbdb634c26982101647e319bb03dce941d124f0ab0edc8a76de9

                                                  SHA512

                                                  e52fb7f7091ed7a21944c629081fa5069f47fc076911101e20fdcc183c35b7b460fbbfac56f1f91052b1d35a35e66ce2dafce70349ed34ca6f16ba1e1f1fabdf

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000009.dbtmp

                                                  Filesize

                                                  16B

                                                  MD5

                                                  979c29c2917bed63ccf520ece1d18cda

                                                  SHA1

                                                  65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                                  SHA256

                                                  b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                                  SHA512

                                                  e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\CURRENT

                                                  Filesize

                                                  16B

                                                  MD5

                                                  18e723571b00fb1694a3bad6c78e4054

                                                  SHA1

                                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                  SHA256

                                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                  SHA512

                                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000010.dbtmp

                                                  Filesize

                                                  16B

                                                  MD5

                                                  60e3f691077715586b918375dd23c6b0

                                                  SHA1

                                                  476d3eab15649c40c6aebfb6ac2366db50283d1b

                                                  SHA256

                                                  e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                                  SHA512

                                                  d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\js\index

                                                  Filesize

                                                  24B

                                                  MD5

                                                  54cb446f628b2ea4a5bce5769910512e

                                                  SHA1

                                                  c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                                                  SHA256

                                                  fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                                                  SHA512

                                                  8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  48B

                                                  MD5

                                                  150cd17d5b8f1a3885fcc37acb83f92c

                                                  SHA1

                                                  e776f472970cfeb1df267689204ef46913942658

                                                  SHA256

                                                  27c0266dd5b98006b71fe6e638c939254a993258a08d5673915ecdebd8d61bb5

                                                  SHA512

                                                  c250b238474e44c1c62ad635f2cd7e92ab993a9e563fde20837940ca6c9bc909791cba1d1cc9be6428fbafdcc82c5185f7fef0146f766800e1a030fff88272b9

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Extension Scripts\LOG

                                                  Filesize

                                                  192B

                                                  MD5

                                                  c5b4f3f072916cf190d17a2ae47d66e2

                                                  SHA1

                                                  eb63090d524cfd6f66deca0bb2aa54d0cd7374c2

                                                  SHA256

                                                  e226984e71061e454e6beb8d9f4fe3bf8bd22b204a10a63f471a7c4419521533

                                                  SHA512

                                                  0f7c90d7318d2b557b3fc52829df1be9f7bfd0a8d5126943abb7f71acb06bad0f28da642d7c3c6956483dc7fb564ba271e3273e3045c0796b42f5ee06c009e7f

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\000003.log

                                                  Filesize

                                                  40B

                                                  MD5

                                                  148079685e25097536785f4536af014b

                                                  SHA1

                                                  c5ff5b1b69487a9dd4d244d11bbafa91708c1a41

                                                  SHA256

                                                  f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8

                                                  SHA512

                                                  c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\LOG

                                                  Filesize

                                                  204B

                                                  MD5

                                                  c903472ef675753726676b2cf264a703

                                                  SHA1

                                                  4bc593baa95dabee29e5a113fbec227bd5cf2dac

                                                  SHA256

                                                  0e67afbabd9e94604263fad41b8e2e955c2bd8423a245b6b05f2ca9f34ce5410

                                                  SHA512

                                                  b8a3496b8729a8ae519407ec858d8f87489d1e50dce0ac6af4e1515466760dc7488b625a6e0e556cac5cbcb8888a302359f101e4933a0c25ae784015930b6289

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\CURRENT~RFf76ef7d.TMP

                                                  Filesize

                                                  16B

                                                  MD5

                                                  46295cac801e5d4857d09837238a6394

                                                  SHA1

                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                  SHA256

                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                  SHA512

                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\LOG

                                                  Filesize

                                                  192B

                                                  MD5

                                                  3d9ad53d6691ff18550e2dee8464a4ec

                                                  SHA1

                                                  9fe3053fa8d7b03920797c2311cd1431a7ecf567

                                                  SHA256

                                                  e1292b868f1b19a5be12f1161c4df3bcf769e0dc3cc9e199da3e37ae9c6ae709

                                                  SHA512

                                                  c0a6b77e375e2036c578dbcd84f3d625fce8b81925a6e435fa4ab616ca4f139686a53564dc42321981f13e4aa9036d2717365018bd91acd725c041df996dea2c

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Visited Links

                                                  Filesize

                                                  128KB

                                                  MD5

                                                  cfbd044796f1b318e00409dfceb34eca

                                                  SHA1

                                                  bd5f497809f9681e9d285e993027bb659390ff1b

                                                  SHA256

                                                  af087de6206ca892dd97a79700488e5d94fb15923c21b0e18bb99a21c5222214

                                                  SHA512

                                                  b63116e29003595c12cc3fab36e46044e88846aa9cfe549df83cc2a77c56910cf31902be9ea81385e2e058bb91677ad74208740aa19ee8733b9f961520da154c

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Web Data

                                                  Filesize

                                                  92KB

                                                  MD5

                                                  802b55068e1f9596dd1e5479c62d8c6e

                                                  SHA1

                                                  ac7833493f3f8301f046a829688597219b89eb6a

                                                  SHA256

                                                  324f5d23f0889b992ffe7d3463a3c8b09e1ec78931a57b738bbefee4906ef0c4

                                                  SHA512

                                                  f95321ff4f399a21084e9fc7b0b734b764f8691a429460a82463dbbdb61c83bfeee2935c78dbefe22a57774dac58eaca8a17b97ffa038d8f2f968f13cfa36f41

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\shared_proto_db\metadata\LOG

                                                  Filesize

                                                  199B

                                                  MD5

                                                  2922baadfb2e4998f8efaf314d0b87d4

                                                  SHA1

                                                  5f68e5bd4b57c88e521d77aeacab74870060e735

                                                  SHA256

                                                  b3afe055f8084923c7c213f5b285dbbd4652f48453df5ac760c10c2e6f1ca2cf

                                                  SHA512

                                                  cfec5b8f49faf46b1f3022e681a28f5a95c51df58da79fe880d0bab9a191e8aebfcaa89d28fbeef1c6136c1e19ea3a9ff0387614661999bd3b81bdb78d88d8f6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                  Filesize

                                                  14B

                                                  MD5

                                                  9eae63c7a967fc314dd311d9f46a45b7

                                                  SHA1

                                                  caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf

                                                  SHA256

                                                  4288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d

                                                  SHA512

                                                  bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                  Filesize

                                                  264KB

                                                  MD5

                                                  f50f89a0a91564d0b8a211f8921aa7de

                                                  SHA1

                                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                  SHA256

                                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                  SHA512

                                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Affiliation Database

                                                  Filesize

                                                  32KB

                                                  MD5

                                                  69e3a8ecda716584cbd765e6a3ab429e

                                                  SHA1

                                                  f0897f3fa98f6e4863b84f007092ab843a645803

                                                  SHA256

                                                  e0c9f1494a417f356b611ec769b975a4552c4065b0bc2181954fcbb4b3dfa487

                                                  SHA512

                                                  bb78069c17196da2ce8546046d2c9d9f3796f39b9868b749ecada89445da7a03c9b54a00fcf34a23eb0514c871e026ac368795d2891bbf37e1dc5046c29beaaa

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\wasm\index-dir\the-real-index

                                                  Filesize

                                                  48B

                                                  MD5

                                                  e80ca46225d1e25e38c607f78472b6ad

                                                  SHA1

                                                  59c8e64c2e0200aaf7719ec1d3a29e2e42732895

                                                  SHA256

                                                  31b768986e894bbc2373f5da5ab8aa89515df638c5951b5b9cb88c65bb3cb6df

                                                  SHA512

                                                  6c51e89a1d061be32083a3776cef26c1188362b58a58386599a84e815c3fa6c488b218b3733f7a6db6897ed87c83c8bbe520cd0b99e851d6ca2435aaab512427

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\000003.log

                                                  Filesize

                                                  76B

                                                  MD5

                                                  cc4a8cff19abf3dd35d63cff1503aa5f

                                                  SHA1

                                                  52af41b0d9c78afcc8e308db846c2b52a636be38

                                                  SHA256

                                                  cc5dacf370f324b77b50dddf5d995fd3c7b7a587cb2f55ac9f24c929d0cd531a

                                                  SHA512

                                                  0e9559cda992aa2174a7465745884f73b96755008384d21a0685941acf099c89c8203b13551de72a87b8e23cdaae3fa513bc700b38e1bf3b9026955d97920320

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\LOG

                                                  Filesize

                                                  193B

                                                  MD5

                                                  9ff8e8b0e110968c0cc8625ce56e6fe3

                                                  SHA1

                                                  d7561c42f6b3fe3b7b75be3c27ff37b68138187f

                                                  SHA256

                                                  a31195322f0a028f1b33b918dfd229693dbde1b01c59287e39fee5743e5a5f37

                                                  SHA512

                                                  aac3e6b92dac7282dd6c9f392316d41ca26fb991ac82f63d8cfd8e4e107db4b3ef1a8975df90f62c685059689a7b001f93116c36cc3aa628390795774e69060d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\MANIFEST-000002

                                                  Filesize

                                                  50B

                                                  MD5

                                                  22bf0e81636b1b45051b138f48b3d148

                                                  SHA1

                                                  56755d203579ab356e5620ce7e85519ad69d614a

                                                  SHA256

                                                  e292f241daafc3df90f3e2d339c61c6e2787a0d0739aac764e1ea9bb8544ee97

                                                  SHA512

                                                  a4cf1f5c74e0df85dda8750be9070e24e19b8be15c6f22f0c234ef8423ef9ca3db22ba9ef777d64c33e8fd49fada6fcca26c1a14ba18e8472370533a1c65d8d0

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Favicons

                                                  Filesize

                                                  20KB

                                                  MD5

                                                  3eea0768ded221c9a6a17752a09c969b

                                                  SHA1

                                                  d17d8086ed76ec503f06ddd0ac03d915aec5cdc7

                                                  SHA256

                                                  6923fd51e36b8fe40d6d3dd132941c5a693b02f6ae4d4d22b32b5fedd0e7b512

                                                  SHA512

                                                  fb5c51adf5a5095a81532e3634f48f5aedb56b7724221f1bf1ccb626cab40f87a3b07a66158179e460f1d0e14eeb48f0283b5df6471dd7a6297af6e8f3efb1f9

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\History

                                                  Filesize

                                                  148KB

                                                  MD5

                                                  90a1d4b55edf36fa8b4cc6974ed7d4c4

                                                  SHA1

                                                  aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                                  SHA256

                                                  7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                                  SHA512

                                                  ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Login Data

                                                  Filesize

                                                  46KB

                                                  MD5

                                                  02d2c46697e3714e49f46b680b9a6b83

                                                  SHA1

                                                  84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                  SHA256

                                                  522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                  SHA512

                                                  60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\LOG

                                                  Filesize

                                                  205B

                                                  MD5

                                                  b114d5fa2c9a0acedc00b6e0b92fb44d

                                                  SHA1

                                                  4ec15f1b6c7a78cf6d4bd49eb0656216da0cb0cd

                                                  SHA256

                                                  502937fd2d8d190316189eadf6b72a6fd83ad2d97a909bc5b3ab4e43ded22fb4

                                                  SHA512

                                                  4fe70745ff8f38a1e6ff6de0c658f30c1e05a120d478d75d32f44a9b17c273ea2fa6b37339d2d0b47e304a53d402078e941bb0b5296df8c03dbc8482b7c38dc9

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\000002.dbtmp

                                                  Filesize

                                                  16B

                                                  MD5

                                                  206702161f94c5cd39fadd03f4014d98

                                                  SHA1

                                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                  SHA256

                                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                  SHA512

                                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\000003.log

                                                  Filesize

                                                  46B

                                                  MD5

                                                  90881c9c26f29fca29815a08ba858544

                                                  SHA1

                                                  06fee974987b91d82c2839a4bb12991fa99e1bdd

                                                  SHA256

                                                  a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a

                                                  SHA512

                                                  15f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\000004.dbtmp

                                                  Filesize

                                                  16B

                                                  MD5

                                                  6752a1d65b201c13b62ea44016eb221f

                                                  SHA1

                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                  SHA256

                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                  SHA512

                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\LOG

                                                  Filesize

                                                  193B

                                                  MD5

                                                  5fa41727abbafd79a85376386990cbad

                                                  SHA1

                                                  da13f956ea86098aa7687900502555023b2f4bd9

                                                  SHA256

                                                  c2fd52e410765b3f60df528f552caf9173603ef56cc6648cd8a4eb9ea232f2b3

                                                  SHA512

                                                  5f7bb939e3d5411c96e4dfc2f457b201e85d3e1f793957dd69b0cd52626309c03b014ddbebb593c422c66a975e77b2814d54cecd3c5aede1905a74b4614c71e2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\MANIFEST-000001

                                                  Filesize

                                                  41B

                                                  MD5

                                                  5af87dfd673ba2115e2fcf5cfdb727ab

                                                  SHA1

                                                  d5b5bbf396dc291274584ef71f444f420b6056f1

                                                  SHA256

                                                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                  SHA512

                                                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Visited Links

                                                  Filesize

                                                  128KB

                                                  MD5

                                                  bb5f06ab00a1bab25ab2c924e38ee2a4

                                                  SHA1

                                                  b644db5982451becc6b803a76af72f63e3739c7d

                                                  SHA256

                                                  553cf44e5db9805c51c53682be4cc30f5544bbc0399a9036187111ad827e40b3

                                                  SHA512

                                                  e22d5f1e790c27d54c9957b21910a49597d746866750aac560eb6051b364da661140a99ed65b5a840e73f85649e033ba00678f069d02c7079f25fd3516dc30aa

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\shared_proto_db\metadata\000003.log

                                                  Filesize

                                                  126B

                                                  MD5

                                                  75fd43d5022bdd2d2627d6944561b2f6

                                                  SHA1

                                                  a23b313546c837e097f8900b207b9aebcf67acee

                                                  SHA256

                                                  3363fa9a21dc4db7dc25aa12fa1e9f4c42cf3d07a21814dc37e2a587462564a4

                                                  SHA512

                                                  624e947801c3c24ea5eac7b6c193dbffe2774b0c090ab37c9862ec9a8e366aca0c00dcf5ef63c77de40eb5d2af248a24e0f70a8395ba9671c33023a88fcc8a29

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\shared_proto_db\metadata\LOG

                                                  Filesize

                                                  200B

                                                  MD5

                                                  cdf1db6ca3e66c3661e9490b47b5f766

                                                  SHA1

                                                  1f70f8cbf67a24b6d0d9c8ef58bcc3ddd938daff

                                                  SHA256

                                                  52528e3f957445ed5382250d697aeb2c4f923e71917428fa34146f89ca0055a1

                                                  SHA512

                                                  9e744e7accd091f6d5cd8233879686235df8b4ea1e9440d8504f45e0e205e0a0ac4101ef56445755208d0e8020a0e57a0080a10cf4ec6a3aa4b197c13282d37f

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                  Filesize

                                                  86B

                                                  MD5

                                                  f732dbed9289177d15e236d0f8f2ddd3

                                                  SHA1

                                                  53f822af51b014bc3d4b575865d9c3ef0e4debde

                                                  SHA256

                                                  2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                                  SHA512

                                                  b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                  Filesize

                                                  2B

                                                  MD5

                                                  99914b932bd37a50b983c5e7c90ae93b

                                                  SHA1

                                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                  SHA256

                                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                  SHA512

                                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\activity-stream.discovery_stream.json.tmp

                                                  Filesize

                                                  29KB

                                                  MD5

                                                  2806f14e8b7cf1d5cf6c35a20d98de28

                                                  SHA1

                                                  c668c434b92a654917b72331136028987421a8d5

                                                  SHA256

                                                  f0fdb640d12787d7ae75feec9da086c0ab1a1e5d656bcb5111fb5ee3fb2d6f76

                                                  SHA512

                                                  2f775e08de79805ffb905b8d1df4f461dbac1760676ce2b05c9ed7e938548c45085aadd6da8808be81bd45ddcf23b9305f4fba5c4151610b6fa4f58b69d64c67

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  96c542dec016d9ec1ecc4dddfcbaac66

                                                  SHA1

                                                  6199f7648bb744efa58acf7b96fee85d938389e4

                                                  SHA256

                                                  7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                  SHA512

                                                  cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                • C:\Users\Admin\AppData\Local\Temp\1012041001\e6dA9xd.exe

                                                  Filesize

                                                  612B

                                                  MD5

                                                  e3eb0a1df437f3f97a64aca5952c8ea0

                                                  SHA1

                                                  7dd71afcfb14e105e80b0c0d7fce370a28a41f0a

                                                  SHA256

                                                  38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521

                                                  SHA512

                                                  43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf

                                                • C:\Users\Admin\AppData\Local\Temp\1012306001\rhnew.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  f7286fef9317fe91e24cda721ec0be81

                                                  SHA1

                                                  0e0197c0f87200f7c1ebb4bba314f7bb875a638c

                                                  SHA256

                                                  4dcf1cc20990dace1f3e7c5a4b94ea7b823f90eb6de639b2b1b6494838f1cc62

                                                  SHA512

                                                  314b3f5cf1a0c15db568d33647b97887b37e987ba253ee9f5ded045446328307ebd04acd832fbdf66ad29be9510bd0c378e2fcb889509dca84df9b9106602c6e

                                                • C:\Users\Admin\AppData\Local\Temp\1012311001\d32d84338d.exe

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  032aa8264c2ccbdd008693fd9c29a1fb

                                                  SHA1

                                                  86a99c6498d68c8af759afd61ed56637a46bb016

                                                  SHA256

                                                  eab9619df6b82520165d2b4455fbdf147077932f8f53b80d6adb9501e822cdbc

                                                  SHA512

                                                  bb5c07246b6bbac5ccfd26fd32e4f8fb1b337590593475ee8a289bb92a502d7f95c7f74dcfdf0c71389290ee4c415fb1328618d081e3c7dbb31a3a5c7aa8a679

                                                • C:\Users\Admin\AppData\Local\Temp\1012312001\a8a8cb8718.exe

                                                  Filesize

                                                  4.2MB

                                                  MD5

                                                  945c341f59701ed5ba77d32113380608

                                                  SHA1

                                                  7f4731907303469979510815377be0afe5eba8b6

                                                  SHA256

                                                  ada89f570fc90952b5a2a384b6379efa1e80a7a9165a51e14e6ea611131b7f82

                                                  SHA512

                                                  55dd9513f574183948d6195954c4818842451f5137f336decbd04b42e99e757286e45e3b70837affa73912926338b761ab7623857f6f8d5ee346abe621598f55

                                                • C:\Users\Admin\AppData\Local\Temp\1012313001\fe72e784df.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  51a3cd998ab576ee44d9505d21aa03d5

                                                  SHA1

                                                  374360e64ad4e029c354811123fe68278b0ab1e2

                                                  SHA256

                                                  ea5ebfdc537243bc6a7bc48110919076c9e204abcf93587c873855df82db3934

                                                  SHA512

                                                  f5386c70d76e67d9ccf336acb89046a4d159e04f33237d7c3c3385e4a2569c58c62cf6cda553f1167dbce6cb406da37687dbd0a71dd7fecea8d658f01702208e

                                                • C:\Users\Admin\AppData\Local\Temp\1012314001\f96a9261eb.exe

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  3e7d4e856f6a4c800c481c951a8ce7d5

                                                  SHA1

                                                  57b05e2bd2deda1edeab15d6fcf6cfd12f575af7

                                                  SHA256

                                                  da0b13d14e49b1d1b3382af1ace372f32a29d452ce3ea03e5a7b9bece44b03a7

                                                  SHA512

                                                  355c0225eba742a1f59b528b91b62ea66d05b97d82fcb8f4376fb6d0d12f6d1bc97c1dd31c4c1fdfcf6287d8576d0c6db7d4fd61627977c4530dca1f662bd651

                                                • C:\Users\Admin\AppData\Local\Temp\1012315001\1bd73d5204.exe

                                                  Filesize

                                                  947KB

                                                  MD5

                                                  fad8dedd5b537ee7b1b01b41dbeb11e4

                                                  SHA1

                                                  c50f05e88eb8a869825eac83e4fee36304ddd8cd

                                                  SHA256

                                                  f024cdd25580fe247bd475e581035e56896d1be1d96faa9e6c571d539fec6903

                                                  SHA512

                                                  cb974866957419f663124c4de43919940d859bffbfbf5b50b594b5c0b9beb3781f78b1b22cf5c720b727197079d2b847952c4a9cc4de35ab7048949236a5a86d

                                                • C:\Users\Admin\AppData\Local\Temp\1012316001\cf636a4fbe.exe

                                                  Filesize

                                                  2.7MB

                                                  MD5

                                                  2fdc403d205d060a384aa272958a8946

                                                  SHA1

                                                  9f486badeff8eb149ce638b5ac1d7ce821a58e8f

                                                  SHA256

                                                  38f72cf79abddfb05bb887ac718bc64db67fd1653994bc640c58e285a9b291e0

                                                  SHA512

                                                  4288c709cbf97785dcc74f6380c3344ccbc3504260931e051289c6e11d8004fe3af2819b7a8ac52d9dba75a7d73efce4eae653e88e809b913ac3a2db58a203a6

                                                • C:\Users\Admin\AppData\Local\Temp\CabAD03.tmp

                                                  Filesize

                                                  70KB

                                                  MD5

                                                  49aebf8cbd62d92ac215b2923fb1b9f5

                                                  SHA1

                                                  1723be06719828dda65ad804298d0431f6aff976

                                                  SHA256

                                                  b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                  SHA512

                                                  bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                • C:\Users\Admin\AppData\Local\Temp\TarADB2.tmp

                                                  Filesize

                                                  181KB

                                                  MD5

                                                  4ea6026cf93ec6338144661bf1202cd1

                                                  SHA1

                                                  a1dec9044f750ad887935a01430bf49322fbdcb7

                                                  SHA256

                                                  8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                  SHA512

                                                  6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                  Filesize

                                                  3.1MB

                                                  MD5

                                                  f20337f88ef618159b25fc53724e2883

                                                  SHA1

                                                  21bbad7e6c9e61c657123bbf8ebfbcbb7a88a356

                                                  SHA256

                                                  c4f5c7ff5675bc201cc80fa908f052183d9fdf87134eeefdfcad98d19c41da30

                                                  SHA512

                                                  9f3a672cdef8d14965451b3ba915a2709e25ad0e436c2c9110af236c7eab5adf4f7cae799c69e584257228671a583015bca78845c30c434a1df2e2e2ed196782

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                  Filesize

                                                  442KB

                                                  MD5

                                                  85430baed3398695717b0263807cf97c

                                                  SHA1

                                                  fffbee923cea216f50fce5d54219a188a5100f41

                                                  SHA256

                                                  a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                  SHA512

                                                  06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                  Filesize

                                                  8.0MB

                                                  MD5

                                                  a01c5ecd6108350ae23d2cddf0e77c17

                                                  SHA1

                                                  c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                  SHA256

                                                  345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                  SHA512

                                                  b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\db\data.safe.bin

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  303054f6bf01ae47809f38200d7252e3

                                                  SHA1

                                                  7b3e45c61bd5b997adf16ebb97a214525cf0edb9

                                                  SHA256

                                                  2cf09facbd3c13b75eab63541855818279494cda0f40d7abfb2e5e414620f88c

                                                  SHA512

                                                  cb0c23fad155c88d73c99ad3b838d2469f387bfc42c3dbeaa27810b36da9e1e87c7e3763921bb6a3495ed9eccd88e0806fd2122da356bab2a71b0da9ab1cf5b6

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\1a33c93b-07e4-47b4-beb8-7855994e74ec

                                                  Filesize

                                                  745B

                                                  MD5

                                                  6764b5d9d1def4a0b0d7de019cb003db

                                                  SHA1

                                                  2ec4a3eca6f85b987f0ea91d94c5243ec4929fab

                                                  SHA256

                                                  caaa90de432a4deab47a04978c9f474f240ce10ce2402d6d28f61ae03f018740

                                                  SHA512

                                                  6ecec291086718c546cf6d99edfbe51bdfa50550d88b75326bcadcfbdbf8947aa72e12b1f42c271d63c46829f5696ce272867ff46cbb7c7628834422c115ed9e

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\b23a2b99-afee-4d73-8c15-2481dc9bd62d

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  070927520429187c98d9db0c305c7606

                                                  SHA1

                                                  4c065d1c5e89af7bc64c4eea8bd9d4cadd42499a

                                                  SHA256

                                                  e4904b6b8d8eb835943a2d35a9e6fe3fa7f8d3829b8c2f9a2176fdf61180a63d

                                                  SHA512

                                                  f10db033f1032524ea3b0bf53a4ae293a2d0add08ec738c9cfc046c2fd503ec7bf198dbe3b03abab164299a8cf01fc0b7dc519865c9228332aa1d06056cc6189

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                  Filesize

                                                  997KB

                                                  MD5

                                                  fe3355639648c417e8307c6d051e3e37

                                                  SHA1

                                                  f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                  SHA256

                                                  1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                  SHA512

                                                  8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                  Filesize

                                                  116B

                                                  MD5

                                                  3d33cdc0b3d281e67dd52e14435dd04f

                                                  SHA1

                                                  4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                  SHA256

                                                  f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                  SHA512

                                                  a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                  Filesize

                                                  479B

                                                  MD5

                                                  49ddb419d96dceb9069018535fb2e2fc

                                                  SHA1

                                                  62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                  SHA256

                                                  2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                  SHA512

                                                  48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                  Filesize

                                                  372B

                                                  MD5

                                                  8be33af717bb1b67fbd61c3f4b807e9e

                                                  SHA1

                                                  7cf17656d174d951957ff36810e874a134dd49e0

                                                  SHA256

                                                  e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                  SHA512

                                                  6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                  Filesize

                                                  11.8MB

                                                  MD5

                                                  33bf7b0439480effb9fb212efce87b13

                                                  SHA1

                                                  cee50f2745edc6dc291887b6075ca64d716f495a

                                                  SHA256

                                                  8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                  SHA512

                                                  d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  688bed3676d2104e7f17ae1cd2c59404

                                                  SHA1

                                                  952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                  SHA256

                                                  33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                  SHA512

                                                  7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  937326fead5fd401f6cca9118bd9ade9

                                                  SHA1

                                                  4526a57d4ae14ed29b37632c72aef3c408189d91

                                                  SHA256

                                                  68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                  SHA512

                                                  b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs-1.js

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  15a1437097d00b2a3b1ca61ae4600830

                                                  SHA1

                                                  dcfefca3ca8bcff27a6fa2d058caadc45f7b0a44

                                                  SHA256

                                                  981ce4def37a6e3b02d7c593d381173f6e9b2ef34619d0e965074d0dfda84cf8

                                                  SHA512

                                                  84b215ed357f70f6bc79e27cdbf4afbcc089dcc8e951a567e6df3f8f0d4a3e0340d77beb0e357bf7bb378ff76d379262aaddf92f4b6e8a7badd05504632a800b

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs-1.js

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  59641a49e1a90bf6477fe8fbf1ed576e

                                                  SHA1

                                                  c295577a5f368bc66e2c4c5131dd8b88443e1e45

                                                  SHA256

                                                  70b4f9a061b66d814c8d5d48b39ece9ac1ee9ecbebd8e0fee74e261cdb26f9fd

                                                  SHA512

                                                  d66fba34de4ad406abb2787b594ec9b617974f7ad23a9f4f0a6b926514bc4389d80218ebd4a2ff67babf24629c0fb24d69d1c328699493232b2214dcf9af4ce0

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs.js

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  706271437e513f876fe773d49821523f

                                                  SHA1

                                                  7bd698ee6b1006485423f153efd5c64bda27283f

                                                  SHA256

                                                  7ea190e9024efee62554b1e46a0124be5620ee2e23cedf5fe4e65469d9597600

                                                  SHA512

                                                  0d910356b2ff0e6a1572170b7365f60e7989841beff90859910d5f5f726d8b2df91ed06d2618d0d8c82434525ace410ad87ca5fe98140114b93be31d531a0446

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs.js

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  eb246660c0e75f4fb50a8e508b7da35b

                                                  SHA1

                                                  5fcb6a952dfb5980e7fa75f4b7b37c68ece41dd5

                                                  SHA256

                                                  deee9685e3db6410f055d310745a24138901b98315f724081bc8a82528c46caf

                                                  SHA512

                                                  cb3441812711123d1b09c5dab22443ab7e1aff1d75207c97ec58e5790727eb85183c4eb90f19e384fde1f3a4ad041c1bdbda93415ebaacd02f4734dae5f70683

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs.js

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  ab032848124f2443592564cd576b0931

                                                  SHA1

                                                  35bb6e1ec33d2dcafad76847ccb7de79f1611890

                                                  SHA256

                                                  67efd08459941f377ffa5896bc93a8f57b099467273737c388f4a442c5b229b7

                                                  SHA512

                                                  d2b43f5d770f40499f82aa17180c89bb0f0cc342ce8657a11bbb8d8520f12f4b948bf621ca59fc354925cb1fb81a45ad286a1bdab8cabdfc2bc59a5188351244

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionstore-backups\recovery.jsonlz4

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  87f5d9ea70b16c899689824bf4307893

                                                  SHA1

                                                  ad43b531040d0e3b3f509dcd5dd3edc2320d8293

                                                  SHA256

                                                  bb938c77ff4a4df8e069b47d0ebd4e03b34bfc6e79e8b801ece9113b6253c9f0

                                                  SHA512

                                                  acc32166fe733fb1919bda7b1cc7e443e2691eac91f7dc518960eb37f8afcff412a0f1a5eb1c6f7cc6638939763bfcecdf0397efd23b5f08ca5bc04c40de267b

                                                • memory/612-667-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/612-944-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/612-961-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/612-584-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/612-959-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/612-586-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/612-860-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/612-950-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/612-563-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/612-963-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/612-842-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/612-942-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/612-931-0x0000000000400000-0x0000000000C62000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/816-653-0x0000000000850000-0x0000000000CE3000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/816-581-0x0000000000850000-0x0000000000CE3000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/816-650-0x0000000000850000-0x0000000000CE3000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/816-544-0x0000000000850000-0x0000000000CE3000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/816-566-0x0000000000850000-0x0000000000CE3000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1624-601-0x0000000000C60000-0x000000000191B000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/1624-652-0x0000000000C60000-0x000000000191B000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/1624-651-0x0000000000C60000-0x000000000191B000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/1624-580-0x0000000000C60000-0x000000000191B000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/2416-684-0x0000000000340000-0x00000000007F1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2416-599-0x0000000000340000-0x00000000007F1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2416-669-0x0000000000340000-0x00000000007F1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2616-3-0x0000000000910000-0x0000000000FB1000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2616-510-0x0000000000910000-0x0000000000FB1000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2616-1-0x0000000077590000-0x0000000077592000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/2616-2-0x0000000000911000-0x0000000000928000-memory.dmp

                                                  Filesize

                                                  92KB

                                                • memory/2616-4-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                  Filesize

                                                  972KB

                                                • memory/2616-243-0x0000000000910000-0x0000000000FB1000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2616-0-0x0000000000910000-0x0000000000FB1000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2616-250-0x0000000000910000-0x0000000000FB1000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2616-284-0x0000000000910000-0x0000000000FB1000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2616-486-0x0000000000910000-0x0000000000FB1000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2664-622-0x0000000000B40000-0x00000000011E1000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2864-666-0x00000000068D0000-0x0000000006D81000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2864-949-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-665-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-561-0x00000000068D0000-0x0000000007132000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/2864-582-0x00000000068D0000-0x0000000007132000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/2864-546-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-962-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-841-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-583-0x00000000068D0000-0x0000000007132000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/2864-960-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-585-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-562-0x00000000068D0000-0x0000000007132000-memory.dmp

                                                  Filesize

                                                  8.4MB

                                                • memory/2864-523-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-579-0x00000000068D0000-0x000000000758B000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/2864-543-0x00000000068D0000-0x0000000006D63000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2864-928-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-547-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-958-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-941-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-564-0x00000000068D0000-0x0000000006D63000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2864-943-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-600-0x00000000068D0000-0x000000000758B000-memory.dmp

                                                  Filesize

                                                  12.7MB

                                                • memory/2864-854-0x0000000001320000-0x0000000001648000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2864-598-0x00000000068D0000-0x0000000006D81000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2880-545-0x0000000006C00000-0x0000000006F28000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2880-521-0x00000000009B0000-0x0000000000CD8000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2880-509-0x00000000009B0000-0x0000000000CD8000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/2880-522-0x0000000006C00000-0x0000000006F28000-memory.dmp

                                                  Filesize

                                                  3.2MB

                                                • memory/3068-830-0x00000000001F0000-0x00000000004B6000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/3068-831-0x00000000001F0000-0x00000000004B6000-memory.dmp

                                                  Filesize

                                                  2.8MB