Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 10:35

General

  • Target

    a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe

  • Size

    2.9MB

  • MD5

    c9624e4e0c6bbc83b57f844d1dc44102

  • SHA1

    b0f8c247986305f8f1f83ea55bb04f6c748557ce

  • SHA256

    a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb

  • SHA512

    0417b2186a7f284a79016bd2cc473768293f2c262400439dac659b0a46cff82f72018f6fbbb3ba41b6d76eeff1f96110f8cd5c4739989dafb17942dd0e9a0d23

  • SSDEEP

    49152:jyKdaGFwF6TL+v1ndNBCT8HlTxD/S8jeHAleOOOOOOOOOOOOOOOOOOOOOOOOOOOU:XdzFwFYLGbNBCT6lV0ll

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 2 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • XMRig Miner payload 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 28 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 48 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 20 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe
    "C:\Users\Admin\AppData\Local\Temp\a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Users\Admin\AppData\Local\Temp\1019290001\a0a3ce6eb5.exe
        "C:\Users\Admin\AppData\Local\Temp\1019290001\a0a3ce6eb5.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2636
      • C:\Users\Admin\AppData\Local\Temp\1019291001\f1993375a6.exe
        "C:\Users\Admin\AppData\Local\Temp\1019291001\f1993375a6.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:584
        • C:\Users\Admin\AppData\Local\Temp\1019291001\f1993375a6.exe
          "C:\Users\Admin\AppData\Local\Temp\1019291001\f1993375a6.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          PID:1712
      • C:\Users\Admin\AppData\Local\Temp\1019292001\d387c2850f.exe
        "C:\Users\Admin\AppData\Local\Temp\1019292001\d387c2850f.exe"
        3⤵
        • Enumerates VirtualBox registry keys
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1708
      • C:\Users\Admin\AppData\Local\Temp\1019294001\9b1e933b3b.exe
        "C:\Users\Admin\AppData\Local\Temp\1019294001\9b1e933b3b.exe"
        3⤵
        • Executes dropped EXE
        PID:2156
      • C:\Users\Admin\AppData\Local\Temp\1019295001\ab0e51e65f.exe
        "C:\Users\Admin\AppData\Local\Temp\1019295001\ab0e51e65f.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1692
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\jlnilxdx"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1724
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2856
      • C:\Users\Admin\AppData\Local\Temp\1019296001\44502b04c3.exe
        "C:\Users\Admin\AppData\Local\Temp\1019296001\44502b04c3.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2612
      • C:\Users\Admin\AppData\Local\Temp\1019297001\e987930263.exe
        "C:\Users\Admin\AppData\Local\Temp\1019297001\e987930263.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:380
      • C:\Users\Admin\AppData\Local\Temp\1019298001\2663f23b6a.exe
        "C:\Users\Admin\AppData\Local\Temp\1019298001\2663f23b6a.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3016
      • C:\Users\Admin\AppData\Local\Temp\1019299001\d86c07d46e.exe
        "C:\Users\Admin\AppData\Local\Temp\1019299001\d86c07d46e.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2736
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7509758,0x7fef7509768,0x7fef7509778
            5⤵
              PID:2988
            • C:\Windows\system32\ctfmon.exe
              ctfmon.exe
              5⤵
                PID:2256
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1080 --field-trial-handle=1276,i,12797611748689335619,998529832269155605,131072 /prefetch:2
                5⤵
                  PID:2596
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1276,i,12797611748689335619,998529832269155605,131072 /prefetch:8
                  5⤵
                    PID:2432
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1276,i,12797611748689335619,998529832269155605,131072 /prefetch:8
                    5⤵
                      PID:1556
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2136 --field-trial-handle=1276,i,12797611748689335619,998529832269155605,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:1600
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2496 --field-trial-handle=1276,i,12797611748689335619,998529832269155605,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:892
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2504 --field-trial-handle=1276,i,12797611748689335619,998529832269155605,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:1748
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1384 --field-trial-handle=1276,i,12797611748689335619,998529832269155605,131072 /prefetch:2
                      5⤵
                        PID:3244
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                      4⤵
                      • Uses browser remote debugging
                      • Enumerates system info in registry
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      PID:2828
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4599758,0x7fef4599768,0x7fef4599778
                        5⤵
                          PID:1580
                        • C:\Windows\system32\ctfmon.exe
                          ctfmon.exe
                          5⤵
                            PID:1964
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1368,i,17559857467828463863,4761038205875516439,131072 /prefetch:2
                            5⤵
                              PID:3216
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1368,i,17559857467828463863,4761038205875516439,131072 /prefetch:8
                              5⤵
                                PID:3360
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1368,i,17559857467828463863,4761038205875516439,131072 /prefetch:8
                                5⤵
                                  PID:2428
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2324 --field-trial-handle=1368,i,17559857467828463863,4761038205875516439,131072 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:2156
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2600 --field-trial-handle=1368,i,17559857467828463863,4761038205875516439,131072 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:2784
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2672 --field-trial-handle=1368,i,17559857467828463863,4761038205875516439,131072 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:4012
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1484 --field-trial-handle=1368,i,17559857467828463863,4761038205875516439,131072 /prefetch:2
                                  5⤵
                                    PID:3524
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\KJJJKFIIIJ.exe"
                                  4⤵
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  PID:3792
                                  • C:\Users\Admin\Documents\KJJJKFIIIJ.exe
                                    "C:\Users\Admin\Documents\KJJJKFIIIJ.exe"
                                    5⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3388
                              • C:\Users\Admin\AppData\Local\Temp\1019300001\a356c6b919.exe
                                "C:\Users\Admin\AppData\Local\Temp\1019300001\a356c6b919.exe"
                                3⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:3000
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM firefox.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3160
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM chrome.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3348
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM msedge.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3400
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM opera.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3444
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /F /IM brave.exe /T
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3488
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                  4⤵
                                    PID:3532
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                      5⤵
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:3540
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3540.0.418446287\29596704" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5cd6c566-297c-4105-9050-2bbe54b1b884} 3540 "\\.\pipe\gecko-crash-server-pipe.3540" 1312 11ff4c58 gpu
                                        6⤵
                                          PID:3704
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3540.1.279022847\1413654193" -parentBuildID 20221007134813 -prefsHandle 1496 -prefMapHandle 1492 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7aaff080-4203-48a8-a7d3-1df08e5e66d8} 3540 "\\.\pipe\gecko-crash-server-pipe.3540" 1508 e73958 socket
                                          6⤵
                                            PID:3764
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3540.2.1012672333\1728464706" -childID 1 -isForBrowser -prefsHandle 2116 -prefMapHandle 2112 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ceb3375c-8c1c-48ce-8f96-982d668d2b91} 3540 "\\.\pipe\gecko-crash-server-pipe.3540" 2128 1a2b0158 tab
                                            6⤵
                                              PID:3964
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3540.3.80431574\163762538" -childID 2 -isForBrowser -prefsHandle 2768 -prefMapHandle 2760 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6ac821b5-095f-4eae-9053-bca864f4e5a6} 3540 "\\.\pipe\gecko-crash-server-pipe.3540" 2784 ee6f58 tab
                                              6⤵
                                                PID:2032
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3540.4.71673468\751015222" -childID 3 -isForBrowser -prefsHandle 3752 -prefMapHandle 3740 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {50506165-7310-44b2-a78c-7a5c8775c8c1} 3540 "\\.\pipe\gecko-crash-server-pipe.3540" 3764 2103a258 tab
                                                6⤵
                                                  PID:552
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3540.5.1647844692\1702362352" -childID 4 -isForBrowser -prefsHandle 3824 -prefMapHandle 3896 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e44278b9-08d2-41ff-95d2-49680ad1a805} 3540 "\\.\pipe\gecko-crash-server-pipe.3540" 3996 20e86c58 tab
                                                  6⤵
                                                    PID:1300
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3540.6.726680096\194997326" -childID 5 -isForBrowser -prefsHandle 4040 -prefMapHandle 4044 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc3b0c56-aac1-4f33-8a93-8791f71a1a34} 3540 "\\.\pipe\gecko-crash-server-pipe.3540" 3980 20e86358 tab
                                                    6⤵
                                                      PID:3440
                                              • C:\Users\Admin\AppData\Local\Temp\1019301001\9b737be40b.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1019301001\9b737be40b.exe"
                                                3⤵
                                                • Modifies Windows Defender Real-time Protection settings
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Windows security modification
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3284
                                              • C:\Users\Admin\AppData\Local\Temp\1019302001\4a09ce6e8e.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1019302001\4a09ce6e8e.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:864
                                                • C:\Windows\system32\cmd.exe
                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                                                  4⤵
                                                  • Loads dropped DLL
                                                  PID:1280
                                                  • C:\Windows\system32\mode.com
                                                    mode 65,10
                                                    5⤵
                                                      PID:3344
                                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                      7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2768
                                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                      7z.exe e extracted/file_7.zip -oextracted
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3140
                                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                      7z.exe e extracted/file_6.zip -oextracted
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3064
                                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                      7z.exe e extracted/file_5.zip -oextracted
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:940
                                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                      7z.exe e extracted/file_4.zip -oextracted
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3528
                                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                      7z.exe e extracted/file_3.zip -oextracted
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3412
                                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                      7z.exe e extracted/file_2.zip -oextracted
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3164
                                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                      7z.exe e extracted/file_1.zip -oextracted
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1856
                                                    • C:\Windows\system32\attrib.exe
                                                      attrib +H "in.exe"
                                                      5⤵
                                                      • Views/modifies file attributes
                                                      PID:2816
                                                    • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                                      "in.exe"
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:3328
                                                      • C:\Windows\system32\attrib.exe
                                                        attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                        6⤵
                                                        • Views/modifies file attributes
                                                        PID:2180
                                                      • C:\Windows\system32\attrib.exe
                                                        attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                        6⤵
                                                        • Views/modifies file attributes
                                                        PID:1772
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                                        6⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:1368
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell ping 127.0.0.1; del in.exe
                                                        6⤵
                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3228
                                                        • C:\Windows\system32\PING.EXE
                                                          "C:\Windows\system32\PING.EXE" 127.0.0.1
                                                          7⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Runs ping.exe
                                                          PID:3156
                                                • C:\Users\Admin\AppData\Local\Temp\1019303001\cdf9409d0f.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1019303001\cdf9409d0f.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2408
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /c move App App.cmd & App.cmd
                                                    4⤵
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1820
                                                    • C:\Windows\SysWOW64\tasklist.exe
                                                      tasklist
                                                      5⤵
                                                      • Enumerates processes with tasklist
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3668
                                                    • C:\Windows\SysWOW64\findstr.exe
                                                      findstr /I "opssvc wrsa"
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:892
                                                    • C:\Windows\SysWOW64\tasklist.exe
                                                      tasklist
                                                      5⤵
                                                      • Enumerates processes with tasklist
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3424
                                                    • C:\Windows\SysWOW64\findstr.exe
                                                      findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3408
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /c md 245347
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2920
                                                    • C:\Windows\SysWOW64\findstr.exe
                                                      findstr /V "profiles" Organizing
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2344
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /c copy /b ..\Judy + ..\Sheets + ..\Another + ..\Wanting b
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1588
                                                    • C:\Users\Admin\AppData\Local\Temp\245347\Dry.com
                                                      Dry.com b
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Checks processor information in registry
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SendNotifyMessage
                                                      PID:3608
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\245347\Dry.com" & rd /s /q "C:\ProgramData\9HVSRQ90HDJM" & exit
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1712
                                                        • C:\Windows\SysWOW64\timeout.exe
                                                          timeout /t 10
                                                          7⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Delays execution with timeout.exe
                                                          PID:1908
                                                    • C:\Windows\SysWOW64\choice.exe
                                                      choice /d y /t 5
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1996
                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                              1⤵
                                                PID:1812
                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                1⤵
                                                  PID:2240
                                                • C:\Windows\system32\taskeng.exe
                                                  taskeng.exe {399C9F02-7618-434A-8DA9-AF7CAFA9402F} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]
                                                  1⤵
                                                  • Loads dropped DLL
                                                  PID:2788
                                                  • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                    C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:1904
                                                    • C:\Windows\explorer.exe
                                                      explorer.exe
                                                      3⤵
                                                        PID:2528
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                        3⤵
                                                        • Drops file in System32 directory
                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:916
                                                        • C:\Windows\system32\PING.EXE
                                                          "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                          4⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Runs ping.exe
                                                          PID:2336
                                                    • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                      C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:904
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        3⤵
                                                          PID:3288
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                                          3⤵
                                                          • Drops file in System32 directory
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:2248
                                                          • C:\Windows\system32\PING.EXE
                                                            "C:\Windows\system32\PING.EXE" 127.1.10.1
                                                            4⤵
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            • Runs ping.exe
                                                            PID:1736
                                                    • C:\Windows\system32\wbem\wmiprvse.exe
                                                      C:\Windows\system32\wbem\wmiprvse.exe -Embedding
                                                      1⤵
                                                        PID:2816

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        40B

                                                        MD5

                                                        c71a70ef46590ef0016a755286ca78ea

                                                        SHA1

                                                        f333ef55abb71212507b4796cb0e39940dd9280f

                                                        SHA256

                                                        36315c353e2802a76481df39dfd6b80bdc993f3db521aef716a1f927990decf3

                                                        SHA512

                                                        333e0c4300fd0baf59072bbf7c363c62e11d7b2351ec9e84125dec4c1047dd29bedaf99fd1c3bcc3fa43353a51f2b006030829b8c5615a7b29ffb9ed3a903295

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                                        Filesize

                                                        16B

                                                        MD5

                                                        18e723571b00fb1694a3bad6c78e4054

                                                        SHA1

                                                        afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                        SHA256

                                                        8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                        SHA512

                                                        43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                        Filesize

                                                        14B

                                                        MD5

                                                        9eae63c7a967fc314dd311d9f46a45b7

                                                        SHA1

                                                        caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf

                                                        SHA256

                                                        4288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d

                                                        SHA512

                                                        bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                        Filesize

                                                        264KB

                                                        MD5

                                                        f50f89a0a91564d0b8a211f8921aa7de

                                                        SHA1

                                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                        SHA256

                                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                        SHA512

                                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Affiliation Database

                                                        Filesize

                                                        32KB

                                                        MD5

                                                        69e3a8ecda716584cbd765e6a3ab429e

                                                        SHA1

                                                        f0897f3fa98f6e4863b84f007092ab843a645803

                                                        SHA256

                                                        e0c9f1494a417f356b611ec769b975a4552c4065b0bc2181954fcbb4b3dfa487

                                                        SHA512

                                                        bb78069c17196da2ce8546046d2c9d9f3796f39b9868b749ecada89445da7a03c9b54a00fcf34a23eb0514c871e026ac368795d2891bbf37e1dc5046c29beaaa

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\000004.dbtmp

                                                        Filesize

                                                        16B

                                                        MD5

                                                        6752a1d65b201c13b62ea44016eb221f

                                                        SHA1

                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                        SHA256

                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                        SHA512

                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Favicons

                                                        Filesize

                                                        20KB

                                                        MD5

                                                        3eea0768ded221c9a6a17752a09c969b

                                                        SHA1

                                                        d17d8086ed76ec503f06ddd0ac03d915aec5cdc7

                                                        SHA256

                                                        6923fd51e36b8fe40d6d3dd132941c5a693b02f6ae4d4d22b32b5fedd0e7b512

                                                        SHA512

                                                        fb5c51adf5a5095a81532e3634f48f5aedb56b7724221f1bf1ccb626cab40f87a3b07a66158179e460f1d0e14eeb48f0283b5df6471dd7a6297af6e8f3efb1f9

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\History

                                                        Filesize

                                                        148KB

                                                        MD5

                                                        90a1d4b55edf36fa8b4cc6974ed7d4c4

                                                        SHA1

                                                        aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                                        SHA256

                                                        7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                                        SHA512

                                                        ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000002.dbtmp

                                                        Filesize

                                                        16B

                                                        MD5

                                                        206702161f94c5cd39fadd03f4014d98

                                                        SHA1

                                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                        SHA256

                                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                        SHA512

                                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000003.log

                                                        Filesize

                                                        40B

                                                        MD5

                                                        148079685e25097536785f4536af014b

                                                        SHA1

                                                        c5ff5b1b69487a9dd4d244d11bbafa91708c1a41

                                                        SHA256

                                                        f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8

                                                        SHA512

                                                        c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\CURRENT

                                                        Filesize

                                                        16B

                                                        MD5

                                                        46295cac801e5d4857d09837238a6394

                                                        SHA1

                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                        SHA256

                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                        SHA512

                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\LOG

                                                        Filesize

                                                        205B

                                                        MD5

                                                        27f55eeb8b1ab4ca68dc4d4c38c0444d

                                                        SHA1

                                                        a19fad10c883c93782b017a97f4df3d36bd3794f

                                                        SHA256

                                                        1dbe6ed5910cfe635a967f4172820370b0a93dd06b5f4d09c8531495f1eed91d

                                                        SHA512

                                                        45c54606b2ddca3a321f863ef863d984570905e2a0ffb707f1a0c6b4678557ef48ae6199d334bd2985dade0ffd2a61dea5c449f0b139cc86f7e65054aff763a2

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\MANIFEST-000001

                                                        Filesize

                                                        41B

                                                        MD5

                                                        5af87dfd673ba2115e2fcf5cfdb727ab

                                                        SHA1

                                                        d5b5bbf396dc291274584ef71f444f420b6056f1

                                                        SHA256

                                                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                        SHA512

                                                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\MANIFEST-000002

                                                        Filesize

                                                        50B

                                                        MD5

                                                        22bf0e81636b1b45051b138f48b3d148

                                                        SHA1

                                                        56755d203579ab356e5620ce7e85519ad69d614a

                                                        SHA256

                                                        e292f241daafc3df90f3e2d339c61c6e2787a0d0739aac764e1ea9bb8544ee97

                                                        SHA512

                                                        a4cf1f5c74e0df85dda8750be9070e24e19b8be15c6f22f0c234ef8423ef9ca3db22ba9ef777d64c33e8fd49fada6fcca26c1a14ba18e8472370533a1c65d8d0

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\LOG

                                                        Filesize

                                                        193B

                                                        MD5

                                                        9b02e99431f855aa9ba8181835f85181

                                                        SHA1

                                                        9cfa18625d0e85532dee0efb97f3df37154770e1

                                                        SHA256

                                                        410483ad55bf82dce309dc89e3a7f6ea1a8366b0a6d687e3129fadd4902df6c5

                                                        SHA512

                                                        333227c59c5cf810bfbedcd89cc7a58312fe4c8e9910ee174f1d6d7f428e4172b57a49a88c2c9e0435267b55b5e3aceee623222b82c0c97bb320be37800cc4ad

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Visited Links

                                                        Filesize

                                                        128KB

                                                        MD5

                                                        dba4b68efaf6a71badbd7ffcf57c842d

                                                        SHA1

                                                        c090df82b6072ddfd3b10d70ea21e1bfc4cb7a14

                                                        SHA256

                                                        3afcb7cadc2462455a9bd674697c3a43f9586c1f1e3915daaf0ea6ce0c115e6f

                                                        SHA512

                                                        b013bcef4fe71a4c609827393f8e01d265639538b0775b3b8d93dec1c39d0e630ab4187be5f4c895779d818ee3fa18b9e76dbdc41653795a9c7f6159a50eeca8

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                        Filesize

                                                        86B

                                                        MD5

                                                        961e3604f228b0d10541ebf921500c86

                                                        SHA1

                                                        6e00570d9f78d9cfebe67d4da5efe546543949a7

                                                        SHA256

                                                        f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed

                                                        SHA512

                                                        535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WUBCGJ0A\download[1].htm

                                                        Filesize

                                                        1B

                                                        MD5

                                                        cfcd208495d565ef66e7dff9f98764da

                                                        SHA1

                                                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                        SHA256

                                                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                        SHA512

                                                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\activity-stream.discovery_stream.json.tmp

                                                        Filesize

                                                        22KB

                                                        MD5

                                                        425c4e70af3652d4c20e3aec7d79d371

                                                        SHA1

                                                        dbbc19de4b5778938666c58391ca96cdaec4d4d5

                                                        SHA256

                                                        edd397fa1cd2630cd7ccdfdb0a8ef1318f9ea2e79796854680d40120299b6907

                                                        SHA512

                                                        3ebfe28cf419051be12be7784d495c7bbcf9011fe346ee5bd66c078bde036689c73ac7d54a62b62d63e2941c86b62af68dd67ab1118e296266661ab4979e35e8

                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        96c542dec016d9ec1ecc4dddfcbaac66

                                                        SHA1

                                                        6199f7648bb744efa58acf7b96fee85d938389e4

                                                        SHA256

                                                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                        SHA512

                                                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                      • C:\Users\Admin\AppData\Local\Temp\1019290001\a0a3ce6eb5.exe

                                                        Filesize

                                                        1.8MB

                                                        MD5

                                                        27c1f96d7e1b72b6817b6efeff037f90

                                                        SHA1

                                                        2972cc112fc7e20cbf5952abe07407b8c1fbb2a2

                                                        SHA256

                                                        aec3ec473de321d123e939985579227ee62b53b3b3edb7ab96e2a66c17e9696d

                                                        SHA512

                                                        9a31dc9945889d35aea8710df2f42806c72c422b7b5f4aa8acba6986cbd9ea6a49181a41a50ee21ccbed86cbff87c98a742e681ac3f6a87e2bd4436c9112eb32

                                                      • C:\Users\Admin\AppData\Local\Temp\1019291001\f1993375a6.exe

                                                        Filesize

                                                        758KB

                                                        MD5

                                                        afd936e441bf5cbdb858e96833cc6ed3

                                                        SHA1

                                                        3491edd8c7caf9ae169e21fb58bccd29d95aefef

                                                        SHA256

                                                        c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                                                        SHA512

                                                        928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                                                      • C:\Users\Admin\AppData\Local\Temp\1019292001\d387c2850f.exe

                                                        Filesize

                                                        4.2MB

                                                        MD5

                                                        de977c9c79ceebdf86d4cb38408d7ce4

                                                        SHA1

                                                        2ffb19e7bc8109bb8033c1d6e25f4ae2fe49b3c6

                                                        SHA256

                                                        ad3fb64aaa0680e21de914b77e3502a6c82860f333fa3d2415cb9a7a93b9b893

                                                        SHA512

                                                        19067b298995a405ac3768b6586cd456598af7a9703551eccb1caf8c30c1e126abf9d4f80001f1fcd1c201dd0cf30f99cdd77ef5b5e2feffbcdd7887e29932b0

                                                      • C:\Users\Admin\AppData\Local\Temp\1019294001\9b1e933b3b.exe

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        669ed3665495a4a52029ff680ec8eba9

                                                        SHA1

                                                        7785e285365a141e307931ca4c4ef00b7ecc8986

                                                        SHA256

                                                        2d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6

                                                        SHA512

                                                        bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6

                                                      • C:\Users\Admin\AppData\Local\Temp\1019295001\ab0e51e65f.exe

                                                        Filesize

                                                        21KB

                                                        MD5

                                                        04f57c6fb2b2cd8dcc4b38e4a93d4366

                                                        SHA1

                                                        61770495aa18d480f70b654d1f57998e5bd8c885

                                                        SHA256

                                                        51e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2

                                                        SHA512

                                                        53f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd

                                                      • C:\Users\Admin\AppData\Local\Temp\1019296001\44502b04c3.exe

                                                        Filesize

                                                        4.3MB

                                                        MD5

                                                        c8b0314ae0cbcfd409e4548085f0f549

                                                        SHA1

                                                        0265c5c943dba461b8b691093cc195505e8a494d

                                                        SHA256

                                                        ce15dcdc4ddd3b15fd58bf62bfccba35f4fe180b88f07de64934509d2eda6ce5

                                                        SHA512

                                                        691554630171d8cdf65a04716388185ebc99e07cfc3ded4cef9610b39f994d87aa9c13cbeb8a85e8e08ae9072282d87d9ea2f8d2bea79f915c1362538ec9ca9d

                                                      • C:\Users\Admin\AppData\Local\Temp\1019297001\e987930263.exe

                                                        Filesize

                                                        1.8MB

                                                        MD5

                                                        8f99d6a86bb1b60441b2d0824b2f8a16

                                                        SHA1

                                                        bdba27ca8ac199579268260535b2a90a88c63b3b

                                                        SHA256

                                                        4360fbed2a0cfcaaecab2a478478a2266fe8df65bfb9fc2876bbdb91ff1add46

                                                        SHA512

                                                        30a2f0a07521e61877a8a05a17daf9c378435caa17b42993827d1421a8c57d94e75f97bd3daa582207b1b2874d4f5e70a4cf476f556f39c66bcd6eefc7ad8430

                                                      • C:\Users\Admin\AppData\Local\Temp\1019298001\2663f23b6a.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        6d8d689df3a8a757930ba664469fc255

                                                        SHA1

                                                        f41f35962798f68bc0b3fce6cf73870dc245192b

                                                        SHA256

                                                        194c3c0b5b5598859bf03524c9836fc147838f7bd510aa3d698ac4c4c975e100

                                                        SHA512

                                                        713b536aff1b5e29877752c2d8bd8fa8e7a9ba9f6ed13d87216c1aaa273e9ed0fe80b2d9112d2ec17f7e077e49141c6b5aec9d22ea7cc60b5af6c728c68e28d6

                                                      • C:\Users\Admin\AppData\Local\Temp\1019299001\d86c07d46e.exe

                                                        Filesize

                                                        2.8MB

                                                        MD5

                                                        bb44422919d44c41ba392b6fad35f9e3

                                                        SHA1

                                                        0a9332cd23a8cfa6092709bc133d7052d2d43c05

                                                        SHA256

                                                        d12207e5d2e2668de9c381a14a35a6199a0d6c50cbed1164340ac61bb1eb85d2

                                                        SHA512

                                                        2ce8ab147380afd27a12f2f9f325566751ed208ef0529cd6d6a45634914dedf6f1ca2fd4cde579a30ec667873a60909f0540615e37da2c274afc40a02a914d07

                                                      • C:\Users\Admin\AppData\Local\Temp\1019300001\a356c6b919.exe

                                                        Filesize

                                                        949KB

                                                        MD5

                                                        9aef1b3224bf1bcc34255c7712edb0dd

                                                        SHA1

                                                        e13fb1aff032d1379c55f8967e8278005ef60297

                                                        SHA256

                                                        86c685cf35eeb7bf2430a1f660b8a41e3bcc9bb6123b806cc02129d25bd71660

                                                        SHA512

                                                        4bb4d6b3714a3f2daa7a642908ef3b495931e45fbd0ceb7e664cf66b5c9d4505b6032aa963c899275f8c67f4df6801423c40d18a7b82d1775f5407eefdb01009

                                                      • C:\Users\Admin\AppData\Local\Temp\1019301001\9b737be40b.exe

                                                        Filesize

                                                        2.7MB

                                                        MD5

                                                        ac9e59a31d92ef6f50e0fec74cb123e9

                                                        SHA1

                                                        66e89a6d52d65d239afd89c28502c485ea727c7a

                                                        SHA256

                                                        31e8402192c50641097a68c05119ac4470defa964bfd62eec7559d3ee8469674

                                                        SHA512

                                                        087db92ed085a5ff578551fce7731a1d3ce3639a940f0821efa45a7a672d48a12d493006d632d0fca4ca63d6d49bc394caf5c1944611c0b194e364f0c45bbc35

                                                      • C:\Users\Admin\AppData\Local\Temp\1019302001\4a09ce6e8e.exe

                                                        Filesize

                                                        4.2MB

                                                        MD5

                                                        3a425626cbd40345f5b8dddd6b2b9efa

                                                        SHA1

                                                        7b50e108e293e54c15dce816552356f424eea97a

                                                        SHA256

                                                        ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                                                        SHA512

                                                        a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                                                      • C:\Users\Admin\AppData\Local\Temp\1019303001\cdf9409d0f.exe

                                                        Filesize

                                                        842KB

                                                        MD5

                                                        8eb4f92605e35c57a42b0917c221d65c

                                                        SHA1

                                                        0e64d77ef1b917b3afe512b49710250c71369175

                                                        SHA256

                                                        b57d78d93f74f7ae840ab03d3fda4f22a24ad35afcf9a53128cf82a92a67a085

                                                        SHA512

                                                        4cc5db426c8de3d7afdcfa26440d5bd9a885f5148e4307b8d04c5d56c96672d5c82ed9989bf346ce7aecea07d980735c46a930b885f824ba53738ac76dbb05bf

                                                      • C:\Users\Admin\AppData\Local\Temp\Cab2FAA.tmp

                                                        Filesize

                                                        70KB

                                                        MD5

                                                        49aebf8cbd62d92ac215b2923fb1b9f5

                                                        SHA1

                                                        1723be06719828dda65ad804298d0431f6aff976

                                                        SHA256

                                                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                        SHA512

                                                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                      • C:\Users\Admin\AppData\Local\Temp\Tar3097.tmp

                                                        Filesize

                                                        181KB

                                                        MD5

                                                        4ea6026cf93ec6338144661bf1202cd1

                                                        SHA1

                                                        a1dec9044f750ad887935a01430bf49322fbdcb7

                                                        SHA256

                                                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                        SHA512

                                                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                        Filesize

                                                        2.9MB

                                                        MD5

                                                        c9624e4e0c6bbc83b57f844d1dc44102

                                                        SHA1

                                                        b0f8c247986305f8f1f83ea55bb04f6c748557ce

                                                        SHA256

                                                        a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb

                                                        SHA512

                                                        0417b2186a7f284a79016bd2cc473768293f2c262400439dac659b0a46cff82f72018f6fbbb3ba41b6d76eeff1f96110f8cd5c4739989dafb17942dd0e9a0d23

                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                                        Filesize

                                                        458KB

                                                        MD5

                                                        619f7135621b50fd1900ff24aade1524

                                                        SHA1

                                                        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                        SHA256

                                                        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                        SHA512

                                                        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                      • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                                        Filesize

                                                        440B

                                                        MD5

                                                        3626532127e3066df98e34c3d56a1869

                                                        SHA1

                                                        5fa7102f02615afde4efd4ed091744e842c63f78

                                                        SHA256

                                                        2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                                                        SHA512

                                                        dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                        Filesize

                                                        442KB

                                                        MD5

                                                        85430baed3398695717b0263807cf97c

                                                        SHA1

                                                        fffbee923cea216f50fce5d54219a188a5100f41

                                                        SHA256

                                                        a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                        SHA512

                                                        06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                        Filesize

                                                        8.0MB

                                                        MD5

                                                        a01c5ecd6108350ae23d2cddf0e77c17

                                                        SHA1

                                                        c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                        SHA256

                                                        345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                        SHA512

                                                        b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        5c48dc19ea7e834545b2350de22d095a

                                                        SHA1

                                                        6ed8062157ba80010a9e56f46d871c1bc1fc3d1b

                                                        SHA256

                                                        f1f9cc4b0f1322df4528714c05b3bf92b03206c986f0c9bf495bb54ed05f80b8

                                                        SHA512

                                                        fd4875e3f300f8acbf548d16cfbcd698a9f49b1a9c42616813715d4da8d57dc952b5da4d54b56b86878d92ad582a2178e19307f518e4252974ba812ac4fe02b2

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\db\data.safe.bin

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        b40a45cf7fab923e680e469063577599

                                                        SHA1

                                                        7bf578690dc46880ab00a9c8dbe04bd62aedc51c

                                                        SHA256

                                                        035cfc9234019a470beb56ee0c938ee397b0e4d4588bc9b84ce4dfd9186f4640

                                                        SHA512

                                                        0f388cff859b830424db5a42387e97e640d2282d549e3e623fb87364ea549677dba161b1f619659bd09a91e44fee60612c5fe498c6a26699bbb76759aa6078f2

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\0e1a8809-b87e-4db9-a4cc-97371c825efa

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        9cf9c336fa0668cfb242300afedd860d

                                                        SHA1

                                                        a0ecdd299a2db5778ff3d9a5a7a1bd734243dcf4

                                                        SHA256

                                                        c67c72ae06a2aec43340053feaeb31ba92a7150e44ece8c925ab5ecae7dc16a7

                                                        SHA512

                                                        7ef2e7a88f5043d2ff032b7f662724db6d8da7b050d542f61d081cfc9a1930cf01edff79b1ae47ba2f5776897d09fafb60a1fb9a945e182c32e9a057acfb5746

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\a722a1f5-fbb4-462d-b6ec-b5e8b84ab5ff

                                                        Filesize

                                                        745B

                                                        MD5

                                                        3d237f23699e4276f107c7b30ea50fde

                                                        SHA1

                                                        ff27856a6fcc289f38a999dcf265849769b74e0e

                                                        SHA256

                                                        36f61b2b29eeae0460cde329290a6dd0f06565244d65b9494328ba80ace6d4bf

                                                        SHA512

                                                        d20e62be5bdc09579debfaddc9b32e69761fb57e4a020876ebf3b40ff88d29c4755312f4f1de65417c782dee2373e865b67a939cc8dc0df2cd728231b823f4ae

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                        Filesize

                                                        997KB

                                                        MD5

                                                        fe3355639648c417e8307c6d051e3e37

                                                        SHA1

                                                        f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                        SHA256

                                                        1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                        SHA512

                                                        8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                        Filesize

                                                        116B

                                                        MD5

                                                        3d33cdc0b3d281e67dd52e14435dd04f

                                                        SHA1

                                                        4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                        SHA256

                                                        f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                        SHA512

                                                        a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                        Filesize

                                                        479B

                                                        MD5

                                                        49ddb419d96dceb9069018535fb2e2fc

                                                        SHA1

                                                        62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                        SHA256

                                                        2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                        SHA512

                                                        48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                        Filesize

                                                        372B

                                                        MD5

                                                        8be33af717bb1b67fbd61c3f4b807e9e

                                                        SHA1

                                                        7cf17656d174d951957ff36810e874a134dd49e0

                                                        SHA256

                                                        e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                        SHA512

                                                        6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                        Filesize

                                                        11.8MB

                                                        MD5

                                                        33bf7b0439480effb9fb212efce87b13

                                                        SHA1

                                                        cee50f2745edc6dc291887b6075ca64d716f495a

                                                        SHA256

                                                        8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                        SHA512

                                                        d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        688bed3676d2104e7f17ae1cd2c59404

                                                        SHA1

                                                        952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                        SHA256

                                                        33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                        SHA512

                                                        7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        937326fead5fd401f6cca9118bd9ade9

                                                        SHA1

                                                        4526a57d4ae14ed29b37632c72aef3c408189d91

                                                        SHA256

                                                        68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                        SHA512

                                                        b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        6619c4567fe8519614da8506e762ab5d

                                                        SHA1

                                                        7118aeeaa7a9e38ab84cf70733922a4fe9328055

                                                        SHA256

                                                        de489d1ee91ec57669f66c42894c82f789caf4774b9a646e0afb037f6f058c69

                                                        SHA512

                                                        fd9a1f9ddb57a471919f2566fcc9fe26d90643f660df498f6019b9f79e5ac9918376d0497f37e5ffc5042536c0e3c64f164338bb6c1c42b3fa320ac1f243b85f

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        43e8d77c5b7e9791d193248274dc7dba

                                                        SHA1

                                                        e11d9b6296bb77fc01a1d8831f134f33175249b1

                                                        SHA256

                                                        b7dc9b7425921a9c8cabaafc45a21a5dde7122102957027e9ef4185af41d33b6

                                                        SHA512

                                                        466ec3212f7a345e65703c9ab01caaf8f074a60f04c0f9a5cb1c953f14e4f095340283de6154c374efb05c08fe3ffd570bca015b9cf844edc19c61f4b3620cb6

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        652a0f0da8469dc94a25cf04daac0754

                                                        SHA1

                                                        cb58cbb24182449583b9a3feef9cf3d3eff6a9ee

                                                        SHA256

                                                        f447d9232abc0521eb89fc22747c130977a7db51b02fa97923b77b5d9527f776

                                                        SHA512

                                                        08d61526404d6f93e1df8387e06509812b1f798a3354a1e30f6d862803aa98739cd223f610d1e5d20b6e6563e2f7581d7ca25af7c3b3e402085b4beae3a1a73b

                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionstore-backups\recovery.jsonlz4

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        e2e5cf1de677a372861227d84de7ddec

                                                        SHA1

                                                        54a4d1d0c5048eb10c9011f992169539537b00c9

                                                        SHA256

                                                        b0887d671bda8b38dd2189620b82a9b9f1dea22af7cd92ae2f4d73920be05b32

                                                        SHA512

                                                        1e1703bea99f0c7fd6c47ec23bebf5d0980fa24ed07fadbe597b9bc00d0b268800abd096ae2829aa1c0cfb4d0632b44d04ae6a48e5e962cbc384c6237ea3778b

                                                      • memory/380-957-0x0000000000400000-0x0000000000C5D000-memory.dmp

                                                        Filesize

                                                        8.4MB

                                                      • memory/380-951-0x0000000000400000-0x0000000000C5D000-memory.dmp

                                                        Filesize

                                                        8.4MB

                                                      • memory/380-752-0x0000000000400000-0x0000000000C5D000-memory.dmp

                                                        Filesize

                                                        8.4MB

                                                      • memory/380-257-0x0000000000400000-0x0000000000C5D000-memory.dmp

                                                        Filesize

                                                        8.4MB

                                                      • memory/380-234-0x0000000010000000-0x000000001001C000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/916-1087-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/916-1086-0x000000001B5B0000-0x000000001B892000-memory.dmp

                                                        Filesize

                                                        2.9MB

                                                      • memory/1692-167-0x0000000000E10000-0x0000000000E1C000-memory.dmp

                                                        Filesize

                                                        48KB

                                                      • memory/1708-179-0x0000000000910000-0x000000000159B000-memory.dmp

                                                        Filesize

                                                        12.5MB

                                                      • memory/1708-178-0x0000000000910000-0x000000000159B000-memory.dmp

                                                        Filesize

                                                        12.5MB

                                                      • memory/1708-102-0x0000000000910000-0x000000000159B000-memory.dmp

                                                        Filesize

                                                        12.5MB

                                                      • memory/1708-213-0x0000000000910000-0x000000000159B000-memory.dmp

                                                        Filesize

                                                        12.5MB

                                                      • memory/1712-68-0x0000000000400000-0x0000000000456000-memory.dmp

                                                        Filesize

                                                        344KB

                                                      • memory/1712-74-0x0000000000400000-0x0000000000456000-memory.dmp

                                                        Filesize

                                                        344KB

                                                      • memory/1712-78-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/1712-79-0x0000000000400000-0x0000000000456000-memory.dmp

                                                        Filesize

                                                        344KB

                                                      • memory/1712-81-0x0000000000400000-0x0000000000456000-memory.dmp

                                                        Filesize

                                                        344KB

                                                      • memory/1712-72-0x0000000000400000-0x0000000000456000-memory.dmp

                                                        Filesize

                                                        344KB

                                                      • memory/1712-70-0x0000000000400000-0x0000000000456000-memory.dmp

                                                        Filesize

                                                        344KB

                                                      • memory/1712-76-0x0000000000400000-0x0000000000456000-memory.dmp

                                                        Filesize

                                                        344KB

                                                      • memory/2156-175-0x0000000000D00000-0x0000000000E57000-memory.dmp

                                                        Filesize

                                                        1.3MB

                                                      • memory/2248-1262-0x000000001B770000-0x000000001BA52000-memory.dmp

                                                        Filesize

                                                        2.9MB

                                                      • memory/2248-1263-0x0000000002760000-0x0000000002768000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/2392-6-0x00000000008E0000-0x0000000000C02000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2392-1-0x00000000771B0000-0x00000000771B2000-memory.dmp

                                                        Filesize

                                                        8KB

                                                      • memory/2392-18-0x00000000008E0000-0x0000000000C02000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2392-4-0x00000000008E0000-0x0000000000C02000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2392-15-0x0000000006930000-0x0000000006C52000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2392-3-0x00000000008E0000-0x0000000000C02000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2392-2-0x00000000008E1000-0x000000000090F000-memory.dmp

                                                        Filesize

                                                        184KB

                                                      • memory/2392-0-0x00000000008E0000-0x0000000000C02000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2392-10-0x00000000008E0000-0x0000000000C02000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2528-1056-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/2528-1054-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/2528-1055-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/2528-1057-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/2528-1058-0x0000000140000000-0x0000000140770000-memory.dmp

                                                        Filesize

                                                        7.4MB

                                                      • memory/2612-194-0x0000000000E70000-0x0000000001AF7000-memory.dmp

                                                        Filesize

                                                        12.5MB

                                                      • memory/2612-195-0x0000000000E70000-0x0000000001AF7000-memory.dmp

                                                        Filesize

                                                        12.5MB

                                                      • memory/2636-44-0x0000000000FA0000-0x000000000143A000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/2636-138-0x0000000000FA0000-0x000000000143A000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/2636-99-0x0000000000FA0000-0x000000000143A000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/2636-110-0x0000000000FA0000-0x000000000143A000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/2668-24-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-176-0x0000000006B30000-0x00000000077BB000-memory.dmp

                                                        Filesize

                                                        12.5MB

                                                      • memory/2668-20-0x0000000000261000-0x000000000028F000-memory.dmp

                                                        Filesize

                                                        184KB

                                                      • memory/2668-21-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-22-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-25-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-42-0x0000000006B30000-0x0000000006FCA000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/2668-101-0x0000000006B30000-0x00000000077BB000-memory.dmp

                                                        Filesize

                                                        12.5MB

                                                      • memory/2668-100-0x0000000006B30000-0x00000000077BB000-memory.dmp

                                                        Filesize

                                                        12.5MB

                                                      • memory/2668-98-0x0000000006B30000-0x0000000006FCA000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/2668-152-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-926-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-43-0x0000000006B30000-0x0000000006FCA000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/2668-47-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-675-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-177-0x0000000006B30000-0x00000000077BB000-memory.dmp

                                                        Filesize

                                                        12.5MB

                                                      • memory/2668-193-0x0000000006B30000-0x00000000077B7000-memory.dmp

                                                        Filesize

                                                        12.5MB

                                                      • memory/2668-196-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-210-0x0000000006B30000-0x000000000738D000-memory.dmp

                                                        Filesize

                                                        8.4MB

                                                      • memory/2668-212-0x0000000006B30000-0x00000000077B7000-memory.dmp

                                                        Filesize

                                                        12.5MB

                                                      • memory/2668-256-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-258-0x0000000006B30000-0x000000000738D000-memory.dmp

                                                        Filesize

                                                        8.4MB

                                                      • memory/2668-19-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-999-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-65-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-66-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2668-46-0x0000000000260000-0x0000000000582000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/2916-260-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                        Filesize

                                                        972KB

                                                      • memory/2916-974-0x0000000001290000-0x0000000001787000-memory.dmp

                                                        Filesize

                                                        5.0MB

                                                      • memory/2916-927-0x0000000001290000-0x0000000001787000-memory.dmp

                                                        Filesize

                                                        5.0MB

                                                      • memory/2916-676-0x0000000001290000-0x0000000001787000-memory.dmp

                                                        Filesize

                                                        5.0MB

                                                      • memory/3016-507-0x00000000003C0000-0x000000000084C000-memory.dmp

                                                        Filesize

                                                        4.5MB

                                                      • memory/3228-922-0x000000001B600000-0x000000001B8E2000-memory.dmp

                                                        Filesize

                                                        2.9MB

                                                      • memory/3228-923-0x0000000000500000-0x0000000000508000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/3284-660-0x0000000001090000-0x000000000134A000-memory.dmp

                                                        Filesize

                                                        2.7MB

                                                      • memory/3284-657-0x0000000001090000-0x000000000134A000-memory.dmp

                                                        Filesize

                                                        2.7MB

                                                      • memory/3328-916-0x000000013F4C0000-0x000000013F950000-memory.dmp

                                                        Filesize

                                                        4.6MB

                                                      • memory/3388-975-0x0000000000D20000-0x000000000104A000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/3608-980-0x0000000003560000-0x0000000003799000-memory.dmp

                                                        Filesize

                                                        2.2MB

                                                      • memory/3608-976-0x0000000003560000-0x0000000003799000-memory.dmp

                                                        Filesize

                                                        2.2MB

                                                      • memory/3608-977-0x0000000003560000-0x0000000003799000-memory.dmp

                                                        Filesize

                                                        2.2MB

                                                      • memory/3608-978-0x0000000003560000-0x0000000003799000-memory.dmp

                                                        Filesize

                                                        2.2MB

                                                      • memory/3608-981-0x0000000003560000-0x0000000003799000-memory.dmp

                                                        Filesize

                                                        2.2MB

                                                      • memory/3608-979-0x0000000003560000-0x0000000003799000-memory.dmp

                                                        Filesize

                                                        2.2MB