Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 11:47

General

  • Target

    33a84ea233fe9fe1b4c85e533a228bbd.exe

  • Size

    1.8MB

  • MD5

    33a84ea233fe9fe1b4c85e533a228bbd

  • SHA1

    413d73dd32bcce870cf5edd4b777051762882034

  • SHA256

    a777bbce91625e3261edebb334be8610372daaf0790763fc2fd085db35b8463d

  • SHA512

    0f28610c0396bac87e8eb7c8bceb0cd468cebe4df9bca2a9e8ba2f3f37708317d6e621fdd9a9cdb6046b43eb578237124215f15bc614b016457cb37117e8395a

  • SSDEEP

    49152:70jEH8GosswSBQTiNQza4GYnSZrV2azV/r4wCY9W:704cwfSlQeAnSZpTIY9

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Extracted

Family

stealc

Botnet

sila

C2

http://85.28.47.31

Attributes
  • url_path

    /5499d72b3a3e55be.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\33a84ea233fe9fe1b4c85e533a228bbd.exe
    "C:\Users\Admin\AppData\Local\Temp\33a84ea233fe9fe1b4c85e533a228bbd.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:264
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3612
      • C:\Users\Admin\AppData\Local\Temp\1000002001\a4950553d1.exe
        "C:\Users\Admin\AppData\Local\Temp\1000002001\a4950553d1.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3536
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 1300
          4⤵
          • Program crash
          PID:4388
      • C:\Users\Admin\1000003002\dfba16900f.exe
        "C:\Users\Admin\1000003002\dfba16900f.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9FF9.tmp\9FFA.tmp\9FFB.bat C:\Users\Admin\1000003002\dfba16900f.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2516
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4736
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffb9975cc40,0x7ffb9975cc4c,0x7ffb9975cc58
              6⤵
                PID:4204
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,10145844756071185844,11367348418294111133,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1732 /prefetch:2
                6⤵
                  PID:896
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,10145844756071185844,11367348418294111133,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2192 /prefetch:3
                  6⤵
                    PID:3464
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,10145844756071185844,11367348418294111133,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2612 /prefetch:8
                    6⤵
                      PID:2672
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,10145844756071185844,11367348418294111133,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3192 /prefetch:1
                      6⤵
                        PID:6612
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,10145844756071185844,11367348418294111133,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3448 /prefetch:1
                        6⤵
                          PID:6672
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=228,i,10145844756071185844,11367348418294111133,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4612 /prefetch:8
                          6⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2092
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
                        5⤵
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:4608
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffb995146f8,0x7ffb99514708,0x7ffb99514718
                          6⤵
                            PID:1240
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
                            6⤵
                              PID:4256
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
                              6⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:872
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:8
                              6⤵
                                PID:4164
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
                                6⤵
                                  PID:5164
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
                                  6⤵
                                    PID:5172
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:1
                                    6⤵
                                      PID:6956
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2964 /prefetch:2
                                      6⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5388
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
                                    5⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:3596
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
                                      6⤵
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:3008
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1952 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 25755 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e0af0f5-aabe-4e30-b351-5b2658d1914d} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" gpu
                                        7⤵
                                          PID:892
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 26675 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0fbfc69-17d3-4244-81be-9831f7e39dd2} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" socket
                                          7⤵
                                            PID:932
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3260 -childID 1 -isForBrowser -prefsHandle 2724 -prefMapHandle 3284 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1164 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ac3fabf-ffbb-4f8a-a663-7be247602b4e} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab
                                            7⤵
                                              PID:2916
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3680 -childID 2 -isForBrowser -prefsHandle 3700 -prefMapHandle 3696 -prefsLen 31165 -prefMapSize 244658 -jsInitHandle 1164 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4fa1bcc9-44f3-4889-a374-81740e62c38e} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab
                                              7⤵
                                                PID:5632
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2988 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4436 -prefMapHandle 4432 -prefsLen 31165 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {768a5949-c12f-4a97-b87f-dde4466bdea3} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" utility
                                                7⤵
                                                • Checks processor information in registry
                                                PID:6276
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5492 -childID 3 -isForBrowser -prefsHandle 5556 -prefMapHandle 5160 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1164 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5971dbd5-e214-402b-8dfe-73f591838193} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab
                                                7⤵
                                                  PID:6132
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5688 -childID 4 -isForBrowser -prefsHandle 5644 -prefMapHandle 5372 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1164 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {176759cc-a207-4008-b62f-8df23c550f6f} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab
                                                  7⤵
                                                    PID:5160
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5896 -childID 5 -isForBrowser -prefsHandle 5908 -prefMapHandle 5912 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1164 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {20742d25-5ee0-496e-a0c4-f7e3c0f7df90} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab
                                                    7⤵
                                                      PID:4860
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3536 -ip 3536
                                          1⤵
                                            PID:4868
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:5572
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:6720
                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                                                1⤵
                                                  PID:6744
                                                • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                  C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:7060
                                                • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                  C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:6424

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\1000003002\dfba16900f.exe

                                                  Filesize

                                                  89KB

                                                  MD5

                                                  9fde5445045e43d9507d20a2bba50696

                                                  SHA1

                                                  b996c962d8cf7e073f4bf5bc738e21e3273db649

                                                  SHA256

                                                  aabe8925ffd443357b00bb1eaad58d028090b95ab492fb942c39c12d9bb78abd

                                                  SHA512

                                                  691c143c2bf39a6db457f20ad4c1b1dcc1c5b34b1df85afabd45c6511991171ac2fbb35cdd69f0b02bd9641062af339c442a019d205e12ab8ea8e7bd9d78b5a6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  264B

                                                  MD5

                                                  7b861ffe253ed9b69c0efda61ec53439

                                                  SHA1

                                                  7600be84dc85a17072b61a1bae359db4e4a42498

                                                  SHA256

                                                  6f9cb4f4c5f880ed30119d02d98c67c4ada3d410b871856987e6ad33c682eea3

                                                  SHA512

                                                  06ced3f56639cf2d7f3cfe6860b27a98606d2b910d04fca867c7310b3bbc36ff10447abf329bc9dc6a0fe389c50ebf29b27bed28eddb6bd6077e5febf8860c81

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                  Filesize

                                                  3KB

                                                  MD5

                                                  548db249ad637a42efeeefb8214bcef7

                                                  SHA1

                                                  3ec69f81075e220e0c0dba998789375fe46202d3

                                                  SHA256

                                                  b380a77597908c98ec1055d94ffd932564e609ba046d8c8d7aab0ed0898e2a82

                                                  SHA512

                                                  3bd0995246d380646ff8fdb877b934c644bc380a32d35fa9dbd5ce01be1a0d693ca507142bc24f956802955636ba30d791a3ced8e47beb6e37f742b2cb34c531

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                  Filesize

                                                  2B

                                                  MD5

                                                  d751713988987e9331980363e24189ce

                                                  SHA1

                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                  SHA256

                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                  SHA512

                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  356B

                                                  MD5

                                                  ed6ac14df70029a70952a5211fa87433

                                                  SHA1

                                                  4aeb5b31f34e98412f0a57da151781321b93c3ac

                                                  SHA256

                                                  3563e673841122887966e08df86037edd2f0790c4da5821a28c60254e13488f0

                                                  SHA512

                                                  11d5ed5900fa4229828a2a4d13d27a42cd530d2ae441dee129df047050a56e6e0262eee43f598f7b6fd834318a2ddc15844deb47c1c8490589aeee379d0b4be3

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  a89da920d7d8b913ae6cf8c55050179e

                                                  SHA1

                                                  9239c403b668e7bd448c98d67c96990966e7af64

                                                  SHA256

                                                  6cbb5981a7aaa73d566818340e13b5755cf28b4c7ccaf11e0f0266c9e6ed37c4

                                                  SHA512

                                                  897ff13db8054366f001383519d2ea31e7e6b65161767f0a5919bfd3a18bdf385ee7eaf2c9838f704482e5afb3fd02f0827bf8d8b14dec37861ee38003d52b49

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  252eb94af464cbdfef9e16f3ad2d09f5

                                                  SHA1

                                                  4b3582d9993422959bbde492654e22349263a662

                                                  SHA256

                                                  9c0f4b9f7287abca88cb4bd8b5d05b9de846d72762631b498c869b93f401296f

                                                  SHA512

                                                  5e4378d9a2724fbdc3a16b87368aa7088829da72b96527ef30f9d22ae5405e304209b4d8212e7d056db00c7c74318a031f709aaf2f202cef828fe612f320c3e2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  4805d4c8db7ee9104281c644dedf6a33

                                                  SHA1

                                                  292a10cf543267293d0e01d9e18914e1cb71cd30

                                                  SHA256

                                                  ad8f116daa8616560f2598e2d5d0fdb7b911f97da624159056923873cca8ba7f

                                                  SHA512

                                                  d7b9b1adb16b05e35b90a8ec9dd74273205eee1c0166f3e807aa2fcd3ee4ca749ac8dcc7bd7ce86a7a114022f96293bd8e0ccdf634c6c44e4ee04566dca8da33

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  e743dbc78c8bf7953b250749a16270fa

                                                  SHA1

                                                  3cedce865626a7aa8fa67c5290502ba7a7e09493

                                                  SHA256

                                                  9b049aa3b935dd4f04a3cc9c0e2118b065bc4ddde3e4f4e3cfa2d5fe03b01893

                                                  SHA512

                                                  30230daf98c6ed65d4f9ef9b2757e6bb605d751d05c58a8d7a9944869388c90a3e46b03a303d664f54d599b4160b614fd4db8425706bd19ead521e00c7190d35

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  fda6c06cb942a466eb6c2918e7b1477f

                                                  SHA1

                                                  48c9304384a8daaa47c7ea6d75fe05146e5712fc

                                                  SHA256

                                                  e0e87b5c967610d13a5d196a87e8448a2fc8c17b75e2133ceb54d38d6d5b01d5

                                                  SHA512

                                                  272b225ad644ffd4b8f0f0aade1ccc23c105f9737142375c5ecd3877f13bc79b5fcea4cfd3579f05d620ba1bbf814afb3410db100b6994b1caf2bb3f9197e0b6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  34e63ccc12b5da8a4f6b166a6129f492

                                                  SHA1

                                                  6ccb27bee76d791ed100fbacf9d1336419f286a2

                                                  SHA256

                                                  287274d50078655f6f03b92e6bb63c0185a9cef917c1cf5afe2b2c3e7234376b

                                                  SHA512

                                                  dc3d4d3d612bd2532b82efe4e0f6f86217b9f15585d5cf0d4bbcd734cb1d818744f4f8cf4c891351a88a7093dfc4a6406d7b055390d2d9d99118ff6c1c36608a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  0b6bf967f91ac8a504535e37b4bcd5dc

                                                  SHA1

                                                  4f9cad9662fa84b727a6625c48ab6042c25c109c

                                                  SHA256

                                                  4b7a97b74ce49d6acb39e1dd135cb44f9e611ac067461393d6e1fc180bd6d998

                                                  SHA512

                                                  f3d202633cf2992cb6d6c39abf436b3cad26d86c187e4fef06274edc2e144c2868023abd3ede172d24479b4dd7106f4a5c3a75f30fd2a0a59d1ccf0c774e4130

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  1159db280bbd854fcf4b86ddac8b183c

                                                  SHA1

                                                  26bc82cebae818af0921b13d8970128d3620bc09

                                                  SHA256

                                                  31a27102b0473b3baf43e7c5962f619f1b10c2c472a275a1b7fd25ec8381bd6e

                                                  SHA512

                                                  672e881098f1c1e73c7d1903143d62e824bf694dd097fc40ea13321558e4c9e4c3c74fa192d09027a169750fe1fa3e792cf6e2088a3d19fd94e323eff39b56e3

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  9baeac1eb64c143d2e9bea5518225cf6

                                                  SHA1

                                                  5d343585783c7e5d4737f14b2fd239c0566c4431

                                                  SHA256

                                                  3ed69c7f687a6744530a8a60a5c8b358d7cde0c9a95ff163d6786d5a275aa2c8

                                                  SHA512

                                                  f13c8d30e833719fb7bd6233f6c9543f900d4b313cb4993e24271a4cbef889d5f345fdb1270c0d5ccb36c44bdad80d92e3dba98d6685b05b7a160b8e278caebf

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  92KB

                                                  MD5

                                                  ff9291943d99ab899581ba0b3de774eb

                                                  SHA1

                                                  7866e011364e636478c6e9b654e90fed0c7d06cd

                                                  SHA256

                                                  1ad62f0304e549c8d300e7285d5db97c52b825620893ef619955066ab2cfdaa8

                                                  SHA512

                                                  a52b2d2835e0ea23e8c5994af884e1ad75e941ebfa4709720cfd59439a9fb7b061b09e42d403871cb0cc7cd47b29685b667aaf8091dbf5baecf340d3a106810d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  92KB

                                                  MD5

                                                  15898657c7bb1c20e0768f4db3696cb0

                                                  SHA1

                                                  b54b2e28bea2e747adcfb4711e37fff702940f3b

                                                  SHA256

                                                  556543dad93b7cd0d16c504846015134316db26c91708d9b625fa67643e7be0b

                                                  SHA512

                                                  a58639f8bbc5080a130320f2b9882cc290fff4c38b63e3b1ecc96156c14f85243acc5b7cbab1a7504385e54505e7af472afe936aeb646bba9f5eaa17482680d9

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  54f1b76300ce15e44e5cc1a3947f5ca9

                                                  SHA1

                                                  c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7

                                                  SHA256

                                                  43dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24

                                                  SHA512

                                                  ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  c00b0d6e0f836dfa596c6df9d3b2f8f2

                                                  SHA1

                                                  69ad27d9b4502630728f98917f67307e9dd12a30

                                                  SHA256

                                                  578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1

                                                  SHA512

                                                  0e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                  Filesize

                                                  33KB

                                                  MD5

                                                  daa6948a37ac312342600f2b96db15ea

                                                  SHA1

                                                  0bfa2e04bf51480baf1fc7e7819f65cd3b0c90ba

                                                  SHA256

                                                  de7cf820e8eb0aa51d82aff3a848fd853dfa878674cc67094aee0ac115c85fee

                                                  SHA512

                                                  5af3ceb0a4c56b767792ad349b83a179191d9fe6dca8e3795cb48edb87ae6a8b89e51a64ebedd68857c674befd71dc1664a2e8380ac21abacc9566329d8c2e14

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                  Filesize

                                                  38KB

                                                  MD5

                                                  a1cbc8600fb0e0b668df61bb5d1737f9

                                                  SHA1

                                                  65aaea9cf40ee7aafcf033f35980aac172b0a267

                                                  SHA256

                                                  b0324009cc7d496245d763710959284dbc9eb3c4aa93227cd6fa82772ff5a2bb

                                                  SHA512

                                                  c731cbc3fd2397fea0afdb98ad7e0a2624dfdd9da00da2032cbb425ff653291bd3e9290514d6aac2761923a055c0666b521a61524595c5ab1aa2b56ce18b2338

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  216B

                                                  MD5

                                                  6f63377eef47cabdb6bcfd3e91602b33

                                                  SHA1

                                                  8af395b42a34aceaed18ec70caec48fcd5a13eb3

                                                  SHA256

                                                  20d67afaf20abce9a2e70341eecfa48f07145a98e5f6c0e26d822870e4cd7191

                                                  SHA512

                                                  e263c569dafc0f3635eb4295e69354c9e513a0309384a36632963c0f2bcc86ac7ace0d1e9d29e83d454b1ae9b9eff1343bf8c2887d87817e6e702826cfd27c51

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                  Filesize

                                                  111B

                                                  MD5

                                                  285252a2f6327d41eab203dc2f402c67

                                                  SHA1

                                                  acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                  SHA256

                                                  5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                  SHA512

                                                  11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  72dbfca3f9bf24c306424e5cee622ba9

                                                  SHA1

                                                  f80bba831ebeed2d9c08d9c7ee09d218e84d1a11

                                                  SHA256

                                                  a09f8adcea2cc69456ae32a432e5af3322657186deea2baa0aad3e887437b17a

                                                  SHA512

                                                  001ba80fdd15f6796b14e2f2f4fc8d8c76b130c8fb2a28f3db96c1f54dad36d9ad95d1c83885dd37e55fce84f9fe2bb95ca75de97b3e55f8360f801fbc717ebd

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  e9b7dd970ce4f64befbd2a45b75cd645

                                                  SHA1

                                                  3a2f4a90697c714c4dd68543a7ba5afee6d8b6b8

                                                  SHA256

                                                  e45b35a030974a5566c6e41553feb567f9ca367ed7d7e9f7b3d4743ed7178f1e

                                                  SHA512

                                                  2918e6f5600c391ed21a8e09fee9c7a7f42377b642ba8f21cd6af4d80ac3e666816337e43d2db3b09ffe711b935471765498a1af1322e5d33f11badf8504981e

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  0efb06d467825d884a0384413d0fe82e

                                                  SHA1

                                                  4470409cf0d7f08bd3a2b51a8db8534d0990e9ae

                                                  SHA256

                                                  43e5e773c9a784bc36cb587c36c7eadad298017e310f850cb33eb8fc4ab79464

                                                  SHA512

                                                  ebcbca09c926ea4334501999a0ccb5711871a5a1919ce1f4449cf4701973c43ca286b4b88441338e9deba1d024d4238046272c73f15e889a5ffb364d0537b178

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  a2f91699e0680905b6c8476899c82eed

                                                  SHA1

                                                  abaacc867422ca4e2f594e420d42d354bcb05439

                                                  SHA256

                                                  1279aedf07ac7f3195a08a84db1b79bcdd7b34c9bda2a62caeb3ccfcbe604c88

                                                  SHA512

                                                  521ae7d75f68d47250eb66d92fa5af26fa366cb5b41b33702919a27395a31592eecf26d56844be2b2a4caffbf3d18aa6f49c474832e1128a284ca586eb5fae67

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85t3rifc.default-release\activity-stream.discovery_stream.json

                                                  Filesize

                                                  18KB

                                                  MD5

                                                  52b44e2a1373625594dcccc9bdcb84de

                                                  SHA1

                                                  2052d14c6876986b0b97fba3d094542c93b7e8f8

                                                  SHA256

                                                  d84c8be459a318816360cb56cf7730212deb9fbf51bcb4fc647d191f262d933f

                                                  SHA512

                                                  b658029e67f07916c28d16cfa34a035e3a2738cca7bdc1c31f6a29b5e49a71da42fd5c18357a8ee5e6e0d7ef50e835ab8c792fd75af89dd3c82a0c6da479b621

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85t3rifc.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D

                                                  Filesize

                                                  13KB

                                                  MD5

                                                  bea257f9b203fc393b4d847db55e51ec

                                                  SHA1

                                                  64a5875620d79300d432de71fc3e4d1e8dc9c85f

                                                  SHA256

                                                  e832ea0f9c4eedaf5a56627185c1f44d13f8ef043b134ca7f9a034d580bb0ea0

                                                  SHA512

                                                  053da745bb0b2bc3d3d7de5b29f288743835fb430f8a6b4ba8ad7d83c0609e0b99e6c78fc47f36dd592afe9c0af70d32854bf15f12b7e681451639c0368ac711

                                                • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  33a84ea233fe9fe1b4c85e533a228bbd

                                                  SHA1

                                                  413d73dd32bcce870cf5edd4b777051762882034

                                                  SHA256

                                                  a777bbce91625e3261edebb334be8610372daaf0790763fc2fd085db35b8463d

                                                  SHA512

                                                  0f28610c0396bac87e8eb7c8bceb0cd468cebe4df9bca2a9e8ba2f3f37708317d6e621fdd9a9cdb6046b43eb578237124215f15bc614b016457cb37117e8395a

                                                • C:\Users\Admin\AppData\Local\Temp\1000002001\a4950553d1.exe

                                                  Filesize

                                                  259KB

                                                  MD5

                                                  268974e398224e4c5f7d30f8221a5f93

                                                  SHA1

                                                  5d11a31a4012266bd5bda4f6debb80ca34a13a54

                                                  SHA256

                                                  1c18346eccf2800753f37747b7d4c20d4e778849906186f1bf586244589bfda5

                                                  SHA512

                                                  b21022ba5db5ec9780a91adb375c9d32996f3f6b2049f3506b8dae0c2c9c2a9eb35f3711a87559051f69e5ec395591774c671aba8b47f8d7ec7493d0d7a02d64

                                                • C:\Users\Admin\AppData\Local\Temp\9FF9.tmp\9FFA.tmp\9FFB.bat

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  de9423d9c334ba3dba7dc874aa7dbc28

                                                  SHA1

                                                  bf38b137b8d780b3d6d62aee03c9d3f73770d638

                                                  SHA256

                                                  a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698

                                                  SHA512

                                                  63f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                  Filesize

                                                  479KB

                                                  MD5

                                                  09372174e83dbbf696ee732fd2e875bb

                                                  SHA1

                                                  ba360186ba650a769f9303f48b7200fb5eaccee1

                                                  SHA256

                                                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                  SHA512

                                                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                  Filesize

                                                  13.8MB

                                                  MD5

                                                  0a8747a2ac9ac08ae9508f36c6d75692

                                                  SHA1

                                                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                  SHA256

                                                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                  SHA512

                                                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\AlternateServices.bin

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  d886fbc3a4c1eba76e7001c0fb93b568

                                                  SHA1

                                                  89df5868df5c83d9f133314ec251a1e71c6cada6

                                                  SHA256

                                                  33f9d5a0644e45cc306cf39c4562e4300ff1540db5546248563f3ec20337f005

                                                  SHA512

                                                  4d262b8d75d06f332fa67675659775ff435c53e7af0496bb352aaf432f037b38a389df58e85d556f707400f800c41ef5284834255f3109efa09825bf34206243

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\AlternateServices.bin

                                                  Filesize

                                                  17KB

                                                  MD5

                                                  6ef33a388823612d2e231455e0dcdac9

                                                  SHA1

                                                  ada1165668558a4ae921cc72dbcdb95924eea419

                                                  SHA256

                                                  502e87f33d0b4ed1d301ea86f380d4b6a125ce735985f44d57e3b51dc5589398

                                                  SHA512

                                                  077d2c5b63d04e9006e47e68ef23678a0e793e76e30c0e964aedc1071fd8d9160a3637243cbe9b54117729b0334d4a7e6fbcdb58ee81a0ec43e1fd5a7bc5bcf6

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\AlternateServices.bin

                                                  Filesize

                                                  12KB

                                                  MD5

                                                  3c61d7954b0fe7cfcf94b327c6a55017

                                                  SHA1

                                                  0ef103e26927466d8bdf5e316fc0ef0c8de9c367

                                                  SHA256

                                                  d8da29eaa5952adba48561d4c752a6f31058c89550dc0ae169990ddc78e289d2

                                                  SHA512

                                                  42fb53253975a00a34afd124c8a6fe12c87ae5e8e539dbed276a2a2203ce419452e4aaf74fe5bf17e34e3c4f8d03155f9a01675c277acb0476701b7d9544d27c

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  c683a73d5da4528f93332839c69f591b

                                                  SHA1

                                                  5b58494724e5a6fb89174c133541fcecf2e3d213

                                                  SHA256

                                                  4cfe111b09226436a1737d39f5c2073b2a68898ba2a946d0bc5d4978307f38f8

                                                  SHA512

                                                  97f114470522e0172aa2a27546bb635cb6bdbc618bf49a8b25d7c29779a2bc8cfd040f0a8075aeefb74b691f3a8c623e3728d57b741002b649968530e03ded45

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  9b3f6fb6d06e49608fd6a1f3612268e7

                                                  SHA1

                                                  26cd6bacb2944fccc029eff4e6bce5c7e8dc6294

                                                  SHA256

                                                  bf72af3f2f38bdeca6899ed857197aa9a65007f2926d5a59d496a0d9d148fa32

                                                  SHA512

                                                  5edc9b1b8ebb403443fc5a3a89cd946afdb7df779a067415c9f709c83d34e68f8bd32e6903d366b2870aea871a5fe893755799196526eac10c1e8d016fe42cdd

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\datareporting\glean\pending_pings\239de6ed-1c80-4112-929d-9eda2a6e54a2

                                                  Filesize

                                                  982B

                                                  MD5

                                                  6cc6e5bc19696e5719e2eb4a68fdb476

                                                  SHA1

                                                  b335f01795e069d945a3e885ee3fc61ba209962b

                                                  SHA256

                                                  3ab89fb6a4bea7fb4b99e069fafb47afc83b1ddb83c6441a60e90e6fb3a27f1f

                                                  SHA512

                                                  b5563c24dbce57e2dc7393f0feaafeaade7720722e1b24c82dd12c09632331bb4648cd65c4f1e5149beca0784fbab387d46ad0797a17446d7ec1b946a7efa95f

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\datareporting\glean\pending_pings\bf587f17-cd8c-4f07-a9b7-98ead4bd7eab

                                                  Filesize

                                                  27KB

                                                  MD5

                                                  4c422597e768f04a400f05653dbad2b4

                                                  SHA1

                                                  fda2000d13a830e445f32799d48ec282bb1897f6

                                                  SHA256

                                                  38901dae977ecd53ba0facb7a43d20d81a902e043d2c703cc6d0546ff9c6f49c

                                                  SHA512

                                                  0aff7d29ecdb88d2ba2d6a4a51ec40b98ea52449b663200d90fcf7724fd3800a196119ea667f51259160814a13a560a8fe3334792744451f8c10a69510a360d1

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\datareporting\glean\pending_pings\f33b1abd-b7f6-4d06-ae36-56b0a4c20786

                                                  Filesize

                                                  671B

                                                  MD5

                                                  67f0368c341e87a3e245f1ae626446e5

                                                  SHA1

                                                  4a508bd42aa5de803fc195c3ad309dcc182694cc

                                                  SHA256

                                                  0a4f946f822522844cdb9b004548848bf27bf068c9d53c34247ec69cd205d799

                                                  SHA512

                                                  6f3804c5691dfe6eddcadb1cc30633a94628b9de410d50c027245b2869bf5163df1ec9529a53c637d09bddd25c838887c7a728ca287d87edfcfb6b808e22ffca

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  842039753bf41fa5e11b3a1383061a87

                                                  SHA1

                                                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                  SHA256

                                                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                  SHA512

                                                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                  Filesize

                                                  116B

                                                  MD5

                                                  2a461e9eb87fd1955cea740a3444ee7a

                                                  SHA1

                                                  b10755914c713f5a4677494dbe8a686ed458c3c5

                                                  SHA256

                                                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                  SHA512

                                                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                  Filesize

                                                  372B

                                                  MD5

                                                  bf957ad58b55f64219ab3f793e374316

                                                  SHA1

                                                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                  SHA256

                                                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                  SHA512

                                                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                  Filesize

                                                  17.8MB

                                                  MD5

                                                  daf7ef3acccab478aaa7d6dc1c60f865

                                                  SHA1

                                                  f8246162b97ce4a945feced27b6ea114366ff2ad

                                                  SHA256

                                                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                  SHA512

                                                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\prefs-1.js

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  09274c2cb5ed4d7ec36f3e5c363d442c

                                                  SHA1

                                                  dc62dac1cd2c518d691e1ab0027b1e0232531c4b

                                                  SHA256

                                                  99e83cf848d0bd6b7d3b1fbd6009584fa7ab4f7627a833515a8244611a232816

                                                  SHA512

                                                  43923628cbe9272a0986809316fb8dea074e75d51164c7e10ff6887ca0a5ae58f01ee031d5ea773a8f4c516b3c50fc6a065bc051f1c218e30021b12903a0cfd4

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\prefs-1.js

                                                  Filesize

                                                  12KB

                                                  MD5

                                                  abb02a2ab6aea4dffff5be1a08337f23

                                                  SHA1

                                                  8d14521aafe391869dd190926b32cf01c86a2192

                                                  SHA256

                                                  c876a2e024303a0b527072c851126ba54587240e4b22ce30cdf1b5e5865d40bf

                                                  SHA512

                                                  90e7295ff4c1197dfdbee4472f5bef83c95b3f2598c610416ee7ae8d97a3e6a740e77448a12b1f05079c0d40f1bd19b0522ad12ecb4b60ae0336ef08f8f653bf

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\prefs-1.js

                                                  Filesize

                                                  16KB

                                                  MD5

                                                  9c5a0bba48f58115e868c851a280bf74

                                                  SHA1

                                                  0c146ef045bb9dd4943d1cbe948b33b6611d3de3

                                                  SHA256

                                                  9d37c8af072e6d8772929c1763e3f1fe8a8277a72dfbf4795117174c0ab3f5df

                                                  SHA512

                                                  37305695d5ece56387f322ed2185ee448a18f61964962eba836e3d0795367300cdeeaa1e35510555eb7015bfbbe140ccaf94310d42a48effbff5b9409055c95d

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\prefs.js

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  d6c5c8bad50a669501823c85e8b37ef5

                                                  SHA1

                                                  5bbba062192d531e663315b55b6e096b2a60f573

                                                  SHA256

                                                  8085d893f205cd2264f21a03d6537069401dc70828a0335d97f1b52de9df876f

                                                  SHA512

                                                  80ad0a852d7e5d2ba2e6bd79598ec5ef0968c85563876d5abb845cb39ac7425b723b97d707c0a9ec86db56d8b5e638da5d54fbc9afc1b4e2b1f4f6a190a3ab00

                                                • memory/264-17-0x0000000000EC0000-0x000000000136D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/264-0-0x0000000000EC0000-0x000000000136D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/264-1-0x0000000077D54000-0x0000000077D56000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/264-3-0x0000000000EC0000-0x000000000136D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/264-2-0x0000000000EC1000-0x0000000000EEF000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/264-5-0x0000000000EC0000-0x000000000136D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3536-39-0x0000000000400000-0x000000000245A000-memory.dmp

                                                  Filesize

                                                  32.4MB

                                                • memory/3612-530-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-3264-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-3330-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-20-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-19-0x00000000001A1000-0x00000000001CF000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/3612-2820-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-3212-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-1849-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-3229-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-18-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-3249-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-22-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-21-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-457-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-562-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-3274-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-531-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-3304-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-543-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-3288-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-3289-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3612-542-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/6424-3278-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/6424-3276-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/7060-2636-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/7060-2669-0x00000000001A0000-0x000000000064D000-memory.dmp

                                                  Filesize

                                                  4.7MB