Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-07-2024 06:40

General

  • Target

    7a96f4f4cd4766c6e7319321aed7c42933e7c84327a1b4d8cae713b5d411353a.exe

  • Size

    1.8MB

  • MD5

    1dce706f6aced6737a8f262475470bfe

  • SHA1

    2de45d72a2fea7c89528f5283a9e0a9a0424d26f

  • SHA256

    7a96f4f4cd4766c6e7319321aed7c42933e7c84327a1b4d8cae713b5d411353a

  • SHA512

    be1ab223a46aae5d3661768a55571b57ba5ff69b4aa09478c11c1f82697387675cc9b5fd9b81ae2fe8a2ca8cd81a9dd867e419d86447c5f592ece98ef13ad70c

  • SSDEEP

    49152:2OQZJFROaHrEEMue9iPwKC+BZM4ZiL+FB8h0o3FehrHxsklDM:MpCNKC+BZMoW3Fe5HSk

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a96f4f4cd4766c6e7319321aed7c42933e7c84327a1b4d8cae713b5d411353a.exe
    "C:\Users\Admin\AppData\Local\Temp\7a96f4f4cd4766c6e7319321aed7c42933e7c84327a1b4d8cae713b5d411353a.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4940
      • C:\Users\Admin\AppData\Local\Temp\1000020001\7b3fd09b27.exe
        "C:\Users\Admin\AppData\Local\Temp\1000020001\7b3fd09b27.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3408
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BB61.tmp\BB62.tmp\BB63.bat C:\Users\Admin\AppData\Local\Temp\1000020001\7b3fd09b27.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2016
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4360
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffa1ed3cc40,0x7ffa1ed3cc4c,0x7ffa1ed3cc58
              6⤵
                PID:1768
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,4579187661004814245,2907934703535859563,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1916 /prefetch:2
                6⤵
                  PID:3852
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,4579187661004814245,2907934703535859563,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2184 /prefetch:3
                  6⤵
                    PID:2388
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,4579187661004814245,2907934703535859563,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2264 /prefetch:8
                    6⤵
                      PID:1792
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,4579187661004814245,2907934703535859563,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3144 /prefetch:1
                      6⤵
                        PID:6400
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3160,i,4579187661004814245,2907934703535859563,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3240 /prefetch:1
                        6⤵
                          PID:6412
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4628,i,4579187661004814245,2907934703535859563,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1160 /prefetch:8
                          6⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1060
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
                        5⤵
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:2040
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffa1ee946f8,0x7ffa1ee94708,0x7ffa1ee94718
                          6⤵
                            PID:4684
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4748273094502051528,16922897856899393233,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:2
                            6⤵
                              PID:4976
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,4748273094502051528,16922897856899393233,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
                              6⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3444
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,4748273094502051528,16922897856899393233,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:8
                              6⤵
                                PID:2376
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4748273094502051528,16922897856899393233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
                                6⤵
                                  PID:5192
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4748273094502051528,16922897856899393233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
                                  6⤵
                                    PID:5204
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4748273094502051528,16922897856899393233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4516 /prefetch:1
                                    6⤵
                                      PID:7152
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4748273094502051528,16922897856899393233,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:2
                                      6⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1064
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
                                    5⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:4876
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
                                      6⤵
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:4904
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1908 -parentBuildID 20240401114208 -prefsHandle 1824 -prefMapHandle 1816 -prefsLen 25757 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d461114-6f2b-4de1-b457-7845d3325280} 4904 "\\.\pipe\gecko-crash-server-pipe.4904" gpu
                                        7⤵
                                          PID:4344
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2384 -prefMapHandle 2312 -prefsLen 26677 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {20cef4b9-d67b-4fe2-baa4-8f4fd9b22992} 4904 "\\.\pipe\gecko-crash-server-pipe.4904" socket
                                          7⤵
                                            PID:4888
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2820 -childID 1 -isForBrowser -prefsHandle 3280 -prefMapHandle 3284 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6adf7d77-b8c8-4131-bc3a-67d70857aee5} 4904 "\\.\pipe\gecko-crash-server-pipe.4904" tab
                                            7⤵
                                              PID:5376
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3760 -childID 2 -isForBrowser -prefsHandle 3752 -prefMapHandle 3748 -prefsLen 31167 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a37c90b6-341a-4c45-b1a2-7ce619fba076} 4904 "\\.\pipe\gecko-crash-server-pipe.4904" tab
                                              7⤵
                                                PID:5652
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4592 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4548 -prefMapHandle 4544 -prefsLen 31167 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5032e1b-f78b-459c-875a-e4f917722e6a} 4904 "\\.\pipe\gecko-crash-server-pipe.4904" utility
                                                7⤵
                                                • Checks processor information in registry
                                                PID:6244
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2632 -childID 3 -isForBrowser -prefsHandle 5388 -prefMapHandle 5532 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f792970b-8ada-4937-a0f4-a4313599796c} 4904 "\\.\pipe\gecko-crash-server-pipe.4904" tab
                                                7⤵
                                                  PID:6024
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5540 -childID 4 -isForBrowser -prefsHandle 5676 -prefMapHandle 5680 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac1a6ec1-913a-4145-bef2-013d841516af} 4904 "\\.\pipe\gecko-crash-server-pipe.4904" tab
                                                  7⤵
                                                    PID:6036
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5516 -childID 5 -isForBrowser -prefsHandle 5864 -prefMapHandle 5872 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1db358df-05ba-413d-bb72-e662dde9eed0} 4904 "\\.\pipe\gecko-crash-server-pipe.4904" tab
                                                    7⤵
                                                      PID:6056
                                            • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                              "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
                                              3⤵
                                                PID:6520
                                              • C:\Users\Admin\1000029002\8f82d85882.exe
                                                "C:\Users\Admin\1000029002\8f82d85882.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:6532
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 6532 -s 1096
                                                  4⤵
                                                  • Program crash
                                                  PID:4744
                                              • C:\Users\Admin\AppData\Local\Temp\1000030001\4112acf0f8.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000030001\4112acf0f8.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3956
                                                • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                  4⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:2364
                                          • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                            C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4604
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:5300
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:6448
                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                                                1⤵
                                                  PID:6532
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 6532 -ip 6532
                                                  1⤵
                                                    PID:7160
                                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4876
                                                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:7020
                                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5180
                                                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5440

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\1000029002\8f82d85882.exe

                                                    Filesize

                                                    2.5MB

                                                    MD5

                                                    72230d8efc579eaab4852e555f410c00

                                                    SHA1

                                                    5650597c7f86092b999b284b9364b083f3a140e8

                                                    SHA256

                                                    fec0c11ef40a4bffb95b80f18e445dfaac26d65650e235bd1f181219823d943c

                                                    SHA512

                                                    a198b9a0a26961d96da5e0d4c0a55ea54ec084306a476c93a9663d5d45eb0b46c75cedffe9613cae993782e242fc737cdca150a018876ec9363ac95fbe1f3fd1

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    288B

                                                    MD5

                                                    a2dcbc98bab7a8b19d1946b94e6eb5ed

                                                    SHA1

                                                    af01bde89afe65c0784a9f63a74f6c853fcb60ec

                                                    SHA256

                                                    858a960c7446fd07f3ba8f1e731188d0a5e77248fb530a86dae4e6691d18ffc4

                                                    SHA512

                                                    e20a7b6ec1400859fa551f4b8e8ae1707e8a0564addde432671deb5346fa8e6c7956b55ef295a575e585d67bd6c8204c9d982afee6bfab4948943667300310bf

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    ea1003a1702ee41b5c7739387a94b880

                                                    SHA1

                                                    105922dcdab8ef0b5030d057fb1a43b31b817f28

                                                    SHA256

                                                    5e6fb6bfebf766dbb0576227fddf6c00a342151c15520c4a96320fa8c122ab88

                                                    SHA512

                                                    3f308d602552651395912e04a5c8829a2f01cfcb133251e1946637be746c9ae349f0348159a24c261f5fe74764ba04922037973cf2e8608df20fa84d76d731a3

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                    Filesize

                                                    356B

                                                    MD5

                                                    d0084a11c8f71ac7bd3d89bf8bc752fa

                                                    SHA1

                                                    103d4b908350d86a029c4541fff8b57c51e0dbbd

                                                    SHA256

                                                    867bb91beac2560aee2fbcd5e755a1c7ed04622eb5fdac29c57997d36802abac

                                                    SHA512

                                                    6174f7ec79ab22f783fe674a376e5f0319cccd5540ee71e6b7d15c7bf7fcf2831fa2844ba36bce3629c2a4feb1228fbe2b125dc5956b0351f743d9d68af63d07

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    28e04c080f99b6773d47089081812a97

                                                    SHA1

                                                    c39068cee73e5d47b0f9e051662f9e856567b699

                                                    SHA256

                                                    e1559b50356e5582352995689f6dc73c5b4cec6c4fbbe68c1e1d3fd1d594b15d

                                                    SHA512

                                                    ffd9afbab11297f3b639581e79f7a233ee80a360a42c6b3b828609dcc7232a3087ec3c2f29b5d771eda92141ba031855447f14dd5c0bd4989393623a09e7ffbf

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    1f731a23a58042dcf54c01440559bb46

                                                    SHA1

                                                    f11dc7d6a15149f8bb63d92ff6f4b1ddad75148f

                                                    SHA256

                                                    63bfba4540e2d20989c0dc09e396218fd4d5a489adab389a953761004aca83c8

                                                    SHA512

                                                    0b80f3f946340c018029f9df682dc62de1843e8a7442a6881752b9c5310991962194af13218676c15a2f7484347c0b15e85ec47c128991037ca30cf5df3192f9

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    62a59e53db07d26e6ef4c772aef112bd

                                                    SHA1

                                                    8a110a57f47d5d40f598bcf0afc109f8c095daae

                                                    SHA256

                                                    55af6a7b47e512e3d7bfad294414ea467d11b9fedfb43f415c9c16a79672f935

                                                    SHA512

                                                    0385824c5f4f9edcb3c2164dcc94cc2f686b7f2696822514e6c2d74e8acf8c40bedbb2c3785a0f5de0f661256b63f060b8d38ed60807a1daca5eb59e4647b98a

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    2b06b29e134960c164da850e9337f795

                                                    SHA1

                                                    bd149935f961c88f4c6b6a17496dfcd0dd104112

                                                    SHA256

                                                    3fa661752d449ed08f22a96cbd661907974fdb4452940243dfbdbe24a145b501

                                                    SHA512

                                                    d330ffcad73e53a9129c1a9474ce18b0147582667c01a6a0d642a694a79dbf97a6f3db00246d656d9f2d920d6556738595a8155c7c7ed2cc5792bf491ade4b80

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    e881292bf8ca5f92a88da1a9737dbd53

                                                    SHA1

                                                    2c58bf12a449f01e64dd3caa3cbd3ba849629be3

                                                    SHA256

                                                    ac44498ffbf10d717873b4ec48d13c753d083868df80904ac4a8e7a23081f5e0

                                                    SHA512

                                                    af3aec944c6d1eb0892e61e0f99484749cca6d5e7543d39813a5b82bcdba70847e58c2a3ee1f11d024d29a432dde46935e0304f1ddf068e2985f03973e7cd8d7

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    ed6494d56853656857d6bf3f2fc007bd

                                                    SHA1

                                                    2391f59b5959d28765de6e59c1ed9b30242ed56c

                                                    SHA256

                                                    eecd7580e09103a254d0bea4fe2d7ba25722bfd327b9c715dee9e127201910b3

                                                    SHA512

                                                    f893b19b173a6081f15223b87f3a89dc3105328f0041a4b06ae7853187f770557a1cf8cf2b89f865223137a19cad6d5f4258f21f8f54c99b2d41f107c99b9b8b

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    48a21a6f6fbe2c69b6bd2b9277e829d3

                                                    SHA1

                                                    7b7375519294cc8fed7fb35b17bae20551c8dbee

                                                    SHA256

                                                    cb8aea948b8a5e8928d179f664cda7f106049edf738b7d275db68e7b4e53b2ee

                                                    SHA512

                                                    9514759e80fc597a9f1ae001092f120171e20b8ab4f31653ed655534e21fcae13c7d23708190b33718084879458049a51882cc5af20bdfb4768fb93c335574dd

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    20dbe494bb531a4c419fe087b20ab7c9

                                                    SHA1

                                                    59b1dc926c3dd46804c37896d609a34198a5d517

                                                    SHA256

                                                    4e24d75df30fffb85c96b1314ddb6dd7beb7be7f52df4b9600cc23b101ea2574

                                                    SHA512

                                                    60e8196a9ef2b3ee72bd215a7932b7967e4a4d9ee73bc5cb942e7e662fd89ecd9a5ff28d348b110a08b9b1280a29a937efad692f48bb9a4e3654a8a9538befad

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    92KB

                                                    MD5

                                                    4f5fbd834d6ef16f9df0fa99af423659

                                                    SHA1

                                                    e31249ff87cd84dc68fe4248e1b345576bc5e485

                                                    SHA256

                                                    a6ed0656f59778eef5a54eab2441377968a3ea6d04359f27d95a453df78b6b18

                                                    SHA512

                                                    f7ab64a58c7375c7246f192e13eebdae4bffff9df0b731e174315785cd898c6c85bede80c65ed1c6a9cbd9d136687b787ba7e75bf29150c8d43161c0b5a4face

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    92KB

                                                    MD5

                                                    da97a139dcb094ec8f94d6d194220aef

                                                    SHA1

                                                    13393fb6996e52455d52ea2b0cef70a36d044587

                                                    SHA256

                                                    d2d755bd4f08d7c3d64e4574c4c0e88803d9e5899c28e3a9784cdc1f92bd120b

                                                    SHA512

                                                    2fc59ce43de10b968c8d2e4b0088c36cc5d1c956aa208c92782025b8a635d643bcba3396c14461e7de20d7a2702e9aad9e6384555de7384c8c4b988b6ac735ce

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    54aadd2d8ec66e446f1edb466b99ba8d

                                                    SHA1

                                                    a94f02b035dc918d8d9a46e6886413f15be5bff0

                                                    SHA256

                                                    1971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e

                                                    SHA512

                                                    7e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    2f842025e22e522658c640cfc7edc529

                                                    SHA1

                                                    4c2b24b02709acdd159f1b9bbeb396e52af27033

                                                    SHA256

                                                    1191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e

                                                    SHA512

                                                    6e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                    Filesize

                                                    38KB

                                                    MD5

                                                    a1cbc8600fb0e0b668df61bb5d1737f9

                                                    SHA1

                                                    65aaea9cf40ee7aafcf033f35980aac172b0a267

                                                    SHA256

                                                    b0324009cc7d496245d763710959284dbc9eb3c4aa93227cd6fa82772ff5a2bb

                                                    SHA512

                                                    c731cbc3fd2397fea0afdb98ad7e0a2624dfdd9da00da2032cbb425ff653291bd3e9290514d6aac2761923a055c0666b521a61524595c5ab1aa2b56ce18b2338

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    216B

                                                    MD5

                                                    d08d740b4de5f96cad5d367ab2b065c1

                                                    SHA1

                                                    bf4195fb6a1716f5520c3a53d97466eb00c10662

                                                    SHA256

                                                    e3e6c7d3664549500eee916c27c0fb3256bb7249650177b91b54292288944b4d

                                                    SHA512

                                                    f2cde8c865afbdfeed15a4c4fa1c5e96928f5fbcee65ac411ad09ee75a741dbed4d03c51ea161baa66e362494e6d3c9c68a8af40562c72c49a48dc00257e2090

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    1eda4dbf19bc93f95345fcc4fb71bb28

                                                    SHA1

                                                    a0e8cb0684981c829a41a85f69720c00a82be6fc

                                                    SHA256

                                                    47aa189a0afed2d9b2c87fc7f38e33ed922a602f155e11af047abbd565fd7330

                                                    SHA512

                                                    c6a4b69648ded06293f813e2d29142b614ae665c01f6ea1d7e5ea2e737011cc095d3d0ee467d08c83fd8eb61f11572366412d6a5420a51eacf8ff9a4e88fac1b

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    f36cd655858f015e24330edc2c0791a1

                                                    SHA1

                                                    191cb3fd3b5925ce20115454429875e088b3c9fa

                                                    SHA256

                                                    99eb24b01ac2f38cd90030a304c8db65e863b8bb48a0c848d3ffbe0a88fdb9cd

                                                    SHA512

                                                    498295a62951dd8b55b5040aa76e300e29eb415a1ef14be14c39422bf3b78476f8297933f55460c328909398d8a7b8bc9021ce30c9c2814fd575d45489f9d41f

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    0564f8b2351d8b4506f1515f1d98d51d

                                                    SHA1

                                                    85f72b689f0479abc4b0956d5a0f4b80c5b0dee0

                                                    SHA256

                                                    72565011c1d39b4f3fbf1b6da6ee605a83ee419d3fa6a50c8db285a4fc4b80dd

                                                    SHA512

                                                    6884ada6f47b2710fb95f1b58b0344bd4081ffc255c86d8d2080412d30a4702430a7516dde503693a9244b480a912f80a753e0883a94cbdc8b406cd3f4f86da5

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    984f02ff0ce73064af8323a4e1f90fe2

                                                    SHA1

                                                    8284dbc4389a7c3317bb32ed294415e0b6c63b9b

                                                    SHA256

                                                    f7d9f1183b791dd323a4f6c7d34c3bf51b54c06f011a52edda7d09a58d326ac9

                                                    SHA512

                                                    c22e357e656e6fee61559b760f859bbe3fa6fb60dd2664896388ecfffe19719dcfc91735c7ea0644b46406cf17c4f061465d789bc86055dd850b5c65e6465858

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zirruo9e.default-release\activity-stream.discovery_stream.json

                                                    Filesize

                                                    19KB

                                                    MD5

                                                    6c9f5ea1b73bba9fbf7948ae17ccf17c

                                                    SHA1

                                                    ad2b5b5977fd336350076ae8b364e126a12e74b8

                                                    SHA256

                                                    d80686ada606c499c3984da66aa53d813b353b1af476c3cca384a4165e8a8e91

                                                    SHA512

                                                    8f56818da034e0a2b2a0ee506cd8ea838b85d5deb67bc9bca98a4e557c14033329d39256676e059605f47bc6d38121648de8ceebf3896d0fdd78340079557e0a

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zirruo9e.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D

                                                    Filesize

                                                    13KB

                                                    MD5

                                                    2d768fcba67fea0e9d2fd741d3aaad81

                                                    SHA1

                                                    01073dce9f6dd1642c44e8bc9315e02b08b5ec51

                                                    SHA256

                                                    cbb8b879e424930cd54e95c972d30016a6d62fc44716d02cf5fa27743a60ace4

                                                    SHA512

                                                    a7929b2507f3a88a7f08c0c6bf6d15007ec846a8b34100d2f8cf187a65a1672d960d0feed98ff2516e89439942383fb726a6355598e0c9b76d32ea353e282f9d

                                                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    1dce706f6aced6737a8f262475470bfe

                                                    SHA1

                                                    2de45d72a2fea7c89528f5283a9e0a9a0424d26f

                                                    SHA256

                                                    7a96f4f4cd4766c6e7319321aed7c42933e7c84327a1b4d8cae713b5d411353a

                                                    SHA512

                                                    be1ab223a46aae5d3661768a55571b57ba5ff69b4aa09478c11c1f82697387675cc9b5fd9b81ae2fe8a2ca8cd81a9dd867e419d86447c5f592ece98ef13ad70c

                                                  • C:\Users\Admin\AppData\Local\Temp\1000020001\7b3fd09b27.exe

                                                    Filesize

                                                    89KB

                                                    MD5

                                                    fe8201c151054a291f95acf6d5f4ac43

                                                    SHA1

                                                    b57ad5c2422631ad2ab8941f317985bcfab36a6a

                                                    SHA256

                                                    0b5172279fc60860e1d9c64b34b53db42fbf8fd629f98671cf68fbb4c160c09f

                                                    SHA512

                                                    29e95d94a13090417f8439c04e02495530a14e9d3d02bddb339e84f047d23ca32741b933d479d4d8c04b4e14f816a8c936d604f939f9295e1661c78c95e263c7

                                                  • C:\Users\Admin\AppData\Local\Temp\1000030001\4112acf0f8.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    949b0567d960c8a3b4a6360ebdcdadb2

                                                    SHA1

                                                    082be7e0d2e9a6365d8d06148b9006a42bc9f0aa

                                                    SHA256

                                                    e5825ed69e841dff506db64b4b90cb0a3bdc8a7fef677b99fe915152a975f9e0

                                                    SHA512

                                                    e9a867140485c57b185f8876d5a6579ed99bf2dc6ebeafb7edce5e7dd78156c2296b101581ccda018af0efeb776a26c7fdc0f240db453a1dd3b6ba40902742f6

                                                  • C:\Users\Admin\AppData\Local\Temp\BB61.tmp\BB62.tmp\BB63.bat

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    de9423d9c334ba3dba7dc874aa7dbc28

                                                    SHA1

                                                    bf38b137b8d780b3d6d62aee03c9d3f73770d638

                                                    SHA256

                                                    a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698

                                                    SHA512

                                                    63f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                    Filesize

                                                    479KB

                                                    MD5

                                                    09372174e83dbbf696ee732fd2e875bb

                                                    SHA1

                                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                                    SHA256

                                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                    SHA512

                                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                    Filesize

                                                    13.8MB

                                                    MD5

                                                    0a8747a2ac9ac08ae9508f36c6d75692

                                                    SHA1

                                                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                    SHA256

                                                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                    SHA512

                                                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\AlternateServices.bin

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    90e7c500da60ad926123af00f09d830b

                                                    SHA1

                                                    1b716cd1f6fb44ff46ffda79a44ebcd281b83c54

                                                    SHA256

                                                    db00bfb8b4d6b99fac5f5debe4cf8ccdb2f02af5d2e2a344ac1ac660797edd12

                                                    SHA512

                                                    bbec9f970a1a8b72524a5c1a7eaa5f0523c2242c74cfbecdce9b07a025c74e61b4b45e2720bdc7957d6d9dedb63cac42c1dbe9e4f86e59639013dfff4958d079

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    fed9ab58dee0593a8829d24a8beb44b2

                                                    SHA1

                                                    adc02fa45b520339e35f585fdd4d0b4bab6830df

                                                    SHA256

                                                    42b5e4d8048be9fc5bc03f9850d5fe018b997559708eddfdfe6edc4beb6c36c9

                                                    SHA512

                                                    afe54644bd3b7944b6bf8383d4d403c5d26eb8b28864a97a64eb1895d2ebac683c6081b203efd9e909f498c8a181d8e9b5653a972d18bb15acf9697f194e9185

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    77dd555d4c86e0e0a5f1bfcdd8ffe404

                                                    SHA1

                                                    8e794f2bf54ec37dec0db288dc8664f59c705298

                                                    SHA256

                                                    15e8eaf5ca1d285993b548d4626252fea19bc8e89be5d1fc186815e672b0d68e

                                                    SHA512

                                                    b687d0453a7c91729e95564b4e00607f48ebcd784e6e7342fc4bd06f422715b40eaa7a8efb985c16a0c9cab46543745e063916ee92770914ef9af70a8df89ef6

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    892b922dd0acea98c13941bbfe7498b1

                                                    SHA1

                                                    465e283d52a6adc380b2cb087312af2a8d7fb95d

                                                    SHA256

                                                    495a34060a2909c36f09bc36cd127c86a69f155d36ec769a5580d756eea9952c

                                                    SHA512

                                                    41e1ed1d4713d93c4e6bd858349534066e92345f035d16361c30d77d55f82a7cc60e570121d00545c8ffcc60aa770be7c238e8af84877fb063715b82bc577630

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\pending_pings\a498a5e5-dd4e-4494-8656-d20acae6d321

                                                    Filesize

                                                    26KB

                                                    MD5

                                                    2472c3a2214c8b34176b1d1059244cb4

                                                    SHA1

                                                    28e0c7ee97950f879b6a38d3a3eef6844bc69cc8

                                                    SHA256

                                                    a7456092184a1d9342ab144bd178b4b20b11352c19d60b5c49955b633184412e

                                                    SHA512

                                                    b3d9f525639f001fa6fd249c62b17b2764ee7c0ac86902fa10b33321e34416b6ae9de0d10e88e68fb26899d82162bcf8093014bb678cdc0a334c653b8b5b57d6

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\pending_pings\c5081f64-e292-4518-bded-ba598761c56d

                                                    Filesize

                                                    671B

                                                    MD5

                                                    11b59c9004e6786cc4618cbc8141942f

                                                    SHA1

                                                    df4d9cb552f3a3b5dd0a6fc09c56b8f3256a6a57

                                                    SHA256

                                                    7e6f8ff2729e9e224df273257a95ee0bc7ffcc77db5f9ab397b06b1c1e628507

                                                    SHA512

                                                    faf2f035f8631b3fc5f6ec358346168de59eff3e5506b8f07872bb2b9ada031e2803d2ada89a2e14ae590a5a2e297ba0ee5901a6f2fefd61280902b69364c711

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\pending_pings\c565d1be-e878-4112-99c8-986f57cad144

                                                    Filesize

                                                    982B

                                                    MD5

                                                    94563d1ed9d0061dcff765eab36590f8

                                                    SHA1

                                                    07b106d2d0b0e89bc8c2dbd018ca263fce6267c1

                                                    SHA256

                                                    c46e0e30851f5123e3d8b23bd94c517c7699ff8e2d69db645f1824a1e1b56529

                                                    SHA512

                                                    f859bea4ee94f97de76d05a6f2c70cb70e4655d5a5d2247e6c58fc8eb9b986b76ef978a9f6eceb88cb952e6a271b5a23e8d43ec93e1642e19ae20c7509190174

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                    Filesize

                                                    1.1MB

                                                    MD5

                                                    842039753bf41fa5e11b3a1383061a87

                                                    SHA1

                                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                    SHA256

                                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                    SHA512

                                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                    Filesize

                                                    116B

                                                    MD5

                                                    2a461e9eb87fd1955cea740a3444ee7a

                                                    SHA1

                                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                                    SHA256

                                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                    SHA512

                                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                    Filesize

                                                    372B

                                                    MD5

                                                    bf957ad58b55f64219ab3f793e374316

                                                    SHA1

                                                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                    SHA256

                                                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                    SHA512

                                                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                    Filesize

                                                    17.8MB

                                                    MD5

                                                    daf7ef3acccab478aaa7d6dc1c60f865

                                                    SHA1

                                                    f8246162b97ce4a945feced27b6ea114366ff2ad

                                                    SHA256

                                                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                    SHA512

                                                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\prefs.js

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    e3502580f596bbaf66c71e714439c706

                                                    SHA1

                                                    b82bf7ca697a7fcd20135a8a829deb42f43fe1b2

                                                    SHA256

                                                    1616a74f31effc81d8c42994d71cf7758e19e31922915b2de994509871756043

                                                    SHA512

                                                    0d80057abdce3b6233025f61e56fbff4d36f70ef1ec1f7f9b3e7d1d7b53a349ebdd40bd967005bd7402f57fc3e954337a3fec3afa90e18f8140041d60039a42a

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\prefs.js

                                                    Filesize

                                                    12KB

                                                    MD5

                                                    14c91df21166f0248f656f581f71346b

                                                    SHA1

                                                    388023c999655db5b6376ad512c9898cfd80abac

                                                    SHA256

                                                    91acc62c649b75043387c4b204d764985422878d74b48d64bb4d143d010fd4a0

                                                    SHA512

                                                    aec9903ac245a5d0e37583e504665c8cd529feed613bed767d4aba9a4c970a92080312c55bd5ab39dea4876aabca705f81d88ba6ac52e2601b2e5bed82b92cf7

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\prefs.js

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    3e5ebe2778406f8e3f7eefb7a6fbb8c4

                                                    SHA1

                                                    1dc75a6cb9ae57deb77bf80a6a972e433a54eeaa

                                                    SHA256

                                                    96c398fa4ab5149bc23026724f61ab4450a429bc9cf27707050b38ea3a69e5e9

                                                    SHA512

                                                    b87d989264421977210738b264a991666f12da65b92e132ea192eef533c1dae600ae51e9450059780062d91db30e280ad8bc016404271ee92db3a5ab4108bf91

                                                  • memory/2364-3313-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2364-3335-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2364-3363-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2364-3338-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2364-2665-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2364-3324-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2364-3252-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2364-3273-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2364-3275-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2364-3374-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2364-3311-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3956-2664-0x0000000000740000-0x0000000000BFA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3956-2594-0x0000000000740000-0x0000000000BFA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4604-24-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4604-20-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4604-25-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4604-28-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4604-27-0x0000000000B41000-0x0000000000B6F000-memory.dmp

                                                    Filesize

                                                    184KB

                                                  • memory/4876-3253-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4876-3258-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-787-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-3251-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-22-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-21-0x0000000000B41000-0x0000000000B6F000-memory.dmp

                                                    Filesize

                                                    184KB

                                                  • memory/4940-3312-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-515-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-16-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-2666-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-23-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-3274-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-1805-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-3362-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-3337-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-518-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-520-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-3310-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-3373-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-477-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-3334-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-3323-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4940-519-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5056-18-0x00000000001E0000-0x0000000000699000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5056-0-0x00000000001E0000-0x0000000000699000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5056-1-0x0000000077214000-0x0000000077216000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/5056-4-0x00000000001E0000-0x0000000000699000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5056-3-0x00000000001E0000-0x0000000000699000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5056-2-0x00000000001E1000-0x000000000020F000-memory.dmp

                                                    Filesize

                                                    184KB

                                                  • memory/5180-3343-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5180-3339-0x00000000001F0000-0x00000000006AA000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5440-3344-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5440-3341-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/6532-1804-0x0000000000400000-0x00000000031F0000-memory.dmp

                                                    Filesize

                                                    45.9MB

                                                  • memory/6532-1120-0x0000000000400000-0x00000000031F0000-memory.dmp

                                                    Filesize

                                                    45.9MB

                                                  • memory/7020-3255-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/7020-3256-0x0000000000B40000-0x0000000000FF9000-memory.dmp

                                                    Filesize

                                                    4.7MB