Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-07-2024 10:26

General

  • Target

    0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe

  • Size

    1.8MB

  • MD5

    c015c231f5d013a7031748f95129a969

  • SHA1

    27f74431dbaa7b8bd16a5ddc0b871da65ea62849

  • SHA256

    0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4

  • SHA512

    baf6f0d3752e49ad769325bde85129d803094ea42e9d9735eafb3f415014e6d2f07a977d8892fef85307bc80e0060f0ef3c364ef3b6d05a0d4324956723a194e

  • SSDEEP

    49152:AsoGdXqMpDQe+xIfJJzbTR4O8/t76/rhCDfpIrs:poGtqMpU9KhF6OB/rIDpI

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe
    "C:\Users\Admin\AppData\Local\Temp\0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Users\Admin\AppData\Local\Temp\1000020001\92445542c5.exe
        "C:\Users\Admin\AppData\Local\Temp\1000020001\92445542c5.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5084
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7C64.tmp\7C65.tmp\7C66.bat C:\Users\Admin\AppData\Local\Temp\1000020001\92445542c5.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:228
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4208
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffa574dcc40,0x7ffa574dcc4c,0x7ffa574dcc58
              6⤵
                PID:1020
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,2751649425852856136,6094888221654298944,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1912 /prefetch:2
                6⤵
                  PID:4164
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,2751649425852856136,6094888221654298944,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2176 /prefetch:3
                  6⤵
                    PID:2512
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,2751649425852856136,6094888221654298944,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2392 /prefetch:8
                    6⤵
                      PID:4812
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,2751649425852856136,6094888221654298944,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3176 /prefetch:1
                      6⤵
                        PID:7136
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,2751649425852856136,6094888221654298944,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3216 /prefetch:1
                        6⤵
                          PID:7148
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4672,i,2751649425852856136,6094888221654298944,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4692 /prefetch:8
                          6⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          PID:7036
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
                        5⤵
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:5108
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffa573946f8,0x7ffa57394708,0x7ffa57394718
                          6⤵
                            PID:3324
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
                            6⤵
                              PID:4076
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
                              6⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1008
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:8
                              6⤵
                                PID:4768
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
                                6⤵
                                  PID:4056
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
                                  6⤵
                                    PID:852
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2728 /prefetch:1
                                    6⤵
                                      PID:5864
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1226125016714314626,8481941408731505767,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2308 /prefetch:2
                                      6⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5496
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
                                    5⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:2492
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
                                      6⤵
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:3340
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1952 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 25753 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b73e80e-aad8-4aad-9892-35d89675b0d2} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" gpu
                                        7⤵
                                          PID:3264
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2400 -prefsLen 26673 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2674e359-01c1-4099-83ca-33b10c3ffe0e} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" socket
                                          7⤵
                                            PID:4280
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3220 -childID 1 -isForBrowser -prefsHandle 2840 -prefMapHandle 3052 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7fc6dc74-3eef-4f11-865e-18bf149629c2} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab
                                            7⤵
                                              PID:5536
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3340 -childID 2 -isForBrowser -prefsHandle 3236 -prefMapHandle 3252 -prefsLen 31163 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef26bea0-8760-4577-8de5-39d5daf35898} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab
                                              7⤵
                                                PID:5944
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4352 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 2812 -prefMapHandle 2788 -prefsLen 31163 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5c2c9f8-0207-472d-a34c-875002af0909} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" utility
                                                7⤵
                                                • Checks processor information in registry
                                                PID:5936
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5332 -childID 3 -isForBrowser -prefsHandle 5284 -prefMapHandle 5376 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d00a6794-b5e4-4eff-aaea-f7d7c4a9faf6} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab
                                                7⤵
                                                  PID:6208
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5580 -childID 4 -isForBrowser -prefsHandle 5660 -prefMapHandle 5656 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f2ba3932-3704-42df-a876-d9a5238f6e7b} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab
                                                  7⤵
                                                    PID:6240
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5772 -childID 5 -isForBrowser -prefsHandle 5852 -prefMapHandle 5848 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4d73a4e-5b59-4059-b0e0-bcf42284f94d} 3340 "\\.\pipe\gecko-crash-server-pipe.3340" tab
                                                    7⤵
                                                      PID:6248
                                            • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                              "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
                                              3⤵
                                                PID:3672
                                              • C:\Users\Admin\1000029002\bcf4995e7a.exe
                                                "C:\Users\Admin\1000029002\bcf4995e7a.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:4340
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 1404
                                                  4⤵
                                                  • Program crash
                                                  PID:7124
                                              • C:\Users\Admin\AppData\Local\Temp\1000030001\84d1226898.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000030001\84d1226898.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3624
                                                • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                  4⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:2540
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:5204
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:5524
                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                                                1⤵
                                                  PID:856
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4340 -ip 4340
                                                  1⤵
                                                    PID:7056
                                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:6108
                                                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4332
                                                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2300
                                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3224
                                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5240
                                                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5088

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\1000029002\bcf4995e7a.exe

                                                    Filesize

                                                    2.5MB

                                                    MD5

                                                    1d36135b5c0b59b965aa1ff8f8874a4e

                                                    SHA1

                                                    c699ce3e004181308e099dbb93fb3b84999bfc2c

                                                    SHA256

                                                    e26d7dabcf5095750d11407a9341af6c898034b75f9fff158cc4c4757ec9f51a

                                                    SHA512

                                                    d821fffb943189f13117338feb9fb535cf1378566a7f28bd6a5570d33839f91ae04b8eaa0ab7d3cfe35b57a71b5ad2938302e175579b7d38aeec8bdd2fbf44a5

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    264B

                                                    MD5

                                                    7f771e978a81fbad3223ec872de9df58

                                                    SHA1

                                                    d3460b7673a1e91fee4946cd26605bbf81e7efa7

                                                    SHA256

                                                    76f8b6986193fbca9db9c26fe8812d53151d0488237ae8422dcffcb992181962

                                                    SHA512

                                                    1748af0dcbf2c508782ed0f6086b9dc9f255fb3a983d64b2e667bae3a7f8b8b5e6c58ec9d04946f0507b35d39830ac13436fadc86e85975b58c67beb63438737

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    305d6b310daf8c4cc64603841755b063

                                                    SHA1

                                                    898bc9ccca3e3b45f8ed4221ab5cc90aaa5db05f

                                                    SHA256

                                                    b0dd75352f98e75fb8a3f7586715604a297204bd2e5c717b4b978d2debc53283

                                                    SHA512

                                                    164abd9fc5ec206c278d88346bc0c2dbdb4d2d4b3c9189244b20809c925575c36717caa4aed37a799427c21f0b94ce277dfe6b2a7c6f47d53cd57e38119e6fb4

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    acccf67e5da4042f368ef4ae250fcdce

                                                    SHA1

                                                    f5d22e035f7e8836a0452d36d3331c72c9818a25

                                                    SHA256

                                                    7eaa6ce6023954cfb0b527132d25cd79ea8c4ab6286dfd309409b315674d019c

                                                    SHA512

                                                    fa609692bc0289f4451f0a3b8d90f190996e8e8a7109cced22b1b498294c907be720479753c65e17555d3d6f6d4720719cfa0d6d5caa2027b464a215ffef2d58

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    99c83a330d6eaa51b1839d3d4efc3be3

                                                    SHA1

                                                    5bc39fcc5cfced93c73d48bba45a133413bb1e00

                                                    SHA256

                                                    c4e36554bae7ef90fda160fd090ecac0d150445ae873a9f6111893d68fa55860

                                                    SHA512

                                                    80f75787a981059feb37ba39cc034c554723c0a1df439eb5cbecaefe5de7b9218e52c30d9bf6b87272a8ea893de161886fd2a84cac8a582c490f08735b1a5502

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    25cae31bd8f49551ef6d99280c1ade0d

                                                    SHA1

                                                    b7dba5c6508653b2e4588023ad60e2db591f286f

                                                    SHA256

                                                    ef5283ae864d850af368e4bc69d9109d83b3012a5af3c31ed82fcc0eb67cd41f

                                                    SHA512

                                                    5878bc5e633a6d372b719f8c8cddc97cb9544c444058de163454d0875bffc8436072151c349a9aa343cca86475fc49f4a866084edd4b908ebcbdc027b7755d79

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    918449c5755f5cbe1811902b4879ee01

                                                    SHA1

                                                    3644c4326262c26d8da02c5f8d2eda0089a32a03

                                                    SHA256

                                                    896e3a5100a1fb7eb97b151357e1a998ec1cd6cbbb152f497c855f4c5f77b521

                                                    SHA512

                                                    6fdb0e86cb925feb44ed76dad7a6fc55dbc74160889188d3ad91fa329207a4fee4cf3ee22ba621e98735db71f8dc5d8448bdd8db2f3cabc400f767fc65c45a24

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    a0edd035d68f6915fc07af3273f9e7ba

                                                    SHA1

                                                    5854c612acdc639dab2d83d6f1c2ce3014721b3e

                                                    SHA256

                                                    37a0bf84a022f04499e162510e35d5e51de0d218b73ac9f0ec6809fd6edc26d3

                                                    SHA512

                                                    618dccf4ae34f5f5dec9a65e5fb3450ee865c0cfc1f5048e80a2ea30f37e3e381f0ff7bcd4130e3d459504897f053836c81b61d5e6edaf6cc17962185149cace

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    823cae64fb20967c21477a8329d6a417

                                                    SHA1

                                                    08c90cb068b18b0ea260b3492c733369cefc7958

                                                    SHA256

                                                    5af4f45742d662d92a3560376a055cb3edc57d5bf66404e83490435a062347e4

                                                    SHA512

                                                    eea1d5b891897fd8cdd74f539901d1b1974d1a4341548124b5f1a65c05050e0458d26a839bb6b93b20e8fba935c8853b5568b3ec3f1d5699c4ae8e1d9913d697

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    6121ddd93367bf633f6abcd8a46cd4c2

                                                    SHA1

                                                    58336f6ec58ddd7e612e2f8ffcb31c290403d17a

                                                    SHA256

                                                    27a81288fdca17ab33bcb529ff39465305daddabda103654e6eae1453b8f4e15

                                                    SHA512

                                                    1bb2fd8ed337711d01bd687210c23fd29424b6e6a0f694fcbe703bddccc7d7279304ea7ab9cec54e3c6d6681f9d3387f9848288c82fe672a70facd1c9c4878db

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    8930a6a83b0cae53cde418648b783b31

                                                    SHA1

                                                    72f1a8a759e4cfb08c50ffd3ddfaa04b9dd33343

                                                    SHA256

                                                    9190f1e4ca47d71dca28f6a4515c66c93b29e372fe60e70c917e98c2716d4d3c

                                                    SHA512

                                                    c05164e2f313361d77df6402a55338f17c533777534a822ffda9ee9b51a80742723a0325fa46f8076a5f50df056351e9b49b00be515de0f17ca5914f3df5ab03

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    92KB

                                                    MD5

                                                    6406db559bc97195268d355eaf777691

                                                    SHA1

                                                    bc145ec69e4862d4a5455936138a6b0e0cd15dde

                                                    SHA256

                                                    612921ab6c820ab5f5b5baac4323ba3a7fcd70a641a14924b569aaa10e63eb04

                                                    SHA512

                                                    b5384cb8078b4563da0fc3bfb8b828d58c371026aab29aab525510edc9803585239f420e6e302bf24dfa31af85dff81a64e79ca9de911e344d81f637f9c0f330

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    92KB

                                                    MD5

                                                    373736898fff68679a2390b02f237b6b

                                                    SHA1

                                                    3a1179bfc31721e772921113d53c763d7079450c

                                                    SHA256

                                                    c76f1d45f2734cca2628cd652f051ab345a5903c76f622c93f0a8c8342780272

                                                    SHA512

                                                    aa981a53a7a4b8995dedba25546726992f17ceb31d4ba514718d77af16c5686e873c5f26c6655c402a1af94c4f6bb7c72627aeb2f54c028c4800f0727586fb05

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    54aadd2d8ec66e446f1edb466b99ba8d

                                                    SHA1

                                                    a94f02b035dc918d8d9a46e6886413f15be5bff0

                                                    SHA256

                                                    1971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e

                                                    SHA512

                                                    7e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    2f842025e22e522658c640cfc7edc529

                                                    SHA1

                                                    4c2b24b02709acdd159f1b9bbeb396e52af27033

                                                    SHA256

                                                    1191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e

                                                    SHA512

                                                    6e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    216B

                                                    MD5

                                                    1d9fff03271424907dbfaac2bc3559b1

                                                    SHA1

                                                    a076c2d72f7b8a9bd65cba8b7229383df5720994

                                                    SHA256

                                                    06f70d4731372bf32558a9b82dc92b0a2e7e9f1d35680b2b3e47fe816704d07e

                                                    SHA512

                                                    c919fe9bb51026b978506dc04105b3eb428f40f6ca7dee2151c3ecf46dccb92241048437c163c4d92f7590d299fa6e25e25e962ba09bc27e9094d5e841e4daa4

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    903851ba29b42ee1cc30e0b5f33e02be

                                                    SHA1

                                                    6a5904c6be8e17d8c641a728896f24ae05e0b421

                                                    SHA256

                                                    bdc2bfe290da37118884fa6f80c4266b2c37de3f62cb143f35941e2d60a6881a

                                                    SHA512

                                                    4a2b778392a867650fda33fa16124ceaff828383e185a80d7f4c7919fab12408169b0ff2fd0774b0cace108b439cb011d861d901c6be4bcaacdf5087db9f3071

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    c7e6ecee0ede3ab7bcd1ebab167bdc04

                                                    SHA1

                                                    e6b1767d30d17518cc085cfdf64576f92efa3495

                                                    SHA256

                                                    a6cbada0fac4e159ba402a184ad8bcaca156e237e74a6b82ef3f07a28dc4aaa6

                                                    SHA512

                                                    9f25d2daec7a95b33c7356284e4319b770c96e70208f00d695f1111b6de96ee0a7ed8b6aacb668571e455a8bc71c9e235f79b2cfefc993f1a8faf79ba9d7f95d

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    e02f421ac40015f0aa8eee763b2cfc5b

                                                    SHA1

                                                    55b0d432a0875b8562b4f85da51021cdc2c85e3b

                                                    SHA256

                                                    cbc029061890cd7ad354c096f5bd3c6bbf16526a18c7692b7a56bd1a35d00dd4

                                                    SHA512

                                                    f583aec1d358015d59d69bd813acbf272a69971ff55841969b4680dac682f884aec49b02b4165b0cb01e5ad777cef21844d0dad0afd7460bfb617843e2a724b7

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    40e320d4b9d915a034de9ba7c6f68721

                                                    SHA1

                                                    c5beabe974650004e2f18ae1aad3322ec0e0b6bc

                                                    SHA256

                                                    bb7197325145705b983a02a1a624dc3b2546c00540123058a073c7a21fa71742

                                                    SHA512

                                                    c252abb5e48c6042bc081878ddeb16c18b35063806b936a75dc3a77ef483f2f528c7641de989cc5c58f6c501fdef48e4fca9c85bb41101c252c17cdf953ef1b6

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zirruo9e.default-release\activity-stream.discovery_stream.json

                                                    Filesize

                                                    24KB

                                                    MD5

                                                    94ab9d1aa30d1611f7ddf8b540016c2b

                                                    SHA1

                                                    06fea7653b4f916ce85582cc3b0f69c99396929d

                                                    SHA256

                                                    54f77da1168bcaf25bf96ddac1f4f8f3e5c1073dfac5cb8026310d38989bf0dc

                                                    SHA512

                                                    c0d4b72333fdbbff86b71134149f97dc326609479dfdc678d0dd45f130e0c36c66c42e753c6c40897f59776f39b612897b7af33fd8b644936495e400b9b8534f

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zirruo9e.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D

                                                    Filesize

                                                    13KB

                                                    MD5

                                                    3f201f62c57de620e65cf7c76014e44a

                                                    SHA1

                                                    442a222a9b13fe51ad56c371172b9e41fba7523e

                                                    SHA256

                                                    67a25aff5210a2d962d66ab392a824c15835e3812903a64bc2ccef1ff6b9d3c6

                                                    SHA512

                                                    24aa813fbe990b853e7d11607bcbca5fedda474d37eaf744e15659eab01fa0da2f44d62cbd9bc759bd3bb3ff962783ac557b0df0bcd5035da5ea90ed090d692d

                                                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    c015c231f5d013a7031748f95129a969

                                                    SHA1

                                                    27f74431dbaa7b8bd16a5ddc0b871da65ea62849

                                                    SHA256

                                                    0d558642cb8576c04cad2835209a1ee8ffd40061f985a8ba8ab4d4f45ada5ad4

                                                    SHA512

                                                    baf6f0d3752e49ad769325bde85129d803094ea42e9d9735eafb3f415014e6d2f07a977d8892fef85307bc80e0060f0ef3c364ef3b6d05a0d4324956723a194e

                                                  • C:\Users\Admin\AppData\Local\Temp\1000020001\92445542c5.exe

                                                    Filesize

                                                    89KB

                                                    MD5

                                                    bd7c3142fff42f65a90d694673662a57

                                                    SHA1

                                                    4355c8585fa4e7f0c0d2fb36eb33d671169866ba

                                                    SHA256

                                                    bd2fbe2d4b67cee1a265bd007f2e284361ab77815f670304d1a643bd9bf12a96

                                                    SHA512

                                                    ebfc23c5d78eaa705976393b641cbe7fd1006f22c31a1aa4e7450e1aed5fe5548fe4f31127be9af3668080c435c2d7e1fcca538a567a9f6eab98d484d2a72f4c

                                                  • C:\Users\Admin\AppData\Local\Temp\1000030001\84d1226898.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    26bcb02dc05d82acf18da769ea313906

                                                    SHA1

                                                    b0b98bafecf15a2042b585f72edd524256e5f6d6

                                                    SHA256

                                                    1693a2e2a9dec635eae38092d75637ea7fe71d380849b6d213adb8fba03735b0

                                                    SHA512

                                                    92ce97d129d5f7b5d5fff72ed43bda08e0141b7a33bb38ac2abf07d013d8ecc264491543c2e6ad14d7e9c5ee7f96bcc20e7ff03baba60b54c3b9a22876cb72b7

                                                  • C:\Users\Admin\AppData\Local\Temp\7C64.tmp\7C65.tmp\7C66.bat

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    de9423d9c334ba3dba7dc874aa7dbc28

                                                    SHA1

                                                    bf38b137b8d780b3d6d62aee03c9d3f73770d638

                                                    SHA256

                                                    a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698

                                                    SHA512

                                                    63f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                    Filesize

                                                    479KB

                                                    MD5

                                                    09372174e83dbbf696ee732fd2e875bb

                                                    SHA1

                                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                                    SHA256

                                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                    SHA512

                                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                    Filesize

                                                    13.8MB

                                                    MD5

                                                    0a8747a2ac9ac08ae9508f36c6d75692

                                                    SHA1

                                                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                    SHA256

                                                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                    SHA512

                                                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\AlternateServices.bin

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    816096366af8547216d397048d7a94d3

                                                    SHA1

                                                    6c77991f9ce049802f75829ba728e644785433e0

                                                    SHA256

                                                    0e3ab0f0fb852913a67d1730f1eb57d433f971ca0c2bee83026b27b00c22577c

                                                    SHA512

                                                    2cf4d70efad93f6b1a7d61e52d1652c5ca2acb44d92754111e0223d2fa881f44a50dc721fa00a1d2fcef16931a4a2983a4011e835b206b0ad79e79cee80fcd3f

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    21d44a627c3e017fa811a368590dce2d

                                                    SHA1

                                                    3f2ccd6d8d53c69d032de5e2a7a104606991a0c7

                                                    SHA256

                                                    3562c54bdaf686b9ea9650708a56024b9bae8224449ef941d934a02fbe5de919

                                                    SHA512

                                                    bd0d7809adb8d7f21af5ac5bdff8fe0cccf409e51a50e287564bf41b78d792f0fb6c24a2004a9de56d868af41a07a9023900c2a21c9489cb20b064da76c8c71b

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    e7cdd36b16deced11cf6cacdabc10edf

                                                    SHA1

                                                    c0d7ef8bae7c16b6fd041f511c66deb9b3005aef

                                                    SHA256

                                                    4ae9c91a0d5719bfaba6ac6f10160e7e147d6089ae7f5fbf743a822b299db7cd

                                                    SHA512

                                                    62c7cec526105a62ead2003f16993bca7bd33a3c385a27146cb60519ba9867522b5cc61a9f6fc32b2b337cc996fd74a6c63fbd98d6850a87b231158daeb511cb

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\pending_pings\000b01b7-4e26-483e-a8c5-c9813f481635

                                                    Filesize

                                                    671B

                                                    MD5

                                                    d4265f492c33987dc18dde1827898c8c

                                                    SHA1

                                                    ab0f0a631896d8588affcc4ab2d36b70148e0454

                                                    SHA256

                                                    f75aedce2b92932be380d123b4e906d873d234036d5ab6aa34d0ba9e118286d5

                                                    SHA512

                                                    e87ededdb58639f4220faac94fa4fb76decb5c7eb750b3a167f0f73f013f70610e82a51a1cdb40da545d7a504b1dd29eaf44d2a9ebc647bfd0c9ed3b3abbfa12

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\pending_pings\043e3e20-e64e-45a8-a3a3-a202b38e7c9c

                                                    Filesize

                                                    27KB

                                                    MD5

                                                    cda3270fbe5427a05f8a162f22214dc5

                                                    SHA1

                                                    bac40c6365795c78e8133252f53775780937bbbe

                                                    SHA256

                                                    37afdb182227db0c66d1f97c36d48d45bbab3282d7da586632588dfea2ba9d28

                                                    SHA512

                                                    26713d43812517032a28977f2a2c0f8c609def9e3904eb6f1565b8a42e893d63b168b00a4d0a5adf6d46c41a069342d203a7898974177bba15b74353f91f7f10

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\datareporting\glean\pending_pings\b369d34c-c9be-498c-bdfe-5f3784a2395d

                                                    Filesize

                                                    982B

                                                    MD5

                                                    c12f4b570272fd8d21cd1e3285856e42

                                                    SHA1

                                                    fc51fdbd177f91cc6ff956ff455a8347d0247d99

                                                    SHA256

                                                    2f35e177583efb2577b05ebfe65bb328b99fd44a8299264b44c4b96c5e8d0b09

                                                    SHA512

                                                    d66efbe3ff9a0513e48624c28f15b128bcd3e9e501335e29d1e2506c07daff11302e54d9885c469d682ca7f67e2e1b40c433708f927575d5692a86df5d907864

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                    Filesize

                                                    1.1MB

                                                    MD5

                                                    842039753bf41fa5e11b3a1383061a87

                                                    SHA1

                                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                    SHA256

                                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                    SHA512

                                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                    Filesize

                                                    116B

                                                    MD5

                                                    2a461e9eb87fd1955cea740a3444ee7a

                                                    SHA1

                                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                                    SHA256

                                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                    SHA512

                                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                    Filesize

                                                    372B

                                                    MD5

                                                    bf957ad58b55f64219ab3f793e374316

                                                    SHA1

                                                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                    SHA256

                                                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                    SHA512

                                                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                    Filesize

                                                    17.8MB

                                                    MD5

                                                    daf7ef3acccab478aaa7d6dc1c60f865

                                                    SHA1

                                                    f8246162b97ce4a945feced27b6ea114366ff2ad

                                                    SHA256

                                                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                    SHA512

                                                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\prefs-1.js

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    8cce3b62f4adde06161b798836440357

                                                    SHA1

                                                    9eb1dd06520ac7e2c2ecdef063ee6b93cdc15e83

                                                    SHA256

                                                    4e897e9a95e7943a438e56066c2ae774592a42e52ea692b635360640b542e229

                                                    SHA512

                                                    fa9e8a163e78717a0cf4972a0aa355ca6eb261ffd54d995c4d1a2cf93f030df5aea93c84e568724a8d2572f4f9a554028159f1b97b20ecf22379c637b051c4a8

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\prefs-1.js

                                                    Filesize

                                                    12KB

                                                    MD5

                                                    6ccb4e0f64916d84f02ca34eca3ee294

                                                    SHA1

                                                    f3ae533cb56ab129dcae2dba1aea3ad92231214c

                                                    SHA256

                                                    748d45ba5c1d3d6c3a9ff7e723eeb5f9999a14e1747a540722902e42cdfda4a6

                                                    SHA512

                                                    1827207b50c98b2c38ed8f2f516b7856964894f2c3b3788ccc27eb660fb32bca0d6cda68317132ea98a38f9c88e041d65112ac22f52819578682446c6e7c359a

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\prefs-1.js

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    c46cda3956b67ed25ca5475c4504ed0e

                                                    SHA1

                                                    1f817ce77489d1ad8c49f6ccd1ffcd8b4c1b939c

                                                    SHA256

                                                    d0857a4108c65ca6d84c5aeb33c3b4235e8589f7a595b617190b41946355dfc4

                                                    SHA512

                                                    e6bffb0506d6442b3d749cb196f24793423cb021af43c152cccc6b3b082c0fb3bd773634ce071803f1d352480f7054a2390be49883cffd3decf7cc50a9b64964

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\prefs.js

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    b06193dc99c6c95f4731062357a36966

                                                    SHA1

                                                    e4253147120b60121e326667b30b7a94a5759ecb

                                                    SHA256

                                                    d2a6a6434fcb168142dd1e78b2cf69e3d5e72c0e16135c612ea14107b7c79e1b

                                                    SHA512

                                                    b79f2992c5476badddfdd9075cde3948718d4572d5acdc7972e85887c4d2370e1979fdc4f260d43626a457d8ddc06ac40f8c1d6bdbc7d5ca09530062ac082214

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zirruo9e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                    Filesize

                                                    9.4MB

                                                    MD5

                                                    3c625444cb691d34bcc3a91174dfb0ad

                                                    SHA1

                                                    1237c967e2ff27c035a6af67f69e8f7f84763486

                                                    SHA256

                                                    3051b88fdffc5ae040f6b64c3d96ce173bb1b4b3af6fd24ca3b9d2910aac9000

                                                    SHA512

                                                    2fe2aecd6913de7bd48093baf550063ad744b0e950ccbb10d91222486c8b1cb630bce63e97cd52f0e6352de1313ca3a2b0df49d7e5cc4ae4271921e82dde78f7

                                                  • memory/1580-17-0x00000000002C0000-0x0000000000779000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1580-2-0x00000000002C1000-0x00000000002EF000-memory.dmp

                                                    Filesize

                                                    184KB

                                                  • memory/1580-1-0x0000000077BD4000-0x0000000077BD6000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/1580-0-0x00000000002C0000-0x0000000000779000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1580-3-0x00000000002C0000-0x0000000000779000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1580-4-0x00000000002C0000-0x0000000000779000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2300-3081-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2300-3077-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2540-3094-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2540-3092-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2540-3116-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2540-3047-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2540-3105-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2540-3146-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2540-2989-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2540-1020-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2540-3135-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2540-2384-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2540-1641-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2540-541-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/2540-3074-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-3073-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-21-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-1632-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-2919-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-854-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-3046-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-18-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-3145-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-20-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-19-0x0000000000E81000-0x0000000000EAF000-memory.dmp

                                                    Filesize

                                                    184KB

                                                  • memory/3000-726-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-3134-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-2227-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-3115-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-22-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-522-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-3091-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-520-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-3093-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-455-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3000-3104-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3224-3078-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3224-3080-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3624-540-0x00000000001D0000-0x0000000000682000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3624-523-0x00000000001D0000-0x0000000000682000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4332-727-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4332-747-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4340-505-0x0000000000400000-0x00000000031E8000-memory.dmp

                                                    Filesize

                                                    45.9MB

                                                  • memory/4340-503-0x0000000000400000-0x00000000031E8000-memory.dmp

                                                    Filesize

                                                    45.9MB

                                                  • memory/5088-3150-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5088-3152-0x0000000000E80000-0x0000000001339000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5240-3149-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5240-3154-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/6108-729-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/6108-749-0x00000000009B0000-0x0000000000E62000-memory.dmp

                                                    Filesize

                                                    4.7MB