Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 03:32

General

  • Target

    3fe86f16a2d125df9cbc70c53e29395fcbbfbf93830a4706cef8a67fbdb93232.exe

  • Size

    1.8MB

  • MD5

    09e01863cce03edfae832f8919a5333f

  • SHA1

    d0b8e0d222dce89cc49a8bfab16485155a51fd55

  • SHA256

    3fe86f16a2d125df9cbc70c53e29395fcbbfbf93830a4706cef8a67fbdb93232

  • SHA512

    2edb30a7b1969fb4122a11165ae6d696bcc79f277255cd25f492d2e5c40cda83be12b0f2d066a8027cbe7bfb14c80cf912c4898f3431e30610c4439cbc7a3566

  • SSDEEP

    49152:iWT505B8VxdCAbn9oVi5rOgaTQogVWBaC38Jefg:iq5teAbneVS6g0yWBaC3we

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fe86f16a2d125df9cbc70c53e29395fcbbfbf93830a4706cef8a67fbdb93232.exe
    "C:\Users\Admin\AppData\Local\Temp\3fe86f16a2d125df9cbc70c53e29395fcbbfbf93830a4706cef8a67fbdb93232.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Users\Admin\AppData\Local\Temp\1000020001\5b358c2158.exe
        "C:\Users\Admin\AppData\Local\Temp\1000020001\5b358c2158.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1356
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\ACBB.tmp\ACBC.tmp\ACBD.bat C:\Users\Admin\AppData\Local\Temp\1000020001\5b358c2158.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3228
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
            5⤵
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3660
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff82b8bcc40,0x7ff82b8bcc4c,0x7ff82b8bcc58
              6⤵
                PID:2484
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,8913291294184765867,18016101835761131114,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=1916 /prefetch:2
                6⤵
                  PID:4832
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,8913291294184765867,18016101835761131114,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2168 /prefetch:3
                  6⤵
                    PID:3484
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,8913291294184765867,18016101835761131114,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2216 /prefetch:8
                    6⤵
                      PID:3608
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,8913291294184765867,18016101835761131114,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3128 /prefetch:1
                      6⤵
                        PID:5556
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,8913291294184765867,18016101835761131114,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3176 /prefetch:1
                        6⤵
                          PID:5568
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4544,i,8913291294184765867,18016101835761131114,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4460 /prefetch:8
                          6⤵
                            PID:5900
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4560,i,8913291294184765867,18016101835761131114,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4716 /prefetch:8
                            6⤵
                              PID:5968
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=220,i,8913291294184765867,18016101835761131114,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4728 /prefetch:8
                              6⤵
                              • Drops file in System32 directory
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5156
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
                            5⤵
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of WriteProcessMemory
                            PID:3920
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff82b7746f8,0x7ff82b774708,0x7ff82b774718
                              6⤵
                                PID:2196
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,16893991891265978168,14935966016254580422,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
                                6⤵
                                  PID:5028
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,16893991891265978168,14935966016254580422,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3
                                  6⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2080
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,16893991891265978168,14935966016254580422,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:8
                                  6⤵
                                    PID:4136
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16893991891265978168,14935966016254580422,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
                                    6⤵
                                      PID:1164
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16893991891265978168,14935966016254580422,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:1
                                      6⤵
                                        PID:4708
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16893991891265978168,14935966016254580422,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:1
                                        6⤵
                                          PID:5376
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,16893991891265978168,14935966016254580422,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4412 /prefetch:2
                                          6⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5432
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
                                        5⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:3448
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
                                          6⤵
                                          • Checks processor information in registry
                                          • Modifies registry class
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of SetWindowsHookEx
                                          • Suspicious use of WriteProcessMemory
                                          PID:3672
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1948 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {68de708e-c651-40cd-a6cd-e4b5365d79ad} 3672 "\\.\pipe\gecko-crash-server-pipe.3672" gpu
                                            7⤵
                                              PID:868
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {562f2e92-6854-4e0d-9dee-a17a19796d23} 3672 "\\.\pipe\gecko-crash-server-pipe.3672" socket
                                              7⤵
                                                PID:4404
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3048 -childID 1 -isForBrowser -prefsHandle 3064 -prefMapHandle 3140 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {445bf90f-b79a-4613-993d-361568b45fe8} 3672 "\\.\pipe\gecko-crash-server-pipe.3672" tab
                                                7⤵
                                                  PID:2324
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3504 -childID 2 -isForBrowser -prefsHandle 3496 -prefMapHandle 3492 -prefsLen 22693 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8a9c4bcc-8a9d-4b70-ad1f-bcc25b7a0b65} 3672 "\\.\pipe\gecko-crash-server-pipe.3672" tab
                                                  7⤵
                                                    PID:5248
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3640 -childID 3 -isForBrowser -prefsHandle 3644 -prefMapHandle 3652 -prefsLen 22693 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9debdb48-5deb-4047-b2f3-3f8837e8e258} 3672 "\\.\pipe\gecko-crash-server-pipe.3672" tab
                                                    7⤵
                                                      PID:5168
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3896 -childID 4 -isForBrowser -prefsHandle 3816 -prefMapHandle 3820 -prefsLen 22693 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {94ea1817-b82d-40df-993c-0c547b42a248} 3672 "\\.\pipe\gecko-crash-server-pipe.3672" tab
                                                      7⤵
                                                        PID:5220
                                              • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
                                                3⤵
                                                  PID:5196
                                                • C:\Users\Admin\1000029002\689b49b11b.exe
                                                  "C:\Users\Admin\1000029002\689b49b11b.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:5844
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 5844 -s 1364
                                                    4⤵
                                                    • Program crash
                                                    PID:5768
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:2984
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:5168
                                                • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                  C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5176
                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                                                  1⤵
                                                    PID:5672
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                    1⤵
                                                      PID:4884
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5844 -ip 5844
                                                      1⤵
                                                        PID:5388
                                                      • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                        C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:1992
                                                      • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                        C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:1028

                                                      Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\1000029002\689b49b11b.exe

                                                              Filesize

                                                              2.4MB

                                                              MD5

                                                              13eee6247b33baad8ebe94616c643e19

                                                              SHA1

                                                              f2fcfa779eb774e301e233e6ed78269295cec8f0

                                                              SHA256

                                                              fd81bd2ceacb5605548f0bf2ba0b67da7829ebe3be375cab39154daf23709df2

                                                              SHA512

                                                              e919df651ad6337b5ef764d1a3cd1353f520347bfd757768dbf3b9ead5176a69098f9d76752800247783c09bf8f0fced97843aab2622c1d5e08644bb4babb317

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                              Filesize

                                                              288B

                                                              MD5

                                                              f4acc6d0aab71aec6186473a2ac3426f

                                                              SHA1

                                                              b5d6b1ba1978373689699d87b3841a806321d6e0

                                                              SHA256

                                                              d6570dc98d77d29792a912aef168ae350947eb842d4b043f13f1829ac5d8afd7

                                                              SHA512

                                                              4dbb8f4da22a6c6455981c9d303958b6c82a73a8c68e6de8fc8b9f637e7884942e87320562f1897a15c2f93b10a7af2670d175f3402beb178b66c639865ca47c

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                              Filesize

                                                              3KB

                                                              MD5

                                                              881a79bfe58d16caaebb0a9ea7b92da4

                                                              SHA1

                                                              ee6b156a74fbb0762d344036db70f3ce4323e3c3

                                                              SHA256

                                                              0a086bcecb8480babc9ee27d0678abe90315a576cffeb42098944d066a7c21b1

                                                              SHA512

                                                              f979d241d645eeabfc81628a661f01c6ae3133eeb0638532a7ea8c6aceca53d496c8b8a9cc81e411f1a5454c42c4decd039199a8a945a91d09a532a85ff5076f

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                              Filesize

                                                              2B

                                                              MD5

                                                              d751713988987e9331980363e24189ce

                                                              SHA1

                                                              97d170e1550eee4afc0af065b78cda302a97674c

                                                              SHA256

                                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                              SHA512

                                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                              Filesize

                                                              524B

                                                              MD5

                                                              8cab1b1b904c6144d38c77bc698cc411

                                                              SHA1

                                                              e8d6ca6f9b45e1787d94e5a4ddd92245911867b6

                                                              SHA256

                                                              801267ab9d9cc2660c33bf344fb24d8a06e2d2849757d2e94ce17a33a57e709a

                                                              SHA512

                                                              2736167c3bae8b2b98d24be755e91dc17067c938b226ccb872c263c0871315468c05e348b04a028fb1a15410cde3a55117672e34784554481e980f58bbaa7cb2

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              e3e50bc6106f125fe0836b8e4d0c844d

                                                              SHA1

                                                              98e2c0d68435884b72012883cfe0f75fd457cf66

                                                              SHA256

                                                              978012caf9b9eac8061ee26bc3470d74e926c29041fe95e83f1bd53feb1ecfe6

                                                              SHA512

                                                              bde9d9c40c00b7e2a6ca1eb698eb4200937f89e55495d0922ab78e49a6b99654cdf00df733d0e2e84d90bc83a4e4e812c3205e184597a98339293267ef5670ec

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              d992be088550b40e065f6d80b68f4fdf

                                                              SHA1

                                                              0f910f43e27942ad8423963a0dc9f18686cdea34

                                                              SHA256

                                                              5a44805a33089be70dc05bf666e905915fdb90ecc0495449bf0c51737aa5442c

                                                              SHA512

                                                              08a0c107f031625ec7109ab849d5d8045c47724693b0ca97d5a9b4d4e0afa7c1ad70bc0f180436dc10191afc86dd842c8f5aed233f77accf572b7d2bf1789d09

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              b59706f420c5d57f04466f80d670443b

                                                              SHA1

                                                              ae31eea6a1165a988247cd3314a60375b3e5ab85

                                                              SHA256

                                                              1868379f7b8eb56f53346f9943125c0d3431e430cd7dc54d3a3aedf2764c3a69

                                                              SHA512

                                                              afafc959d8edf8c504a27febef52af1c7b43c75ad397cfb55534f2607559927bfd77b1f0c16f5755c4dab32e3baa3b29dd3179493fd216407cccb063e9bfbfb3

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              a2aa94b05a20adaaaa1dc987116b074a

                                                              SHA1

                                                              0e1ff659aef866279dcb67b20f1c85327b323b63

                                                              SHA256

                                                              9987e570e856fa111ac4dcc2d2a3208ea09aa2e8cb5088c5beb843fa85d47f40

                                                              SHA512

                                                              4ec5583a30ec95a30001c9546d30428cefbd0fb3cc65463d37aa20eddc13b0a788829be59c49f802a705cf142c29eb3fcc295664df98c78ff7a940013ccdbbd7

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              89992292ff049a9b9c6fcf213f1eda32

                                                              SHA1

                                                              630ea25dac0e5fe3688211db8de5c29f1ab01bf0

                                                              SHA256

                                                              df9ac582261755d3a573f8e6c32d92918ce6b67f578701c4a4cf39ec2ca03b43

                                                              SHA512

                                                              51bc0175ce994f90242de448f7ef14c97a38626000077875dcec92076c6fd81d00ea152ac5aefe3d7b4c64d11e1408c6bc7a68f2870d9f0ec7cf1eb86f03be36

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              e65ffc6904aa02bcca50aa8aa22f9082

                                                              SHA1

                                                              b7cce42c6d20a1bcb0c65d2a6c317b623b1272a2

                                                              SHA256

                                                              7600bcb97a4c9521f8646573aeff36f85484eed32b61747d3c272ff4be68223b

                                                              SHA512

                                                              6447ba6e08633fb4e7a4fcb968bcb0df9dbbe57c40d92eb361ce03d5f4656fa33ea5feb5d89c47c00fdd07ca869c5ee45ab168aefc1e467d4d27674de98f44a4

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              d871a1df0b7a5dea5934c2c93cab94d8

                                                              SHA1

                                                              44e1648e7b95fa52f15887b44e38b0c8e42b5bd4

                                                              SHA256

                                                              6986aa6d9aeaed48661e782e9bfdc1753c259aa2a09e6a03aeaec780f588c1b0

                                                              SHA512

                                                              ace87601c64e6be7aebd2beb739ce29d00d04a13710e2ee12b42aa8ba89698fd38bdb3c943b7939968a5e3ae993b01e7bad658e40863b758903da39d2058e8b2

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              cb3741b9853289f1c1e369b732ace801

                                                              SHA1

                                                              e2d43a128d9251bad0760364049267679bca63d6

                                                              SHA256

                                                              0e9c9788d1dec31eae264ac5cd54a8e607e7b98807d2f318ce820e64dc6a5160

                                                              SHA512

                                                              a92d2fc2b2949f6782a7aefef4ec236e613c7e4e5e8c1495ac87105b6a9d0cad65fafbece9f4a185962b84d673f681ef6bada3e7e8820309e9e825cf5a8db5de

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              3466e1a05ab480c90b8fb6fda67365ab

                                                              SHA1

                                                              e74c110729d83ba4d5557c32ae504b8eda80e0b2

                                                              SHA256

                                                              a193363316ffdeab56de701ef1a5eb6f42eff1216d69bd87347f2e22fb230b0c

                                                              SHA512

                                                              f7ada3c1e020383d42b456da08aabbda5bc246d2aa72cba827c0a556562254d4fbf917423ba15ebaf717f52b698885d6f52db2c689f0757f3fc83afbec9d174f

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                              Filesize

                                                              15KB

                                                              MD5

                                                              388373434a376abe5862fbc390d7cba5

                                                              SHA1

                                                              e9cdfd5dc27e8d5801d070ce212649b5574d1015

                                                              SHA256

                                                              811ba734df1a5484f0cb1b834ebffcc70d91980bc457659f354cadab7886a40f

                                                              SHA512

                                                              10aed2030af99d8c8f0167172b2d945f1d8d4ce6a983f365500a2b90f4ee0569ebd20924af33debc91509f97d151290799eaa187c3438c2a406c2116e1bdafff

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                              Filesize

                                                              196KB

                                                              MD5

                                                              532b645abf699858de5dadec0fc8c16a

                                                              SHA1

                                                              97906b80ec128237f2b76855fde8408f8d49fa4b

                                                              SHA256

                                                              dfa836f233e5fd0a351b63120e55a84185899593734bb95feb839fdb819adcee

                                                              SHA512

                                                              d7ed96f13ab68abbcc956b7964391622ac14b500e47fc784c801232c5d59bd38e14c3693ecece759cbca947163b80a44357903349a0d088b2089273839acf9d3

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                              Filesize

                                                              196KB

                                                              MD5

                                                              7b868383879046f1c5f08ecd3728a435

                                                              SHA1

                                                              eabb42d101c311f12ed40dcc8060fb766a633dbf

                                                              SHA256

                                                              dc70445fbc752bd3d889847c218008e3b80ba2a0402593c4f4992ff864f80d03

                                                              SHA512

                                                              8219cd1ee8dbd1ec3536619641c05efc47b311b430fa6abf2490d8639f1c3600adaae92008c699b5fdfb6511c144b27c075c78573341d612461b92e6de76909c

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              152B

                                                              MD5

                                                              a15dea0d79ea8ba114ad8141d7d10563

                                                              SHA1

                                                              9b730b2d809d4adef7e8b68660a05ac95b5b8478

                                                              SHA256

                                                              0c4dd77399040b8c38d41b77137861002ef209c79b486f7bbdb57b5834cd8dbf

                                                              SHA512

                                                              810fc1fb12bceae4ca3fad2a277682c2c56f0af91a329048adbeb433715b1f707927274e3e4a4479222f578e8218663533440c71b22c49735a290f907cc0af1f

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              152B

                                                              MD5

                                                              506e03d65052f54028056da258af8ae6

                                                              SHA1

                                                              c960e67d09834d528e12e062302a97c26e317d0e

                                                              SHA256

                                                              b26d2695dfe8aed4d0d67d11b46d4542c3c9c8964533404dfe32ce7a3e6cfb98

                                                              SHA512

                                                              15da55267433c41febebbe48983023293c6d436f89a56138cef1cea7deb5cdd7d4bcf58af12835e1152a8ec59e08cfc965e521eb54eed47fe44e1f4c2d1557a4

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4d8eeabd-12ab-4046-8fdc-7444650e50d3.tmp

                                                              Filesize

                                                              111B

                                                              MD5

                                                              285252a2f6327d41eab203dc2f402c67

                                                              SHA1

                                                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                              SHA256

                                                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                              SHA512

                                                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                              Filesize

                                                              216B

                                                              MD5

                                                              84e0f8dddb584bcc37208e52051d3009

                                                              SHA1

                                                              49eaa7f9dc5622473c8538b0eb14226d4895a400

                                                              SHA256

                                                              f63d6f2cd9512547b701baed71d92032656c2e10ff89845bcd1e792e8c26253f

                                                              SHA512

                                                              be467de09009fb99e6a8aba8795d9e0adf7e101b3aef9d7b4be101922f2ad71cf7ce90539a11fd5290e5897515e89ab4cb29c2294589fdf61d536ca7283b21d9

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              86efb792159474f85b980412473aa3b1

                                                              SHA1

                                                              c8024431f8912ebacbdffe0f7c28314227c30e4b

                                                              SHA256

                                                              3e5c88aa98c649d80b8c7da088da2a742039a89bf77b32002dbce51d35e9e7bd

                                                              SHA512

                                                              a64792e72680d399788baf2aaa8b3f529b7cafcc6b947f98da05e72d3d2bf8affef224584b3ece9c9e2c807cd44bfef48b8b7d7a8abd5992ae88de4178676d2d

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              3b40280bb7a11d66f403b1e97ae2a3ca

                                                              SHA1

                                                              4e939f2073dae4ea066e21ebe50b9d1e63d68f40

                                                              SHA256

                                                              17a6f5278032ae01fa928c63d2f50739080a93a7c9e5e5c18dc55d685a1664c8

                                                              SHA512

                                                              c2881f97f66cbeb9009a122f504098fb426b316855d68d4c27b105192720fffd764b9e8972d83afc44bebad20907345ec1296f800a9ee49a38745c5cbd4dcb31

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              0a1f6cf0e80f82c3b710ee6b837aee24

                                                              SHA1

                                                              a1b9880eeeb0be705acd9a1f784290bec108e6ed

                                                              SHA256

                                                              8548774cb7ca319ba99bfc1cdc25bce4411996ba6d5a27d45ef08b744d9242b4

                                                              SHA512

                                                              436aaf7f73d691fb907810bd37d5488d633ddb24c229c4c1c940061dd3bbd23c5291447060a4d1a090d7ffbd0f3d347335c27d34d18d9b94d23815ee5aed4803

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                              Filesize

                                                              10KB

                                                              MD5

                                                              635d18215af6d16006260aa193602a03

                                                              SHA1

                                                              1605865f206c6ac6f421436f60369ffdfd90a716

                                                              SHA256

                                                              eca83bfa68a61dfee7f608137adbfeb14b8f5b6a1faedc186d6f6b1269afd965

                                                              SHA512

                                                              cc4082e6ab6e6b880fc7290fe9b7471b840a14f4df7a7c6a82b891a79e340d5bae71dc466b7e75c379b695d8a705db457764ef5dd10f4e01aa3e2e4389d0ef0f

                                                            • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              09e01863cce03edfae832f8919a5333f

                                                              SHA1

                                                              d0b8e0d222dce89cc49a8bfab16485155a51fd55

                                                              SHA256

                                                              3fe86f16a2d125df9cbc70c53e29395fcbbfbf93830a4706cef8a67fbdb93232

                                                              SHA512

                                                              2edb30a7b1969fb4122a11165ae6d696bcc79f277255cd25f492d2e5c40cda83be12b0f2d066a8027cbe7bfb14c80cf912c4898f3431e30610c4439cbc7a3566

                                                            • C:\Users\Admin\AppData\Local\Temp\1000020001\5b358c2158.exe

                                                              Filesize

                                                              89KB

                                                              MD5

                                                              e79982f20b14a98a0f7d8a56a2ff8849

                                                              SHA1

                                                              76c42ae1a0268a9b2cf4d62a83a9c14762ef2a90

                                                              SHA256

                                                              2807f731d05af9d345790484853aae47dd3485e51a6b8a340c3834cd47962b71

                                                              SHA512

                                                              f5d06c06cce01b9b9f96dfaabf333c381984b695759e7b7ad5a4844056a8600d958b2311879e0a4a218ee10c2afb3c69164275616648b28845e3eeeec49d1679

                                                            • C:\Users\Admin\AppData\Local\Temp\ACBB.tmp\ACBC.tmp\ACBD.bat

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              de9423d9c334ba3dba7dc874aa7dbc28

                                                              SHA1

                                                              bf38b137b8d780b3d6d62aee03c9d3f73770d638

                                                              SHA256

                                                              a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698

                                                              SHA512

                                                              63f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401

                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                              Filesize

                                                              479KB

                                                              MD5

                                                              09372174e83dbbf696ee732fd2e875bb

                                                              SHA1

                                                              ba360186ba650a769f9303f48b7200fb5eaccee1

                                                              SHA256

                                                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                              SHA512

                                                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                              Filesize

                                                              13.8MB

                                                              MD5

                                                              0a8747a2ac9ac08ae9508f36c6d75692

                                                              SHA1

                                                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                              SHA256

                                                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                              SHA512

                                                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hdqbpzf1.default-release\AlternateServices.bin

                                                              Filesize

                                                              8KB

                                                              MD5

                                                              7b473d33af3fa76996659840e92ae894

                                                              SHA1

                                                              fa9a6c075ef881d145e4c353185e0072749ec359

                                                              SHA256

                                                              e62ac0ff1b7aaf8b676342cf2d01de334d53bf4d68ef7cb73b321a8381296b63

                                                              SHA512

                                                              13bcf8d8ba5bb7e142a9e8a7b4713a3a1532aac60ae0c15e6fd13e6248ec494cd853c2707dbc3f9ffc0d2dd4179648e6100de36a6b8b57f2e86a2b326eefcb05

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hdqbpzf1.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                              Filesize

                                                              1.1MB

                                                              MD5

                                                              842039753bf41fa5e11b3a1383061a87

                                                              SHA1

                                                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                              SHA256

                                                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                              SHA512

                                                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hdqbpzf1.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                              Filesize

                                                              116B

                                                              MD5

                                                              2a461e9eb87fd1955cea740a3444ee7a

                                                              SHA1

                                                              b10755914c713f5a4677494dbe8a686ed458c3c5

                                                              SHA256

                                                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                              SHA512

                                                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hdqbpzf1.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                              Filesize

                                                              372B

                                                              MD5

                                                              bf957ad58b55f64219ab3f793e374316

                                                              SHA1

                                                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                              SHA256

                                                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                              SHA512

                                                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hdqbpzf1.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                              Filesize

                                                              17.8MB

                                                              MD5

                                                              daf7ef3acccab478aaa7d6dc1c60f865

                                                              SHA1

                                                              f8246162b97ce4a945feced27b6ea114366ff2ad

                                                              SHA256

                                                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                              SHA512

                                                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hdqbpzf1.default-release\prefs-1.js

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              bf750ea071f098d889e3fbb1f49fa81d

                                                              SHA1

                                                              b4373d2240d50703afebb59cc9f01f733f58c067

                                                              SHA256

                                                              2aae62d52a99bb68b8bbc38c0dea144df7e8fba27f181a4e0764949b417b72be

                                                              SHA512

                                                              d565180d053b721b2235d111c48b0913f00811804bd91caf7aa78f2e93ec428c9959b8c7033b2252bb15b775b1659574511b21aa2b119f8f97453dcf9417239a

                                                            • memory/1028-435-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1028-436-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1992-359-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/1992-358-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-21-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-17-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-213-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-206-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-454-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-444-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-325-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-145-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-419-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-344-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-418-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-354-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-218-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-363-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-212-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-20-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-396-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-19-0x0000000000901000-0x000000000092F000-memory.dmp

                                                              Filesize

                                                              184KB

                                                            • memory/3020-247-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-397-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/3020-408-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/4052-16-0x00000000008C0000-0x0000000000D73000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/4052-0-0x00000000008C0000-0x0000000000D73000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/4052-4-0x00000000008C0000-0x0000000000D73000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/4052-3-0x00000000008C0000-0x0000000000D73000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/4052-2-0x00000000008C1000-0x00000000008EF000-memory.dmp

                                                              Filesize

                                                              184KB

                                                            • memory/4052-1-0x0000000077144000-0x0000000077146000-memory.dmp

                                                              Filesize

                                                              8KB

                                                            • memory/5176-78-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/5176-84-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/5844-164-0x0000000000400000-0x00000000031D7000-memory.dmp

                                                              Filesize

                                                              45.8MB

                                                            • memory/5844-193-0x0000000000400000-0x00000000031D7000-memory.dmp

                                                              Filesize

                                                              45.8MB