Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 19:54

General

  • Target

    rama.exe

  • Size

    1.8MB

  • MD5

    6e5042ff1ec6df9aee18f4eea7864524

  • SHA1

    19e4eaaec31c8512b191138a439b6c4c7ba73d18

  • SHA256

    420a1ba2737e39704e52e1ea0c2494d8c232f10e2b40971923959da4708b3b0c

  • SHA512

    ac5c8537bfd0a509ab49911cdf180778e9e47f9f9fb600933b2ba03f939f9bc9834db5a106840382ee648b289cddaf69b55cf969f51b9f89c49c678f1edc202c

  • SSDEEP

    49152:2M3rvEOaXgE3YC8ZtDYYuyVcBUpxOePEEmeweNX9:24E9QiYC2DYscuEEmdu

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

c7817d

C2

http://31.41.244.10

Attributes
  • install_dir

    0e8d0864aa

  • install_file

    svoutse.exe

  • strings_key

    5481b88a6ef75bcf21333988a4e47048

  • url_paths

    /Dem7kTu/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\rama.exe
    "C:\Users\Admin\AppData\Local\Temp\rama.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
      "C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Users\Admin\AppData\Local\Temp\1000008001\ba193dea75.exe
        "C:\Users\Admin\AppData\Local\Temp\1000008001\ba193dea75.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4884
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B508.tmp\B509.tmp\B50A.bat C:\Users\Admin\AppData\Local\Temp\1000008001\ba193dea75.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password"
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1224
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffb87f3cc40,0x7ffb87f3cc4c,0x7ffb87f3cc58
              6⤵
                PID:3156
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1912 /prefetch:2
                6⤵
                  PID:2016
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2172 /prefetch:3
                  6⤵
                    PID:3360
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2448 /prefetch:8
                    6⤵
                      PID:2364
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:1
                      6⤵
                        PID:6532
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:1
                        6⤵
                          PID:6544
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4400,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4452 /prefetch:1
                          6⤵
                            PID:6952
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4612,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3548 /prefetch:8
                            6⤵
                              PID:6792
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4604,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4588 /prefetch:8
                              6⤵
                              • Modifies registry class
                              PID:6804
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1164,i,6531228770533235013,4650415913700039881,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5100 /prefetch:8
                              6⤵
                              • Drops file in System32 directory
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4912
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password"
                            5⤵
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of WriteProcessMemory
                            PID:3960
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffb87df46f8,0x7ffb87df4708,0x7ffb87df4718
                              6⤵
                                PID:2624
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,1244054373335832835,16960812577679184906,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
                                6⤵
                                  PID:3784
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,1244054373335832835,16960812577679184906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:3
                                  6⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2272
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,1244054373335832835,16960812577679184906,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:8
                                  6⤵
                                    PID:1140
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1244054373335832835,16960812577679184906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
                                    6⤵
                                      PID:3660
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,1244054373335832835,16960812577679184906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
                                      6⤵
                                        PID:768
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,1244054373335832835,16960812577679184906,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2328 /prefetch:2
                                        6⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3064
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password"
                                      5⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:1356
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
                                        6⤵
                                        • Checks processor information in registry
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:4320
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1960 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {97e43871-ab34-47d1-8379-1fd8a81b3b30} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" gpu
                                          7⤵
                                            PID:656
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21e1b5c1-9642-4049-9409-2e3f71f947db} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" socket
                                            7⤵
                                              PID:3612
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3096 -childID 1 -isForBrowser -prefsHandle 3276 -prefMapHandle 2744 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bfdbe9de-46aa-4982-a111-e1cf24c59123} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab
                                              7⤵
                                                PID:5224
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3636 -childID 2 -isForBrowser -prefsHandle 3644 -prefMapHandle 3660 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4269a8bc-b14e-484b-9d3e-4aa72fcc7a94} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab
                                                7⤵
                                                  PID:5472
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4752 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4768 -prefMapHandle 4776 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e410359c-7732-4ad2-a39c-d38fb32f44f8} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" utility
                                                  7⤵
                                                  • Checks processor information in registry
                                                  PID:6136
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5416 -childID 3 -isForBrowser -prefsHandle 5344 -prefMapHandle 5408 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {44fdc7cb-72e2-4d1c-afe7-eb0b33561188} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab
                                                  7⤵
                                                    PID:5616
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -childID 4 -isForBrowser -prefsHandle 5424 -prefMapHandle 5420 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {96440fdf-3029-4ba6-ac42-08672e9828e8} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab
                                                    7⤵
                                                      PID:3668
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5824 -childID 5 -isForBrowser -prefsHandle 5660 -prefMapHandle 5656 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b61d752-d89c-465e-b0a4-195d7bacf5c7} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab
                                                      7⤵
                                                        PID:6124
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6036 -childID 6 -isForBrowser -prefsHandle 6056 -prefMapHandle 6028 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {24b07f14-6281-4d09-8e29-7d031f65c86a} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab
                                                        7⤵
                                                          PID:6224
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:5192
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:5552
                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                  1⤵
                                                    PID:7016
                                                  • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                                    C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4764
                                                  • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                                    C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:7164
                                                  • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                                    C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3864

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    384B

                                                    MD5

                                                    c0b89babbf37ada25f3919f4d1db24f0

                                                    SHA1

                                                    115ea2339cc8f7e5e30ceb42cf04aae3a4872803

                                                    SHA256

                                                    f5fe2b81ff77c175fc6a08c0cfde79d396c811d7b1284dae0f0f6876f226b8bd

                                                    SHA512

                                                    e4b6b3cf04ea19ffba9c24faa999bf3aa1813d571b3c29986afebfdb3ff05c948f3ed92c299c8740b18d2e3b920956744b1c3292478aecd8cc2c9f925618c09e

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    803cbbf417bde4624a877dc53b98b6df

                                                    SHA1

                                                    ddb16c20cf257a917888a851d64f98e204c044bf

                                                    SHA256

                                                    d0793c010808228253934779e464d7c6a80789e5854376dbbc03702c8e2b3cd8

                                                    SHA512

                                                    3a9d9e645b8b1ee8957172efa02c98c9694f47dba87ee5dd0fa10672540d73f3cfa6975dce96014447b85018ad209524f8cf0f79a9ab486685809a4b7e1763d4

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    e526369b92cf1abaa3e50713edb11811

                                                    SHA1

                                                    bde3d0f1b8fb52a6b28b9de39b8dad59059f7acb

                                                    SHA256

                                                    f1c8e10fd365dd2d1b88d0422c5acfe74adc23efc61bf438b7d984aa05c86d4c

                                                    SHA512

                                                    b8ee4df48f66c1b36df6f8c590d795a146dcb061e1c2e941a40d3832049e0bcc829612d11ebdad6544d870e019dc19bb1ac528df5fefff133bf0ac1cb9b630de

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                    Filesize

                                                    356B

                                                    MD5

                                                    d64c92230f0b4c77dfcbaa168d8ab7bb

                                                    SHA1

                                                    ee9833530606d338cb1e021485e4aeb36b679576

                                                    SHA256

                                                    4dca360468953b35226fdbd295e6ade172df572629cb53da1631bc601d68d148

                                                    SHA512

                                                    b0dd1c05d546c09a5d474e01f78833f278e8c51e1ef5eb82089f7096106f4faaa5c47273642d6bd52a989240d8ec282da0d75ae4cde2ede6dd1bb783ddd2dd97

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    355aa6a0bc9ba52324c7653ac5f040ba

                                                    SHA1

                                                    9245e40886e8a3933bcafa9d3969254613e4bf20

                                                    SHA256

                                                    149a70f23fe1d266a8f1b0d709726baf2844d3232b5eca3a7cc0ff26fb93c1ef

                                                    SHA512

                                                    890f8082be8b8b532bbeea2f506eaf0e13ed2976a77f65518b105a54a80186c3170946b99b9bca34f53ee9ffd15b919f1b749a462418955f233024cde41e4438

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    adb210952e2bd87494e4b82a6c2e4acf

                                                    SHA1

                                                    f02116674e2dbf5d0f25e1dd2a0f988c78b920cb

                                                    SHA256

                                                    2f0a7b431281f7a740315535c18a88de24cddb77597f61bad85a0beeb9f07b0c

                                                    SHA512

                                                    94df0e4061d733b490ad0d30928939735df2a906a01e9a6f3a076598a69484b751624d9082bab7d1f46e3a2f4414a6ac8b5b4290a76156273b38c12321f9b6fd

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    911f4cd5c86f993eda739090faf12251

                                                    SHA1

                                                    38f0636c67099ecba861bc663da2805f39d17290

                                                    SHA256

                                                    c1648d8f17da5033e0812aaae179c962b0cf8f1e96780faba0bf8f7ce9065b58

                                                    SHA512

                                                    7fbe4e19e7ea9d6b5fd1af64bcdfeb3aefae857430a3159ea2641f18006e91359917fe63afd635f755052c3d6248bc43bff5d9ebb5f6b4518c6dfdeae1d3b6e0

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    4b3badcb55cdb2ea1efd426e73153e8a

                                                    SHA1

                                                    4cb64205d5263856341a73984903727ca0d475a6

                                                    SHA256

                                                    eb89afc41b5799a21e6982b1adfa1f6a94ca8ff51f4cce7062f5bca4ea9a9dfb

                                                    SHA512

                                                    42a6195da7ee3eb4d8348a11123c269a829df775a3e7c36df700ec688d3168f200e33239437a9da0a64c59ad6b29d3534e21dc990dec083ac2c81710b91cf76a

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    a4c841644281c0f6da51d1917b126959

                                                    SHA1

                                                    016a1dd07602915d1dea332085f14c99c3a2935f

                                                    SHA256

                                                    e2400b8f28f17999dc83e517efe919d3e2ab3278d1933a06c641e1d831e67343

                                                    SHA512

                                                    870e77a9041609420979ab233ddc8d00ea3c2403f103a36742e123a0d1f59b21e82b26d3bff54d7e43c9e007fe02b7fb215a5e83d5ee1b5b103fdd62f481a4c0

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    9e251c7653877a46f2d600dfb45c9c56

                                                    SHA1

                                                    1ff35648f805a916a1b8ceec8c5fc7638f69de02

                                                    SHA256

                                                    0bf27db24cf75c47ba1676c7ffa0c6806403ae3fcf749097fa5e40e3fa1dbf2e

                                                    SHA512

                                                    3f62c7e329dfc44e8457357233b5434443ac17a2484d115615fc12208c9207203ba41759b9568067946158bdbe1279ac64e0b19d47b90843cacaa54a9deef28d

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    c17b3743c5663f6278e443031e773e0d

                                                    SHA1

                                                    f14fc5daaad1a580b40a787f38c0057c3f9c58e8

                                                    SHA256

                                                    44bd34f6e7d3b3451eb5fb51e0b74105d75777d104db8b005873f0bff883a316

                                                    SHA512

                                                    41ee8c3556197dee4087c7e90af292b0739e6c2cc3f63b3a521ff13ccf6825a2df77e15273ecb0c676c54b93f5dbff67bedb1cdefe314dace3f0118e63a453c1

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    4497a55ca723905bd6c4404d18366aa5

                                                    SHA1

                                                    d6af30badfdc28a105232e21b8db74ccb2f80489

                                                    SHA256

                                                    394a15585ff86df0a1e00142a14791b38d809aff8c69738a90dea930f2988d81

                                                    SHA512

                                                    3612d10c15e020ede844452f3ccc854e9f0dd20752b7a4d34a9e765d341f5d6174f356c0a703a2af9af0247da4945e6b2443f9c424e0b8ace2be98231eeaaa1f

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    7bb8db4f42c6db350ae3f017efcb4fb5

                                                    SHA1

                                                    e6fe3b0e432d9e21843f9e5abcee524309ada31c

                                                    SHA256

                                                    dca29cfe894e04bde65405c43c89693ba21cebe268a2e9ac541b770b8b84be80

                                                    SHA512

                                                    d9452f28ee9f3c4debf6cffbe479e329e752ea9d42ce95302d992b7ac95b6bdabaa7daf1dad28212e3c569395b0586677048de58651817eef9d1bea6ab7433c8

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    99KB

                                                    MD5

                                                    967e807457fbd57a62414ff7d49c0339

                                                    SHA1

                                                    add565343c17da5ffc76ea71657dd9e9c6e153df

                                                    SHA256

                                                    9ac1202606dba2bfa7113825439eb436617a5402eba9b50f40c9ae37d79d5925

                                                    SHA512

                                                    9b6aeb6dda851d75416543199aac261d69e3aaefbb0ec76748b261fc61e4b75ccb0b0ebeb6e9ec63dd4b9c38aecb8f53f0c7a5a3b0c5fa89c02e61b8cc00ee8e

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    99KB

                                                    MD5

                                                    aa82b28e2b996eea75210f7c84736aa8

                                                    SHA1

                                                    ec4172b8ebb0dbc0ab0b73854b5101fbe79b6650

                                                    SHA256

                                                    4bf1ca2cb500d6fa6f93055ff2c03e7b1ea74fc529dc37db8c023fbc9a550906

                                                    SHA512

                                                    c8081ca18304c9f999d8470d9645d1b1355e6127c0ae201cd12b80a7dfc7d1470d41fbab9ab9a9be82a65eccf8d622651db31eb8778460c84e3fe6e4545d1252

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    e765f3d75e6b0e4a7119c8b14d47d8da

                                                    SHA1

                                                    cc9f7c7826c2e1a129e7d98884926076c3714fc0

                                                    SHA256

                                                    986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89

                                                    SHA512

                                                    a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    53bc70ecb115bdbabe67620c416fe9b3

                                                    SHA1

                                                    af66ec51a13a59639eaf54d62ff3b4f092bb2fc1

                                                    SHA256

                                                    b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771

                                                    SHA512

                                                    cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    336B

                                                    MD5

                                                    85e107dca95c5de7a3137b32068fe232

                                                    SHA1

                                                    a367052780817e39138acddf9b1c565008e52ce1

                                                    SHA256

                                                    6ff748d343273a1bd6c6910356797de92e264dbd66b89bfda96d6ec106e9e117

                                                    SHA512

                                                    22e51425a25c8b9eb96c7cd47e55abedd5889a1055ce903953d213e1df1a48a1bb6f246ced85db64fe595d58e60007ef28f20ef4525bfd5ca4c23a2b5158e8ef

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    6712911afdfdb6ce11e2ad9c5005f27a

                                                    SHA1

                                                    fe88f12a1452db9ce1d983b78c8f051ebf7ed516

                                                    SHA256

                                                    877b29bd0788c543cfb31fc5bf4950a3e6ad56f2ee67856925b3edf7349a6991

                                                    SHA512

                                                    2baa5dc55de8b872338029d534006cb7d645c70aee591b06cf88990c5800c55d2b10a596407ed08b0ebc7cd9df3691fd768f59eec6871009ae4f3f83875d637b

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    85c57964da463c1b97de9d527749db6f

                                                    SHA1

                                                    6361a41804ada71e354fc4ddf666b3c3e434e45e

                                                    SHA256

                                                    992eec34014324ca560b23b827515d6643babb8495705667505557b5f348ff36

                                                    SHA512

                                                    e72730e6d2b76795e29f9b477ca352457cffa492c7a054c375ad469d8953004dea40bb51f801bdca66e7a12d838c807e91fc2b428a9c8af9cde87d44c53d17b2

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    ef1a4479f324340ca2b37e485f9f9a57

                                                    SHA1

                                                    6bd5d46609f7e2b509b9a1d7c940cec6b49906e6

                                                    SHA256

                                                    b0c18f1320111ce0b7390a7edc572061ee23db4b6e8f46e70e39da6035acf3d4

                                                    SHA512

                                                    ed97e0e598ad0582062308225c1063eebd17e9985b38ff34e572bceb2dff56c4b044c394ae40fe2de110a879a119d4695cc9d4a43389dae343bb0a95795f8c3f

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    8371be9bf19a010f834cc237c86986b9

                                                    SHA1

                                                    c9d6daf44a66fefebcf5dd4baec31d2049bbd0b2

                                                    SHA256

                                                    c683873c8db7e18201555fada422c51b75d0da79f119bf3485ae594b8bd4a19b

                                                    SHA512

                                                    a0a3106b2ef260df38940ad7cf79ca3b94eb9f783e1f808c032515fcba73ebc92c990699bed50214188a3f490fe9d79348e1ff2a44a9fc3ee601d3d89ca6b272

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    d4443da0112233b40967d00dc4173448

                                                    SHA1

                                                    4cf9d1d16f9582f95f42c6ab30883003c2572564

                                                    SHA256

                                                    f285e14ea39b309cf3bfaf9cd0c6f93f23381aabb04a5dcd74f159b99a9b0b11

                                                    SHA512

                                                    538eb5efc9f84243e5bad20dc0e2c90ff40198b2fbcfc6a5df894433385149ea685a7e0405aedaf218213aa95b65fca395fe568bb9735524a9ca30ddd64a9e57

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bxumog7h.default-release\activity-stream.discovery_stream.json

                                                    Filesize

                                                    36KB

                                                    MD5

                                                    fc373f37ac1f5c4eba5036da93495fdd

                                                    SHA1

                                                    0693b850df7b259be044350c0a7e5eea33f1eaa8

                                                    SHA256

                                                    81fca07152c0ea7b0d3f4ff8019a017350bac75629a72f214878250b659bf2cb

                                                    SHA512

                                                    0d9a346b5bc0b6d97a2010d2456ebecf97f02d7520240fd809e5bace29d1442cc367bc165c9ea52f5334882827ea2eb405c37d45a92ca63ee805d55067026fa3

                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bxumog7h.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B

                                                    Filesize

                                                    13KB

                                                    MD5

                                                    298d471971e3aa2a4cc92894fea65e46

                                                    SHA1

                                                    b3685324838292c2dec0b61ca4b1b39815c89e54

                                                    SHA256

                                                    5c5e7a7610e47c55a06052efc3d4b113874fe0297431972629caebc238e21650

                                                    SHA512

                                                    9fe52d0ffc5affbadc9342bb9bd345b8ef5a02b289b11ce3c9635f2449ebbf578acdf363c15a870f62298df5f291faaadea8c17b11608b3ef6601153a55288af

                                                  • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    6e5042ff1ec6df9aee18f4eea7864524

                                                    SHA1

                                                    19e4eaaec31c8512b191138a439b6c4c7ba73d18

                                                    SHA256

                                                    420a1ba2737e39704e52e1ea0c2494d8c232f10e2b40971923959da4708b3b0c

                                                    SHA512

                                                    ac5c8537bfd0a509ab49911cdf180778e9e47f9f9fb600933b2ba03f939f9bc9834db5a106840382ee648b289cddaf69b55cf969f51b9f89c49c678f1edc202c

                                                  • C:\Users\Admin\AppData\Local\Temp\1000008001\ba193dea75.exe

                                                    Filesize

                                                    89KB

                                                    MD5

                                                    cc86773e8d2f2c3ade17e0b062aecddb

                                                    SHA1

                                                    5e7790ca0b918b8e74e4e85af0c08f81cb4ade0f

                                                    SHA256

                                                    51f4ab5d835ea80224cd5ceec0fcd7cbae80ffc1216b3da35c498cf4b01224cd

                                                    SHA512

                                                    9f5bc37e717063dd0758bbcd77789038aed67b191a0ff23ee6f408a08c9b9992f298643108ed148eacbaaf9322b65acc82f3737e3da664f7a44b96796a1b4350

                                                  • C:\Users\Admin\AppData\Local\Temp\B508.tmp\B509.tmp\B50A.bat

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    4ac6a9d9e192f54598f8b67cf299ea5e

                                                    SHA1

                                                    c3c63fc731603f581ab71bab7651a4d5112b04e6

                                                    SHA256

                                                    f1179bc15a8c644c353af64d6c6c3f13fd2d48eed2fb0b709a167185d2ed806e

                                                    SHA512

                                                    3ff1226c147403aa5afdc515f260849196dec92166273206256ce8437a98dc1dd3b2cf913861e7537ccf36d6bc53537bd49b600e9adb1671f4bdb3d6e3da23a5

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                    Filesize

                                                    479KB

                                                    MD5

                                                    09372174e83dbbf696ee732fd2e875bb

                                                    SHA1

                                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                                    SHA256

                                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                    SHA512

                                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                    Filesize

                                                    13.8MB

                                                    MD5

                                                    0a8747a2ac9ac08ae9508f36c6d75692

                                                    SHA1

                                                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                    SHA256

                                                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                    SHA512

                                                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\AlternateServices.bin

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    4c331b152e47f73dd50f09acc3661659

                                                    SHA1

                                                    cf5b26e20a10bc5c0527bb2fe76e733d7fbe340b

                                                    SHA256

                                                    85bdce7689c9bb17695cfd3e5ba5462c1bf8fc30b88ea41e5af0db0917cc243f

                                                    SHA512

                                                    f24f2bf2482e58ce37f99d72811dc4f31f349146087c6ef5bd0ced70996d67335fcdc0e637fb84dc7c1be66ec31399831a7a2fc8752db21d7963fc2cea89dcfd

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    a0145ac4c530762ec832120f0dc63b8f

                                                    SHA1

                                                    3162fe0474f0db4e6efd71d707069007f5c3784a

                                                    SHA256

                                                    2f981b4afdf95c7fb75ba3c961cbcd548c66e179c4f19b20bea1b0cede00dcdb

                                                    SHA512

                                                    ed9d9b834b4eb8cd547e6a6058ad803992cf1609d221d43dd296e97dea0dce44ba80ecc1029c35a20356bae81fea869238699c735b1f323209f0786ba7c780d5

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    4KB

                                                    MD5

                                                    43cf958afe371fa122bcc7ba159082f5

                                                    SHA1

                                                    62b2e4643774839fb7aeae51a5cdf87bb5c99d07

                                                    SHA256

                                                    fe6a35265b9d527f4276d5cc93ed984d8f21b41b6016d40b1c0b83a6477eed8d

                                                    SHA512

                                                    b5736717f004f64c2c75eb285ddb96200fe296e4a914988f62d8907d0e9b802a9a4c77bab100ce8fdd8285d1783f6dd9cd897c3ad4def124099fbc6710db7f7a

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    6c2ddc031a8f3cffe086fede147373e3

                                                    SHA1

                                                    12c693a9c63e40aad569cda95bf51f87454377ce

                                                    SHA256

                                                    ca3066d6dd41c531e660ac88bbde60fd530a9743e89870f3f2adfdce25c49a30

                                                    SHA512

                                                    870ce9dd660250ed16fc63b14cb9b3f82b9ab263cf023e37687e981e889366d99bd6b186faf8df1f96813a682b309c10972f8ae69c9c4def7498431289768b48

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\db\data.safe.tmp

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    d139360f53687f7d93655b24e2cd4621

                                                    SHA1

                                                    2d707f0295235205d03e3a90ee4f84909be54dcb

                                                    SHA256

                                                    e4040dccd333acec7380c7184a19c1c2d7aee963aa6185c6cc218313415f6e5e

                                                    SHA512

                                                    f289e392b7cc6b19ecc039ed463d4b89dd821d12660f7de687ea1b21d14b0cba8f2690f9eb7aa41c1ce66b75ec777fb90e45c77d72bca70c967b389795fbf4de

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\pending_pings\5a41d54d-9e2e-4c9b-ba52-e8a99b8c3d29

                                                    Filesize

                                                    671B

                                                    MD5

                                                    ef32c4d9b3fa897b77c6b5f05b6760d9

                                                    SHA1

                                                    6bce569274d290a722151609c0ecbfa5d2960a7c

                                                    SHA256

                                                    3f706fbf6c9f488fb091b5f6c8ad73a703b3af972d8c5f8411fedc00dfb90189

                                                    SHA512

                                                    2419e51f57e809d77489c16eed99db7756ae5f9d076481280e421a6d0ad863e4567a49f4b164212b3deaf6a9e94c001e7d68419a9fc920edc807916d77a9483b

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\pending_pings\76f031fd-9dbf-4a49-bfd3-02198b5ca3b6

                                                    Filesize

                                                    982B

                                                    MD5

                                                    d9ef360ed2b163fa62d3f9e6d9157b89

                                                    SHA1

                                                    6e7c70aee5a52562c5e918441650d5856f81789d

                                                    SHA256

                                                    4e211d4b709a49de1e1280c995b541b91e2cf3410ccaf6856e801c50051fcfb5

                                                    SHA512

                                                    479ed3b9fc9f5d1bb8d2e5a8f303ddccd44c3729d01dc0282149135318116b1f00e80aa14cb925ff260cf632ab5c3d18d65d38d931b8cb6a3563dee61d2912d9

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\datareporting\glean\pending_pings\ca3d3204-437f-4c56-8133-cd0e59096285

                                                    Filesize

                                                    26KB

                                                    MD5

                                                    1effe4ce7a69f9e586d12cbbc149d999

                                                    SHA1

                                                    6b221ddc410cad41b7d03739bcb98906703904ca

                                                    SHA256

                                                    3e9461293f89332140a747373e2896bd9aee5a2bceca15f8c3c10a03c4445c10

                                                    SHA512

                                                    9daaecf7213266b72948d3b4a8c58a2e6c8e12a88947f1f975131d7bbb2ce28c01b8cc91c628d395f910f71efc2d96c14ed7018242b24d61a8f532eec17aa915

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                    Filesize

                                                    1.1MB

                                                    MD5

                                                    842039753bf41fa5e11b3a1383061a87

                                                    SHA1

                                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                    SHA256

                                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                    SHA512

                                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                    Filesize

                                                    116B

                                                    MD5

                                                    2a461e9eb87fd1955cea740a3444ee7a

                                                    SHA1

                                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                                    SHA256

                                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                    SHA512

                                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                    Filesize

                                                    372B

                                                    MD5

                                                    bf957ad58b55f64219ab3f793e374316

                                                    SHA1

                                                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                    SHA256

                                                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                    SHA512

                                                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                    Filesize

                                                    17.8MB

                                                    MD5

                                                    daf7ef3acccab478aaa7d6dc1c60f865

                                                    SHA1

                                                    f8246162b97ce4a945feced27b6ea114366ff2ad

                                                    SHA256

                                                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                    SHA512

                                                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\prefs-1.js

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    a5440d17c6819724b43f6fdc62410ecf

                                                    SHA1

                                                    285b5abccf36bb373d9df1fa4ff689852d463445

                                                    SHA256

                                                    cc8c8dd42f92d50be63bc837929be754a9e1eca74bca080ba7191810877d1135

                                                    SHA512

                                                    4f69692a02e17573ee4b15bd87b0c7067f69a265c25fe6a77c1563390c58fbb238c4c1411ac97f6c34bdb9a039ac662dde65d8833bff115a5e972844682ccf92

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\prefs-1.js

                                                    Filesize

                                                    12KB

                                                    MD5

                                                    34d8a03e6ebbe4aa7d1544b833780aa6

                                                    SHA1

                                                    8eb55e211a8933fd10fc28dd47894d64327543ba

                                                    SHA256

                                                    3f4f310493ce7c37344d031cd06fa3435dce6d34e62558baf7268bc174381b9e

                                                    SHA512

                                                    2fb6695e1aba6791d6622f5ca031a2360d124440fe1688184bf6d53869012ec9be13f439c388927b24938bbca43dae392687e289583cd837f41fb08a675e4341

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\prefs-1.js

                                                    Filesize

                                                    16KB

                                                    MD5

                                                    37c7f99042d81a22f875c39ec746edb7

                                                    SHA1

                                                    53dd9add8b7dd4f0d991a1c65d144e81bbb6c63a

                                                    SHA256

                                                    188a499982501414edb272b9589041296c6262bcea9c8bdaa9a7c6c97f9e95d0

                                                    SHA512

                                                    785e0021e4fdab304084eb70a252dedd790c48c2779f8d34a7d5a2d6c0a77b97978a68b373b22cf1c62ab6009ab0af0fd84467319abac4d12d7448fe00bd3f23

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\prefs.js

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    700ca0e6abe4eabe5a772f20f66ac6a4

                                                    SHA1

                                                    9d4652407cf7ac38921faf119f7fd42feba028fd

                                                    SHA256

                                                    13d758738fe6a6d5496c52e4dbad4c1369e7473cfc1815ba8bd948ea79f6aee1

                                                    SHA512

                                                    b5255d7f1d8785d8167e919dc9c28a2a24b1c915ccc4f5eb469ef20251e16dfd2242e290592facaa108dda8bfeb0f0ef573f48536800d435eaed194bb21de6c6

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\sessionstore-backups\recovery.baklz4

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    bd87084249691787e4271434858ded38

                                                    SHA1

                                                    19a80f831f542367c11f50dd8ff6d5d2abcff0e1

                                                    SHA256

                                                    18987b31a844ceaabc6ed0341ca3d3d445cb5da33f736c8ea4803cac40946824

                                                    SHA512

                                                    7b62dc5322ca0b614bbe0a1d3d6c8567585951c5e79c033c4f9b9194952509aeb1836da69416ff6529b4534298e055ce048f12f2125d961cf65f33a27c544e42

                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                    Filesize

                                                    1.2MB

                                                    MD5

                                                    e8acaa8c54e65bbb17f84591532bf886

                                                    SHA1

                                                    03f33bf4e99754af5cc576ee3fad693ebafc95e6

                                                    SHA256

                                                    eabf80b5a50d27ce4eff365acb853790e71df53792dc1ec7597c5c6673d9e346

                                                    SHA512

                                                    86c34ce59ae4f2fc456b7aadb2ee7f09701eb7b51eaec09cf4ab8deb0ddee10bdb750aa582690d148dcb1f063abb5ce375896812ba1c976d3fa427ab3504d234

                                                  • memory/1132-3-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1132-18-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1132-4-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1132-0-0x0000000000F40000-0x00000000013FF000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1132-2-0x0000000000F41000-0x0000000000F6F000-memory.dmp

                                                    Filesize

                                                    184KB

                                                  • memory/1132-1-0x0000000077BE4000-0x0000000077BE6000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/1760-2431-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-3024-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-835-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-551-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-393-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-2952-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-2961-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-21-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-20-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-19-0x0000000000A51000-0x0000000000A7F000-memory.dmp

                                                    Filesize

                                                    184KB

                                                  • memory/1760-2990-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-493-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-492-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-3052-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-3003-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-3004-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-16-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-3014-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-471-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-1555-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/1760-3042-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3864-3072-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/3864-3073-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4764-700-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/4764-722-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/7164-2993-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/7164-2992-0x0000000000A50000-0x0000000000F0F000-memory.dmp

                                                    Filesize

                                                    4.7MB