Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 01:39

General

  • Target

    9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe

  • Size

    6.0MB

  • MD5

    0ff741b5513934d69be524236e1c2594

  • SHA1

    e677e9230456e8dd2664a412741a79c1216e25c1

  • SHA256

    9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f

  • SHA512

    bcc5e46301f6f3f0d736b48de6e4ffe01b952149d0343382cbc3de747e74bc68e5915e32897a4a9193dcdc120a350286d9f741f0385fe522031e2f2f7051f5b6

  • SSDEEP

    196608:9PtIrFVXknIPYh1+qPmOUuU6x0qIZAD2:1OKzNPmIU8TX2

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://navygenerayk.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • XMRig Miner payload 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 17 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 50 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe
    "C:\Users\Admin\AppData\Local\Temp\9c3748b52a29c68ce473bc92557f57d67c9a67d7f140bb959e91619b7626d26f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7k43.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7k43.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4D59.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4D59.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3832
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v95d4.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v95d4.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4088
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4452
            • C:\Users\Admin\AppData\Local\Temp\1004884001\crypted.exe
              "C:\Users\Admin\AppData\Local\Temp\1004884001\crypted.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4436
              • C:\Users\Admin\AppData\Local\Temp\1004884001\crypted.exe
                "C:\Users\Admin\AppData\Local\Temp\1004884001\crypted.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2264
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 572
                7⤵
                • Program crash
                PID:4384
            • C:\Users\Admin\AppData\Local\Temp\1004943001\chrone.exe
              "C:\Users\Admin\AppData\Local\Temp\1004943001\chrone.exe"
              6⤵
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4304
              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5644
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                7⤵
                  PID:4464
                  • C:\Windows\system32\wusa.exe
                    wusa /uninstall /kb:890830 /quiet /norestart
                    8⤵
                      PID:5904
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop UsoSvc
                    7⤵
                    • Launches sc.exe
                    PID:5836
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop WaaSMedicSvc
                    7⤵
                    • Launches sc.exe
                    PID:5892
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop wuauserv
                    7⤵
                    • Launches sc.exe
                    PID:5924
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop bits
                    7⤵
                    • Launches sc.exe
                    PID:5968
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop dosvc
                    7⤵
                    • Launches sc.exe
                    PID:6076
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                    7⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:6096
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                    7⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:6108
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                    7⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4312
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                    7⤵
                    • Power Settings
                    • Suspicious use of AdjustPrivilegeToken
                    PID:6124
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe delete "GDRQRNRG"
                    7⤵
                    • Launches sc.exe
                    PID:2900
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe create "GDRQRNRG" binpath= "C:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exe" start= "auto"
                    7⤵
                    • Launches sc.exe
                    PID:6280
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop eventlog
                    7⤵
                    • Launches sc.exe
                    PID:6324
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe start "GDRQRNRG"
                    7⤵
                    • Launches sc.exe
                    PID:6348
                • C:\Users\Admin\AppData\Local\Temp\1004964001\87b079f524.exe
                  "C:\Users\Admin\AppData\Local\Temp\1004964001\87b079f524.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3464
                • C:\Users\Admin\AppData\Local\Temp\1004965001\c618a6f11c.exe
                  "C:\Users\Admin\AppData\Local\Temp\1004965001\c618a6f11c.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5172
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                  6⤵
                    PID:5552
                  • C:\Users\Admin\AppData\Local\Temp\1004967001\3ad8b374fa.exe
                    "C:\Users\Admin\AppData\Local\Temp\1004967001\3ad8b374fa.exe"
                    6⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Windows security modification
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5628
              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z7570.exe
                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z7570.exe
                4⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4996
            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3o40b.exe
              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3o40b.exe
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3764
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m978A.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m978A.exe
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3932
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              3⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1576
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              3⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3996
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              3⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3084
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              3⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1032
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              3⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2056
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3444
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                4⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1200
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2064 -parentBuildID 20240401114208 -prefsHandle 1988 -prefMapHandle 1980 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {23691ee4-1e70-420c-8b6c-e983c98ed458} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" gpu
                  5⤵
                    PID:2412
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2504 -parentBuildID 20240401114208 -prefsHandle 2496 -prefMapHandle 2492 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cfd7f1ba-2bca-4d44-b1cd-1cb1f3778377} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" socket
                    5⤵
                      PID:5020
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3092 -childID 1 -isForBrowser -prefsHandle 3364 -prefMapHandle 3408 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07f40f10-0826-4a30-8d58-bf657a24e072} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab
                      5⤵
                        PID:3256
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3980 -childID 2 -isForBrowser -prefsHandle 3548 -prefMapHandle 2788 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75f3347d-e3cc-4479-b9be-1d2241e71631} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab
                        5⤵
                          PID:4712
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4440 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4364 -prefMapHandle 4356 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f44d3543-ada2-4670-ac58-9b82c7b0f70e} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" utility
                          5⤵
                          • Checks processor information in registry
                          PID:5212
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4332 -childID 3 -isForBrowser -prefsHandle 5640 -prefMapHandle 5636 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f5ee6c31-8dfe-4fcb-9da9-45276fad6d34} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab
                          5⤵
                            PID:5232
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5804 -childID 4 -isForBrowser -prefsHandle 5612 -prefMapHandle 5512 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3035931c-9580-4dcc-a234-da0c47f6234f} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab
                            5⤵
                              PID:5260
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6012 -childID 5 -isForBrowser -prefsHandle 5932 -prefMapHandle 5936 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2c8c6e2-edc8-4ebf-aa92-1f2a1c6392e6} 1200 "\\.\pipe\gecko-crash-server-pipe.1200" tab
                              5⤵
                                PID:5268
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4436 -ip 4436
                        1⤵
                          PID:4512
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3116
                        • C:\Windows\System32\mousocoreworker.exe
                          C:\Windows\System32\mousocoreworker.exe -Embedding
                          1⤵
                            PID:3444
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:6748
                          • C:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exe
                            C:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exe
                            1⤵
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3692
                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                              2⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:6584
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                              2⤵
                                PID:2124
                                • C:\Windows\system32\wusa.exe
                                  wusa /uninstall /kb:890830 /quiet /norestart
                                  3⤵
                                    PID:6872
                                • C:\Windows\system32\sc.exe
                                  C:\Windows\system32\sc.exe stop UsoSvc
                                  2⤵
                                  • Launches sc.exe
                                  PID:3676
                                • C:\Windows\system32\sc.exe
                                  C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                  2⤵
                                  • Launches sc.exe
                                  PID:6744
                                • C:\Windows\system32\sc.exe
                                  C:\Windows\system32\sc.exe stop wuauserv
                                  2⤵
                                  • Launches sc.exe
                                  PID:6804
                                • C:\Windows\system32\sc.exe
                                  C:\Windows\system32\sc.exe stop bits
                                  2⤵
                                  • Launches sc.exe
                                  PID:6936
                                • C:\Windows\system32\sc.exe
                                  C:\Windows\system32\sc.exe stop dosvc
                                  2⤵
                                  • Launches sc.exe
                                  PID:6748
                                • C:\Windows\system32\powercfg.exe
                                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                  2⤵
                                  • Power Settings
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2612
                                • C:\Windows\system32\powercfg.exe
                                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                  2⤵
                                  • Power Settings
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:7064
                                • C:\Windows\system32\powercfg.exe
                                  C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                  2⤵
                                  • Power Settings
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:6876
                                • C:\Windows\system32\powercfg.exe
                                  C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                  2⤵
                                  • Power Settings
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4408
                                • C:\Windows\system32\conhost.exe
                                  C:\Windows\system32\conhost.exe
                                  2⤵
                                    PID:6732
                                  • C:\Windows\system32\notepad.exe
                                    notepad.exe
                                    2⤵
                                    • Modifies data under HKEY_USERS
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:456
                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  PID:5460

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json

                                  Filesize

                                  24KB

                                  MD5

                                  ab6902e1f221277a8743df12ccfaa4f1

                                  SHA1

                                  e9a2a1fbeceaf1e38b00175edcc5238452b50ab9

                                  SHA256

                                  996d60fc71ac99c030d0b6b02284e05311839b20763d642b2dd1df4e745231a6

                                  SHA512

                                  676d61c92c8240c600482c00c7847f0d801fb11e02d4e839d63154f361a33ab767a634b56f144696970ee20c64e8ac4d3d0bce4ac5c3172ecc54aa43006170db

                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                                  Filesize

                                  13KB

                                  MD5

                                  9395c9977024305388d120501ef6ec19

                                  SHA1

                                  c45c67bc4da0ef8f8e5929d96519b36bddc1e853

                                  SHA256

                                  65542d098699539dd1ab0b34dfe5f4122e78fe3cbf9f98581f26e1abb4fd2577

                                  SHA512

                                  4ee5d97bb84e49b55cbaaf270021defeb22d76752d439b7a6f740821770931eac95d83c2ee15f0a3376e578797a44bb82b23b4ad5dd7257b1d5101511a108ed5

                                • C:\Users\Admin\AppData\Local\Temp\1004884001\crypted.exe

                                  Filesize

                                  1.2MB

                                  MD5

                                  e1d09be68de1be491cdb2870bfc90854

                                  SHA1

                                  6db8265a53f1a9e9d0c4aa8f98ade1db4eea9109

                                  SHA256

                                  6b2c384e64992914ec049762e153d4592c7dc2511b8cc079843c4d8195210c23

                                  SHA512

                                  10e609c166adfe9aebb5c62f57896fc194d5272f5b82c2cd8f3719444074bd0064e7969a559633b4d7b000b5196812ea38c913bf970cfd4c33567116d8295692

                                • C:\Users\Admin\AppData\Local\Temp\1004943001\chrone.exe

                                  Filesize

                                  6.9MB

                                  MD5

                                  ce3a6f4d1ebe823841187d30e9f143ab

                                  SHA1

                                  7316c51c0539724130226dd5cdc968b67415e225

                                  SHA256

                                  98d0e67d779ed43bcac753a9af22326e0024390d703c7c4e6601917ce6ff96bc

                                  SHA512

                                  cfdddc6575138fb500d8e7e4ca379091d96864e4bf60fbcc357a0275b68f67210757204b86c983465959dd115e1b3944d22f410fec3f7232f2b6bda187df171a

                                • C:\Users\Admin\AppData\Local\Temp\1004964001\87b079f524.exe

                                  Filesize

                                  3.0MB

                                  MD5

                                  bb610f3b68a61a23e8d71c8fad693f38

                                  SHA1

                                  b077edd1521904673b7dd7f01d45e7aa3cbce4fb

                                  SHA256

                                  1ad85e7a7ae029b5d4003420b6912a51fcefc95f6b7f64fabc2783e10286857a

                                  SHA512

                                  9353f34e693fc2bbcf7da5ce3f9d3382262786ccaf763a00b3a874949f6e17beca912a61f144dc0fb6e7a2794e53721d3631c84b5a4afccfd679cb0974d9c914

                                • C:\Users\Admin\AppData\Local\Temp\1004965001\c618a6f11c.exe

                                  Filesize

                                  2.1MB

                                  MD5

                                  f058a72e4dbe19f8b8ffb8785c2820d2

                                  SHA1

                                  440c44260ad8564a776ec1292adc4577906009fe

                                  SHA256

                                  6a443c0ac67ec4aff6acb6319cfc04d68bf0f861ac0424dec70a6bb8a27975cb

                                  SHA512

                                  bb2068d16c5f8a02aa2df1d51b491fb48de7a47cf74bb69e1ea20feb5b33f529d8e2d0b36844fa6ce961aa3c6337c057af7533153209cf26b4db6b7cd30d23ea

                                • C:\Users\Admin\AppData\Local\Temp\1004967001\3ad8b374fa.exe

                                  Filesize

                                  2.7MB

                                  MD5

                                  af8f97d988c3efd72eda117bca4927e2

                                  SHA1

                                  e22e4c6f96febbb91c6c9de022772ada9129b7f6

                                  SHA256

                                  2395e140ced018d325aceb6c0c0bdc7ce7fe960424276d995855a2d7a8272667

                                  SHA512

                                  4685898b8a6074fbaad2154a9f041f750e9c167daf66ebcfacc6f2b1b60d803e813f76a9b2bbae943c65d1aae75a449bb6ebc73c5080b7592e394aea837266bb

                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m978A.exe

                                  Filesize

                                  898KB

                                  MD5

                                  9ea0842588c153999f1a95c1a6e887f2

                                  SHA1

                                  0fd29248d1e77bcba44643e5f5021b11ff5c1d01

                                  SHA256

                                  41ec0499a24fa3682af7130da2d2e7cd68f2cd9ff709ce5d7f4f15513c52b326

                                  SHA512

                                  ffa79ea616a4cb978828739cf167249c74b78e02b8dbc69b3a865e1473b1dde7b8facd32af5c838ca76f1d79d28ba1816bea24f6c727a567346d73303acfb0b6

                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7k43.exe

                                  Filesize

                                  5.6MB

                                  MD5

                                  3807da7be828f830f937bd4b16d83af9

                                  SHA1

                                  260acaa78f699039a7ec6c1e37740c25312c6498

                                  SHA256

                                  7bf099795939dd20fe31cf152b99d6fc45164a51ca33d051988c688da0faa90a

                                  SHA512

                                  1f0e771c9cbb58452ef959d00f3d32ed528c30aa9ee9c754b3362d6d07fd49b9306f1535536c2b7b733fd0b0c1f27be2bb2d242d197f9d28c83c7f11a21aae02

                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3o40b.exe

                                  Filesize

                                  2.0MB

                                  MD5

                                  11d426c888db116423f5b98a68f128e7

                                  SHA1

                                  b1130e91da13796704eed24164d53b537d5abe09

                                  SHA256

                                  086d33d97dacb90e333a023aae5df67812e44c25fb1492775936ed12a8245e43

                                  SHA512

                                  37d2ce2eb090af5c21b3c72b1e0ad72aad527cc7ac6f5d6f0bc5c0e46390c90923378b69c25ff4137deba52819f552cfe82d851eea6fa4e2007fe5320b0a45d2

                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4D59.exe

                                  Filesize

                                  3.5MB

                                  MD5

                                  664c0236cb71a216b2fb1f3955315c63

                                  SHA1

                                  cc43a22e0dcb9114fd66f33ed18922b7c759498f

                                  SHA256

                                  24adf41e8001977af7d55918af61637469cdf4339d42f4ea974112e750ebe242

                                  SHA512

                                  da553c130613f2e6319e86a2f5a1ff9639b05f1c6ecb5a06278413dad1b0f32b7e2076708c3b8081d0c853cc6bb449b52a522f21045221a08e4eba79075860fe

                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v95d4.exe

                                  Filesize

                                  3.1MB

                                  MD5

                                  45992c73523a4739a3cd6749f3d3f632

                                  SHA1

                                  ae7d540cddafc301f19a6306d40f13aac56b6173

                                  SHA256

                                  7bc09569d86014729ebcfc4442b27288f40417c926d12598971647a0d8a42e6c

                                  SHA512

                                  66ebcec5889001c3a6ca5a3cf0501fc989a0108a507734d0370945cab714b088ecfc94c4a4b0800830c048a9271a6e65cedb0569ce691a073c153438d96b27f6

                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z7570.exe

                                  Filesize

                                  3.1MB

                                  MD5

                                  e17e79621707b33deebbb062396a7cb5

                                  SHA1

                                  8f525636a1320a50c51312de1981d53d9e545599

                                  SHA256

                                  ef85019d3696285f9a0d5c9b4c4134a68713b6294cb77a9dc41e0223ea7bede9

                                  SHA512

                                  5150c7af1b0565d2b975e550d080db0e8253a1847a0ac0aeadc11d091c02b128941caeb5b6b1bd9d60a878165b1aab7b38a37dd7f07ca2e9aecb0b90c519d9b0

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_25325ofq.aet.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                  Filesize

                                  479KB

                                  MD5

                                  09372174e83dbbf696ee732fd2e875bb

                                  SHA1

                                  ba360186ba650a769f9303f48b7200fb5eaccee1

                                  SHA256

                                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                  SHA512

                                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                  Filesize

                                  13.8MB

                                  MD5

                                  0a8747a2ac9ac08ae9508f36c6d75692

                                  SHA1

                                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                                  SHA256

                                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                  SHA512

                                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                                  Filesize

                                  18KB

                                  MD5

                                  94b47b2f75270f1d0d1aa0b30abc268d

                                  SHA1

                                  94940bc61f520406527e31746f998f0b110d6f6d

                                  SHA256

                                  97b194e1580c577444df68e1251ae7a44b31b7ebcaf7a99d268b9779a1394440

                                  SHA512

                                  69f7f82e1282fb460f8436c4963e2c6749cbb22420c4e6ee7b8e4905654e77b902c23ddd5a22bf7fbc81402fad7bc3e6e4fd5b3d05da891627bf5f44f016434e

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                                  Filesize

                                  6KB

                                  MD5

                                  86ac8efe5a6bbe09e65bb8bb4d048cce

                                  SHA1

                                  87aa0527caec67932fcfc16a727a8c7094a34edb

                                  SHA256

                                  49fb541eff7268ebef5efe9e2b064c2029744a7d2e549383a8b59773170450af

                                  SHA512

                                  8623e64872b29df089d2a941f649b744327056ee55f1247df466a4bc8fbd623f82cae3a1abcc09eb09fb94566a37caa8b71cc4c99af33497436cf2c19c14f41b

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                                  Filesize

                                  13KB

                                  MD5

                                  44c5dd5a2ef7c3a257a85fc1e2dfe5a9

                                  SHA1

                                  63fa09adff73d7f28dd6e93c07c1fc0248268021

                                  SHA256

                                  2fd1ed3271fb1e643d51aa08ffceb629ef324eed192501822c42da8cea9d5bb0

                                  SHA512

                                  cacf866eddab50f9a7bc3c8e9fd9d327c627ec7d4d590021be57651baabd2010dd1e4e19e5b64d60990637091f178f0aad1646fc27f2b7ccf34169958ba23f4a

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                                  Filesize

                                  23KB

                                  MD5

                                  78f4b873b2a36dd2e0514f3ffb7b66e2

                                  SHA1

                                  1feec208b04b03f52205eb927815368ba0fe06e7

                                  SHA256

                                  d0073b3561cc1af7b76f95a47fb9e4a31e714fa0523835dd6275071caa6f3c31

                                  SHA512

                                  68a587d908cc585de9b6fbe3e85454a32a4e12fb7844f076217a8c52609777b75227c0234cd72cd51ba7c5b40ef481b17f0f0a45c5f6e349156cbb52c9d92123

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                                  Filesize

                                  22KB

                                  MD5

                                  407feced7e47bf6662588c1828f08a9d

                                  SHA1

                                  7ff7eecbb85ea57231f0b4f765da0c5fd0cd5c78

                                  SHA256

                                  fe2acecc15175b405d582f57fc740f320979a5972e9d930458aa5b27183b50b8

                                  SHA512

                                  b35243b46ad22451a867d91927f862688f1a5af33746f4da362517d19666885af310a7ef9673a32134ea6ab2188395c3d75dc3035adc55fa9303b90fdc7241a6

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                                  Filesize

                                  24KB

                                  MD5

                                  483350837df4c81388673d98631d516e

                                  SHA1

                                  9ca3e9235f647a63b57a1e74eaa141cfc23994b7

                                  SHA256

                                  b4778ee754a1077f8897c5747f27f5b9348d6b541c79784c4fa277e0f68c0ad4

                                  SHA512

                                  7f4263f673f81065fbb9d5013d6c54512135a44704ed4aec3b6abafee5438f53c97d12e17837f61c6499a0dd2111c43fea10726075d499daf4a04d117e4433a4

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                                  Filesize

                                  25KB

                                  MD5

                                  75203889337d89c0c42ca4ba30489d60

                                  SHA1

                                  be60c629ee17f2aa5217f7a3e3398d1f1082d7b0

                                  SHA256

                                  238b603b5cdad3b43d0a271ef28a565df6d3f6cce2200c99a36b462991c4baea

                                  SHA512

                                  7a6f37fb35bf4dd8db695c5c9ddce91983239c9a3b20a09515fff0f8088740688b1a7310b97b53b6cd9ac8a4f06c8f61214ebba8111cdf0ac07812d1f08724f5

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  22KB

                                  MD5

                                  1f4abfcdde2a6daf3d6960e70be19ca5

                                  SHA1

                                  a4904cab402cacfc1ffb1db9c821ef12fdf16055

                                  SHA256

                                  1d37c53e4b336eeb15a908d016ee99985893cbd6f5794788dd1ffd7b9fb173d8

                                  SHA512

                                  42d440cee04c7d2778238420975771b44c7c5c20064b8ccbd50207bf06344c496b85d5825f68b3289c087af89488ae0d6b5eabb6616a043c039ae1707013bcb2

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  22KB

                                  MD5

                                  02e5370860ee296353fb6817ec1407d0

                                  SHA1

                                  fe7e43696b663f1a10501a026e44b5f4ade799ef

                                  SHA256

                                  a3513237ca3be7b67e6bf891c2592e6a60110a1eb0a676e0017c33d641033a49

                                  SHA512

                                  e176628728f37a91a2b539b85a26237943a9884682eaadb09c17eb4ee74e8f0e5c09da5cb596029b5a24e8d93ada88d0ca6f90ff63c4c8c1bed6c5b6d5da5d0d

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  23KB

                                  MD5

                                  9dd55beea73cb35829eec0d598438332

                                  SHA1

                                  cd056bd7cf120874c4f4644d67d896b3ce860866

                                  SHA256

                                  246036a0c60cef7ba85f86c7f2e0ed11662fd8ec9ce918105e7ba75502143c9d

                                  SHA512

                                  d728016a162e7fc900d54e37b3d1a898fedde1711f3358b997362298766b652b808a2eb2b385f2642c66491c53967ae99da3869ab8e776eef83e9151208825e9

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  23KB

                                  MD5

                                  9cc56c7d0b6da5912f58d30cfc168b25

                                  SHA1

                                  2e57e3a2103b2921a3237b3d1f1c282ce45f7e45

                                  SHA256

                                  4a470cdff22559f9b58e78f0f7ad67dc5b740f38168be6b7c8becc2069f3b6d1

                                  SHA512

                                  b0609a7470e9776b5fe6095bae3825bebfd247c90b655f1377876406df66b7f3fc1bdf0db7a47b9005c5e079cd282c766302f452a47271c434d07318cdf02729

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  25KB

                                  MD5

                                  7ce16bde7122c6a5ca2bd77182cb7021

                                  SHA1

                                  864c9562574d2eb02454e295dd0e75bb6e9a0c5e

                                  SHA256

                                  6964dd9d2f1b8434a7c6c726548feece78ca7d97b53374a3225d2d1b4529022e

                                  SHA512

                                  6172b74348df7e1668530cb704626db9da05c9bf3530e29e9754324d1b5a24ee22a8a3937cf2d6f18fe49b877c62ce50dc3b4d00de9c6501045e9d4fa4daca1e

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  25KB

                                  MD5

                                  3cac2537cc7d0798613f82eece79cc76

                                  SHA1

                                  1eb4e6b8d0b5dd9c9f27bda55eac84ac6b4ed275

                                  SHA256

                                  597dea3e1bcb5c084dd3cebc819d8e7bd2fc3df6b4cbd050c583dd965939f9fc

                                  SHA512

                                  c3d0191cb5d5edecd00903990df12fa7e6045702b95470b23cdf5f21736bdb61c90dc02b7c6361787c14ee46170bab7dc7f9d3b523e55e654ae3d6d82ad26f38

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\a6fef9f4-feb9-411b-bc94-d26a4ba35ac4

                                  Filesize

                                  659B

                                  MD5

                                  032eeb12d0441c67adcdffd045cd4d30

                                  SHA1

                                  7b4d44b704888d21625799a0a63f5b6f1c3e9b2b

                                  SHA256

                                  ef52039607c4144a5adca252f24dd853bf19db7ce1654b9aa07a0eee3da36a55

                                  SHA512

                                  7df578e2f9021688c3ec179e89ee901c3afe50bc214e05e8fbaa14567c05f7feeb1476d085bc25995669a0bac65e54d7e0a3e2166f164f3926c3a750eac0ee9d

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\b3c7114f-0ea5-4637-b31d-76d5085da583

                                  Filesize

                                  982B

                                  MD5

                                  0be2ca89191fb3abd2824d3b100bf1f3

                                  SHA1

                                  05d9104008353ecec70f29d4fe0703c1f1e93f8a

                                  SHA256

                                  444f41e8bdac915e5224d53e1dcf51a81bbe0099713bd65192b771d3759a1623

                                  SHA512

                                  4eb72db573d4a50e0e4cbf1c7cb9b7ef3fa7763f66a6c3b42b240621f5e6e9d839b705fa5523e5a6f97254c5b6cdd13b25adb2eaa161568f573072c81abd8bc9

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                  Filesize

                                  1.1MB

                                  MD5

                                  842039753bf41fa5e11b3a1383061a87

                                  SHA1

                                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                  SHA256

                                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                  SHA512

                                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                  Filesize

                                  116B

                                  MD5

                                  2a461e9eb87fd1955cea740a3444ee7a

                                  SHA1

                                  b10755914c713f5a4677494dbe8a686ed458c3c5

                                  SHA256

                                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                  SHA512

                                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                  Filesize

                                  372B

                                  MD5

                                  bf957ad58b55f64219ab3f793e374316

                                  SHA1

                                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                  SHA256

                                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                  SHA512

                                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                  Filesize

                                  17.8MB

                                  MD5

                                  daf7ef3acccab478aaa7d6dc1c60f865

                                  SHA1

                                  f8246162b97ce4a945feced27b6ea114366ff2ad

                                  SHA256

                                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                  SHA512

                                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                                  Filesize

                                  12KB

                                  MD5

                                  ac537b824fc6d19c66015c17191f7c2e

                                  SHA1

                                  a84e708df5cdbc993efcc378041eea35970d7be1

                                  SHA256

                                  11d3bf028e25417f496f63aec632488e044d5994b15158770cf3a36c77112354

                                  SHA512

                                  13830f3d9bccb570fadde0ceb3daa1562957f6a132904e32ae4b5bcf09c2870c84883b8a014a3abaa22eb56cf60db6443e5e7629e1c77f87a681504084b616c8

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                                  Filesize

                                  15KB

                                  MD5

                                  c39a7c192d4d8ea85eaf211fe3e90592

                                  SHA1

                                  0bd321426c5c14e393916664e2339c62642aa95d

                                  SHA256

                                  61520e5f95bc09324087190aa87943c8456aa50628a0928353297675a227bee6

                                  SHA512

                                  bc09a02d612e615b33e738b7ec7209ac0eb00d0adf400db64e855e366dc23914bacba1d9f12bf045447a6b215a40fe8af1c45e54d71dcaaaecbc041a0970fd29

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                                  Filesize

                                  10KB

                                  MD5

                                  1044ba2163cb7cd4626d9f8d42ba2fc0

                                  SHA1

                                  22782e4f5acd7b8e262a6b210f27136ec122e3cc

                                  SHA256

                                  fa1ce16d3a93c12d781bbcd7016f72244fefaae95cc665d56c21844185ae5035

                                  SHA512

                                  da72aeb5cae266d47b4c68ce2f31893bcaac9a7add47f08e6f46bc0f3ad90212110433fe59861d062104304acfc77cd1e70db0364a262d36d72b39e579d67195

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                                  Filesize

                                  10KB

                                  MD5

                                  19cca982c2d2207bdb943ccc459b6881

                                  SHA1

                                  5b3da824b3e89fe7f1fa4a8aa898ad96666e5879

                                  SHA256

                                  5b62bac41839bfefa0bacc99691ea58a8bf11cb27191c730482b1696256521dc

                                  SHA512

                                  6b8c1b54a50bdaa6ce0705df6809baf90953bd69d6d2002893b490499b04757a6d3dfc458bfc3606929139c0032dff2ccf03303e96480265bda92607948efa71

                                • memory/456-4783-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/456-4805-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/456-4772-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/456-4786-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/456-4804-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/456-4782-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/456-4773-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/456-4777-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/456-4774-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/456-4785-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/456-4781-0x000002850D6D0000-0x000002850D6F0000-memory.dmp

                                  Filesize

                                  128KB

                                • memory/456-4780-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/456-4778-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/456-4779-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/456-4784-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/2264-68-0x0000000000400000-0x0000000000459000-memory.dmp

                                  Filesize

                                  356KB

                                • memory/2264-66-0x0000000000400000-0x0000000000459000-memory.dmp

                                  Filesize

                                  356KB

                                • memory/2264-64-0x0000000000400000-0x0000000000459000-memory.dmp

                                  Filesize

                                  356KB

                                • memory/3116-575-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3116-77-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/3464-4673-0x0000000000560000-0x000000000086C000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/3464-4674-0x0000000000560000-0x000000000086C000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/3692-4734-0x00007FF7947D0000-0x00007FF795220000-memory.dmp

                                  Filesize

                                  10.3MB

                                • memory/3692-4776-0x00007FF7947D0000-0x00007FF795220000-memory.dmp

                                  Filesize

                                  10.3MB

                                • memory/3764-45-0x0000000000EE0000-0x0000000001614000-memory.dmp

                                  Filesize

                                  7.2MB

                                • memory/3764-44-0x0000000000EE0000-0x0000000001614000-memory.dmp

                                  Filesize

                                  7.2MB

                                • memory/4088-21-0x00000000005B0000-0x00000000008CF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4088-35-0x00000000005B0000-0x00000000008CF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4304-4693-0x00007FF69F250000-0x00007FF69FCA0000-memory.dmp

                                  Filesize

                                  10.3MB

                                • memory/4304-4694-0x00007FF69F250000-0x00007FF69FCA0000-memory.dmp

                                  Filesize

                                  10.3MB

                                • memory/4304-4657-0x00007FF69F250000-0x00007FF69FCA0000-memory.dmp

                                  Filesize

                                  10.3MB

                                • memory/4304-4731-0x00007FF69F250000-0x00007FF69FCA0000-memory.dmp

                                  Filesize

                                  10.3MB

                                • memory/4452-3741-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-4787-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-4807-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-4806-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-641-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-771-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-4794-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-4793-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-789-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-1047-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-4624-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-4627-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-4635-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-4638-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-4692-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4452-34-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4996-38-0x00000000001D0000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/4996-40-0x00000000001D0000-0x00000000004F0000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/5172-4691-0x0000000000FF0000-0x000000000172E000-memory.dmp

                                  Filesize

                                  7.2MB

                                • memory/5172-4690-0x0000000000FF0000-0x000000000172E000-memory.dmp

                                  Filesize

                                  7.2MB

                                • memory/5460-4798-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/5460-4796-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/5628-4716-0x0000000000370000-0x000000000062E000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/5628-4715-0x0000000000370000-0x000000000062E000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/5628-4714-0x0000000000370000-0x000000000062E000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/5628-4792-0x0000000000370000-0x000000000062E000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/5628-4789-0x0000000000370000-0x000000000062E000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/5644-4722-0x000001A21D040000-0x000001A21D062000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/6584-4755-0x000001F9F5860000-0x000001F9F586A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/6584-4754-0x000001F9F5890000-0x000001F9F5945000-memory.dmp

                                  Filesize

                                  724KB

                                • memory/6584-4761-0x000001F9F5AE0000-0x000001F9F5AEA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/6584-4760-0x000001F9F5AD0000-0x000001F9F5AD6000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/6584-4753-0x000001F9F5870000-0x000001F9F588C000-memory.dmp

                                  Filesize

                                  112KB

                                • memory/6584-4756-0x000001F9F5AB0000-0x000001F9F5ACC000-memory.dmp

                                  Filesize

                                  112KB

                                • memory/6584-4757-0x000001F9F5A90000-0x000001F9F5A9A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/6584-4758-0x000001F9F5AF0000-0x000001F9F5B0A000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/6584-4759-0x000001F9F5AA0000-0x000001F9F5AA8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/6732-4764-0x0000000140000000-0x000000014000E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/6732-4771-0x0000000140000000-0x000000014000E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/6732-4765-0x0000000140000000-0x000000014000E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/6732-4766-0x0000000140000000-0x000000014000E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/6732-4767-0x0000000140000000-0x000000014000E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/6732-4768-0x0000000140000000-0x000000014000E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/6748-4632-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/6748-4633-0x0000000000CC0000-0x0000000000FDF000-memory.dmp

                                  Filesize

                                  3.1MB