Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 10:17

General

  • Target

    file.exe

  • Size

    1.9MB

  • MD5

    8016c72a6e4bf40375e31e867f487fa7

  • SHA1

    98cee0e4a8751579ece1e66cb6429ea912526410

  • SHA256

    6f8f6f652654b2cdf67a5fe92652e349da600dfca2076f3d41b9c336434db169

  • SHA512

    769cb20163e136187b03e99dfebeaaa4ac4b7815a95b105f511d2ae76bd38f9a882c53380745f1222fc6dcc64a1d8858e8e2e2484f9689b8bd1896b06a9b6685

  • SSDEEP

    24576:JhsQPljqzshikccrx5emV+SJzyFNG8Fe9rCuoT8cGUNguuxmz3PZbTn/YSug2:DvljqwccrykhkGxW54UNgFUtD8x

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Smokeloader family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Users\Admin\AppData\Local\Temp\1007634001\9d748d51b7.exe
        "C:\Users\Admin\AppData\Local\Temp\1007634001\9d748d51b7.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2452
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:632
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff91120cc40,0x7ff91120cc4c,0x7ff91120cc58
            5⤵
              PID:4720
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2304,i,14617253977173464964,8216740430191118428,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2300 /prefetch:2
              5⤵
                PID:3988
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1772,i,14617253977173464964,8216740430191118428,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2484 /prefetch:3
                5⤵
                  PID:2556
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2016,i,14617253977173464964,8216740430191118428,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2588 /prefetch:8
                  5⤵
                    PID:1104
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,14617253977173464964,8216740430191118428,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:5704
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,14617253977173464964,8216740430191118428,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3228 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:1816
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4468,i,14617253977173464964,8216740430191118428,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4564 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:5924
                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:3960
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:5116
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 1528
                  4⤵
                  • Program crash
                  PID:6076
              • C:\Users\Admin\AppData\Local\Temp\1007639001\5cbea9db84.exe
                "C:\Users\Admin\AppData\Local\Temp\1007639001\5cbea9db84.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:1452
              • C:\Users\Admin\AppData\Local\Temp\1007640001\4c542def46.exe
                "C:\Users\Admin\AppData\Local\Temp\1007640001\4c542def46.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:1360
              • C:\Users\Admin\AppData\Local\Temp\1007641001\506a2c2d43.exe
                "C:\Users\Admin\AppData\Local\Temp\1007641001\506a2c2d43.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:3968
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM firefox.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2408
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM chrome.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2964
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM msedge.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3396
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM opera.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4720
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM brave.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:644
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3904
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    5⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1316
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1896 -parentBuildID 20240401114208 -prefsHandle 1836 -prefMapHandle 1828 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5861f17f-5153-4e0d-9df0-6e15cc47c08b} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" gpu
                      6⤵
                        PID:4668
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2408 -prefMapHandle 2404 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5b659f7-b940-48f8-b890-a68e701a66f0} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" socket
                        6⤵
                          PID:4080
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3176 -childID 1 -isForBrowser -prefsHandle 2580 -prefMapHandle 2576 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2b25032-cfca-4dec-851b-259e843bad3a} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" tab
                          6⤵
                            PID:2264
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2560 -childID 2 -isForBrowser -prefsHandle 3956 -prefMapHandle 3952 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {235ce2b4-a61a-456e-a54d-37253038cd2c} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" tab
                            6⤵
                              PID:2968
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4728 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 1596 -prefMapHandle 4676 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f131698-3d65-4ad5-b235-c99d60203ad9} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" utility
                              6⤵
                              • Checks processor information in registry
                              PID:5364
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5220 -childID 3 -isForBrowser -prefsHandle 5236 -prefMapHandle 5252 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ca46fe8-d0bf-41a6-936f-dba8d449240a} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" tab
                              6⤵
                                PID:1744
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5656 -childID 4 -isForBrowser -prefsHandle 5580 -prefMapHandle 5564 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c3257f54-0c15-42fc-b5f7-81f6064cc0e6} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" tab
                                6⤵
                                  PID:4792
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5792 -childID 5 -isForBrowser -prefsHandle 5800 -prefMapHandle 5804 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c3203ee5-dc58-446a-b028-4fe7c2ac6087} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" tab
                                  6⤵
                                    PID:5084
                            • C:\Users\Admin\AppData\Local\Temp\1007642001\23ee89a93e.exe
                              "C:\Users\Admin\AppData\Local\Temp\1007642001\23ee89a93e.exe"
                              3⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5116
                            • C:\Users\Admin\AppData\Local\Temp\1007643001\GuidanceConnectors.exe
                              "C:\Users\Admin\AppData\Local\Temp\1007643001\GuidanceConnectors.exe"
                              3⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:5888
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c copy Frequently Frequently.cmd & Frequently.cmd
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:5100
                                • C:\Windows\SysWOW64\tasklist.exe
                                  tasklist
                                  5⤵
                                  • Enumerates processes with tasklist
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5924
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr /I "wrsa opssvc"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5944
                                • C:\Windows\SysWOW64\tasklist.exe
                                  tasklist
                                  5⤵
                                  • Enumerates processes with tasklist
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5972
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5976
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c md 390641
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:6128
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr /V "ConventionTroopsStudiedTooth" Version
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1880
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c copy /b ..\Accessing + ..\Entire + ..\Peripherals + ..\Et B
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5048
                                • C:\Users\Admin\AppData\Local\Temp\390641\Imposed.com
                                  Imposed.com B
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:3164
                                  • C:\Users\Admin\AppData\Local\Temp\390641\Imposed.com
                                    C:\Users\Admin\AppData\Local\Temp\390641\Imposed.com
                                    6⤵
                                    • Executes dropped EXE
                                    • Checks SCSI registry key(s)
                                    PID:5724
                                • C:\Windows\SysWOW64\choice.exe
                                  choice /d y /t 5
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5300
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3948
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:1064
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2452 -ip 2452
                            1⤵
                              PID:4052
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3248
                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                              C:\Users\Admin\AppData\Local\Temp\/service123.exe
                              1⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:2284

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              0573f8b37cd63ac985f6863e1685efd8

                              SHA1

                              7b3e16e1b8e37dce0543bafec613febb7f13e96a

                              SHA256

                              b5c9474b93c13ce34b47db69473f7ab881a77aafcafee10ffb161d45ecef9bf7

                              SHA512

                              53c74f09b27289b62831536f9153ad642d913f1b0cd1d852bd6e57af944d8ef1ef61cda00d7efc65c9122562371a66c4f1f87da2bf34541b15fb85c28ae9aab1

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              356B

                              MD5

                              9edc47567801ae85a28fa6bd0f400a12

                              SHA1

                              6979caed8db48958621ff7b02fe511822e73ab22

                              SHA256

                              9ea89aaf12dc77b1596e17dec09db62b810e4fc3c764f56c2eb8394bf2f84f2a

                              SHA512

                              592e5ee249723b1b54edf1f363603a861fb143708f73cc93320a8a60909ba3bb186034f5d7770034ea42942a3f01e1e19e59aab6f20bfc87dd9357705e44a145

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json

                              Filesize

                              19KB

                              MD5

                              3223d78939559c9884810920295257f7

                              SHA1

                              001f0d5b4ce8c86cc38dc063f3303ca94f52bcfe

                              SHA256

                              72efb58698db8b26d1e16a8d0bd65bc89720df1cd05855d46a7b214add4a9bd8

                              SHA512

                              b3e164ec89f14e26a6e4d04b5603afde0611c18a0d33d5ecb40a6c11d52ce67774bf50639b4af0c96b98a1c0be91f92600e0f29ac874b53aafdfa03e7ebdb92b

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                              Filesize

                              13KB

                              MD5

                              087799809715c7ae8b2b4e5b32497140

                              SHA1

                              d169a2630843fcf521d7b44ca94e73dcd49b4c02

                              SHA256

                              88908e30dc091f6ddc3af924af685845e36740c362d6cec1a95c7c0f987f5191

                              SHA512

                              5334bb0e0ce4132878ff161c058558dbcf86a676f625efd95d94633320df81ff2668ea37c47e879966b189eea1e67a377c97afa36b8d8046ade270fa815dc79a

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308

                              Filesize

                              9KB

                              MD5

                              0a6e6dd301c1279c262654689875e523

                              SHA1

                              5250c5494f6944e7ee03321b90cfbfe78fb0e1bf

                              SHA256

                              f8e948a1d283ca2389fbf1f0aa9c6e3cb37bf79c798211a79e4f8c9b4120174e

                              SHA512

                              48c8a27c25762c11768280b78c64bfd885554c898b13f84e0b75a7cb459b8bc9df3c22072745fc38ebc40be3ef9e3770d32e495e381c0e2537664cc6501648a4

                            • C:\Users\Admin\AppData\Local\Temp\1007634001\9d748d51b7.exe

                              Filesize

                              4.2MB

                              MD5

                              e0daf3617f84af41981769a31ed23565

                              SHA1

                              e366c1340ba76460bbb29a86530bb855fbd2ffaa

                              SHA256

                              3a312ae4537c6311d8d2a395f3ce7b1b7ba74280b84069c800ca9f81efa23eec

                              SHA512

                              a33c985efd651dce9dcfcb84285485a01fa39c74ee593b1e68be83ebf8b8b29a1e7807e7b54f691b0c9db24bddc15a5bc6d376dfc8cb8994c2e5b754639e4039

                            • C:\Users\Admin\AppData\Local\Temp\1007639001\5cbea9db84.exe

                              Filesize

                              1.8MB

                              MD5

                              c295093aa18965205a72349f476a9cf3

                              SHA1

                              a6be2adb5b6cec99d08774cc16f97a0958e725fd

                              SHA256

                              e17a1dea3206e9cd29badca66347857b796122e12ed6017f0889bf8e196dcfd8

                              SHA512

                              697136ddf3e73f24ab10931481de27972679996d98ad73dc5376637696e40febed34f9ceda624725b5da58e4f65f435f49df2198b64c5502cd7cd0e1b16d02fd

                            • C:\Users\Admin\AppData\Local\Temp\1007640001\4c542def46.exe

                              Filesize

                              1.7MB

                              MD5

                              7a3b3989f1f3647dc9188a185b345d43

                              SHA1

                              475a5d5e48c0f25f8083ff7657e9d6958e39d2ad

                              SHA256

                              749a24775a9225dd27ed9d457d9a82ace5122cdcaaef5069ae3e802464e2c77b

                              SHA512

                              a0709cbff8c8a4a55de37bb2829c1b7922b96d5e74e71655d932a7bc355d6ccbeba0ce84f89698439ff2e3831a671cea427785d0f0024731bc04a6390a48ac8b

                            • C:\Users\Admin\AppData\Local\Temp\1007641001\506a2c2d43.exe

                              Filesize

                              901KB

                              MD5

                              68d659f5943261e1ef96ef4bf5ee50a0

                              SHA1

                              7503ccd4b8cad67a68c335f3f6cf0ef0cce84780

                              SHA256

                              dbf65560ef727cd961e0e0144e3a945c7655debfe059cc5a84e4e5069eeecc80

                              SHA512

                              aeaf6e7c4de4416c3a481e9e58845482819be63ed7462ef52c59fca30ad8961f5cdf57d5a6419afe8c836215e8d70c950ddb2a06dc82554c385df2a53678118b

                            • C:\Users\Admin\AppData\Local\Temp\1007642001\23ee89a93e.exe

                              Filesize

                              2.6MB

                              MD5

                              17953500d9b941e5d42ea7121adaadc8

                              SHA1

                              e98556a798deec4b705ede2908316aa337658904

                              SHA256

                              7c4cdf4ff736598c7c4611feb1c4de1e845b3fd4e8708ddbb652b967e6722dd3

                              SHA512

                              7f35e7651e60a558f1c4c08c4ae086a786b6ea86b16bf8fbb61f07f59512b957598ce7d3e35edd1ae39f53b79c886869e2d583b452a950a75e4ab8adb7820bbd

                            • C:\Users\Admin\AppData\Local\Temp\1007643001\GuidanceConnectors.exe

                              Filesize

                              741KB

                              MD5

                              211dd0cc3da148c5bc61389693fd284f

                              SHA1

                              75e6bd440e37240fee4bf7ae01109093490ac5a7

                              SHA256

                              645ee0535f2ada91b101c0029f2fb71de2a27c10a5446e84d3547968ea36eafe

                              SHA512

                              628bb927b5a85674ed1f762d4c42e8e9f55859cd626ab0f01b7d47ee4c74ff5775ceafc4a45864344d5dd13e588fe60b6a121b00dac79276689d0a9970d12e89

                            • C:\Users\Admin\AppData\Local\Temp\390641\B

                              Filesize

                              224KB

                              MD5

                              6aaa6156bca65c60437b9dcf21a8566e

                              SHA1

                              74c4917b5006a2af825ed9e9d3bdaff7884aa11c

                              SHA256

                              fe153e9df223598b0c2bba4c345b9680b52e1e5b1f7574d649e6af6f9d08be05

                              SHA512

                              02f8a158815b29cfbad62403b5177ea5e073d84103e640441d901e12b2fbc4f2cd113924d2b06b09cf045c99b58a5527f2c68e6a664d8015f646672c11567199

                            • C:\Users\Admin\AppData\Local\Temp\390641\Imposed.com

                              Filesize

                              921KB

                              MD5

                              78ba0653a340bac5ff152b21a83626cc

                              SHA1

                              b12da9cb5d024555405040e65ad89d16ae749502

                              SHA256

                              05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

                              SHA512

                              efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

                            • C:\Users\Admin\AppData\Local\Temp\Accessing

                              Filesize

                              52KB

                              MD5

                              0487661a3be3e516ecf90432e0f1a65b

                              SHA1

                              548f56668cdfde2d71e714cd4e12e3a1419dfc31

                              SHA256

                              1dbfc503087ed424d8befd455c6554ba03aa4c4c5e77f7b388dc412b6a99a70e

                              SHA512

                              7f9027e567876bae2302652a2d63b457bc39f439ec6cd4d7d170423c5f27aa5b0479113b7d8c436cbc08ac76450b0e56c2d8dd42a219c7ad3dbbf693f935cf77

                            • C:\Users\Admin\AppData\Local\Temp\Blade

                              Filesize

                              919KB

                              MD5

                              c09756dea58e68a563c05c98f2ee5822

                              SHA1

                              90675ae3c1a7f575dee20ceee5cbf3d761aee432

                              SHA256

                              0d43333d98724395292ff88d573ad31c6ff65a0ec117e3a605b1009478f91ac8

                              SHA512

                              c5b0bff60c4b44f62e224a58dbd508efb20f1324c85c62de13134f909a1cfd63349402d7472940992b6447685fbb665fd28929dc6693a5f3f1222173a8c477c7

                            • C:\Users\Admin\AppData\Local\Temp\Entire

                              Filesize

                              82KB

                              MD5

                              09d17ffb85794728c964c131c287c800

                              SHA1

                              a1d7a2dea5e0763de64fb28892786617d6340a86

                              SHA256

                              f913264e2aa6be78dae1261782f192ae4ef565439c5ad68a51c0397b33ee1475

                              SHA512

                              d174de399777b691443de3abff35dde5040d84ea06f252e86ec5b76bc2c02dc0c5c430f0ed9bab83a69e128a7cea989a1a24c6f579947e448db1cc393838b1d6

                            • C:\Users\Admin\AppData\Local\Temp\Et

                              Filesize

                              32KB

                              MD5

                              0e9173e00715288b2d6b61407a5a9154

                              SHA1

                              c7ba999483382f3c3aba56a4799113e43c3428d5

                              SHA256

                              aa4685667dd6031db9c85e93a83679051d02da5a396a1ad2ef41c0bdf91baf66

                              SHA512

                              bb13d5de52ea0a0178f8474fceb7e9fc2d633baceacb4e057b976cac9131152076544891d0959fa22fe293eeee942ae0f6a2fdd3d3a4c050a39549baa2cb5ecd

                            • C:\Users\Admin\AppData\Local\Temp\Frequently

                              Filesize

                              8KB

                              MD5

                              283c7e0a2d03ff8afe11a62e1869f2e5

                              SHA1

                              235da34690349f1c33cba69e77ead2b19e08dbc9

                              SHA256

                              38582d3231748a788012e4c27a5ac0f54f9cb0467d60ecc247a31ea165edeef9

                              SHA512

                              b9ba42910d150ce9e07542a501c4134fb668f9b4af70db1ed8fa402066c8fb5025cf4bb29abd91c877571361e71c582e1e7c5350b28c7bda18d6bf184e85273e

                            • C:\Users\Admin\AppData\Local\Temp\Peripherals

                              Filesize

                              58KB

                              MD5

                              6337b4a0ef79ecfc7a0e70beea5d5b5b

                              SHA1

                              904aaf86b183865a6337be71971148e4ef55d548

                              SHA256

                              024ad40c289bfdbea25aa7c319381595c700e6e9e92a951bc2e5df8a21382630

                              SHA512

                              9b88533915190062002702b2b632e648a94f086b987040d3f22f1bc718a2e58fbcb6d85a9ad17c8ee34018364cd9486d52bef91d645cfc3608aa3b592fca6b48

                            • C:\Users\Admin\AppData\Local\Temp\Version

                              Filesize

                              1KB

                              MD5

                              51c0f6eff2d7e54810b653329e530404

                              SHA1

                              52aef28dab5ba3202341fe2a34f64744f268b991

                              SHA256

                              a8f5d7c5caed37fa9f6dc432c1f854f32564d6cf0fec70f4bede96ba4df4dcdd

                              SHA512

                              ae804726dabe115186e5ccaf7827912b48517a8a4dea8bafa2d35286bc60cb1203cbe71b6936cc269bfa82c7037bacd79d9dbb586e49909fcb1d84e99e6f3fe7

                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                              Filesize

                              1.9MB

                              MD5

                              8016c72a6e4bf40375e31e867f487fa7

                              SHA1

                              98cee0e4a8751579ece1e66cb6429ea912526410

                              SHA256

                              6f8f6f652654b2cdf67a5fe92652e349da600dfca2076f3d41b9c336434db169

                              SHA512

                              769cb20163e136187b03e99dfebeaaa4ac4b7815a95b105f511d2ae76bd38f9a882c53380745f1222fc6dcc64a1d8858e8e2e2484f9689b8bd1896b06a9b6685

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              479KB

                              MD5

                              09372174e83dbbf696ee732fd2e875bb

                              SHA1

                              ba360186ba650a769f9303f48b7200fb5eaccee1

                              SHA256

                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                              SHA512

                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-2

                              Filesize

                              13.8MB

                              MD5

                              0a8747a2ac9ac08ae9508f36c6d75692

                              SHA1

                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                              SHA256

                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                              SHA512

                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                              Filesize

                              6KB

                              MD5

                              65ae7f4308143cd2332201642a428571

                              SHA1

                              a8a4e5a647aab08383e193b6f3d18da5cad25538

                              SHA256

                              11055fdb02bbc55ae9873a752ee8714c451876af1c9d08ad898beb140e0e6441

                              SHA512

                              9a8911cfa1476c4ece0c369fbba9621b9b1fdaa057abcf6811963c5332a0e9f9813a41a763717dbf033078b88fdfe5f06e65acc24c055fa94077b85a71945250

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                              Filesize

                              8KB

                              MD5

                              3cf14efd4ef11f29df6f920b025d04e6

                              SHA1

                              63adc919c4709073ef9c384907abe407f13d933c

                              SHA256

                              0f102a93605d9175c719c5b8881dd784d4db45bf9b326947346e7e6b05d4adbe

                              SHA512

                              8ec3e11e26b83be4da57d807d516b7ac24910d70e56811c42d1ef54c170a811f865415d6b3dcde1c2c2b5bf315f1eb2bfe162f226a68647751a9a7841642ddbb

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                              Filesize

                              17KB

                              MD5

                              562ece423deb9e69ef73212843e1562b

                              SHA1

                              9223437028b9c91f0c670087c3f34b3ce39b9809

                              SHA256

                              59ceeb158112e7a5c9989315881f02a5fd515c4493cb8bcd476bb45e812d732a

                              SHA512

                              5d7cb6d2fb44dfea30ac35ad1d77a5d050bf172c57bf29a5074aa2e02636ad5799cb89d7e51c67aebf441b37717c44cf6d552a6d62b1d25d972fe5b86eb30155

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              27KB

                              MD5

                              986d48dea2ac08df846c9fbdf82fa6e7

                              SHA1

                              385c7469694304c2759f5cc01606bbe56ec83a38

                              SHA256

                              c50daa6f7f783c5e3846c3c94830bddcd49af510cda4a558c5c303c3a2be4939

                              SHA512

                              9469fe1f2abae5ebe8d56a0206054dda121ebbc3dd5a06d3170544890585dc9988f43e27a0dd06c7073098c0aa5023d1b1cc8ac0ae1dd11dd8165c28fe41948e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              5KB

                              MD5

                              ce88b790f6d78945a3c10c9273781735

                              SHA1

                              0a3c9476e5bc65c2e48be9424f5edabba12faa3c

                              SHA256

                              1318ab9da46e952caa0e6f417aeecac1574647a2275f9f030557e1e985ba6250

                              SHA512

                              88ddf0f1e7c8caa834ba53b4abbdff0679b69524d5f6e8018d657d58eedb00a241ba98a10dc57aff79a781a0d71ed6bc7d916900593e0636aeb376de5e0eab96

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              cd159bd6a758a880613178a560405a50

                              SHA1

                              07b8416b89d4d43eee6ea17a2387b0f029dd2baa

                              SHA256

                              35a017ce5e55495d2729c7a6de92a1dbfcf307b9bb6e446b8ad2ea59abd73b24

                              SHA512

                              6aff94ea3ab44e16143963c7c3fa5dfa5544d3b9c4abe8369f8a365a619defcbcef9901202b5a1221c7c1eab806e9e09351c06fa2d429148461dc40cab31b96e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\84874a0b-1b13-4ffd-8103-8373a49c9542

                              Filesize

                              25KB

                              MD5

                              caea531223053c2690a02a813ca9e395

                              SHA1

                              2ced35770b71d10b3735c02e153086fb12ac983d

                              SHA256

                              886046ec4636427dca77503c93c3a2156865660c31a7fa9854369fcedeff699b

                              SHA512

                              f88b3ba8daea21bf663363cc456f315e09cdef05194996fb1e6dcdca4306683522d8f7f7a6ad777ccff83e3b204d28bab73db09688894373b75b31ea49ebaed2

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\db546ff0-5661-4115-806d-9fea5e18d97f

                              Filesize

                              671B

                              MD5

                              3af5528aca7b295a6dd1f2b7d25c9e3a

                              SHA1

                              224cf1b2bd3088eb72f33e5135bee38939e40eeb

                              SHA256

                              482bee28f053cbf65a693aeba2dd53fe85f66a5f0e720917c05b4f5f0c9fcec5

                              SHA512

                              b47b9dcfccb634955b8a5ac1dcd321098707a4c38ecd27a60082726b1359b67694bd61ecac863140f00b94e583fc05315ca17ab72812ec674590f06f98ca2ac3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\e499036a-13d3-48b0-9d9b-fa0423d29250

                              Filesize

                              982B

                              MD5

                              3de1bdad8a9333799c8059c6cdda107d

                              SHA1

                              11dbc521acf535549c3fbc4684fe030deb7bd9d0

                              SHA256

                              5272748388ad3a43d69bff061731d939e96505654d4dcaf86d14eab1523a71db

                              SHA512

                              2a04f4e15d378882cfc8184db4918cbbb718551dea98e6cdf72522cbd406038168410a7425ca38eba830063e6988470aa415ca3605dda18f4fc9a799581eb2dd

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                              Filesize

                              1.1MB

                              MD5

                              842039753bf41fa5e11b3a1383061a87

                              SHA1

                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                              SHA256

                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                              SHA512

                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              2a461e9eb87fd1955cea740a3444ee7a

                              SHA1

                              b10755914c713f5a4677494dbe8a686ed458c3c5

                              SHA256

                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                              SHA512

                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp

                              Filesize

                              479B

                              MD5

                              49ddb419d96dceb9069018535fb2e2fc

                              SHA1

                              62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                              SHA256

                              2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                              SHA512

                              48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                              Filesize

                              372B

                              MD5

                              bf957ad58b55f64219ab3f793e374316

                              SHA1

                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                              SHA256

                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                              SHA512

                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                              Filesize

                              17.8MB

                              MD5

                              daf7ef3acccab478aaa7d6dc1c60f865

                              SHA1

                              f8246162b97ce4a945feced27b6ea114366ff2ad

                              SHA256

                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                              SHA512

                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp

                              Filesize

                              1KB

                              MD5

                              688bed3676d2104e7f17ae1cd2c59404

                              SHA1

                              952b2cdf783ac72fcb98338723e9afd38d47ad8e

                              SHA256

                              33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                              SHA512

                              7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp

                              Filesize

                              1KB

                              MD5

                              36e5ee071a6f2f03c5d3889de80b0f0d

                              SHA1

                              cf6e8ddb87660ef1ef84ae36f97548a2351ac604

                              SHA256

                              6be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683

                              SHA512

                              99b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                              Filesize

                              12KB

                              MD5

                              51e1db1fa951f454610ccce460ec935c

                              SHA1

                              918907950a74d3ee53ead3aa0b5af1901f5e6194

                              SHA256

                              c77845e5bf78d37b73fe7fe4c9c89f8378eac9347f01b3297f965fff9fe4554e

                              SHA512

                              b967554df04f314b92e296dc5b1429f07d0451c165d2fbc1b3ceed96e47e2670443061a5ff9eae28e284594663f8187d6aed0b03f718829441fb1001ac950974

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                              Filesize

                              10KB

                              MD5

                              6d6dab58bf716185b66c91b65ebfc757

                              SHA1

                              460b9c3925335eba21507b752778248e67ed7d9f

                              SHA256

                              49d4a68015b3b5bf29a5b777071be6bd4b7aef9d3415ad0269c704bcecc14843

                              SHA512

                              ebbbbee349a1be7643a03a8f7d54b7e7584b9e2d7896746cb445a82312aebbacf34b0bc9531d30af2744ef0285d7760c45889b07bf57585632399b880e9ca1b6

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              db167b476a7aca440d3f05b5d6840f32

                              SHA1

                              c13b8cda7362ed406835be0d046c11f4e84d198a

                              SHA256

                              db2fd6bf72587ca446caf44789c7fca2c7cdac3aad96a647274a91ad05e384de

                              SHA512

                              d21c15b76683c3c8fa854ec7c88af23819276dc0d3516c7d20ee9f8c1d3fd598280ff01403a45e338ec3899deb634aab6ccfe13a6a33cf93958e812c753cec99

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                              Filesize

                              2.5MB

                              MD5

                              bd26b9dbb8ba5de87664a116be3af47d

                              SHA1

                              968b0827a6bd9c1363d7e4b751fcb3b732eb0f7a

                              SHA256

                              da9c296e1ce164b0efcabebc8e7ea552088493c1cb90eacc714c169399834b81

                              SHA512

                              2e0580aad059a9800e96384c846dc9f8804be47de147d57aae322307cec327606f0c38b41a66ad6e6782a9bf3db8d86f9a44b38c6f85dc6ee566b9ad783f1c36

                            • \??\pipe\crashpad_632_KPQLNYEAJEINRVGO

                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                            • memory/1360-75-0x0000000000380000-0x0000000000A13000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/1360-76-0x0000000000380000-0x0000000000A13000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/1452-57-0x0000000000EA0000-0x0000000001341000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1452-59-0x0000000000EA0000-0x0000000001341000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2284-4045-0x0000000000ED0000-0x0000000000EE2000-memory.dmp

                              Filesize

                              72KB

                            • memory/2304-4037-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-4046-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-78-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-20-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-500-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-4002-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-3512-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-737-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-1977-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-4025-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-747-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-17-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-18-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-988-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-23-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-22-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-4049-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-21-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-4052-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2304-19-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2452-40-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-4036-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-99-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-823-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                              Filesize

                              10.4MB

                            • memory/2452-39-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-750-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-79-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-614-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-1063-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-4030-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-77-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-4019-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-740-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-41-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-3663-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/2452-2139-0x00000000000D0000-0x0000000000D21000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/3248-4042-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3248-4041-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3948-867-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3948-898-0x0000000000800000-0x0000000000CDA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3960-4038-0x0000000000ED0000-0x0000000000EE2000-memory.dmp

                              Filesize

                              72KB

                            • memory/3960-4039-0x00000000731D0000-0x0000000073304000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/5072-0-0x0000000000A10000-0x0000000000EEA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/5072-15-0x0000000000A10000-0x0000000000EEA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/5072-5-0x0000000000A10000-0x0000000000EEA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/5072-3-0x0000000000A10000-0x0000000000EEA000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/5072-1-0x0000000077854000-0x0000000077856000-memory.dmp

                              Filesize

                              8KB

                            • memory/5072-2-0x0000000000A11000-0x0000000000A3F000-memory.dmp

                              Filesize

                              184KB

                            • memory/5116-123-0x0000000000010000-0x00000000002B8000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5116-719-0x0000000000010000-0x00000000002B8000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5116-716-0x0000000000010000-0x00000000002B8000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5116-117-0x0000000000010000-0x00000000002B8000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5116-124-0x0000000000010000-0x00000000002B8000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5724-746-0x0000000000400000-0x000000000040B000-memory.dmp

                              Filesize

                              44KB

                            • memory/5724-748-0x0000000000400000-0x000000000040B000-memory.dmp

                              Filesize

                              44KB