Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 01:00

General

  • Target

    ea7617b4a5571a89a06ef9bb195dc92a178ea4e0a6a514030eb288f54d26f0a3.exe

  • Size

    1.7MB

  • MD5

    0c50a08dffa73cfbb9ee5ba4382bdefc

  • SHA1

    b21d45218d280416859c21b9c628315d6d71690f

  • SHA256

    ea7617b4a5571a89a06ef9bb195dc92a178ea4e0a6a514030eb288f54d26f0a3

  • SHA512

    529275d8e96270c711ecee981bb07a3e70eab1a01e3550898449cc9cf2da57b0e823d36fcbfca92f006ebd2b47dd1e9d7dbf2367baf14e010f179e521eeabeea

  • SSDEEP

    49152:trCQTxztO4r76EMuOfB/vxbPGpz5aFot5wlN:zrO276+6B/ZbYaFo5wlN

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea7617b4a5571a89a06ef9bb195dc92a178ea4e0a6a514030eb288f54d26f0a3.exe
    "C:\Users\Admin\AppData\Local\Temp\ea7617b4a5571a89a06ef9bb195dc92a178ea4e0a6a514030eb288f54d26f0a3.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
      2⤵
      • Uses browser remote debugging
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff998a3cc40,0x7ff998a3cc4c,0x7ff998a3cc58
        3⤵
          PID:1672
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1856,i,12854789682213548259,15712622689393235998,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1852 /prefetch:2
          3⤵
            PID:4708
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,12854789682213548259,15712622689393235998,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2196 /prefetch:3
            3⤵
              PID:5012
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,12854789682213548259,15712622689393235998,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2264 /prefetch:8
              3⤵
                PID:432
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,12854789682213548259,15712622689393235998,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:2212
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3224,i,12854789682213548259,15712622689393235998,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3248 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:424
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4304,i,12854789682213548259,15712622689393235998,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4288 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:3168
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3188,i,12854789682213548259,15712622689393235998,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4448 /prefetch:8
                3⤵
                  PID:4360
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                2⤵
                • Uses browser remote debugging
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of FindShellTrayWindow
                PID:4552
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff989d346f8,0x7ff989d34708,0x7ff989d34718
                  3⤵
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  PID:228
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,7005522109111949269,15302020896174731944,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:2
                  3⤵
                    PID:3980
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,7005522109111949269,15302020896174731944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:3
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3440
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,7005522109111949269,15302020896174731944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:8
                    3⤵
                      PID:2652
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2064,7005522109111949269,15302020896174731944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:1
                      3⤵
                      • Uses browser remote debugging
                      PID:4688
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2064,7005522109111949269,15302020896174731944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:1
                      3⤵
                      • Uses browser remote debugging
                      PID:3468
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2064,7005522109111949269,15302020896174731944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:1
                      3⤵
                      • Uses browser remote debugging
                      PID:4068
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2064,7005522109111949269,15302020896174731944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:1
                      3⤵
                      • Uses browser remote debugging
                      PID:2428
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsGHIDGDHCGC.exe"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:828
                    • C:\Users\Admin\DocumentsGHIDGDHCGC.exe
                      "C:\Users\Admin\DocumentsGHIDGDHCGC.exe"
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      PID:3844
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                        4⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Adds Run key to start application
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5008
                        • C:\Users\Admin\AppData\Local\Temp\1008068001\2091a04c75.exe
                          "C:\Users\Admin\AppData\Local\Temp\1008068001\2091a04c75.exe"
                          5⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:848
                        • C:\Users\Admin\AppData\Local\Temp\1008069001\2e0d02ffe3.exe
                          "C:\Users\Admin\AppData\Local\Temp\1008069001\2e0d02ffe3.exe"
                          5⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1460
                        • C:\Users\Admin\AppData\Local\Temp\1008070001\2a479f5fab.exe
                          "C:\Users\Admin\AppData\Local\Temp\1008070001\2a479f5fab.exe"
                          5⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:3848
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM firefox.exe /T
                            6⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2708
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM chrome.exe /T
                            6⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:696
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM msedge.exe /T
                            6⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1992
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM opera.exe /T
                            6⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1012
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM brave.exe /T
                            6⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3352
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                            6⤵
                              PID:4796
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                7⤵
                                • Checks processor information in registry
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                • Suspicious use of SetWindowsHookEx
                                PID:4712
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {748ac4b9-be1e-4718-b9c8-ba5ccedad639} 4712 "\\.\pipe\gecko-crash-server-pipe.4712" gpu
                                  8⤵
                                    PID:3572
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2448 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ba5fcf9-bf28-4d8c-97ea-fb615fd4161a} 4712 "\\.\pipe\gecko-crash-server-pipe.4712" socket
                                    8⤵
                                      PID:4776
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3088 -childID 1 -isForBrowser -prefsHandle 2744 -prefMapHandle 1604 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3640be1e-1e80-4e52-9c2f-0dc043ec8daf} 4712 "\\.\pipe\gecko-crash-server-pipe.4712" tab
                                      8⤵
                                        PID:1400
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3636 -childID 2 -isForBrowser -prefsHandle 3676 -prefMapHandle 3672 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a794857a-a1c1-40f8-8a4d-027729369e81} 4712 "\\.\pipe\gecko-crash-server-pipe.4712" tab
                                        8⤵
                                          PID:3388
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4180 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4200 -prefMapHandle 4196 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3ceb6448-13e2-4117-860b-1d85cb3f8a6a} 4712 "\\.\pipe\gecko-crash-server-pipe.4712" utility
                                          8⤵
                                          • Checks processor information in registry
                                          PID:3608
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5348 -childID 3 -isForBrowser -prefsHandle 5400 -prefMapHandle 5368 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d2c61674-112b-4043-893c-a79656ba9c1a} 4712 "\\.\pipe\gecko-crash-server-pipe.4712" tab
                                          8⤵
                                            PID:5824
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5620 -childID 4 -isForBrowser -prefsHandle 5540 -prefMapHandle 5544 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {515c66a2-0b36-4f0e-8b5e-1a2d47b6db79} 4712 "\\.\pipe\gecko-crash-server-pipe.4712" tab
                                            8⤵
                                              PID:5836
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5736 -childID 5 -isForBrowser -prefsHandle 5816 -prefMapHandle 5812 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c69c7700-6305-4128-9623-0b0842d792ec} 4712 "\\.\pipe\gecko-crash-server-pipe.4712" tab
                                              8⤵
                                                PID:5848
                                        • C:\Users\Admin\AppData\Local\Temp\1008071001\3b29110b8c.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1008071001\3b29110b8c.exe"
                                          5⤵
                                          • Modifies Windows Defender Real-time Protection settings
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Windows security modification
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1316
                                        • C:\Users\Admin\AppData\Local\Temp\1008072001\1ca305c1ca.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1008072001\1ca305c1ca.exe"
                                          5⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:3700
                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                  1⤵
                                    PID:1268
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                    1⤵
                                      PID:1508
                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      1⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3708
                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      1⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2984

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\ProgramData\mozglue.dll

                                      Filesize

                                      593KB

                                      MD5

                                      c8fd9be83bc728cc04beffafc2907fe9

                                      SHA1

                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                      SHA256

                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                      SHA512

                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                    • C:\ProgramData\nss3.dll

                                      Filesize

                                      2.0MB

                                      MD5

                                      1cc453cdf74f31e4d913ff9c10acdde2

                                      SHA1

                                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                      SHA256

                                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                      SHA512

                                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                      Filesize

                                      649B

                                      MD5

                                      f7f5eba42a1d6c95bac8f76a1cd9310a

                                      SHA1

                                      b355d9139feb240ebdd3168a396f82d1bf30b462

                                      SHA256

                                      aa95fa411a1c4c5fc1cbd7234da0255ecb9479f54cbf4ae71a14fc8d0bb78ef9

                                      SHA512

                                      a4fb4ca40d05ce36babc409737e4be1816bd6ce292bb51b0ae38b273ee3099000cdd3fd1334b69071d2b19cd41ceacbdabfe8225f0f841a2e65565ef72ec60f4

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                      Filesize

                                      2B

                                      MD5

                                      d751713988987e9331980363e24189ce

                                      SHA1

                                      97d170e1550eee4afc0af065b78cda302a97674c

                                      SHA256

                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                      SHA512

                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      36988ca14952e1848e81a959880ea217

                                      SHA1

                                      a0482ef725657760502c2d1a5abe0bb37aebaadb

                                      SHA256

                                      d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6

                                      SHA512

                                      d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      fab8d8d865e33fe195732aa7dcb91c30

                                      SHA1

                                      2637e832f38acc70af3e511f5eba80fbd7461f2c

                                      SHA256

                                      1b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea

                                      SHA512

                                      39a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      bf2dee068973b1fc1860975626360c0a

                                      SHA1

                                      a364c0c7d17cddbe99747f14d57953b9658c9c3e

                                      SHA256

                                      a51fba9b9734b543cf9b59982dfaecc980c24469b6e244513fbcbb9acc8dbfef

                                      SHA512

                                      81f10a6c92de7cc64ca797ffce37ce283972e970aec83744ae8efdc408c141664f1d57d6e34f21addc5774afd3ef8531b2ed37daa11e9693b9cc6e140bf6ccf1

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json

                                      Filesize

                                      27KB

                                      MD5

                                      e22a07a46aa3d94948ca739bed105b1f

                                      SHA1

                                      aadfeac2a378c96d71b7a861057df9558c52dcee

                                      SHA256

                                      a7c9174b2a3eff02098d658290e4feef5bd0b019ecefbe6db9c789d6b49981ec

                                      SHA512

                                      59bdebbf324990d5560b1b55b285693f87bbf7e8a800b7137bf2db2510a9a84c6049389de062c99e6224a6054faa26e70584b7eb61116b1239b06e05f9d737aa

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                      Filesize

                                      13KB

                                      MD5

                                      7092f8d1b6781810f9fc362b6a5e5228

                                      SHA1

                                      ccdf4843fff3a2463229b3febe689b04a0297589

                                      SHA256

                                      a74967f74aac979695d870dce6bcd7bffd48ee72a89a5b978129c9d7aef1e2c2

                                      SHA512

                                      fe5b195cc24231b575dbe2e3830b5b1ca38e74f3f7076501db42d3d939f624dda9d7e6e5227f2c3843bf220fc7f5e16f6089bd96f167ced0b5af36255d22e2b1

                                    • C:\Users\Admin\AppData\Local\Temp\1008068001\2091a04c75.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      6d02dfe090a1e4d84bdfa569ebe81d9c

                                      SHA1

                                      cae4963adf527d1ded42e49d3b47d20a9f79ed88

                                      SHA256

                                      61c8b17d2e8d8317a67de78ee3e19c583d50fb2ecac1914638fb02c3439db4bc

                                      SHA512

                                      fadc5b2a169b17305c0110baadb2a8465d89bed99f5267bd0b4d2f978076fa058230327212f1b6364f967348ecaf520d65f87e5819146055c003550aa5ee4f1b

                                    • C:\Users\Admin\AppData\Local\Temp\1008069001\2e0d02ffe3.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      cbca0ed5dafeb31daabe0a2f092d50d1

                                      SHA1

                                      cab57f59cff06d3f6fd8bcc0fb7d8c950d365fdf

                                      SHA256

                                      7f9f6c1ccb628c0022abd2fe74b54afcb31df6a42b4a6c5257ef0524a495d9cb

                                      SHA512

                                      c17f507d62c4ed4ca2641b2e0f5e52c55f2f32e046a4f53fa358335158e7bfadc0d5639523f1e3d3cbba1fc0d0e6160b3c0d97801f2e871f5c4d230e7ef35c95

                                    • C:\Users\Admin\AppData\Local\Temp\1008070001\2a479f5fab.exe

                                      Filesize

                                      900KB

                                      MD5

                                      971c61ce1e35a0a341d69c352841ea4b

                                      SHA1

                                      bf74441e20477625a08a5b80c797d7579c9da733

                                      SHA256

                                      ed5f05b07d5767ddc471c2ba8bd4dc2d84343121a16bd5746fca1aef99c90d3b

                                      SHA512

                                      96794646a075b2302557ec2f4a8ebf2e1bc25865cd780ca7992c793dfeb28d4b0a7de68f02fc4ae8d19069b933b2e067a25474bd47b267b0828602b941ae7fa8

                                    • C:\Users\Admin\AppData\Local\Temp\1008071001\3b29110b8c.exe

                                      Filesize

                                      2.6MB

                                      MD5

                                      e52648a7fe5cf3471772acda81fd2765

                                      SHA1

                                      dd385f3a714b32b1f5f056166b42e4cf8446c5af

                                      SHA256

                                      fa39001e5e217ead48fec7c40d1160b3bbd7f392ba01adf0182791347c7f10a9

                                      SHA512

                                      70f881ca9c12971c33c6057b796d45580399e9d7c0b7ac1a8598529d5e0203c0796ca44844bc1bba28766ae31089609282d55be04ad064346c4a30bc36271d45

                                    • C:\Users\Admin\AppData\Local\Temp\1008072001\1ca305c1ca.exe

                                      Filesize

                                      4.2MB

                                      MD5

                                      7300372edfa809331d4b525a77c2a93d

                                      SHA1

                                      0540bbbf3b91b4ebbe67807be1c3fd1db091044c

                                      SHA256

                                      524c9cae1f3bbe7c51d7adf150591c598977e035f2fb86236bc588843d352507

                                      SHA512

                                      af1ac02b02c439cb718703a40e126583982fbc0aefbbf1992126899a099754b45f1839059332a1232be89c66af6f08fdec5aedae43c5389e5baa0d6d49c556b8

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                      Filesize

                                      479KB

                                      MD5

                                      09372174e83dbbf696ee732fd2e875bb

                                      SHA1

                                      ba360186ba650a769f9303f48b7200fb5eaccee1

                                      SHA256

                                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                      SHA512

                                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                      Filesize

                                      13.8MB

                                      MD5

                                      0a8747a2ac9ac08ae9508f36c6d75692

                                      SHA1

                                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                                      SHA256

                                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                      SHA512

                                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                                      Filesize

                                      6KB

                                      MD5

                                      a07bf45669de49fbd5e2e217e79ea186

                                      SHA1

                                      d543c3489b28fb280f4553fe37011bbf67f726e3

                                      SHA256

                                      fce3c071575b1d5a56430dfb491a14e61eef1477347d4790f4025af4116f1a95

                                      SHA512

                                      b40e9eb742be3823b1a6d0daa6fd428d900b44dc2bb387e4a336712e72426d705c74adf6c464cb72f60614a732ae21930f1642a81f3f9ee4581ff4be902d7a09

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                                      Filesize

                                      10KB

                                      MD5

                                      5546498802925a89cd1271b19b7cc196

                                      SHA1

                                      c218651f9136e3a675f8ec4bb517bb506ba77cd3

                                      SHA256

                                      1f0ecf7f6dcaf832ca9266f16cce14564f1372af901c2cecb0784ac14b0e2143

                                      SHA512

                                      1cc970a788fed08be9e9551ca32525157089c74427c942db462ab4544b57afc6e6d6da3a6c32fda46e2eea0a6a4fb895e731773531b6280f23d8bed124069e90

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      21KB

                                      MD5

                                      3f761419d6fde35f717620cb2a9a3e0d

                                      SHA1

                                      bac715cf8a7f3d2854db117acb8fd79e94ed8844

                                      SHA256

                                      7aac3375ecefc6104e1dba03cf87e295e1ca4fde5e9a2580bcece20c0eba5bad

                                      SHA512

                                      cae4aa8131ce16e77104341d927520c472168c94e1de0232039997d5ce8395e92fc326c5bae0d1530cace30d56ccbea3d79f082c7037cc71e2956e792d08bbe3

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      22KB

                                      MD5

                                      218ad7745c152d2959080700abb31fc2

                                      SHA1

                                      68f940b6d3a890d51276a44a322ba1d6d2ecaa33

                                      SHA256

                                      107fa93e99c987c15b4f45b3c1ab7c439c50faafeb6c6f528dcf4fd0dfaeda7e

                                      SHA512

                                      3473e8257316e61793608ba76d6a9aa576d7085d20e7ecdd2a6a809f6825fd9106d8c3e93cb20239db5096475e1b26d3c82c11b618bc30e6f7f2edb4f9e16832

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      22KB

                                      MD5

                                      3f540c345ebb19dd99f747d42266aa55

                                      SHA1

                                      91760cc232af7a18db11af24cd64753f142d8c1c

                                      SHA256

                                      c7e46839270cc5a18bbdfc4d101985b0182e2afdbd945a16af0af571fc88edf5

                                      SHA512

                                      07dacb73695edc5bcb0d39a6f0a677e5038dc759a8a5b68f8c099dce0c8e6207469011761895a54254393b53ce59aefb432e53cf0bd90935f1c861ff0d7af08b

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      24KB

                                      MD5

                                      d313db9537572d6292aadda127906433

                                      SHA1

                                      d2863d0bf0b8fe6f1e5dc8d959f187e330721187

                                      SHA256

                                      d74f2089987ab5faafca0f5c34212cd8d4378cf7f850a3445aaa0795e7a9a9e6

                                      SHA512

                                      17c0d8e6cd7140e06f177a690496200de6aa8449dfae314362c2c4a85b9a0688dc3b950707332c49cef7c4d81ca605b67d4b9c32780262d4c3a0abc8a53b831e

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      25KB

                                      MD5

                                      4f2bd7ea32a22658bdf2c12070252d87

                                      SHA1

                                      386548dc9f926d80c30acc789293443b695d9bc1

                                      SHA256

                                      18d0cea45d94fdb840a48d0da0eab1b35fb0b3086921cfac9b0a44928b8a261b

                                      SHA512

                                      fc894b8556097298942603826f0a6d006e443059e2cf315f5c2792231032b336aa549506c8a3160c7507143989feec98039e6e1a52b786d6d9451cc43dabd30b

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\5e810733-66c9-4ad0-9b93-8a3e9688d926

                                      Filesize

                                      982B

                                      MD5

                                      a8dc0d3ad95427dbfb79f09a3b983644

                                      SHA1

                                      e951d0ab0830a1cafe8c6ef571fde40e9bbdaaec

                                      SHA256

                                      41f5fffa27e629c44d898f01054be72f3d6d0042365adbc4e4d454572a7dc012

                                      SHA512

                                      22fecd3058c7d9e67417929aafdf2b0119d678d026ba1c9ea31b5184f516340f0519671094dbd1b0fd3bd6f6dcc48ff4cbb052acc4ec264d46dbad0a3a037d89

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\b76288f6-0e94-4559-8411-f8bc4c414c67

                                      Filesize

                                      659B

                                      MD5

                                      33a6590c81350197139141f81383867b

                                      SHA1

                                      2473331e7ba337f8eb9aefcd5e56bb23688bf43a

                                      SHA256

                                      6e2c4e29119666a554b453bab47592558d612b9615718bf7bfe9bd485a9ae693

                                      SHA512

                                      215e8968c82c285853df940133596ce7dee6b2f36696ede2c853047a394881a28a1b6d83539d000df66397389a2a919505eb15ecac8400e8eb4c5c186d61498c

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                      Filesize

                                      1.1MB

                                      MD5

                                      842039753bf41fa5e11b3a1383061a87

                                      SHA1

                                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                      SHA256

                                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                      SHA512

                                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                      Filesize

                                      116B

                                      MD5

                                      2a461e9eb87fd1955cea740a3444ee7a

                                      SHA1

                                      b10755914c713f5a4677494dbe8a686ed458c3c5

                                      SHA256

                                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                      SHA512

                                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                      Filesize

                                      372B

                                      MD5

                                      bf957ad58b55f64219ab3f793e374316

                                      SHA1

                                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                      SHA256

                                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                      SHA512

                                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                      Filesize

                                      17.8MB

                                      MD5

                                      daf7ef3acccab478aaa7d6dc1c60f865

                                      SHA1

                                      f8246162b97ce4a945feced27b6ea114366ff2ad

                                      SHA256

                                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                      SHA512

                                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                                      Filesize

                                      15KB

                                      MD5

                                      5984b3c8a266d44cf77ac33063dd97c9

                                      SHA1

                                      2ed9c5faae85702e48f554fecd2532415231bde8

                                      SHA256

                                      bb6935ddfd240f6862a81064db3aa93f0429ef4afe11f6f02a6a7dabf9045fcd

                                      SHA512

                                      c44b62dc76962cd6cb86fa24747c568cf6527691657917c8746f5986cd215f9971f48af0938d5b7d084f756fc8dd22646adfb44f66ff86f7ecfca73f2a403954

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                                      Filesize

                                      12KB

                                      MD5

                                      ccb8707503d75ec33ee72f0e739f26b7

                                      SHA1

                                      f76990e53ba938779d8d364f09487d49d4c06bdd

                                      SHA256

                                      ca8748cb1101a174cf2e0190e3df6c6114cbed7ab01e84e0b735e91054a28660

                                      SHA512

                                      1bf0d769dc0950ee55f41b44fd011cd9fdea7e7d64cc5006d7ade4d963626dad41faf14c86eaf97797f805fa1b266e96ea56c38b9817451c65050bc3ef48d048

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                                      Filesize

                                      10KB

                                      MD5

                                      f7203fff22fc4bf4bfe43f6b3166ce8c

                                      SHA1

                                      2619ffceed125574249c7e2f887b4bdbadf020d5

                                      SHA256

                                      ac87b5ee78a72c4cb7576af2ee59d3f9d9e80b957fed464720c4ada9e5e01860

                                      SHA512

                                      b025299b2c07f7ced539591c24ee3649ffdf44848423aba434dd4d9d00e61c5055cda723f94e2d9eb9465907ea53eb1b25a471ead5b6cd411490fb5964197561

                                    • C:\Users\Admin\DocumentsGHIDGDHCGC.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      6d6d489a90568a8472f4efc6ac8a747b

                                      SHA1

                                      1f1b8e5594cfc41a3c6a1c2bd665e480e15eb583

                                      SHA256

                                      2a31dca6b22d2426f419fc7cc7a478353fff47f27620297b35e685ab3162f3d2

                                      SHA512

                                      d7a3a9b5086f156e7f4066d649704a29582b914f17123ecd7aa2fe3462cd493042181310913356b6eb434561fd1cf3e4efe2083a57c2a09ad0efc6755b3a9e7d

                                    • \??\pipe\crashpad_1536_NOPNYRJBVSRFULFC

                                      MD5

                                      d41d8cd98f00b204e9800998ecf8427e

                                      SHA1

                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                      SHA256

                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                      SHA512

                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                    • memory/848-219-0x00000000000F0000-0x0000000000591000-memory.dmp

                                      Filesize

                                      4.6MB

                                    • memory/848-200-0x00000000000F0000-0x0000000000591000-memory.dmp

                                      Filesize

                                      4.6MB

                                    • memory/848-512-0x00000000000F0000-0x0000000000591000-memory.dmp

                                      Filesize

                                      4.6MB

                                    • memory/848-179-0x00000000000F0000-0x0000000000591000-memory.dmp

                                      Filesize

                                      4.6MB

                                    • memory/1316-624-0x0000000000870000-0x0000000000B1E000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1316-589-0x0000000000870000-0x0000000000B1E000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1316-628-0x0000000000870000-0x0000000000B1E000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1316-588-0x0000000000870000-0x0000000000B1E000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1316-572-0x0000000000870000-0x0000000000B1E000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1356-0-0x0000000000760000-0x0000000000DEB000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/1356-107-0x0000000000760000-0x0000000000DEB000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/1356-103-0x0000000000760000-0x0000000000DEB000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/1356-92-0x0000000000760000-0x0000000000DEB000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/1356-114-0x0000000000760000-0x0000000000DEB000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/1356-47-0x0000000000760000-0x0000000000DEB000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/1356-48-0x0000000000760000-0x0000000000DEB000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/1356-115-0x0000000000760000-0x0000000000DEB000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/1356-4-0x0000000000760000-0x0000000000DEB000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/1356-5-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                      Filesize

                                      972KB

                                    • memory/1356-1-0x00000000774D4000-0x00000000774D6000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/1356-2-0x0000000000761000-0x0000000000778000-memory.dmp

                                      Filesize

                                      92KB

                                    • memory/1356-147-0x0000000000760000-0x0000000000DEB000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/1356-3-0x0000000000760000-0x0000000000DEB000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/1460-196-0x0000000000070000-0x0000000000719000-memory.dmp

                                      Filesize

                                      6.7MB

                                    • memory/1460-199-0x0000000000070000-0x0000000000719000-memory.dmp

                                      Filesize

                                      6.7MB

                                    • memory/2984-3847-0x0000000000FD0000-0x000000000148E000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3700-1155-0x0000000000EC0000-0x0000000001AFD000-memory.dmp

                                      Filesize

                                      12.2MB

                                    • memory/3700-630-0x0000000000EC0000-0x0000000001AFD000-memory.dmp

                                      Filesize

                                      12.2MB

                                    • memory/3700-629-0x0000000000EC0000-0x0000000001AFD000-memory.dmp

                                      Filesize

                                      12.2MB

                                    • memory/3700-3864-0x0000000000EC0000-0x0000000001AFD000-memory.dmp

                                      Filesize

                                      12.2MB

                                    • memory/3700-3852-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                      Filesize

                                      10.4MB

                                    • memory/3700-3848-0x0000000000EC0000-0x0000000001AFD000-memory.dmp

                                      Filesize

                                      12.2MB

                                    • memory/3700-616-0x0000000000EC0000-0x0000000001AFD000-memory.dmp

                                      Filesize

                                      12.2MB

                                    • memory/3700-3836-0x0000000000EC0000-0x0000000001AFD000-memory.dmp

                                      Filesize

                                      12.2MB

                                    • memory/3708-163-0x0000000000FD0000-0x000000000148E000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3844-159-0x00000000002F0000-0x00000000007AE000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3844-145-0x00000000002F0000-0x00000000007AE000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3844-148-0x00000000002F0000-0x00000000007AE000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5008-220-0x0000000000FD0000-0x000000000148E000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5008-1726-0x0000000000FD0000-0x000000000148E000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5008-635-0x0000000000FD0000-0x000000000148E000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5008-3845-0x0000000000FD0000-0x000000000148E000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5008-160-0x0000000000FD0000-0x000000000148E000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5008-180-0x0000000000FD0000-0x000000000148E000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5008-3851-0x0000000000FD0000-0x000000000148E000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5008-181-0x0000000000FD0000-0x000000000148E000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5008-617-0x0000000000FD0000-0x000000000148E000-memory.dmp

                                      Filesize

                                      4.7MB