Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 03:31

General

  • Target

    2IHJC_file.exe

  • Size

    1.8MB

  • MD5

    5ca58d76edc0e7291bf3d6bad7edbbe9

  • SHA1

    694124bf2e8d817b7f188706bbc49d0088317fe2

  • SHA256

    d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103

  • SHA512

    82b990ce963247c140161ce9ab28c79c5b4d648ddf46d622e152e3c0d79842be1cf1009a493b7af37b83976f36c05b56e353c6f7166dfc701979f87447f51fad

  • SSDEEP

    49152:JzqRbJAOwImTwJuvYsiI5kDbZF6j9FWHK:wRVA8xobiI566j9Aq

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2568
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:224
    • C:\Users\Admin\AppData\Local\Temp\2IHJC_file.exe
      "C:\Users\Admin\AppData\Local\Temp\2IHJC_file.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1564
        • C:\Users\Admin\AppData\Local\Temp\1008450001\5468191780.exe
          "C:\Users\Admin\AppData\Local\Temp\1008450001\5468191780.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4752
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3224
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 1012
            4⤵
            • Program crash
            PID:3244
        • C:\Users\Admin\AppData\Local\Temp\1008496001\rh.exe
          "C:\Users\Admin\AppData\Local\Temp\1008496001\rh.exe"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 536
            4⤵
            • Program crash
            PID:3548
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008595041\nig47lK.ps1"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1800
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008608041\J2W0oF3.ps1"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1444
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008609041\EM2BsXU.ps1"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3024
        • C:\Users\Admin\AppData\Local\Temp\1008610001\6aaece7576.exe
          "C:\Users\Admin\AppData\Local\Temp\1008610001\6aaece7576.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2068
        • C:\Users\Admin\AppData\Local\Temp\1008611001\99ebbe1fd6.exe
          "C:\Users\Admin\AppData\Local\Temp\1008611001\99ebbe1fd6.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1548
        • C:\Users\Admin\AppData\Local\Temp\1008612001\04eae4b03b.exe
          "C:\Users\Admin\AppData\Local\Temp\1008612001\04eae4b03b.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4072
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1436
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1608
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4848
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3552
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2596
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:3692
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:2224
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6be564c9-392b-438f-b523-ee13a6f10c35} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" gpu
                  6⤵
                    PID:3596
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c172d336-6e6c-463c-9355-f4d938a8fce0} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" socket
                    6⤵
                      PID:4936
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2984 -childID 1 -isForBrowser -prefsHandle 2956 -prefMapHandle 1624 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e63ac148-734c-4ff9-87d9-e59556900152} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" tab
                      6⤵
                        PID:444
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3644 -childID 2 -isForBrowser -prefsHandle 3668 -prefMapHandle 3664 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aef7d00d-b8fc-42ed-b584-ada6f2245e98} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" tab
                        6⤵
                          PID:1700
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4720 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4716 -prefMapHandle 4712 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87a94835-9eae-404b-9743-244f8daea258} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" utility
                          6⤵
                          • Checks processor information in registry
                          PID:5164
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 3 -isForBrowser -prefsHandle 5344 -prefMapHandle 5340 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {66076dfc-314f-4559-87ea-c8fe6d984447} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" tab
                          6⤵
                            PID:5728
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5256 -childID 4 -isForBrowser -prefsHandle 5488 -prefMapHandle 5492 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {69e0dfb4-8e37-4bd7-82de-b75503924d50} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" tab
                            6⤵
                              PID:5744
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5692 -childID 5 -isForBrowser -prefsHandle 5700 -prefMapHandle 5704 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {18ce55b0-923c-4f2d-8b50-389fd4328247} 2224 "\\.\pipe\gecko-crash-server-pipe.2224" tab
                              6⤵
                                PID:5756
                        • C:\Users\Admin\AppData\Local\Temp\1008613001\10c536af88.exe
                          "C:\Users\Admin\AppData\Local\Temp\1008613001\10c536af88.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1100
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008614041\wE2lFM5.ps1"
                          3⤵
                          • Command and Scripting Interpreter: PowerShell
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3176
                        • C:\Users\Admin\AppData\Local\Temp\1008616001\56a8fcdd1e.exe
                          "C:\Users\Admin\AppData\Local\Temp\1008616001\56a8fcdd1e.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5268
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                            4⤵
                            • Uses browser remote debugging
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            PID:4340
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff7fd5cc40,0x7fff7fd5cc4c,0x7fff7fd5cc58
                              5⤵
                                PID:5232
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2000,i,16214588296565858022,11369381641732063459,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1996 /prefetch:2
                                5⤵
                                  PID:5068
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1908,i,16214588296565858022,11369381641732063459,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2136 /prefetch:3
                                  5⤵
                                    PID:2956
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,16214588296565858022,11369381641732063459,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2272 /prefetch:8
                                    5⤵
                                      PID:3972
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,16214588296565858022,11369381641732063459,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:1
                                      5⤵
                                      • Uses browser remote debugging
                                      PID:5636
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3232,i,16214588296565858022,11369381641732063459,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:1
                                      5⤵
                                      • Uses browser remote debugging
                                      PID:5684
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4556,i,16214588296565858022,11369381641732063459,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4592 /prefetch:1
                                      5⤵
                                      • Uses browser remote debugging
                                      PID:5952
                                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                    "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:5812
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:4184
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 5268 -s 1272
                                    4⤵
                                    • Program crash
                                    PID:3684
                                • C:\Users\Admin\AppData\Local\Temp\1008617001\DgMSV3E.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1008617001\DgMSV3E.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:5660
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4752 -ip 4752
                              1⤵
                                PID:4616
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2592 -ip 2592
                                1⤵
                                  PID:3684
                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1144
                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4264
                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                  1⤵
                                    PID:5648
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5268 -ip 5268
                                    1⤵
                                      PID:3504
                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                      1⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4124
                                    • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                      C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                      1⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:5848

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                      Filesize

                                      2B

                                      MD5

                                      d751713988987e9331980363e24189ce

                                      SHA1

                                      97d170e1550eee4afc0af065b78cda302a97674c

                                      SHA256

                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                      SHA512

                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                      Filesize

                                      2KB

                                      MD5

                                      968cb9309758126772781b83adb8a28f

                                      SHA1

                                      8da30e71accf186b2ba11da1797cf67f8f78b47c

                                      SHA256

                                      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                      SHA512

                                      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      18KB

                                      MD5

                                      c53224768bfa68291b697e929287daa0

                                      SHA1

                                      f6d56a35466f23c709b228fe52310e3c6083d841

                                      SHA256

                                      6e3370afa031ce54398364462ab6fe0eecf1e6e214b0a717bbd32a21561cf1ae

                                      SHA512

                                      418c8ef1cf7199f5f94d19e6efd4d43e8c534188520dabad6253e6a7547c818dc7ba866153ad93dcb240cbd7781b822ea4fefd51aa62adecc4f5a4be3abc8113

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      136B

                                      MD5

                                      69e5ec9756a1187f3379e9fb4ed92285

                                      SHA1

                                      a834aba55849b299ff5e25de297ea3fb8f3e6cc8

                                      SHA256

                                      7ff9820cbe9815a928e835c429ce3d0dfa70c16a73eb6b7ad9aade8bd5d0058a

                                      SHA512

                                      9e4d3814251e074313094f2c483f54feac56c3808c6b1dabb34ad2969f1b9f9299a046ff8673402cd37db89613e9174087798c0806c92860ec25273edbb7184b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      18KB

                                      MD5

                                      64004dd6756afe01d46c2b0daab49144

                                      SHA1

                                      b86b63c1e1b578ef64b082f72401cfbe129295ad

                                      SHA256

                                      b135e19fb3b45bab659f3b4f7a2ed6e3c843bc368a74cdf20603443cc031af81

                                      SHA512

                                      45821c926ce4d94d3057d8f499e1c7c43e107565e55ccdf6465fa44308b672fc063dce2ee2d55f50db8843c666a063c12360a4491b5d40dc1eb24f7404af7766

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json

                                      Filesize

                                      27KB

                                      MD5

                                      e9cb6fd336daa3b23012e1fe3bceaff7

                                      SHA1

                                      d57959cac8ceebdb04b58aef21d9df31a7c79a63

                                      SHA256

                                      17d7b168be3ba40f1056068e3b36d049c84e64faba010aec41186b1a150ff5dd

                                      SHA512

                                      9feba7c83b212b682df6763b3f97fe1aca5e11174555486d90e4c5b6ca8f65c3fda9ea37d8513567b8355b4e9dac3cbcc17cfabe8ae09478601bab5f1ac69faf

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                      Filesize

                                      13KB

                                      MD5

                                      e4d3d5bcc43a72e2eeadbf112ae9e956

                                      SHA1

                                      f39c1220f87ca9e1915c3cca04d468b4714f899d

                                      SHA256

                                      a739d59230ca67d8a08d81a16b4c1d64ee252de95fde7973b6f736bf635bbe2a

                                      SHA512

                                      ec2effd82e54d28525577ed9be1ab71686b883c0e48384ec5119bd1b3cb6ceff17d7d87014054714462f2982ac430b01b58a71b0623b8aa889876ff4f1ff571e

                                    • C:\Users\Admin\AppData\Local\Temp\1008450001\5468191780.exe

                                      Filesize

                                      649KB

                                      MD5

                                      e7aa83909ace3906ec75144cc33e024c

                                      SHA1

                                      333ee9d7f4c683d8e0ed05bdadfbd2baade379e3

                                      SHA256

                                      24443cd457177eeed9c584e5d5ad194303fd94269fdb0d72e0db598215a5c826

                                      SHA512

                                      508fd7984ea8b9d8c8b2cd3c7c3587941a6ee4627c7cf54fe56db7db75dbff0abdaf0db1b0c46876dc6ad0cc21735bd7a2f0351d5edeb735b2de796beef2ea72

                                    • C:\Users\Admin\AppData\Local\Temp\1008496001\rh.exe

                                      Filesize

                                      1.9MB

                                      MD5

                                      4cecb04d97630cc2d5cce80368b87fdd

                                      SHA1

                                      4f693736497e06c820b91597af84c6fece13408b

                                      SHA256

                                      51698570a9c637ec0c9bc2b3ca6acb7edf3d7804c49b8eed33e82573950877dd

                                      SHA512

                                      acdf93d12791a6a11b307fbbdc6df2b27a6e8de6b8cc015c4892304d4653e79ac58351600b53c7ea78d285d69df8e8f2e270cf9a168b187d372a3de17e84ec66

                                    • C:\Users\Admin\AppData\Local\Temp\1008594001\Dy0G0Gp.exe

                                      Filesize

                                      612B

                                      MD5

                                      e3eb0a1df437f3f97a64aca5952c8ea0

                                      SHA1

                                      7dd71afcfb14e105e80b0c0d7fce370a28a41f0a

                                      SHA256

                                      38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521

                                      SHA512

                                      43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf

                                    • C:\Users\Admin\AppData\Local\Temp\1008610001\6aaece7576.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      64f25a20bc6a8730e6d230e5d63dac8e

                                      SHA1

                                      f1c8a90fefc9e7789013cf9228827634ad8410f3

                                      SHA256

                                      daa2f6c445600573a591de7b8ad352699dcc9ff8b5bd2e1a6f93dc373572ceae

                                      SHA512

                                      4b0e9001c5304b3deee2dd463ab5d310cf61423d773983994167093299878f28833772a746336aaa583b036a7a6510051602bc2064f7df983ae5999aae487c87

                                    • C:\Users\Admin\AppData\Local\Temp\1008611001\99ebbe1fd6.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      d3fb62af150353d3cb05f84d328d5601

                                      SHA1

                                      98be84b348beaf1abb2a9327c5918322e840a274

                                      SHA256

                                      3a0642019f4c38e2b2b89e00492dfa809723534f7753ce480e01482ca191b950

                                      SHA512

                                      428034b57853c7b0a9e1fd47590f9816a53ef497cad88bba5bf1094a12089c2022ce75be1cfe760da9342ef8d3adb853d70d01fe05f2cc6622e9c6decb91d0aa

                                    • C:\Users\Admin\AppData\Local\Temp\1008612001\04eae4b03b.exe

                                      Filesize

                                      900KB

                                      MD5

                                      4676050a0ef5a185953ab79d47cb8585

                                      SHA1

                                      dec41077d44ded9ce6d7bcf29848ebf49a89b6fe

                                      SHA256

                                      bba632ef9970be97837b7cd9fad3df8c7a0f8476cb2bb8805e1f05c6b5167fd0

                                      SHA512

                                      3c5f5c50c9c75ebd664fe4b962f0b70791472f33e731dac34547aea673cd65253d31d51f146ad181ddd6bd173636ddf3d0768098d1ba1dd76d853f1e4d72e350

                                    • C:\Users\Admin\AppData\Local\Temp\1008613001\10c536af88.exe

                                      Filesize

                                      2.6MB

                                      MD5

                                      439e7c18eefd3d53793669e1c9575d84

                                      SHA1

                                      8d6cf9ea7bcecbce59a28430636f3a6920b97d85

                                      SHA256

                                      0926fb4154569379a0a942b34acf902d259a7e8d89b0c033ca8858a5503e3965

                                      SHA512

                                      5f75a4b985dc1d05772a03a3cac8283be54c1cea5a4a6a093796b260b44f8f0ce0549ad979b31c06ae1ea16dd29a5c742ced0fc7f849940c07009df48cd59df9

                                    • C:\Users\Admin\AppData\Local\Temp\1008616001\56a8fcdd1e.exe

                                      Filesize

                                      4.2MB

                                      MD5

                                      f35acf76c5ace4e007dc64fcde784dbe

                                      SHA1

                                      8c3fbdc41b3d357b06902049e2ad6f2e4d136344

                                      SHA256

                                      86088c0dfa1761f1989204ae2d46a3a0b3defaf379a2ccd0b81b0067aae8ec07

                                      SHA512

                                      81c0f7526b83b76e9dbf8fa1256baa0945df7337dc876f45b774651449ef98d776b371d0ec91ff771dad0e722bdb2358205bfeaefc5559e738da157111f3002a

                                    • C:\Users\Admin\AppData\Local\Temp\1008617001\DgMSV3E.exe

                                      Filesize

                                      243KB

                                      MD5

                                      b73ecb016b35d5b7acb91125924525e5

                                      SHA1

                                      37fe45c0a85900d869a41f996dd19949f78c4ec4

                                      SHA256

                                      b3982e67820abc7b41818a7236232ce6de92689b76b6f152fab9ef302528566d

                                      SHA512

                                      0bea9890dbcd3afd2889d0e7c0f2746995169e7b424f58d4998c50bc49d2b37d30f5bd1845d3079b25f9963af2b71f136719cbd9fda37f7b85874992096b3e1d

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_quoj0ddz.xio.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      5ca58d76edc0e7291bf3d6bad7edbbe9

                                      SHA1

                                      694124bf2e8d817b7f188706bbc49d0088317fe2

                                      SHA256

                                      d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103

                                      SHA512

                                      82b990ce963247c140161ce9ab28c79c5b4d648ddf46d622e152e3c0d79842be1cf1009a493b7af37b83976f36c05b56e353c6f7166dfc701979f87447f51fad

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                      Filesize

                                      479KB

                                      MD5

                                      09372174e83dbbf696ee732fd2e875bb

                                      SHA1

                                      ba360186ba650a769f9303f48b7200fb5eaccee1

                                      SHA256

                                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                      SHA512

                                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                      Filesize

                                      13.8MB

                                      MD5

                                      0a8747a2ac9ac08ae9508f36c6d75692

                                      SHA1

                                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                                      SHA256

                                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                      SHA512

                                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                      Filesize

                                      6KB

                                      MD5

                                      d2efe1520b1653d69944d90351c7e24c

                                      SHA1

                                      ead0da99c7f54ce5bc5b26f39b1100ffc9f9ba1d

                                      SHA256

                                      f751d41f058d6b0f4e73d53e0d759250d0295b0ea74202c5b96ed5b61d5793fe

                                      SHA512

                                      d240c3ab4a201d0ec8c93078a4c5ca90a6062eaa2f71c9970cc1a8536b8a3c91bb00c5a7594c902cba5ac87c1ce0c52f728d1ceee2cff2c6d475f84fc05fb1ae

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                                      Filesize

                                      10KB

                                      MD5

                                      99417146fa1ce311ecf731a764ac7ac7

                                      SHA1

                                      2dbeab8c5edd00fc9dccc5221d11ba626b7e797c

                                      SHA256

                                      83c105cc996eacbc7ba967b96ae048e540f9409d6a575f913f20948a7f431cf7

                                      SHA512

                                      3268a7245abe5bdea362304b93c0853ff2776f4b9415b0963cd60c595ea6ec018bea9001ad3ab7fa3963e6f34ea2c9121a601a88e0ddb22faa39ff606d3b4471

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      22KB

                                      MD5

                                      5f34ea1a8e4f0ca0afdc22420e912046

                                      SHA1

                                      bf5ea1b4b1c70cc64fd13bcf41a2438cf55f73fa

                                      SHA256

                                      cae8c70ce2f3e2b47d304fd3c529c00d66d29511ad4877dc06936a775994c0cc

                                      SHA512

                                      2b1d4679a803d4b108fa8014d46d26e419d687238e5ede4c941eaf6dffbea3cf70f4df8ed4637105cfa1e91240772b5fc8f2c95a00d8d4185aa56aee9ac1c515

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      23KB

                                      MD5

                                      eb58f9e0dbcca642c8afffb34c0555b7

                                      SHA1

                                      436c4db000c366b5ee273935d59f7e446449c91d

                                      SHA256

                                      f037f620cdddd2a85c79d55eb02b57783c04fc0d48aa8d75e928faf197544790

                                      SHA512

                                      74fae3bd3bb21e1065fb3f27ea82b61d3b020a4eda2030bf1107033c9b7f329a2a30efe848f2ad41886a2b3259d83e5df427ece0d034fc5eb63f93715b358904

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      25KB

                                      MD5

                                      e81515bdad5faa6cc99559a9d3268e49

                                      SHA1

                                      9703799b9818706d464bdb2646b3d35cc1f3ddbf

                                      SHA256

                                      b236aa3b31eeb85c3a330ddeb36b761aeb624a59e5727eddb8e7c2600e53c456

                                      SHA512

                                      bf4d8499e85a1cc0b28416f7c88f31beb94f4516f8ce758ef823c3d648f9136a5fd35a3e4133f9666385bc273ef894ef3a1e0e20a7314ef02b553d153449ea5b

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      25KB

                                      MD5

                                      f92ce0318257083c9c6bb3de3caf6d2a

                                      SHA1

                                      2b8921087cca0386c21b079550e04c9b1690cf34

                                      SHA256

                                      7f16e46d0043b4b2c8bd4b0c259c310d5033e8ddc2d72086c0223f4fadd31495

                                      SHA512

                                      637c35c52001e1e59d3aeae6cf872fa23330dffffd8d193ccf6ee99e181bf13c216da2fdb88fa74c28c3dce420c7e05547e2e142298d5e2f695b62e350bf0e26

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      23KB

                                      MD5

                                      45247de5287630e8aeae14d418318454

                                      SHA1

                                      b38f20f98978fe99b27b01f7ab5774016450112b

                                      SHA256

                                      136a642dfce70ec7c315ef64c7aa171eccc49d27fe2f5a15ef2b4eb1d048a904

                                      SHA512

                                      02200e3627d713adba363e5b2c0c4543e0627d5d26e3d4150c2d56def4ed0c7bf6fac0d454689b034509dbb71fbe999c0a8d9bce56b323faa45c96c297da8502

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                                      Filesize

                                      25KB

                                      MD5

                                      f1791ec400c86a0aa2a13ca34a3884cb

                                      SHA1

                                      3d1a38e2c80696f8cc3dec2fbf8ecc0fdf368f5e

                                      SHA256

                                      14d116446bd4fe4e487654b9af81cb193dab85c8f709254c402a49f220e1cbe5

                                      SHA512

                                      daef606b6531288d2f57d53c870fe8fb9f98c9c7af1f28e28ad5347fd294f0ba06af54f0650578af09024633f73f52e8614b1ef954ebfdb6a76a2574f705e72e

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\03139b12-8565-40e4-b546-4c9b8b57ff31

                                      Filesize

                                      982B

                                      MD5

                                      b4315efa251461b25e5959f988cf10a8

                                      SHA1

                                      e1e00ee3fc9c2c81d3131be3a54e3702b4207f6d

                                      SHA256

                                      2c57f84b985576da6603469070e70abcc7f5c82430a2565e6f75148c5dec6842

                                      SHA512

                                      92f24a3e1bc590347cd74cc445ea5b0989b1750a0da98ad97a73144672d315585b9ecb495b4549e25869d24246b2c37f9865a7c2a35ad605f43fd07a256a33fa

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\6764d79c-060e-4c79-b406-871d8a8e6bee

                                      Filesize

                                      659B

                                      MD5

                                      87eeab111d9128fe64737960211415e6

                                      SHA1

                                      db78def0f0a871d36ab5e2054f070b3d7ac8e3ae

                                      SHA256

                                      5f97472942b4880c0f83fe8db5ae06623ba25942aaf5d33113ec133569d0c4c7

                                      SHA512

                                      a5f9cee63b515787cf5eb9ddeb3c48694c8c77a9b882153c5b60f47b998122bc10240ce9b9ae6a9b8966cd1cada89c77bcc85e08bbc97a8e10f5e42b9b62bfc7

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                      Filesize

                                      1.1MB

                                      MD5

                                      842039753bf41fa5e11b3a1383061a87

                                      SHA1

                                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                      SHA256

                                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                      SHA512

                                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                      Filesize

                                      116B

                                      MD5

                                      2a461e9eb87fd1955cea740a3444ee7a

                                      SHA1

                                      b10755914c713f5a4677494dbe8a686ed458c3c5

                                      SHA256

                                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                      SHA512

                                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                      Filesize

                                      372B

                                      MD5

                                      bf957ad58b55f64219ab3f793e374316

                                      SHA1

                                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                      SHA256

                                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                      SHA512

                                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                      Filesize

                                      17.8MB

                                      MD5

                                      daf7ef3acccab478aaa7d6dc1c60f865

                                      SHA1

                                      f8246162b97ce4a945feced27b6ea114366ff2ad

                                      SHA256

                                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                      SHA512

                                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                      Filesize

                                      12KB

                                      MD5

                                      07fae17bab8a96d7e77fbdd4ab73317c

                                      SHA1

                                      1d089dfcff231c344e56fdb0fa78a3ba97d899fe

                                      SHA256

                                      ab79fed7ea301f6f27c40e1207d0e02d49461c166636b754a6e8fd9b6bb47064

                                      SHA512

                                      4b9a9f2cb084a436d85c29066e250379d71e24cab2b4047b31357b4251e9d52c6399e21daa0d34b31aeb0efa3196c3087275bf1f6834c1ab05f0dcb1e60fca10

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                      Filesize

                                      10KB

                                      MD5

                                      de5e9794dcac2c858d632d2a3baa0b5b

                                      SHA1

                                      11edf3d4bf548940758cfcef2b814ff7cf0f4b88

                                      SHA256

                                      5ec205e8676fb7609c811386f79b89d760b8d6bc47ba6890bf10ed4fc9eb9d0f

                                      SHA512

                                      ce359178685d4adfd8d1be681ae7092bddab9a70510fbc3bc7fc7332abf0185f0dcbca095cbc52eda4204faae097d3471b5028296f7e1a7cdc61b85480483da2

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                                      Filesize

                                      15KB

                                      MD5

                                      7198b756848a5a93186b19209d520cc0

                                      SHA1

                                      ef55af9ba2071f2d3afa1dfcce590b8ad000ca8b

                                      SHA256

                                      fa9e816019aecec80423c5413907e01b594584b330af9753afafdb2a5ab68d6d

                                      SHA512

                                      b08e5ed90408e4b745e6556cdc22dfa623c254c56246eba9f82598c49608fe211c853ef8fe4f91898c1df5d623e42cfeeabc73f7f3a88952ded917a92d79dc58

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                                      Filesize

                                      10KB

                                      MD5

                                      b992d8779d2d27a7b9cc2096d55b522f

                                      SHA1

                                      29297e3bd07b031f8b50596ce4b188f8b8ca711e

                                      SHA256

                                      790c301f71ee602f524a5acf69fba42149f482b85fc0355980767e1103a316dd

                                      SHA512

                                      937514bfbb8bae907d73c97a71a2d8072d78c07889475d910cf1690240b930ea7790befd44c7a813a79e43986e773cf32f7d7feae927d432849034fbe8608cfe

                                    • C:\Users\Admin\AppData\Roaming\gdi32.dll

                                      Filesize

                                      401KB

                                      MD5

                                      3535fcd3063a2965f1dd8f9b65ca8355

                                      SHA1

                                      1f5c89caf911a08415d55ce1687101b65871b122

                                      SHA256

                                      086057602eec63ed064bd97c1643b20c727aa4a557d16bd26a763716414620fe

                                      SHA512

                                      9b623500ffbe25d6dc08c3c90aeb8c123e9fc2841f0962b6fe57ca1d2ab44fb1062352e1d5ab1d506b156c0b25aaf96ca6267a36fd064c97c12df965bcd66929

                                    • memory/224-83-0x0000000000180000-0x000000000018A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/224-88-0x0000000076D50000-0x0000000076F65000-memory.dmp

                                      Filesize

                                      2.1MB

                                    • memory/224-86-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/224-85-0x0000000000940000-0x0000000000D40000-memory.dmp

                                      Filesize

                                      4.0MB

                                    • memory/1100-709-0x00000000002C0000-0x000000000056A000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1100-706-0x00000000002C0000-0x000000000056A000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1100-629-0x00000000002C0000-0x000000000056A000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1100-628-0x00000000002C0000-0x000000000056A000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1100-615-0x00000000002C0000-0x000000000056A000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/1144-233-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1144-232-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1444-170-0x000000006FF00000-0x000000006FF4C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/1548-253-0x0000000000960000-0x0000000000FFB000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/1548-249-0x0000000000960000-0x0000000000FFB000-memory.dmp

                                      Filesize

                                      6.6MB

                                    • memory/1564-254-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-3878-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-3964-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-3961-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-3958-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-209-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-3945-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-3941-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-3895-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-3309-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-996-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-17-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-19-0x0000000000691000-0x00000000006BF000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/1564-20-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-21-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-730-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-55-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-56-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-75-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-673-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1564-77-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1800-146-0x0000000007A60000-0x0000000007A6A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1800-148-0x0000000007C00000-0x0000000007C11000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/1800-152-0x0000000007C70000-0x0000000007C78000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/1800-107-0x0000000005720000-0x0000000005742000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/1800-106-0x0000000005830000-0x0000000005E58000-memory.dmp

                                      Filesize

                                      6.2MB

                                    • memory/1800-105-0x0000000002DA0000-0x0000000002DD6000-memory.dmp

                                      Filesize

                                      216KB

                                    • memory/1800-120-0x00000000066C0000-0x00000000066DE000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/1800-151-0x0000000007C80000-0x0000000007C9A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/1800-145-0x0000000007A20000-0x0000000007A3A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/1800-144-0x00000000080A0000-0x000000000871A000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/1800-109-0x00000000060B0000-0x0000000006116000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/1800-124-0x000000006FF00000-0x000000006FF4C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/1800-119-0x0000000006220000-0x0000000006574000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/1800-135-0x00000000078D0000-0x0000000007973000-memory.dmp

                                      Filesize

                                      652KB

                                    • memory/1800-134-0x0000000006CB0000-0x0000000006CCE000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/1800-147-0x0000000007CA0000-0x0000000007D36000-memory.dmp

                                      Filesize

                                      600KB

                                    • memory/1800-108-0x0000000005FD0000-0x0000000006036000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/1800-121-0x0000000006700000-0x000000000674C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/1800-149-0x0000000007C30000-0x0000000007C3E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/1800-123-0x0000000007690000-0x00000000076C2000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/1800-150-0x0000000007C40000-0x0000000007C54000-memory.dmp

                                      Filesize

                                      80KB

                                    • memory/2068-251-0x0000000000A40000-0x0000000000EDB000-memory.dmp

                                      Filesize

                                      4.6MB

                                    • memory/2068-230-0x0000000000A40000-0x0000000000EDB000-memory.dmp

                                      Filesize

                                      4.6MB

                                    • memory/2592-78-0x0000000005580000-0x0000000005980000-memory.dmp

                                      Filesize

                                      4.0MB

                                    • memory/2592-76-0x0000000000DB0000-0x000000000126E000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2592-97-0x0000000000DB0000-0x000000000126E000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2592-82-0x0000000076D50000-0x0000000076F65000-memory.dmp

                                      Filesize

                                      2.1MB

                                    • memory/2592-80-0x00007FFF8E4F0000-0x00007FFF8E6E5000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/2592-79-0x0000000005580000-0x0000000005980000-memory.dmp

                                      Filesize

                                      4.0MB

                                    • memory/3024-197-0x000000006FF00000-0x000000006FF4C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/3176-675-0x0000000007CC0000-0x0000000007CD1000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/3176-669-0x0000000007950000-0x00000000079F3000-memory.dmp

                                      Filesize

                                      652KB

                                    • memory/3176-659-0x000000006FED0000-0x000000006FF1C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/3176-657-0x00000000067E0000-0x000000000682C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/3176-652-0x0000000006090000-0x00000000063E4000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/3224-49-0x00000000736A0000-0x00000000736FC000-memory.dmp

                                      Filesize

                                      368KB

                                    • memory/3224-54-0x00000000736A0000-0x00000000736FC000-memory.dmp

                                      Filesize

                                      368KB

                                    • memory/3224-50-0x00000000736A0000-0x00000000736FC000-memory.dmp

                                      Filesize

                                      368KB

                                    • memory/4124-3969-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/4124-3968-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/4264-3891-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/4264-3880-0x0000000000690000-0x0000000000B55000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/4752-42-0x00000000015D0000-0x00000000015D6000-memory.dmp

                                      Filesize

                                      24KB

                                    • memory/4752-41-0x0000000000EC0000-0x0000000000F6C000-memory.dmp

                                      Filesize

                                      688KB

                                    • memory/4752-40-0x000000007369E000-0x000000007369F000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/5096-18-0x0000000000F90000-0x0000000001455000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/5096-1-0x0000000077A84000-0x0000000077A86000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/5096-0-0x0000000000F90000-0x0000000001455000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/5096-3-0x0000000000F90000-0x0000000001455000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/5096-4-0x0000000000F90000-0x0000000001455000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/5096-2-0x0000000000F91000-0x0000000000FBF000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/5268-3951-0x0000000000B00000-0x0000000001751000-memory.dmp

                                      Filesize

                                      12.3MB

                                    • memory/5268-748-0x0000000000B00000-0x0000000001751000-memory.dmp

                                      Filesize

                                      12.3MB

                                    • memory/5268-3877-0x0000000000B00000-0x0000000001751000-memory.dmp

                                      Filesize

                                      12.3MB

                                    • memory/5268-3943-0x0000000000B00000-0x0000000001751000-memory.dmp

                                      Filesize

                                      12.3MB

                                    • memory/5268-3892-0x0000000000B00000-0x0000000001751000-memory.dmp

                                      Filesize

                                      12.3MB

                                    • memory/5268-3881-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                      Filesize

                                      10.4MB

                                    • memory/5268-3957-0x0000000000B00000-0x0000000001751000-memory.dmp

                                      Filesize

                                      12.3MB

                                    • memory/5268-3923-0x0000000000B00000-0x0000000001751000-memory.dmp

                                      Filesize

                                      12.3MB

                                    • memory/5268-699-0x0000000000B00000-0x0000000001751000-memory.dmp

                                      Filesize

                                      12.3MB

                                    • memory/5268-2080-0x0000000000B00000-0x0000000001751000-memory.dmp

                                      Filesize

                                      12.3MB

                                    • memory/5268-746-0x0000000000B00000-0x0000000001751000-memory.dmp

                                      Filesize

                                      12.3MB

                                    • memory/5660-729-0x0000000035AB0000-0x0000000035AC0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5812-3960-0x0000000073270000-0x00000000733A4000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/5812-3959-0x0000000000440000-0x0000000000452000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/5848-3972-0x0000000000440000-0x0000000000452000-memory.dmp

                                      Filesize

                                      72KB