Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 13:26

General

  • Target

    6a414356d2c65a3457626c6671ab786586a8eb2bef69775ae8e7b251724a8884.exe

  • Size

    7.1MB

  • MD5

    dbd01356461ce7f2f51809eacb0afd50

  • SHA1

    ac05b9079c5d660f55a6ca6ccdf2000175c6323f

  • SHA256

    6a414356d2c65a3457626c6671ab786586a8eb2bef69775ae8e7b251724a8884

  • SHA512

    e250a7f77d1762a59fce771c7f204cf165c282caff970318396dbbbaf80e45ea99eb19913e1390facfa9194925e929bc5b4631a271abde64adf8757918e78327

  • SSDEEP

    196608:mFXlB9AOqjpvBBvCKlx198fOvSjfmBB0YaPXCwaHOu:Pv3C2lvSjfMOYHwSOu

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 16 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a414356d2c65a3457626c6671ab786586a8eb2bef69775ae8e7b251724a8884.exe
    "C:\Users\Admin\AppData\Local\Temp\6a414356d2c65a3457626c6671ab786586a8eb2bef69775ae8e7b251724a8884.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2G37.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2G37.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\T9a29.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\T9a29.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3056
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1I17n6.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1I17n6.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2600
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4296
            • C:\Users\Admin\AppData\Local\Temp\1009032001\aa43c0fd73.exe
              "C:\Users\Admin\AppData\Local\Temp\1009032001\aa43c0fd73.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:2224
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                7⤵
                • Uses browser remote debugging
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                PID:7068
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x140,0x16c,0x7ffd333dcc40,0x7ffd333dcc4c,0x7ffd333dcc58
                  8⤵
                    PID:7104
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2072,i,1399287551719630784,11768748155784807154,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2064 /prefetch:2
                    8⤵
                      PID:5988
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1836,i,1399287551719630784,11768748155784807154,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1992 /prefetch:3
                      8⤵
                        PID:6000
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2312,i,1399287551719630784,11768748155784807154,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2404 /prefetch:8
                        8⤵
                          PID:6044
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,1399287551719630784,11768748155784807154,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:6280
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3284,i,1399287551719630784,11768748155784807154,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:6296
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4556,i,1399287551719630784,11768748155784807154,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:6160
                      • C:\Users\Admin\AppData\Local\Temp\service123.exe
                        "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                        7⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:6056
                      • C:\Windows\SysWOW64\schtasks.exe
                        "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:6184
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 1868
                        7⤵
                        • Program crash
                        PID:6624
                    • C:\Users\Admin\AppData\Local\Temp\1009037001\25161ce67f.exe
                      "C:\Users\Admin\AppData\Local\Temp\1009037001\25161ce67f.exe"
                      6⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1344
                    • C:\Users\Admin\AppData\Local\Temp\1009038001\c313183ac6.exe
                      "C:\Users\Admin\AppData\Local\Temp\1009038001\c313183ac6.exe"
                      6⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1924
                    • C:\Users\Admin\AppData\Local\Temp\1009039001\8fc7eb0f27.exe
                      "C:\Users\Admin\AppData\Local\Temp\1009039001\8fc7eb0f27.exe"
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:764
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM firefox.exe /T
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4472
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM chrome.exe /T
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4268
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM msedge.exe /T
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1648
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM opera.exe /T
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2660
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /F /IM brave.exe /T
                        7⤵
                        • System Location Discovery: System Language Discovery
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1092
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                        7⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3552
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                          8⤵
                          • Checks processor information in registry
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:4828
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2008 -prefMapHandle 2000 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d31554af-4bd8-431c-8723-f75e54539505} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" gpu
                            9⤵
                              PID:3392
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2536 -parentBuildID 20240401114208 -prefsHandle 2512 -prefMapHandle 2508 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6281558e-b619-4134-9c0a-d9c91fd90165} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" socket
                              9⤵
                                PID:3476
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3140 -childID 1 -isForBrowser -prefsHandle 3236 -prefMapHandle 2888 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1368 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bc719633-bda5-42ce-b08a-57414ead4310} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" tab
                                9⤵
                                  PID:4376
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4060 -childID 2 -isForBrowser -prefsHandle 4084 -prefMapHandle 4080 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1368 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f4d4c142-af95-4843-b90d-66c757cce4ab} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" tab
                                  9⤵
                                    PID:2324
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4772 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4740 -prefMapHandle 3976 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9247151d-016c-4bdb-9b14-77c15cdb0406} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" utility
                                    9⤵
                                    • Checks processor information in registry
                                    PID:6024
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5156 -childID 3 -isForBrowser -prefsHandle 5148 -prefMapHandle 5144 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1368 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b18d170f-b0bf-4160-b50f-92cd0cdf52b6} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" tab
                                    9⤵
                                      PID:4380
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5332 -childID 4 -isForBrowser -prefsHandle 5412 -prefMapHandle 5408 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1368 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8713144-589e-4cbd-80f9-f244c0f266d0} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" tab
                                      9⤵
                                        PID:816
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5156 -childID 5 -isForBrowser -prefsHandle 5608 -prefMapHandle 5604 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1368 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f386c57b-6d1e-450e-8809-1215be00fe8f} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" tab
                                        9⤵
                                          PID:8
                                  • C:\Users\Admin\AppData\Local\Temp\1009040001\da2fa0be2d.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1009040001\da2fa0be2d.exe"
                                    6⤵
                                    • Modifies Windows Defender Real-time Protection settings
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Windows security modification
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:6568
                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2g4990.exe
                                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2g4990.exe
                                4⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4492
                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Z35x.exe
                              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Z35x.exe
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4168
                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4w715D.exe
                            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4w715D.exe
                            2⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2664
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1680
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:6512
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2224 -ip 2224
                            1⤵
                              PID:6328
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6732
                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                              C:\Users\Admin\AppData\Local\Temp\/service123.exe
                              1⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:6768

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json.tmp

                              Filesize

                              19KB

                              MD5

                              bb66a6319d07d34592508d45fe037af3

                              SHA1

                              402773079dc08bce04a47712d0e42602a3779f06

                              SHA256

                              be680581c3f170e1fb3596b150912a15dd6f54855300a3453a71a1309092d67a

                              SHA512

                              d5aa4b9875ed5dc32ffd7cbfb9032f3f1502e793fb9bf1d9ec8bbaf8ea0981b05ca9ef2761c5171f1d24b4ed81d2e1ed4f5be8997b9ab8119173a37577fa7151

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                              Filesize

                              13KB

                              MD5

                              ddf87b7f688f7247a8c705929d7a37a2

                              SHA1

                              2939feceaa2b25e4f9992de164d1d8a2dfc21c52

                              SHA256

                              d0138769309b8779516597bc266e52dedc423c1fca712f496af411fd6551560a

                              SHA512

                              9f89e4879c67727fe43703d190e1cd0488394ba91e0105935f9977d966e712fa0f4c091aeb299cd9fa84c86f0d36a39366939b2e8367c18a3e1aa83f2fc9e19a

                            • C:\Users\Admin\AppData\Local\Temp\1009032001\aa43c0fd73.exe

                              Filesize

                              4.2MB

                              MD5

                              02bb15adea48221f6c39e50f1c4d902c

                              SHA1

                              7ca16530831f2388c7cf367e3e782533a764bf10

                              SHA256

                              af2552f7d0586a5c95bbbf16460571b82e18aa651a440fa94136b0258c640c14

                              SHA512

                              31c547da420e474dbc2e729b05f33c2022e24743ed673ca125ff5345a1e1e00c5b6579338bd6fa2c7c1fd316a49266d4ae4b14c35b3cb9f40842dd9c8bcef774

                            • C:\Users\Admin\AppData\Local\Temp\1009037001\25161ce67f.exe

                              Filesize

                              1.8MB

                              MD5

                              6180812dca1859f8831c138cdeaf34c3

                              SHA1

                              f7bc78cfa4037407f014818f2cf02f93b6903ae3

                              SHA256

                              9a576b4a397bcc22e6521b0c49ac28dd5aee9f3f5a8d8e7f5a0f6b1bc890466e

                              SHA512

                              e4f8f85324533ab2ba503004753343c51a12ed5b36ecbcc72c30dd4ee5026ef4e15444701853d49b0212f66866e30d7ce518d0a3d9d435cd8c839e543e9f4bde

                            • C:\Users\Admin\AppData\Local\Temp\1009038001\c313183ac6.exe

                              Filesize

                              1.8MB

                              MD5

                              989618b54cbe6d89c30aa67fe52fc62b

                              SHA1

                              fb55e89cdd398d44eaf8ce549eff424a7cf47141

                              SHA256

                              bee0fe71acfca971ebaf60e73f2026c1612cf89bc26d18e609891dfdaf4ad423

                              SHA512

                              7e21675d2ce2f33d5ea3e9219733132cf403be18fd810912da03ac53a32c1e12c7821ff81f26874e2cd61452e5e734263be43f8985fdb7f581ce2d0194cdfba8

                            • C:\Users\Admin\AppData\Local\Temp\1009039001\8fc7eb0f27.exe

                              Filesize

                              900KB

                              MD5

                              b732e89c499b07ea29c725416d62ff73

                              SHA1

                              5403902e4bc07eda12d6b26b552324d687dc6298

                              SHA256

                              cb4df1de28626672c35c0a46077bc463061cac3ce8621f4751b3df8758e11519

                              SHA512

                              f1f90fa17be3d00b6e299bc9132a59d2b0585972043b7791ee60806c21996216aa8c4668c7ba04ea77494a610fc8edc4525c40150aea5ba2f23799cfde39f23e

                            • C:\Users\Admin\AppData\Local\Temp\1009040001\da2fa0be2d.exe

                              Filesize

                              2.7MB

                              MD5

                              5615bd983846db760a368756014c7279

                              SHA1

                              f175ccae1f5c0d364cc1c4b0f156e99c264463a7

                              SHA256

                              0650b9365c8df2f76101605bec1c7854dbad9543a7c34c25e50d0a8a919506e5

                              SHA512

                              202158751411457283a5cd8b747051b4ecc95e80a0c8fdaa85ab6b6de7c53de65d60c7652a65d42fc82eebbbab45e6583bc5540458104ec7e92da7de66740404

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4w715D.exe

                              Filesize

                              2.7MB

                              MD5

                              3f7004d4b82d415e406bd90eb5511c63

                              SHA1

                              1f036ffd2df445facae8c87ca4a275e95078d0bb

                              SHA256

                              3dc7433c1cba21da4edae3113fe1e76c7bc285efe59aecd601a69030875472c2

                              SHA512

                              8f8f938101c6211183721d6e6693ab904349bb754f4aec5140e2e848c5e348050a8dbbe0c21d029269ad913f12ed825828e0631e2abfa291bfc29622047afa6c

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2G37.exe

                              Filesize

                              5.5MB

                              MD5

                              da7693c4b13a7c3930b663353e3491c7

                              SHA1

                              f7e0cc6d21841c52494cdcaf3e062b3c79f8680d

                              SHA256

                              034bbac206fc4fb39bb65854067fae14b8c1da2c13e01dd3a7aefe5e47c236db

                              SHA512

                              f30123a700cea5706196d15cb3cfaf4d55ed8970cc49ade574af9ee9bdc2900e77ecde32715fbbb547f78a8d65fb9fabdd400e8608b8fe0171b3ea5f4638fd2b

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Z35x.exe

                              Filesize

                              1.7MB

                              MD5

                              754418530dca8e93cba3a5a7f409f441

                              SHA1

                              b847b0861f4e1d1d309c0bdf51f02fb8954663f7

                              SHA256

                              0d025b505282376cd436001c8148e720475463ac9c266bf3788689f93147a178

                              SHA512

                              f833a2f6477443f23928194b305d88089c5ed15854b18e9664c211b46446cfc0a9b33ffb4726fb2b91a537455bc079c6028c369bf6aba9ce38ee3ed6ff7ca859

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\T9a29.exe

                              Filesize

                              3.7MB

                              MD5

                              627f95532f43723531e98986c58761ca

                              SHA1

                              3bfb75c13d595282a7e03801a9a001656c56cdde

                              SHA256

                              97c98d2c75d8485a15f0946797acd3c99163392e51aae4a0c0542e1794067820

                              SHA512

                              f4efbc01aea9a26a832581ff1547275c420badfde6151a91b5076f92a3e3dee5a32db5508ff784b54a245906b405dc634a03ec2820675a69f0077871399b58eb

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1I17n6.exe

                              Filesize

                              1.8MB

                              MD5

                              28463afd5686fcb3be26841fed11e387

                              SHA1

                              a8712f8199d09b3178b94b8a3f8a2f0fcdac78e8

                              SHA256

                              954a980d4902a0ad937ede8945bb37bda0e957b4d5b6cfc1ec56d694bdfceb25

                              SHA512

                              79a4729e6b4c0567e2a4ef0145a78485f529d4aa466c78a5fb1605d1f043d7847a8f3b69bc65ad5f702a59079df40ba56c913ff35753ba54892c2b06a033c4ef

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2g4990.exe

                              Filesize

                              1.8MB

                              MD5

                              1959840f03733001022c3aa78866b3e0

                              SHA1

                              a6a9800d7009ef076f66deecd050261271d6e3c0

                              SHA256

                              e38e917a486da4cd7fd65caf9761101feedc4a4d0feb047ad1b14e3423f3e903

                              SHA512

                              535ed9b7206e61c1b82df577ea48d8a00658349fcc4bd8d02bb4861d324904a333a22d5c4307caf931cb987d107ca1bd8bcb5b6e14553f45b1efbe5843bf0cbd

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              479KB

                              MD5

                              09372174e83dbbf696ee732fd2e875bb

                              SHA1

                              ba360186ba650a769f9303f48b7200fb5eaccee1

                              SHA256

                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                              SHA512

                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                              Filesize

                              13.8MB

                              MD5

                              0a8747a2ac9ac08ae9508f36c6d75692

                              SHA1

                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                              SHA256

                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                              SHA512

                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                              Filesize

                              6KB

                              MD5

                              26d36ac05b6bb3850f6b39e4528f0255

                              SHA1

                              4a36e23b9bbced86a7b2162c4380e1d2ed8084fd

                              SHA256

                              b0276108010be2744ec6014662d93f72efb3d2d5198df70e8f61bc3a2bc2c2d1

                              SHA512

                              36781fb76579b4a66affb1ca952852afe09d8c77be42705415c24eda0a431a3967e5a14383b188fa0e61a3113a85ba490c730225939ce55b420f4b93d04fc2be

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                              Filesize

                              18KB

                              MD5

                              f35bfe97208d05bd5a6873641b5b39da

                              SHA1

                              94199fe08856deb4fb76c59ff5aab1ca81ba3d0b

                              SHA256

                              63ae4a80d32649fbae09db9851f463e79d05d020607d30427096e57c19eb98a5

                              SHA512

                              a4a833ef43721b5a5c6d908b932c270852aa2cd660748d0b53be64c9dedcc030c52651bc8171dac22ad51effe37d91c873782461a2d1751c9238d668eeba081c

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                              Filesize

                              10KB

                              MD5

                              a5780cf155fee30ed5b96323ecf045ba

                              SHA1

                              dbd159ed7b5c2cf9547eb5ca81f2a70e841baace

                              SHA256

                              f6dcee62336648729bb4d5d24e94ee6b2f22fdb54b643ba23efb992d43ed1d5a

                              SHA512

                              b4a6165bc42b0d7f11ae06820721d5785e0740abcacb29440b2154ce2019ee76e81310dcd853f4b2151c699667bc06b3a0604c9edb583082e01cd721cf15353d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              23KB

                              MD5

                              9d4f3604fead8327b6a2aa0e7c78c1ee

                              SHA1

                              a217e2430795af0d321e219ac3fb54eaca67b5dd

                              SHA256

                              a615401aa927250ddc20153202fe37ec3721790193f50bb63792102ac461d83e

                              SHA512

                              5418b1625a27f88541749ee5fdb0364171c048857aaeb305cacebd741e1e32bdb7813f6d7d667582f965a589282b87141b9849d9865c013ddcb0c44ec918d755

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              6KB

                              MD5

                              e3792d67231f6222c6280d46a7bc3049

                              SHA1

                              6780232a3c5363aa4c28de104447cebbf82fa343

                              SHA256

                              5b1a69c778f8fcefa97b5c1cae4d81c8c177f091cbb89669a7011a2099c29070

                              SHA512

                              396225a22b287cfd07630c55666132c8e1d7f80873fb155c251713beb8df374099819c14eafc77b45e8463348734fc512814850b634778064c82fd39575ac62b

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              15KB

                              MD5

                              6712cd34a4f58dcee080a1bfae512818

                              SHA1

                              eebfd3ab7da3e3a674674c6ab1d869ce3bee0980

                              SHA256

                              40864e559949d4349e1832fb1e1c672bf006da91842cb2d40a24699a6b6b6d30

                              SHA512

                              93b49b9f9a91b61119800009700fec71124102b4ab6e868f63c35e1bfac718e1af8550c53f63babc07cc403ad05b3c52a5019a3978529be35ba02d76e20cbe35

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              15KB

                              MD5

                              9e540751b7f6111e283dc8b5fcb8c9ff

                              SHA1

                              b2a1549603b52acfeae1eb7503506436cc376d67

                              SHA256

                              b3759d46e9a658d86b9837f3866497b3d21fd774b24075c97805a7e43bdb81ff

                              SHA512

                              d53c70177c7b5f535a37781f0a68816727940bc64bdbc24ad9ab7f0f1d959ed18536b2ba035502e5c19bd3e5561dbb8396eab7d27fa6f6faf840999a5b05d289

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              5KB

                              MD5

                              5258ded26a27415bf81a17279efc964d

                              SHA1

                              dd8ccf9cd5d46ca74f1bc1d7617cde0bd7ec6a28

                              SHA256

                              e787bd6e3617f1d8458556b0660d94c6fe8fe69d939c4f2ec0312b2b45fb4e40

                              SHA512

                              8d33b3f5f4f4acf5bf14a35af4f1c1b18afea682642b485a76862ce8e13f71f7cb8fb336e380e08921d65d8fe84a2b8761a24f510a88ed44aab975e53631eb6f

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              5KB

                              MD5

                              776ea537c46b77f442b0d9b93e82af5d

                              SHA1

                              10134293bf2a7ccfd25489cf8a156a069a397eda

                              SHA256

                              3ff7cc07521e09026094a802bbd3169eba61c012aa9fb99f3c775502bd68ff90

                              SHA512

                              012ab16eeadcb47ee9e46871b212f3134e86ef2aa030d72b2dfc2d29666e5af206125578ebb9e428cf106dd253a27e892499c591f3bf4a5f6c14704c39827232

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              67ca6a3c36e6eebcc43f43418b33aa43

                              SHA1

                              b1e1ea56bede27dc26dfc4ad70a42f756ac3607f

                              SHA256

                              bfae91d3f05aa7b2c88e382fc372684be0adf586600a7e52b04c49b60c155ba7

                              SHA512

                              e4abaa62fef4b5d96fdf74abd33e3579bd5e5a7c97a0e6fc5329987dd004f7608e0207512e22944a2717c6f4d1f19693e66c5bc5658a81469f7bda7fb131790b

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              a3c1cbd53a2912d1d41d867a1ce2c238

                              SHA1

                              a8b737537d253188969c0936e2111af68acf221a

                              SHA256

                              cc2d448a97f9e29cd064b1cda4489ce55f369059c6921a2ecee478c392878a0f

                              SHA512

                              cac959d409b243a4602cd8b015823e216bb577146f9f86144e50465d31d6bae9695e36711c2afa697e1eb5379a7c3e30be622e26a53dbfe99c321eb97a9cf852

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              15KB

                              MD5

                              4fc3b5b51ceb6c49e629185df41eed13

                              SHA1

                              ab24a500bca491b5c03d7c8ecaa0e9b7a6d91dee

                              SHA256

                              672c973ed19570dc85e254bdd9cd3ab2d401bbb11b8e272c5f676396bb8bcfa4

                              SHA512

                              d7e2cc03f6eeb6a4e093323efbf93ec9c3d8a9743961d5bf9e987c3366fc5638cb81afdb3684565eb8ff5dcfd8c8de6e640980ef976251ae3f2d41bc4902ef32

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              15KB

                              MD5

                              c1a600b7b32ba602713a1314e076d92e

                              SHA1

                              044f1744a1283631e6005aa01a6736414f87ad78

                              SHA256

                              f1c3abb421b9e22c826951b278d2529c2951d5a8e2ac73373e12967cd9ae9df6

                              SHA512

                              d12ba8e6a898722105e6458bd9d49cfb94a153261ce4f0220df16e1c91adc81808f9c741671635d6098ca63247b2b1dba038ff00a20e8aea94ceee2e180621ff

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              6bbc62ea95c3458a8a8eab483c2453ef

                              SHA1

                              8b7f744ebbf6608667fbcee329fdcd8036367100

                              SHA256

                              1ae66fdbf442970e4804c10a807ea0be582af7bdd500f834710d63a0ecfe6054

                              SHA512

                              169552d996b3fbf7c654f32e54278d9c387958a56aa55ccb51ae2f45e04d25b0eeb9ad9dec22d5dd28390735e74113d240c473b7df7941ddfa9f1e443af794e0

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\595d9ba3-d8a1-413c-94db-1518ba719c02

                              Filesize

                              982B

                              MD5

                              a3cb7739e4620e1522e38121eeed3ab1

                              SHA1

                              3fd04579003712428452f4edac677ca42852d6a6

                              SHA256

                              e03464007b45791d853e6f162419a8de9b4ebef9b3674a3dcf798fd8ac219de9

                              SHA512

                              bfe8393c448ec61ce6b8d48717a1026b7593bf7dac2f6d80e1dc8f9de78d99ae572984fca95f3fb515d505c33fbc927c92ecadd823699e555c69398f0d310b93

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\a52d847d-dedb-471f-8ad6-38638a2c0db2

                              Filesize

                              671B

                              MD5

                              104024879cebf4900e3fcbd46e9ce011

                              SHA1

                              31f070a21d83dadc783e9a488c1c7bc922cdc22e

                              SHA256

                              7da30e77461611c108315ac3e8de70b638f8b8ba0490e5e9f6c52f55dd4ec332

                              SHA512

                              68cda3326f845032275822788fa0ff78b398dc368e10d95c739681c47674ef8d5f03d4aab938f5aa2ffe34fcaa10b033e0ea02e8e53e9859f9d880c49a69c574

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\c4e6b3bc-f2f0-4667-88e8-2f9e906bb6d4

                              Filesize

                              27KB

                              MD5

                              d1da8735b55a6c2432d000a30dd25748

                              SHA1

                              7d515bf463393e24b7fe95f4747c1015ccc13474

                              SHA256

                              3ac263b0e0ad86d5eab4bb5a99164bb8206b0fbb9b5ae0fc5497c185d11c295b

                              SHA512

                              a6493e75f7bd25d5001f93b6d7b3f104d8511ac801a20bd978a1dd1829af90396760b19fb2420dc9536b3eaaaef35109f722e33f56ae9d3d512fccbaa8be931e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                              Filesize

                              1.1MB

                              MD5

                              842039753bf41fa5e11b3a1383061a87

                              SHA1

                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                              SHA256

                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                              SHA512

                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              2a461e9eb87fd1955cea740a3444ee7a

                              SHA1

                              b10755914c713f5a4677494dbe8a686ed458c3c5

                              SHA256

                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                              SHA512

                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                              Filesize

                              372B

                              MD5

                              bf957ad58b55f64219ab3f793e374316

                              SHA1

                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                              SHA256

                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                              SHA512

                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                              Filesize

                              17.8MB

                              MD5

                              daf7ef3acccab478aaa7d6dc1c60f865

                              SHA1

                              f8246162b97ce4a945feced27b6ea114366ff2ad

                              SHA256

                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                              SHA512

                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                              Filesize

                              11KB

                              MD5

                              ee7734fa5b0ab4bf9f006322d2d66d36

                              SHA1

                              bf90f39d6c5a1384fd66b5b259fd753f49e17bbb

                              SHA256

                              ab2d540b87ef46c019b6342f46351fc7cad7390b0039ad2b7436c9f4bbc0bd57

                              SHA512

                              df9778ce37beb8afd61b334fc40d6c283dd380fca9443506c63e4aad49dbdcdd950d8f26741010b64fa6a855ea399e551d91714274ea79118a3abea34f33bf01

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                              Filesize

                              10KB

                              MD5

                              aadafaa6e98128ecccdfd6de89b1a144

                              SHA1

                              d1e24c5ec91130fe0df96e37efb668bc91d03916

                              SHA256

                              70475e12300873fea57018614c4eca7471860ababa7b288a48d7d4d63522cd3d

                              SHA512

                              08c59412efa30444607020f88317dfea1e66b369be01ac7701fa34ae2e10210f09ef35d545bf824134c972622867b825c9cb754391d81a08fbf44e3fc772ee87

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs.js

                              Filesize

                              11KB

                              MD5

                              729c0ca5bc2b50dac722c88f6ff21ed7

                              SHA1

                              bf46a8dac7ac08614ca27e789c526008d92ddd31

                              SHA256

                              b70f4be1d87f6e82f20e0d91dfa43766b1a6e0118326862ca105b1b16a062c84

                              SHA512

                              60eee4a3b82eb4f49f0c02b2647c6ea0faf66ec04ec2ea8658da5ba4802c13c2fccd70c746edff508ffe29e83795f34ec96dbf1175732bb641462f7a24bb1b2a

                            • \??\pipe\crashpad_7068_HUWUEAPLXBTVKURR

                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                            • memory/1344-86-0x0000000000F20000-0x00000000013E0000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1344-111-0x0000000000F20000-0x00000000013E0000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1680-1178-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1680-1200-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1924-102-0x0000000000C40000-0x00000000012ED000-memory.dmp

                              Filesize

                              6.7MB

                            • memory/1924-103-0x0000000000C40000-0x00000000012ED000-memory.dmp

                              Filesize

                              6.7MB

                            • memory/2224-1972-0x0000000000F10000-0x0000000001B79000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2224-2173-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                              Filesize

                              10.4MB

                            • memory/2224-3302-0x0000000000F10000-0x0000000001B79000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2224-106-0x0000000000F10000-0x0000000001B79000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2224-889-0x0000000000F10000-0x0000000001B79000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2224-1170-0x0000000000F10000-0x0000000001B79000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2224-2555-0x0000000000F10000-0x0000000001B79000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2224-3311-0x0000000000F10000-0x0000000001B79000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2224-907-0x0000000000F10000-0x0000000001B79000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2224-69-0x0000000000F10000-0x0000000001B79000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2224-3327-0x0000000000F10000-0x0000000001B79000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2224-120-0x0000000000F10000-0x0000000001B79000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2600-21-0x0000000000D90000-0x0000000001258000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2600-35-0x0000000000D90000-0x0000000001258000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2664-104-0x0000000000350000-0x0000000000608000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2664-109-0x0000000000350000-0x0000000000608000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2664-62-0x0000000000350000-0x0000000000608000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2664-59-0x0000000000350000-0x0000000000608000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2664-50-0x0000000000350000-0x0000000000608000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/4168-46-0x0000000000150000-0x00000000007D7000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4168-45-0x0000000000150000-0x00000000007D7000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4296-3328-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-2815-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-131-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-3346-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-1245-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-908-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-2102-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-3343-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-3340-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-68-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-33-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-895-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-3316-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-3308-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-3337-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4296-70-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4492-41-0x0000000000290000-0x0000000000729000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/4492-38-0x0000000000290000-0x0000000000729000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/6056-3329-0x00000000000A0000-0x00000000000B2000-memory.dmp

                              Filesize

                              72KB

                            • memory/6056-3330-0x0000000072CD0000-0x0000000072E04000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/6568-819-0x0000000000E20000-0x00000000010D2000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/6568-818-0x0000000000E20000-0x00000000010D2000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/6568-903-0x0000000000E20000-0x00000000010D2000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/6568-906-0x0000000000E20000-0x00000000010D2000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/6568-689-0x0000000000E20000-0x00000000010D2000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/6732-3333-0x0000000000BB0000-0x0000000001078000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/6768-3336-0x00000000000A0000-0x00000000000B2000-memory.dmp

                              Filesize

                              72KB