Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 20:53

General

  • Target

    2ad1c03de0c389a69c21c214fd062153bee3d2ebaa2ebed533065c35f472811f.exe

  • Size

    7.0MB

  • MD5

    b36c3e54fb34c24159fae8238044cb17

  • SHA1

    ead3fdbed3c4b853b810a31a9c5e885053cff8b1

  • SHA256

    2ad1c03de0c389a69c21c214fd062153bee3d2ebaa2ebed533065c35f472811f

  • SHA512

    831a233bb597cb13c5baf7d4cf99d9facdae7d7a4e62df557f4a8288dda715d1bc745717f420df9ce2e031159b3cc9acb51026b32d2137aaaf855d99afa11335

  • SSDEEP

    196608:Xz10VU2WQu6wJl9Brq4PJ3eqlO8mcta2b2:jUWQu6wDIctDb2

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 20 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2892
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5456
    • C:\Users\Admin\AppData\Local\Temp\2ad1c03de0c389a69c21c214fd062153bee3d2ebaa2ebed533065c35f472811f.exe
      "C:\Users\Admin\AppData\Local\Temp\2ad1c03de0c389a69c21c214fd062153bee3d2ebaa2ebed533065c35f472811f.exe"
      1⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1272
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M7w39.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M7w39.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\P7w80.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\P7w80.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1O26g0.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1O26g0.exe
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:3824
            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
              "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2812
              • C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe
                "C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe"
                6⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:1244
                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\computerlead.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\computerlead.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2148
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    8⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5208
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 5208 -s 596
                      9⤵
                      • Program crash
                      PID:5568
              • C:\Users\Admin\AppData\Local\Temp\1009119001\332ed1586e.exe
                "C:\Users\Admin\AppData\Local\Temp\1009119001\332ed1586e.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Checks computer location settings
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3388
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                  7⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:1588
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff86db4cc40,0x7ff86db4cc4c,0x7ff86db4cc58
                    8⤵
                      PID:1480
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,16290075060155202018,16959127073849838627,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:2
                      8⤵
                        PID:4280
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,16290075060155202018,16959127073849838627,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2216 /prefetch:3
                        8⤵
                          PID:2496
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,16290075060155202018,16959127073849838627,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2276 /prefetch:8
                          8⤵
                            PID:3032
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3212,i,16290075060155202018,16959127073849838627,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:1
                            8⤵
                            • Uses browser remote debugging
                            PID:408
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3304,i,16290075060155202018,16959127073849838627,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3392 /prefetch:1
                            8⤵
                            • Uses browser remote debugging
                            PID:2356
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4316,i,16290075060155202018,16959127073849838627,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:1
                            8⤵
                            • Uses browser remote debugging
                            PID:1624
                        • C:\Users\Admin\AppData\Local\Temp\service123.exe
                          "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                          7⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          PID:5312
                        • C:\Windows\SysWOW64\schtasks.exe
                          "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                          7⤵
                          • System Location Discovery: System Language Discovery
                          • Scheduled Task/Job: Scheduled Task
                          PID:5452
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 1868
                          7⤵
                          • Program crash
                          PID:5636
                      • C:\Users\Admin\AppData\Local\Temp\1009120001\9120dba0e2.exe
                        "C:\Users\Admin\AppData\Local\Temp\1009120001\9120dba0e2.exe"
                        6⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1080
                      • C:\Users\Admin\AppData\Local\Temp\1009121001\52d0c07b8a.exe
                        "C:\Users\Admin\AppData\Local\Temp\1009121001\52d0c07b8a.exe"
                        6⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1904
                      • C:\Users\Admin\AppData\Local\Temp\1009122001\c702aad2c7.exe
                        "C:\Users\Admin\AppData\Local\Temp\1009122001\c702aad2c7.exe"
                        6⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:4700
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM firefox.exe /T
                          7⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1544
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM chrome.exe /T
                          7⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3356
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM msedge.exe /T
                          7⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2964
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM opera.exe /T
                          7⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3768
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM brave.exe /T
                          7⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:944
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                          7⤵
                            PID:2728
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                              8⤵
                              • Checks processor information in registry
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of SetWindowsHookEx
                              PID:4356
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1928 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {13efe6f2-45c1-4502-9f88-d5d6ea4fd2e5} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" gpu
                                9⤵
                                  PID:2492
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2484 -parentBuildID 20240401114208 -prefsHandle 2476 -prefMapHandle 2464 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b1e64bf8-b0b5-4df0-aff9-193ea8eb6de9} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" socket
                                  9⤵
                                    PID:4500
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3224 -childID 1 -isForBrowser -prefsHandle 3428 -prefMapHandle 3424 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d1411d22-bd3a-4219-8654-b984ee9b3312} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab
                                    9⤵
                                      PID:2304
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3776 -childID 2 -isForBrowser -prefsHandle 3728 -prefMapHandle 3236 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bcce6dd4-9886-4091-9c2e-0c53dfaedf3e} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab
                                      9⤵
                                        PID:2096
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4332 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4344 -prefMapHandle 4340 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a9f91ae-db98-425f-ac5d-edbeb8e93271} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" utility
                                        9⤵
                                        • Checks processor information in registry
                                        PID:6180
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5064 -childID 3 -isForBrowser -prefsHandle 5068 -prefMapHandle 5052 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {84f79d9f-f953-45c3-a4a1-0a5e6ee1ce75} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab
                                        9⤵
                                          PID:6688
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5084 -childID 4 -isForBrowser -prefsHandle 5224 -prefMapHandle 5228 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72b8c7c8-d2fc-46a7-a9c2-b5fe8713b865} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab
                                          9⤵
                                            PID:6700
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5524 -childID 5 -isForBrowser -prefsHandle 5516 -prefMapHandle 5512 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b6103fe-8922-469e-aa7a-dfea2df4995c} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab
                                            9⤵
                                              PID:6736
                                      • C:\Users\Admin\AppData\Local\Temp\1009123001\552a8b9a68.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1009123001\552a8b9a68.exe"
                                        6⤵
                                        • Modifies Windows Defender Real-time Protection settings
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Windows security modification
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:220
                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2A6330.exe
                                    C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2A6330.exe
                                    4⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1856
                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g29P.exe
                                  C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g29P.exe
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1060
                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4S298D.exe
                                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4S298D.exe
                                2⤵
                                • Modifies Windows Defender Real-time Protection settings
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Windows security modification
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2268
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4556
                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                              1⤵
                                PID:2788
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3388 -ip 3388
                                1⤵
                                  PID:5544
                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4472
                                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                  C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                  1⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:4612
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5208 -ip 5208
                                  1⤵
                                    PID:5500
                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4760
                                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                    C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:5116

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json

                                    Filesize

                                    19KB

                                    MD5

                                    6bfb95a7d4bc6d8195b3b4483cbfe801

                                    SHA1

                                    721fb8c32638d8901c8f58e158606aa4b17b93f6

                                    SHA256

                                    32926b4764734fefa5c3b116f543a1c598e74ecdccaaf63fe4f7e012d383694a

                                    SHA512

                                    eda3365dad0ce0dc7908592eda6612ae8c16e99fd3a31fbcb47740c9725ade09734c334665a1666b1f86c83c8ac69d9fa5f56160c650aef2c59c59c726725bb8

                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                    Filesize

                                    13KB

                                    MD5

                                    63c58c86972480f7f3ca54f4af2a5001

                                    SHA1

                                    c2ac3080b6d72b1063105fbb6ab82cd577d3ce8b

                                    SHA256

                                    ab503a56988d40551c9428f6df1870f0ced82b6c69a0d94e10cfb9a65f245df2

                                    SHA512

                                    5cb78c1324b23d68be00d3bb092352a7d236d50e10f8b062ac5354e6b981a2189c08317192a2c2b0aa99ce132576a223c3b0cafc4ea93e22f20c6f195bf43b76

                                  • C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe

                                    Filesize

                                    932KB

                                    MD5

                                    96a7b754ca8e8f35ae9e2b88b9f25658

                                    SHA1

                                    ed24a27a726b87c1d5bf1da60527e5801603bb8e

                                    SHA256

                                    21d262741b3661b4bf1569f744dc5b5e6119cfa4f0748b9c0fa240f75442cc50

                                    SHA512

                                    facb2e44f5a506349710e9b2d29f6664357d057444a6bd994cf3901dee7bea471247b47496cc4480f1ad2fac4b1867117072ea7a0bfa83d55ced4e00dda96745

                                  • C:\Users\Admin\AppData\Local\Temp\1009119001\332ed1586e.exe

                                    Filesize

                                    4.2MB

                                    MD5

                                    0e6a28f3dee9cb4df195327184fc0227

                                    SHA1

                                    96ebb30be7ee04eb4491128fdc193000d6a05d74

                                    SHA256

                                    0d1436daa022833897022dbf4486a009a6a1938a434b3ae00eb84a6a362a5170

                                    SHA512

                                    1cb0163fe35751238a2cee3589ee7713b6f4b655803804f28162cf790dd65cfeaf357c457448b855f55aa32145c7708187343e7c11c14644046f24127bf405c6

                                  • C:\Users\Admin\AppData\Local\Temp\1009120001\9120dba0e2.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    339b28fd2dbb4a572a4fc6b7207448d7

                                    SHA1

                                    d6ca6c0291a42d08bf0cdd9e8b528ee2ac90f0d8

                                    SHA256

                                    dcfcbcb7ccf29f1ef5e01d31ed51789783c2e2a3ab2a77543cde49479556ae37

                                    SHA512

                                    61527fb19bafcb69cd612f44f7a1fa0fc89e1ef68053cb81e78551a50e65477a2f9b8840b4a85c8896449dc1d0c84d123a798b00b0f0ed8f4141d444812e4796

                                  • C:\Users\Admin\AppData\Local\Temp\1009121001\52d0c07b8a.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    6487be67797f2ab4bcd902c3b34efe97

                                    SHA1

                                    6b4a7190c65c8c54c39e66fabab190afd36cb5fb

                                    SHA256

                                    bab41e3e4289d1b7d5785304cc05ba4acbb42b51d5d18053305b6bd19a77474a

                                    SHA512

                                    790db5f7a970c8528891b0524c30d6f85fea324cb7a87473bf309069daaa83bc0a6ad7aacf0e693890fbfc148649f7f06cb5062cac3f810f472fb4ca990e10ca

                                  • C:\Users\Admin\AppData\Local\Temp\1009122001\c702aad2c7.exe

                                    Filesize

                                    900KB

                                    MD5

                                    55181cf50afa00196c7cbd00013e03a6

                                    SHA1

                                    a5ac8deef254c7ff3580a6e8149638df870c192e

                                    SHA256

                                    c29a9fb9427a83ccdbb4120d82f5808877fcc4fff3443779c334483d47a2d78a

                                    SHA512

                                    20036cd1bce83e348943dc56e2ea66ba4f8d991b658d4cb2f3d321f48f0d57e129ada331e4db4d7b32051158292d0f4ce0b73b9611bea65d9abfe4b58f6f8d61

                                  • C:\Users\Admin\AppData\Local\Temp\1009123001\552a8b9a68.exe

                                    Filesize

                                    2.6MB

                                    MD5

                                    f87ac6c41d36f35ef2b8c6c959ccfe26

                                    SHA1

                                    1af22075b086492c4c254f04a7e06f9cac1f8aa0

                                    SHA256

                                    0fcd2882d307444c83e0f7c26ce048780892df4184db29fd70713cff9a6bde70

                                    SHA512

                                    cbfd14e1a7277cec2666273b4e43d79d483168ca1ba27c2ce9fb9bcf45e52dcce0545a2504f703d50ef5c5a21d7cff8e9666da9d342d0414701167a8dc4e5651

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4S298D.exe

                                    Filesize

                                    2.7MB

                                    MD5

                                    0a24c2e5e66d1e2c6b87bf2b0a1c6798

                                    SHA1

                                    84bb168706262c83de6f7cf3a2ab360cdcb0b573

                                    SHA256

                                    99d45b95b1e9ec69ff99b0b2a6a52065628a7a4cfb2c9e25c412f11d53895699

                                    SHA512

                                    19edf3a436a9e392e302a2a152affdd2156810ce26e247aa8b27314b2afc5b3cba6e5611a2da5b4f144275aeaa987c92186615fc2e17de9ade2fa3f326f9dc77

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M7w39.exe

                                    Filesize

                                    5.5MB

                                    MD5

                                    578e7b741c5ea1fec89ca78ee741dff2

                                    SHA1

                                    95941ae0bf9a06ffc4474fc9ad469330fca8dc8f

                                    SHA256

                                    be322f4b9cdb249fe68f158f2c7ba9f14278623f189514f3b751230411e6c016

                                    SHA512

                                    421d3718a1063b18f01b88b0422ea55d8f0a885e3b806af666719218b77505a5ea2b766526fb8177ec855939ea35b05c201dbe9167b23ca084bb4155d0c8ad5d

                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3g29P.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    915ecb2949f1c2ad737caa35856b4584

                                    SHA1

                                    deaf66961d8b2dda755377ab791b8907b71cf9b5

                                    SHA256

                                    9784693e6d3fe06c253e47536652da2ac85aa94b2d05d83230b2f9734529f854

                                    SHA512

                                    bb015aeefc7151b3976e7643a143a0b9e3c47ab93d876186af9bd5dd582e900e21662f177f62021db803289b38d69839d26d463bf7d954ef8ab319289346cf0a

                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\P7w80.exe

                                    Filesize

                                    3.7MB

                                    MD5

                                    f1ad688a05c18ac6516dd9f570f89f00

                                    SHA1

                                    a90941a794f42379edd8a3c08e66d52f35df70cf

                                    SHA256

                                    0607091f06577ca45f055780797b89ff54c57c3d0ae0f0fe76a6e3cf4c37eb8e

                                    SHA512

                                    7d9ad32a4b7f60b08b4174eb0e36139b1adaf5b1543ce05e46a3034269d0d1e2e6d3a4bedc53b84e507c8a8d85d97b391d6ed5709d7d79ac812ae3ba4c0e691b

                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1O26g0.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    72683bf9c6f350a7af5d18a98462fcdf

                                    SHA1

                                    1fd96a421e53351f72998a1a72f923b36e866a0b

                                    SHA256

                                    dfc453c8498400fd0f9cd272a842f6e4893a362e9476764a6aec751b224c7eb3

                                    SHA512

                                    989da907980a4bfab558aed381271e77a77fce8b88458767bdf9d893c540f95ea87f9b81388f4558e27e1b9316fe5df5974481c39a45186e7770826a9c54557d

                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2A6330.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    15a0533dbbd05872ade7db7af70e20f0

                                    SHA1

                                    9aa7aebb7472f67f2c9ddc9bef2fbe3e0ebcabdf

                                    SHA256

                                    77759718bf4686d4cd5d44f739f1ef98dd7389dec31dbe3f7f03f3ad09729ec9

                                    SHA512

                                    593c95647b49823e14a4730c21cdfc04a40c4efa47b8ce1f37b4efbae6d2acbb2a9b921a513d7790b033310a1b29e70a27a6c9b639dd44a978ee69176af437cf

                                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\computerlead.exe

                                    Filesize

                                    1.1MB

                                    MD5

                                    2354e800eefc681a7d60f3b6b28acfd9

                                    SHA1

                                    10b6a3d9d2283b5f98c9924fa1fca6da79edb720

                                    SHA256

                                    d3c21f6c3892f0c444ffb4b06f962caddf68d2c3938bbd399a3056db255007e3

                                    SHA512

                                    0395737b77891d8cf7761266c2b3d594deb8e742bd5f12f15f58b2c161c242356b953ebf8cd1f41924a917b2c1332bd2e05ef275efd2419a6134a60729195354

                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                    Filesize

                                    479KB

                                    MD5

                                    09372174e83dbbf696ee732fd2e875bb

                                    SHA1

                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                    SHA256

                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                    SHA512

                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                    Filesize

                                    13.8MB

                                    MD5

                                    0a8747a2ac9ac08ae9508f36c6d75692

                                    SHA1

                                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                                    SHA256

                                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                    SHA512

                                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                                    Filesize

                                    6KB

                                    MD5

                                    1e7e2f88e54668d756c11fbb88830252

                                    SHA1

                                    9497322abd964878c7aa039829e3990a39ccea49

                                    SHA256

                                    bfba5f922f1668fc19dd28f1c5eab45f38caedbc9f1a4df969e5795ec71c7aa4

                                    SHA512

                                    928c4b3948a8c3950c87f82f5ce6a95ef9105d242fa3a657e7e36599661f284f3234f3db879bb332090283309789207f52169120dce0a490ffefc86f7e602ed9

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                                    Filesize

                                    8KB

                                    MD5

                                    3b47fb3374ab5fc71c46d7bb1bd8ab7d

                                    SHA1

                                    ed0f0a37869bcd1b07d8343aee449c5f4007e656

                                    SHA256

                                    4b316b50e52b628b4aba8c22931191a7a3ce2f2883a5fcd7773936717b66fb81

                                    SHA512

                                    06fb1ad7644a0af2fc6fba9fc050fc330c3c48d19b1461a91505f6ca87e3d571a4d29f86c9b89806e643b7bf9611522d361e1a41304770c33e59b74788cdf804

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                                    Filesize

                                    10KB

                                    MD5

                                    f182f72ba4f73584631b67f1d8a115ad

                                    SHA1

                                    cc3a83c65dc5031ebb90d94c653e3b4fdb360f63

                                    SHA256

                                    a6ce6e758958940b617f3008800ad72efcc02902d8fe267632cc112896f5ff7f

                                    SHA512

                                    2f9b47c9c339298d0fbb029deb00845c2c3751d13298b3d3edc276c485f05c1c88c841042524e2f73dd1e0154ac63ffb1bd02aef51f2efd90dfc12e3728aa1d6

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                                    Filesize

                                    23KB

                                    MD5

                                    15d60cedde17a8f4e81be190199699a3

                                    SHA1

                                    4ec6f43883eeabf87e395a9281ee782424da867e

                                    SHA256

                                    d1b9acfa97e0fe5d4299581886df66f5174f5a505d6d7ff64ac1e3abc6fe68db

                                    SHA512

                                    847dd23b02c2e804827958397cbb85a9fc74e2a7320ec19e760c355cb6d10168b658157586173c545c0e577d78bd9608cf32bc303a8dcda5977be66595b8b3ee

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                                    Filesize

                                    15KB

                                    MD5

                                    50f5c690966e4bbf0a77ca5b0e226d82

                                    SHA1

                                    c9f29d84d056e5524b7a72f656791ec13f8948a2

                                    SHA256

                                    a95ff0abd7217578dde7e516149f9d4b3a75a94815c3151643a9be714290ce01

                                    SHA512

                                    052bced4bc0c78924ad940725476e15848c50ca75de55496253dd7910881f09dc5bcf806c3db186724cd54c56f287fbd988087baea55e428ff42e47c988d36bb

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                                    Filesize

                                    15KB

                                    MD5

                                    b1afc369fd03fee122c2eb5c18153b48

                                    SHA1

                                    96b5510ba61d2efb75d9310fe2bdac7602569061

                                    SHA256

                                    5cc0e63be6122b6ab13181b105f646bb3b2c34d8aab4ec00e396db71146c67b6

                                    SHA512

                                    fdec623ffdf56f6a1be474a039ca1b02b9ee40bbab4aae1463785173ef4e4d6a1d645c1ee53bfe94ba1ae6a0e5117e287cb0bed571c8ce4e80c744e8cac6e1cb

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                                    Filesize

                                    5KB

                                    MD5

                                    43ee9f415de4277633c6df8e0a13f40b

                                    SHA1

                                    702e67935592a80c3a4b7bf1561fdfe45631ca04

                                    SHA256

                                    0ffb6a1b62e29e4916bcf7a873892e4443f134c94baa15b9e1a11d628a405fb0

                                    SHA512

                                    b10b8da362c5ca337b661b0beda2954e502df1ae7de8a8109add19c2f527dea8fb20289e645d3ec074f9807d514cce94870b7737c5bfe4a93ee41da6735e781f

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    5KB

                                    MD5

                                    20de8dd63e99bbe71901fb6df47c182f

                                    SHA1

                                    15c0297141c27dc7600ec4e22c982ddea5b227e6

                                    SHA256

                                    d1f25b16a4068136cf363745d1c738e65eefe4af1f5dbaa2360d2edfdf68428b

                                    SHA512

                                    aefc14291e724c2bf1567caab0f4e19e2bc395696aca135598d21daa8586c8ecdcfd2be9ae40624d2dc17d5357102ac27505da988a9950b75564c9370d180e0a

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    15KB

                                    MD5

                                    9f3c8ad893925910b54e9e199592f251

                                    SHA1

                                    e47af40b4287161961dba4890de5732f0dc83177

                                    SHA256

                                    bc091bc7edd55e2001058626aa7c465e48a678aa41d0c4f5816ef7e9427c38aa

                                    SHA512

                                    75d6e3f25e394fe0cbbcfec3c3f2ca68688a87a227087510840e47c34818f5e66373e97b6b7c8f87a83d0b0efd26250cca48e646c4aa7bd0576780ddd1772034

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    6KB

                                    MD5

                                    1015c633a2d4b075782768bd8c2b60d3

                                    SHA1

                                    08c87996482b3be3f73d9aefb41291a4bf61eb2e

                                    SHA256

                                    acc525dd8d163aba2dfa331a5f4a0cab5236f108cd46656bf4089e16b75df698

                                    SHA512

                                    2bfeb99896bffbeb9818000da550ab01bbd4a8d84e4f3e9caaa2124fbc3e0887843608f03e447b36f419fa475fe3efe4fd59ab14499e873770fc50063f6c0deb

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    15KB

                                    MD5

                                    3675199c804952ca3c5cf63b68f2442d

                                    SHA1

                                    1adab47dc4bfa95984c56859d95ce06c7c313b70

                                    SHA256

                                    280d90c88e28ec915da37222cc2104d6eacdf507b740f5941a807a395f545a8a

                                    SHA512

                                    4480d8c1d1128139cb3e0fe4cb80eaf788bd0827b04b2bfe1e18f43b5a7a43c63f24e2cfcc9739c30a5b570c0ebe72026aff5e60faca989de2a8c5f3dc067cea

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\17b9ecfb-a9f3-4c89-a443-6e9af0f39af7

                                    Filesize

                                    982B

                                    MD5

                                    c7ef8ad6fe099f21988a614dd99e2c7d

                                    SHA1

                                    9ac124bb72cc3f3533544d9cc6dbe6d5b89a8342

                                    SHA256

                                    fcc6a124d56b3623fda537d3f261d6e18881f512de29d726636e8297eb03b791

                                    SHA512

                                    a4deb8f675bfee49d82e948e951ecdec3050b77ca2a34efbf39dce0f8d24628d81b82dcbfb8ad86d20f2c496800fc60785307f86eee5157369e89c90ac59ada3

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\cbec88f7-56f2-4d29-bd65-4e49259bbaa0

                                    Filesize

                                    671B

                                    MD5

                                    abd6e7e78e303125d4a9f49472f1ef2f

                                    SHA1

                                    191b47eb16f1bc30dce9421c97cfbefcfd4527d2

                                    SHA256

                                    aae86f44db011877ced6c0536d2c06d2904ee1482ee3103af012ae7eaec0cd37

                                    SHA512

                                    939daba92e8aaa470826c1df7722c0d6c226eb6ede698e94bb09953a933836d13ae933b0f06c0b3ea73d400287018fc18aafe6d9319f257850f3908c9d345b73

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\d8da7148-00d9-4777-84f6-8898749f6a6b

                                    Filesize

                                    26KB

                                    MD5

                                    1b09ca7fdd86d8d716f2041d9e19cc52

                                    SHA1

                                    9e556299c71969f9f4fb594e3262d2f7dcbacb20

                                    SHA256

                                    6d26a88ee37ab35828265b451479777dc262c7e9e9d9e6d7eec98833ec2f79ea

                                    SHA512

                                    c8b439fc96f0b0966e1b841a545dd5f5d21aef9861459b46ea1875506d3b231d56072538cd9f87182f2cbdc2e98cca572c489053f70cc05df75b7a7d4766b146

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                    Filesize

                                    1.1MB

                                    MD5

                                    842039753bf41fa5e11b3a1383061a87

                                    SHA1

                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                    SHA256

                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                    SHA512

                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                    Filesize

                                    116B

                                    MD5

                                    2a461e9eb87fd1955cea740a3444ee7a

                                    SHA1

                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                    SHA256

                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                    SHA512

                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                    Filesize

                                    372B

                                    MD5

                                    bf957ad58b55f64219ab3f793e374316

                                    SHA1

                                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                    SHA256

                                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                    SHA512

                                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                    Filesize

                                    17.8MB

                                    MD5

                                    daf7ef3acccab478aaa7d6dc1c60f865

                                    SHA1

                                    f8246162b97ce4a945feced27b6ea114366ff2ad

                                    SHA256

                                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                    SHA512

                                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                                    Filesize

                                    10KB

                                    MD5

                                    edd79995a84b88e0374128feb0065f2d

                                    SHA1

                                    b4ef1c3629a222d4097f5b3b15879f3eecc3f47d

                                    SHA256

                                    99ae166391210ecd2ae77c6b59945fec166b387857a2940f3957f0ddff43d735

                                    SHA512

                                    dc806e600c619fe682b73c19764ffeef022fe9654e525c6e7a82bc122181d6aa0b4d285af0a2a603a816fe304225e3a795f05a7537d339a358e5ee2449c14e32

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                                    Filesize

                                    11KB

                                    MD5

                                    f21d6203b24344d4465bf65803453861

                                    SHA1

                                    8a8c332874a52ac8fd22d26174d6499c2f451bf8

                                    SHA256

                                    91d1e167f02da9d92e1c308c3076e09aad4b0fafabe33271ade01ab5f3a9e56a

                                    SHA512

                                    b816e2b9e780c71705b837b048e10108203d38b999d6c8e9c20407a7c6ff8a43efe281a00b1846230a62218c893236cea61533e99463e4641dbf19b90f237388

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                                    Filesize

                                    15KB

                                    MD5

                                    e73fa1bceb1a076c5d81b62e2b6bd9da

                                    SHA1

                                    98bc0e6466ea6e47f43e0233ff7aec1fc1865a67

                                    SHA256

                                    3e16644394e59f57afb4e896b2bc20754085cb120b2f043f2f63d403781e9f1c

                                    SHA512

                                    c24aca436b34850ef3aad1a709930206823b83806bfb120d1d1a854d3d165c282b1df695faa46e84fe401b6841b955e24e53a53cb07ae35929a3691fb4b7afc9

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs.js

                                    Filesize

                                    10KB

                                    MD5

                                    90e167a2998e7c81c08c62ce4fa794c0

                                    SHA1

                                    128f875672cf60141be71a752448d3095001dcb0

                                    SHA256

                                    2b39205977680cfa0b1f7b2377dd229bbbd8c068d77633d1484f4f1d235b22e9

                                    SHA512

                                    a9d6f2d3918b38af7866dd9f700f6305a52c4e8986ca140daccb24f00ee7dcc25225f72e376c4bc0b1af1b92c39e71710cc5a9c9ec5dc463070871492093c8a7

                                  • \??\pipe\crashpad_1588_RHMKVGIKDLANWGQB

                                    MD5

                                    d41d8cd98f00b204e9800998ecf8427e

                                    SHA1

                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                    SHA256

                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                    SHA512

                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                  • memory/220-952-0x0000000000C00000-0x0000000000EAE000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/220-962-0x0000000000C00000-0x0000000000EAE000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/220-990-0x0000000000C00000-0x0000000000EAE000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/220-987-0x0000000000C00000-0x0000000000EAE000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/220-963-0x0000000000C00000-0x0000000000EAE000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/1060-63-0x0000000000A10000-0x00000000010A7000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/1060-73-0x0000000000A10000-0x00000000010A7000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/1080-128-0x0000000000030000-0x00000000004CB000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/1080-135-0x0000000000030000-0x00000000004CB000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/1856-54-0x0000000000F10000-0x00000000013B0000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/1856-38-0x0000000000F10000-0x00000000013B0000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/1904-152-0x00000000003F0000-0x0000000000A91000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/1904-151-0x00000000003F0000-0x0000000000A91000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/2148-67-0x00000000008B0000-0x00000000009D6000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2148-984-0x00000000069A0000-0x00000000069BA000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/2148-985-0x00000000069C0000-0x00000000069C6000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/2148-74-0x0000000005780000-0x000000000578A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/2148-70-0x0000000005B60000-0x0000000006104000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/2148-69-0x00000000051D0000-0x00000000051F6000-memory.dmp

                                    Filesize

                                    152KB

                                  • memory/2148-68-0x00000000052F0000-0x000000000538C000-memory.dmp

                                    Filesize

                                    624KB

                                  • memory/2148-71-0x0000000005790000-0x0000000005822000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/2268-80-0x0000000000710000-0x00000000009C8000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/2268-79-0x0000000000710000-0x00000000009C8000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/2268-77-0x0000000000710000-0x00000000009C8000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/2268-109-0x0000000000710000-0x00000000009C8000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/2268-131-0x0000000000710000-0x00000000009C8000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/2812-34-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-3376-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-81-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-1311-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-991-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-3385-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-98-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-3382-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-3379-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-3367-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-2339-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-203-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-969-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-3291-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2812-134-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3388-132-0x0000000000310000-0x0000000000F60000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/3388-133-0x0000000000310000-0x0000000000F60000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/3388-970-0x0000000000310000-0x0000000000F60000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/3388-97-0x0000000000310000-0x0000000000F60000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/3388-992-0x0000000000310000-0x0000000000F60000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/3388-100-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                    Filesize

                                    10.4MB

                                  • memory/3388-204-0x0000000000310000-0x0000000000F60000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/3388-1049-0x0000000000310000-0x0000000000F60000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/3824-21-0x0000000000830000-0x0000000000CEC000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3824-72-0x0000000000830000-0x0000000000CEC000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3824-32-0x0000000000830000-0x0000000000CEC000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4472-2964-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4556-110-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4556-111-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4612-3031-0x00000000005A0000-0x00000000005B2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/4760-3389-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4760-3394-0x0000000000250000-0x000000000070C000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/5208-3205-0x00007FF87C370000-0x00007FF87C565000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/5208-3212-0x0000000076320000-0x0000000076535000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/5208-3199-0x0000000002640000-0x0000000002A40000-memory.dmp

                                    Filesize

                                    4.0MB

                                  • memory/5208-3198-0x0000000002640000-0x0000000002A40000-memory.dmp

                                    Filesize

                                    4.0MB

                                  • memory/5208-3114-0x0000000000400000-0x0000000000481000-memory.dmp

                                    Filesize

                                    516KB

                                  • memory/5208-3116-0x0000000000400000-0x0000000000481000-memory.dmp

                                    Filesize

                                    516KB

                                  • memory/5208-3112-0x0000000000400000-0x0000000000481000-memory.dmp

                                    Filesize

                                    516KB

                                  • memory/5312-1503-0x000000006ECB0000-0x000000006EDE4000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/5312-1499-0x00000000005A0000-0x00000000005B2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/5456-3225-0x00007FF87C370000-0x00007FF87C565000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/5456-3227-0x0000000076320000-0x0000000076535000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/5456-3222-0x0000000000870000-0x0000000000C70000-memory.dmp

                                    Filesize

                                    4.0MB

                                  • memory/5456-3213-0x0000000000490000-0x000000000049A000-memory.dmp

                                    Filesize

                                    40KB