Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 07:47

General

  • Target

    9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe

  • Size

    7.0MB

  • MD5

    3a1a64491c393ddb08139749c1b06b38

  • SHA1

    1f1c4de5675f0e3905546ecb23c5b346dd190142

  • SHA256

    9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915

  • SHA512

    8afe8a4323b790d7ca803819895d65f150bacb45385983eb77816b0143ab027cda20a1f02bb5805167f37c975eea119b1af0dd076163cd5a104cfa8e37a31553

  • SSDEEP

    196608:QlS0oLY3kTr+HsAd5FhV59FkDnMAyC32Ih1qpDmenc+rLO8MoRf:QlS03kTr+X3g7m84nc+3O8L

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 17 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 59 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe
    "C:\Users\Admin\AppData\Local\Temp\9e17c7a53bf1fdd19eebd7e0ee9055ce5c30a5a5997abc3ba2e5d404c91ed915.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q7g89.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q7g89.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0h43.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0h43.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5068
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x98q1.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x98q1.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2436
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5112
            • C:\Users\Admin\AppData\Local\Temp\1009233001\749b1bf35c.exe
              "C:\Users\Admin\AppData\Local\Temp\1009233001\749b1bf35c.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1676
            • C:\Users\Admin\AppData\Local\Temp\1009234001\609d351aab.exe
              "C:\Users\Admin\AppData\Local\Temp\1009234001\609d351aab.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:452
            • C:\Users\Admin\AppData\Local\Temp\1009235001\ac3863390d.exe
              "C:\Users\Admin\AppData\Local\Temp\1009235001\ac3863390d.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1372
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3664
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3096
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2344
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:5068
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4304
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4752
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  8⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:4488
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1932 -prefMapHandle 1924 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {aca735c3-dcde-452e-9b0a-6221a8ad3211} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" gpu
                    9⤵
                      PID:2300
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2504 -parentBuildID 20240401114208 -prefsHandle 2472 -prefMapHandle 2468 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {783d1cd4-ce2f-48ab-8a1b-b4648ed162d7} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" socket
                      9⤵
                        PID:4532
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3284 -childID 1 -isForBrowser -prefsHandle 3296 -prefMapHandle 3204 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {906d0cb0-cad9-48c7-beee-d4d6099ae82e} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab
                        9⤵
                          PID:2440
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3720 -childID 2 -isForBrowser -prefsHandle 3688 -prefMapHandle 3684 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {78ac65ad-ee5f-4dc1-99a5-bdba8182c660} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab
                          9⤵
                            PID:3660
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4956 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4860 -prefMapHandle 4912 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {99803c16-c9af-4d20-b03b-3eed89a74ef8} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" utility
                            9⤵
                            • Checks processor information in registry
                            PID:6576
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5396 -childID 3 -isForBrowser -prefsHandle 5400 -prefMapHandle 5524 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a141e9ad-4544-4a71-a8f6-acc771c1ae1f} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab
                            9⤵
                              PID:5008
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5732 -childID 4 -isForBrowser -prefsHandle 5724 -prefMapHandle 5720 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b54a028-97f4-407b-b0d0-9c48a3be3624} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab
                              9⤵
                                PID:3772
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5752 -childID 5 -isForBrowser -prefsHandle 5744 -prefMapHandle 5740 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {84ebbde8-896f-44f3-8799-8a16cd7a1615} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab
                                9⤵
                                  PID:2924
                          • C:\Users\Admin\AppData\Local\Temp\1009236001\ae2648351c.exe
                            "C:\Users\Admin\AppData\Local\Temp\1009236001\ae2648351c.exe"
                            6⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4484
                          • C:\Users\Admin\AppData\Local\Temp\1009237001\68e1b587e4.exe
                            "C:\Users\Admin\AppData\Local\Temp\1009237001\68e1b587e4.exe"
                            6⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Checks processor information in registry
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5460
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                              7⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              PID:6520
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x40,0x16c,0x7ff9068ccc40,0x7ff9068ccc4c,0x7ff9068ccc58
                                8⤵
                                  PID:6552
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1996,i,191596200576438509,7489801644623081937,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1988 /prefetch:2
                                  8⤵
                                    PID:6876
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1844,i,191596200576438509,7489801644623081937,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2152 /prefetch:3
                                    8⤵
                                      PID:6884
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,191596200576438509,7489801644623081937,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2256 /prefetch:8
                                      8⤵
                                        PID:7016
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3212,i,191596200576438509,7489801644623081937,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:1
                                        8⤵
                                        • Uses browser remote debugging
                                        PID:3872
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3284,i,191596200576438509,7489801644623081937,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:1
                                        8⤵
                                        • Uses browser remote debugging
                                        PID:4432
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4440,i,191596200576438509,7489801644623081937,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4592 /prefetch:1
                                        8⤵
                                        • Uses browser remote debugging
                                        PID:4984
                                    • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                      "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                      7⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      PID:5872
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                                      7⤵
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:5928
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 5460 -s 1912
                                      7⤵
                                      • Program crash
                                      PID:6040
                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G9220.exe
                                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G9220.exe
                                4⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1092
                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3y96L.exe
                              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3y96L.exe
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4496
                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4L367B.exe
                            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4L367B.exe
                            2⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4072
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:552
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:452
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5776
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5460 -ip 5460
                            1⤵
                              PID:784
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6392
                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                              C:\Users\Admin\AppData\Local\Temp\/service123.exe
                              1⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:6848

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              2146960e485095f146ba3ff397047cdc

                              SHA1

                              925b3bddbac2aa7be28a434d5b47a69019431a9e

                              SHA256

                              87ad826e43a95035b86fdae49d597bbc08a4e7c63be4da290dfa68b28cf31e66

                              SHA512

                              3c20f346344a5cc671ad436ba0eb521908999c39ef2980773d745e58eee3795fe716261f5ddaf9fdfd5f80cd4e6891019785ba97bcf222e0b73d62781668857f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json

                              Filesize

                              28KB

                              MD5

                              c0b4122e9523e4406259f9ee9ad09bda

                              SHA1

                              55f114197262a29f5e54a0f95b69daef29b1934c

                              SHA256

                              98a2ff1134b1c43fdebb2935dda568e3562cdad2cc86e48a7b9ce41bf36b35e0

                              SHA512

                              7f17491d893380232b93525d37b2e5d647ab3e5c06daba5744213483736f0a85423e0d30954d0863076b0402d27715a6295ee882fe0a008e818c0c063f05cad7

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                              Filesize

                              13KB

                              MD5

                              60edd8f0d89a075eeccacfd9e1150881

                              SHA1

                              0f3f34f6cb0913ed846066316b254ce67caf0ae7

                              SHA256

                              84d7c81563a609689bf03da6a963ae3d5b1e6cad9b992e107e828af02f7192b2

                              SHA512

                              04ed64498c6904447564a45d05fb4b85112856dec36ea734f47c46b0c85971cb4bda60a8cbdeb17769abf1a5b16b9a190be315ab3874ac22f8d5782e5aaa4d08

                            • C:\Users\Admin\AppData\Local\Temp\1009233001\749b1bf35c.exe

                              Filesize

                              1.8MB

                              MD5

                              e4b5250f65686e87e82210c71f5d5870

                              SHA1

                              2c9d0de98a7cbcf69d6cb496ed85bece6aa2e3f1

                              SHA256

                              4e5951866d4ca4fdd5e76ace99b49d8d92f13c28289b78d3989957069bc1799a

                              SHA512

                              80c6e789bdedc6a95aa47e65e0fab15c1d3bfec3daf8c79629b60296e8b508421a55e9e978689cb9f661f0702c56c2ed3f7f59ab722eec9241aac1903d438b92

                            • C:\Users\Admin\AppData\Local\Temp\1009234001\609d351aab.exe

                              Filesize

                              1.7MB

                              MD5

                              637c18dc90ea5e349eb27bd582fac705

                              SHA1

                              7fdfba2b9007dc1b2c6bb508f5fc320b4ceab182

                              SHA256

                              f3f6386f2bdec68aa8b66dcc8e2a248dc2934264b39814cbba85831b4dd4ad0d

                              SHA512

                              6daeecf25db8d0a968c5a3f15f533d36fc219074ddcd59d03ef17d230d010a360619c43bd7f9d95c14b149cc957316a4171e8421594aef6faebc9e24e053d4d8

                            • C:\Users\Admin\AppData\Local\Temp\1009235001\ac3863390d.exe

                              Filesize

                              901KB

                              MD5

                              0f6832047e7bced4a803541e7c53fd0f

                              SHA1

                              d384c8fd05f725f0557b74d471a07658e177d40d

                              SHA256

                              d04d6399b3c5ae64db783bee5a7ff7e996c157c149ebb8126a4c3b8777411900

                              SHA512

                              e28f93ffd6c0f525c764214093d01100252e0d72949e6c34844921000f24226c0bca5726110b6e95f09cb21bfad87353d8afe1e8090e39f7941855dc36d56de3

                            • C:\Users\Admin\AppData\Local\Temp\1009236001\ae2648351c.exe

                              Filesize

                              2.6MB

                              MD5

                              7152f5ad6af0a21c03104c040cab2367

                              SHA1

                              3d5e4d02fa7d4dcce03af0ea2453321492379fb2

                              SHA256

                              963a58fad4f05c153e70205aea5788a64608ed6c1ae952ca7b3581d8e567faef

                              SHA512

                              356d73bc01a2f47426bf3160403403919f2c20b83b844f3658f07d5d134b039db95ef1a8c3eac76493091364461f5a4be13962430dfa814c2fc51d5c0b53f042

                            • C:\Users\Admin\AppData\Local\Temp\1009237001\68e1b587e4.exe

                              Filesize

                              4.2MB

                              MD5

                              b4de34dcc96d16ec82f6fa3a7d037d4f

                              SHA1

                              a61abdbcf17bd347b2f0733d921100bf5503e844

                              SHA256

                              176260afa9071597e2a1a9947ae1394acf082932fbbb78b3c830c6d7c63bfa76

                              SHA512

                              619dd38b27a461164a5541a42d4796b5f946df776d7e8e5e0849580c7148a6bbd7afb50db9e7ee0fb0f2dce02962a260fa7545c14d70f1e005243e1fd600aa33

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4L367B.exe

                              Filesize

                              2.7MB

                              MD5

                              0d1e5334ceac878a5054ae5dbcfe0942

                              SHA1

                              1e3bdc4a9a1b54c65cd489187c51f41b51f2a3a2

                              SHA256

                              fece7908c91ac1248fe2ac0d2bd28f80c59b6d26669d2f144e8d5f92a7d1166b

                              SHA512

                              d96f09715b513b8bfa277df9524c4da73ad7e761128714f9da21c4fdff354d10f6bfe75936156fc70f2e6ed9fc02a827b29e2967fe3da9234e6f584d7dddf945

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q7g89.exe

                              Filesize

                              5.4MB

                              MD5

                              0be3b0973890672a601efd0c890884c2

                              SHA1

                              8869ee15f83516a7e7bf9ff730e89ded9aee1000

                              SHA256

                              31496b5bbc45781d3ce977713992cadb9d44bab477be21acbce8dbd3bbe9613b

                              SHA512

                              fb9c2242496837cff34fb4d1a02d703d52b0073d5b93e0f5f37bc61e72c9f3b3d37145e673a06b81625e7f096dcca4133b346912b155aeacd60be792ef9ad23c

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3y96L.exe

                              Filesize

                              1.7MB

                              MD5

                              39150cb5924999ed343818b23d52319f

                              SHA1

                              5e32677c6eb3e4abd9400645e5c79601e3379964

                              SHA256

                              a02e0441ef8f1c4768bf648c73f2a3210828a6f62836acbf73a3c93bae91747a

                              SHA512

                              c0d48d9a6fe6cf508e800023b7aa76dfa85a337967ba2fc5a2e5b4c0060b00799d0ac2a5a41f7206f7ab4dd09606c4923a12f57c9e31ce31facc7d99394e32aa

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0h43.exe

                              Filesize

                              3.7MB

                              MD5

                              3d9833d9d661485a51439a0b1c46fb4c

                              SHA1

                              298e8ef5d2df25e0ba34e20b91e3c12aa0e3389b

                              SHA256

                              cfe15cb4dc0e3e86f9a8253665f9ca2a454cb31f0ba3da5eb522fd50675ecc38

                              SHA512

                              fdfba390be4fdaf2ff21915a28077de08c78adfc45de7170789054989e048140baa377a80e2f72cabcf1946b1d02414ec0569e8e3729c114f74a7db4167fb09f

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1x98q1.exe

                              Filesize

                              1.8MB

                              MD5

                              a5c1bede87aa32763c4260e89488190e

                              SHA1

                              c6aebc9f05315ba9f7fab59b47fd661fb4856db9

                              SHA256

                              213feee2adf1407723f34322234a1ad83857745e38641909a8b50e0ecffe2f11

                              SHA512

                              bcf6c75025bc990feff564a49f0d2e6dbb8207c39b374adcd71f08e2dba8b67305d0ab4cad0a3843ae22f9407f6d5fa1819c003a01664787bfaaf337bc558baa

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G9220.exe

                              Filesize

                              1.8MB

                              MD5

                              bc555453e167161e80e5d71952110fb8

                              SHA1

                              ced441305778199ae6039b36f12137059c20f3f7

                              SHA256

                              389df27a4c0a96ccebb77722d502ba46b74be45f1b6a39189716deb76b0e8d4a

                              SHA512

                              20bca4de5fcd8b1da7d608c27eec7bff218e01b71225c9bb612cf0bf11a4efdf4c3a019da421a84ee60f883ad2d68a9a017b8ff57ea6f340850c739d0198035e

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              479KB

                              MD5

                              09372174e83dbbf696ee732fd2e875bb

                              SHA1

                              ba360186ba650a769f9303f48b7200fb5eaccee1

                              SHA256

                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                              SHA512

                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                              Filesize

                              13.8MB

                              MD5

                              0a8747a2ac9ac08ae9508f36c6d75692

                              SHA1

                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                              SHA256

                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                              SHA512

                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin

                              Filesize

                              18KB

                              MD5

                              4b20d03318bc5a5b06caf04dac5bb565

                              SHA1

                              d5b628861f31269417efb67f668ee7367bdc2213

                              SHA256

                              75841fd18317c84dd30e4d79655c328d67bc3c1aea18a9bcc0a8cbc3d0d8038b

                              SHA512

                              3450728e9ce94b11699cd6f66a8ae9c4567a7b4d2987d85c91f74f855e6871fcf0beb32920454ed68339d951f12f4f5207fd5c84e41cdaa26a57777712c1cb5d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin

                              Filesize

                              7KB

                              MD5

                              2b54f582b275d1b3067b9ca2714d5419

                              SHA1

                              320f727c7769bde39aed18a084e251b0ac2ab12d

                              SHA256

                              c50a36899d23d3f0d4e2eb797e3c761318dbbce6c838e45dc25b94dde947c4e7

                              SHA512

                              01e5583f739fd29f532e2d21e2b820636dc17447add98446a8f04ad394eef50fcbb45a57d384c7db84010d4eaf49ee89f4f82ba6358278931672f76b39748441

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin

                              Filesize

                              10KB

                              MD5

                              9f18c5b516c3e89aac040f5c147d904f

                              SHA1

                              81609e800487ba96435941d5e9165916886cb2a1

                              SHA256

                              1d042a64bfa914deae5032cffb7fdd3d9ad49e9bdd654f7c5a2c4ac12f7b49d4

                              SHA512

                              ae4e875fab1c5b1b54fc3ad227a2c56062ea57ff6d22305d13a4a8e48cbdbf91950672bb8003015a995d2ff74f095da2cd4dec8f1cff16511d4c50eb034822b1

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              23KB

                              MD5

                              458a0abbb0fea9157f0f7abdc7cc6d88

                              SHA1

                              26b64089e8d8fef4801ca081e3c47764aa67a436

                              SHA256

                              861afea72c4bb9c3148b404530938a44a815c4698f57c20f18861459a1f063a8

                              SHA512

                              d0f1ed9508684bed9910506c05fe30c8f56f9f803dc0021874d273bb79e652ae5f8d5120b6eecaf85fa711b9d3b00ca56d678460d6d001e1e5f7ea24c190ec77

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              5KB

                              MD5

                              e0fe0548050bd0bcac199b54af7f12bc

                              SHA1

                              b4963853ece164c343d997dafb3936b228aac67f

                              SHA256

                              ffd1bdf25f38860c40f1e24bdee0e463b44f18f3dcf26a4488f2fd795a94fe58

                              SHA512

                              cbd9da96501f72a39de26d048ea23d6b047d7d7a33ac39161e8c3632077707c5dbba90470365fd24c2caf07ec35c4d1a126b19f9c4375a14a025bf98eb84164f

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              15KB

                              MD5

                              85c8db14d9e16f71a3a2c4d94b07746c

                              SHA1

                              cb7c2f1555732c65bbc6b2e4d3b55e4ff402be0e

                              SHA256

                              7d46e4d1f43101d239cf4c8c8edc29b757e69bbc6f20834d5fa22099bff602b5

                              SHA512

                              a123c0bdaaefa80d9ab351831e287900fd89271c430b6c6b2390d0b8461e7d91290ae47f46622d556cffe6d34c37e4f8dce9b5761cde3c6a506ccade907ede7d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              15KB

                              MD5

                              bbd0a57646db815380379293535138bc

                              SHA1

                              7acd827eddb9bf3243540fb412d91b0c36bcea51

                              SHA256

                              ca3b4012c46001878120a6422f73304c2b8dcd661b39c4d87d5695253b42d5d3

                              SHA512

                              0bbea183addb67f1c12fad2c3ca1b626f06f129703332bfc3459df0af48f37d85d67b3f4784900228764d97c32e6055e1c723bde8c7a91d1c254c6ea048ae096

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              5KB

                              MD5

                              afdba3d9b0fd8dcf94c5830e5df315fd

                              SHA1

                              dc7b6ec8b7c8c0de54e6c222b25ffe79f3f256f2

                              SHA256

                              38de274ec2cee11634987b81f91d006935ec06fff89b940bd8ddbad524612bb8

                              SHA512

                              8e4bb67449b0432a9e9bda27e51551ed21b501c678353586accb7999ef6528fe438e4c7520eb8497b58019d5fd820df3ec46a698234fa9c1648560429cd6f4b4

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              be1d585b64bf09615be515111ae6ac98

                              SHA1

                              38d566b8acb733ec023f085878da6b8983061521

                              SHA256

                              d316ec30b867a8da8e7f846ac2a225b415f3a25759b80c1aaa38405b9847d0c6

                              SHA512

                              4fde3158766405ad1a0fc532e56070b8e56d26823ca49b61303e012747c1cba6b79ce3702eda323d2d8e0327e3d3cc851db9792fdccd86a4f944699dd4096f86

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              ded69ad52e2c2286e52c01ecf20c6efe

                              SHA1

                              45b27c936f1b9fcbd7786735a218c111885d3bc2

                              SHA256

                              5dfa89ac783237ed61436bc70f052003e77d496b4416f2d7c32acb768dfa0356

                              SHA512

                              aa4918d77a4cd4d29759c0b4fe6f836dece26fdb7543cbaf1836aee661fb71abd4da618a11895c7ca70841a9b86e91d953d730a6b191dfe35bd7b237f8d91342

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              b0cdcd193f92e73de2636ec76971b2f6

                              SHA1

                              3b2616fb83fec32c55d00996a0d06877d418c767

                              SHA256

                              fd3205139cf644a262c4396c9de10822fa2af7ee811e1116c7c4bea9631519c7

                              SHA512

                              5099de5267dcf5accd0650cb40bee37a934c2fedee2ae8532797cb41b75439be9f86088e5733cf80e506baddd81a7909dcdb92ab9ff7d76a3ed5ecf453116e55

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              15KB

                              MD5

                              be318b43bfdd65751ebb58742a5dfdb0

                              SHA1

                              f7249227a1a9b9887f90aeeb8623cf5b23e08331

                              SHA256

                              0598830696a587cc4a8fc5bf4a2fc025ee3dc570139bd3182c865ca8c26880c8

                              SHA512

                              02f5b69d5858826c3457e45bb68e9f3340e6ef973ecca35675ffd1a783ae6a0d147a1cb5a3e4ad5acf71a3efd7cd9a9a0eecd2891f664d11530638ab521f514c

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\11b3eaeb-7738-4007-b8ea-24b57d7a93c6

                              Filesize

                              26KB

                              MD5

                              bb0f2fb04899218bacda6ed8ce09c915

                              SHA1

                              b9a4ef20dfaae12d3ec8b6ee79d3d8eecb6ed58e

                              SHA256

                              5263d359d58551150dec5c944d545702010854444e21ed640e750f00d133f673

                              SHA512

                              490340241dbb911f92ceb32e4a2d68d35814ee585a3785898c7104e67e1e79866af707efd9e7d1b4dbae1b010a36a132165e9ace6460ac52f25e7eb8541fa1fe

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\15897b4c-e021-4166-a32d-79d779e8d826

                              Filesize

                              982B

                              MD5

                              f90acff5232efcc82a94268aed9a8221

                              SHA1

                              cf8d5a2dbb7b3f3ca19e946b3fab9266e0598cc8

                              SHA256

                              9595403e34280797ba6b0664cc6640b667788da1fc098b3af1d8bafcc3ad3838

                              SHA512

                              3b984e6b21cdb08ca75391db71c3702b5156b3b09b859e58025635ae000be686dedd7c2b212014f2c500fc90d2c412ae5659e299e5a3e5af88fe1317c050e7c9

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\b16f6727-5c06-4bca-b965-1d6f14a1f47d

                              Filesize

                              671B

                              MD5

                              83a8b768c18a87aec83f26de4b113b3f

                              SHA1

                              8d8e8a2b48b1d7ff29a9e4f56125481894d8752d

                              SHA256

                              8c7513dc952ae8b3f39df21a5aade1da379edc6b854dcb1cd354ce15a68ca55e

                              SHA512

                              899752297c81f6374c2b650f2797e36b71ff6597b79ed1db8f830cd758ea63f723782d3afb1542a7000e97b10865b657878fe432ac5143a83182c6cc918661e8

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                              Filesize

                              1.1MB

                              MD5

                              842039753bf41fa5e11b3a1383061a87

                              SHA1

                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                              SHA256

                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                              SHA512

                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              2a461e9eb87fd1955cea740a3444ee7a

                              SHA1

                              b10755914c713f5a4677494dbe8a686ed458c3c5

                              SHA256

                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                              SHA512

                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                              Filesize

                              372B

                              MD5

                              bf957ad58b55f64219ab3f793e374316

                              SHA1

                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                              SHA256

                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                              SHA512

                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                              Filesize

                              17.8MB

                              MD5

                              daf7ef3acccab478aaa7d6dc1c60f865

                              SHA1

                              f8246162b97ce4a945feced27b6ea114366ff2ad

                              SHA256

                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                              SHA512

                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs-1.js

                              Filesize

                              10KB

                              MD5

                              3ae04d1d31a9468cbc17b984659a2452

                              SHA1

                              d74f38db0686bb05809d540d2344076815809f3e

                              SHA256

                              36eb274b7888d8cb674edc851e72d1dc911c15d93f7e33988326222cd94dcde5

                              SHA512

                              361807eb14fdb56e109f6e092c5e3f03f8d287c85e2f9e6455bff8097b162824ad1924496f6d653b6e1c8d50eae557b53c15ce12f1d5ca875718ed49b722976b

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs-1.js

                              Filesize

                              12KB

                              MD5

                              d3690ea1c9c2a9c1677d89ef22dac3ce

                              SHA1

                              78c7e3735c74bc7bc57ff58ab3237f978b8ec55a

                              SHA256

                              3387c1eb91b8f55a83065f70e94375afd18de29373fc20ac2e4dae605206c513

                              SHA512

                              c72a39eecfadf904e966dc45440dc41d8998c833598c469ca8ef14a33267223a3d9cc526b6147732369edb76ea4628cb655f83a0f6a38fdecc6f54112b63a9a8

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs-1.js

                              Filesize

                              15KB

                              MD5

                              f02137120022fd181a3cb54ccdd02396

                              SHA1

                              c193073ff9b86e989836c2ca48014d46958c7423

                              SHA256

                              56784e076ba52089258b3383fa3c44606921c3764a92936e1704e3b7dd66b21e

                              SHA512

                              cd64bd10646bf93aa50b14bd032c536e26da23e8a0c95982907d8851e9a9c588c52e952b8f5ef099f4647685d11801243fe9360def0d833fbf5339758514e14c

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              1d38ca60ab842453396a6d6e788fedc2

                              SHA1

                              bc1b7a2af595da6af298fcd7cda6697ae971ca19

                              SHA256

                              53ec471c712290fdf6bd8f2c4a9b063393de49524fa4b6ad4d85b916ddd6a4e2

                              SHA512

                              4c051b63e275771cf8dc63e9b851198c1da7f7ab33179222c8c1d22c26d6af223573aeff70b63d4a6752da07cc4fdd06380824d774be14cc772385343041224c

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                              Filesize

                              2.7MB

                              MD5

                              d091c3b02097662a4c63de92d4d71307

                              SHA1

                              9e89f1e86c12f911b3f9d2373417435a360747eb

                              SHA256

                              e23007c08fe580e87bc8bce0b4a487848b70f727c030ecc994f8339935ef1025

                              SHA512

                              0548f7909b07a5955532fa68bd7655c51bcfc7f3f316769e09ddcd8a2257ff6126638e41f83acbd305aa966d8e17ad4d81d6fb5d590acdd077a4621041af98b8

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                              Filesize

                              2.7MB

                              MD5

                              d80f174a5b1bc94b6ea724aca10c1f44

                              SHA1

                              08fc6e44d044339ba78b3840f875faec60853309

                              SHA256

                              ae12e3e2ca187f5fdd035190f2f482db77c7b86f6eec55150654601fd0c06483

                              SHA512

                              6985d484da81be5dcf731f02683172d15c97e833792963aebfc26555e9bd678b179093ec9768ffd4b46a9364743702d16606872d79e76b36aa9eda44ffc1a516

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                              Filesize

                              3.0MB

                              MD5

                              40932324c95f4e357fe5fa5010951418

                              SHA1

                              2a00680eb5fd99b4cacffaa849626a73d2166973

                              SHA256

                              2ab18b4f6ab0935b17d93c85a6cf967e98a7acb68e8f4fbce7a2723349329a9d

                              SHA512

                              e8d85a7ff5eb90fcc9f274ec72d6d15bef3cd953eebd8df113edd14864b4bdab2e10f2a072743596e5e5c649c752bb698cf44e68f519e94adb68c2360f6b7373

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-wal

                              Filesize

                              64KB

                              MD5

                              9891148209b1d9675b56b351daf084f2

                              SHA1

                              e142279cc5b961c815b1bc45a9ab0315f2cc9513

                              SHA256

                              214dfcda36b2e42a9899e8fb439e8bc4363d1064271138f031ec38af46947c7b

                              SHA512

                              5e5e695f07cc1543baf966717a244533052edb8d33e5ba05f5468f531a98115e09cdae622ec53b9d72a811e1b1e525ce79b8ee84735d6742c8c024df9b89041c

                            • \??\pipe\crashpad_6520_NRFEVENWXGNPKQBK

                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                            • memory/452-90-0x0000000000B50000-0x00000000011DC000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/452-95-0x0000000000B50000-0x00000000011DC000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/552-43-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/552-37-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/1092-41-0x0000000000880000-0x0000000000D22000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1092-45-0x0000000000880000-0x0000000000D22000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1676-92-0x0000000000530000-0x00000000009D0000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1676-65-0x0000000000530000-0x00000000009D0000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2436-21-0x0000000000880000-0x0000000000D34000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2436-34-0x0000000000880000-0x0000000000D34000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4072-856-0x00000000009B0000-0x0000000000C76000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/4072-73-0x00000000009B0000-0x0000000000C76000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/4072-132-0x00000000009B0000-0x0000000000C76000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/4072-71-0x00000000009B0000-0x0000000000C76000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/4072-74-0x00000000009B0000-0x0000000000C76000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/4484-144-0x0000000000010000-0x00000000002C0000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/4484-143-0x0000000000010000-0x00000000002C0000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/4484-911-0x0000000000010000-0x00000000002C0000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/4484-915-0x0000000000010000-0x00000000002C0000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/4484-133-0x0000000000010000-0x00000000002C0000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/4496-67-0x0000000000C00000-0x0000000001274000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4496-49-0x0000000000C00000-0x0000000001274000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/5112-1069-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-4025-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-70-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-931-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-873-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-4068-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-4065-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-4057-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-93-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-35-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-2302-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-4053-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-4050-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-3686-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-4047-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5112-4043-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5460-1221-0x0000000000030000-0x0000000000C8F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/5460-933-0x0000000000030000-0x0000000000C8F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/5460-4040-0x0000000000030000-0x0000000000C8F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/5460-3881-0x0000000000030000-0x0000000000C8F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/5460-4027-0x0000000000030000-0x0000000000C8F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/5460-923-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                              Filesize

                              10.4MB

                            • memory/5460-2726-0x0000000000030000-0x0000000000C8F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/5460-932-0x0000000000030000-0x0000000000C8F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/5460-898-0x0000000000030000-0x0000000000C8F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/5776-3718-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5776-3687-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5872-4045-0x0000000000910000-0x0000000000922000-memory.dmp

                              Filesize

                              72KB

                            • memory/5872-4046-0x0000000072E20000-0x0000000072F54000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/6392-4059-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/6392-4058-0x0000000000860000-0x0000000000D14000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/6848-4062-0x0000000000910000-0x0000000000922000-memory.dmp

                              Filesize

                              72KB