Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2024 10:26

General

  • Target

    95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe

  • Size

    3.7MB

  • MD5

    47d78937897b4346b6ad5e5501d8b864

  • SHA1

    687a26e05cf5151da22f4ab9713ecad7e447c795

  • SHA256

    95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd

  • SHA512

    17bc5ac8b9a2b723706f7c29b48ebbfab28e57b432298fc1ae08dcf9219f6d3d8ced70a5b310dedfadbeba408fba7e0a4629491a0b5649d4f9ae2406070ab0b0

  • SSDEEP

    98304:0fEs/7VYZPG7/wGd8BIxAhStyekHscn8BdXj9tv+pT:095GGdshStyekH5nUdXjPmp

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe
    "C:\Users\Admin\AppData\Local\Temp\95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1C03U2.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1C03U2.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3592
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4312
        • C:\Users\Admin\AppData\Local\Temp\1012333001\Go.exe
          "C:\Users\Admin\AppData\Local\Temp\1012333001\Go.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4208
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\MsContainer\P69CZ8d7qXWcyOsB66pHSLt72y6yplqEAs.vbe"
            5⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1756
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\MsContainer\GHGhSTUsO1Bq4f5yX2eWVB.bat" "
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3372
              • C:\MsContainer\chainportruntimeCrtMonitor.exe
                "C:\MsContainer/chainportruntimeCrtMonitor.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2768
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\MoUsoCoreWorker.exe'
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious use of AdjustPrivilegeToken
                  PID:804
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gG5y4eJ6JP.bat"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:544
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    9⤵
                      PID:2300
                    • C:\Windows\system32\PING.EXE
                      ping -n 10 localhost
                      9⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:4804
                    • C:\Users\Admin\AppData\Local\Temp\MoUsoCoreWorker.exe
                      "C:\Users\Admin\AppData\Local\Temp\MoUsoCoreWorker.exe"
                      9⤵
                      • Executes dropped EXE
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1060
          • C:\Users\Admin\AppData\Local\Temp\1012341001\3c171b2b07.exe
            "C:\Users\Admin\AppData\Local\Temp\1012341001\3c171b2b07.exe"
            4⤵
            • Enumerates VirtualBox registry keys
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4000
          • C:\Users\Admin\AppData\Local\Temp\1012344001\rhnew.exe
            "C:\Users\Admin\AppData\Local\Temp\1012344001\rhnew.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4808
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 1648
              5⤵
              • Program crash
              PID:3968
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 1636
              5⤵
              • Program crash
              PID:3468
          • C:\Users\Admin\AppData\Local\Temp\1012345001\5da218c60b.exe
            "C:\Users\Admin\AppData\Local\Temp\1012345001\5da218c60b.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3964
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 1660
              5⤵
              • Program crash
              PID:4836
          • C:\Users\Admin\AppData\Local\Temp\1012346001\c04b2d72d6.exe
            "C:\Users\Admin\AppData\Local\Temp\1012346001\c04b2d72d6.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            PID:744
          • C:\Users\Admin\AppData\Local\Temp\1012347001\6fb35ce065.exe
            "C:\Users\Admin\AppData\Local\Temp\1012347001\6fb35ce065.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4468
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3996
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2720
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:404
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4988
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1432
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2788
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                6⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:2996
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1960 -parentBuildID 20240401114208 -prefsHandle 1876 -prefMapHandle 1868 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9fc48ed6-369a-49c3-b00b-062ac04ad21e} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" gpu
                  7⤵
                    PID:4832
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0faff46b-3297-486a-92dc-6917cda94cec} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" socket
                    7⤵
                      PID:4800
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3048 -childID 1 -isForBrowser -prefsHandle 3052 -prefMapHandle 3244 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {81ec6d8d-602e-4a90-8c68-f861b2e361f6} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" tab
                      7⤵
                        PID:1428
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3876 -childID 2 -isForBrowser -prefsHandle 3868 -prefMapHandle 3864 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3fcb196-736b-4443-9617-93aff491439b} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" tab
                        7⤵
                          PID:1976
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4728 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4740 -prefMapHandle 4736 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e40f525-7fe9-47f6-b8b5-02366df5a4e0} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" utility
                          7⤵
                          • Checks processor information in registry
                          PID:5808
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 3 -isForBrowser -prefsHandle 5404 -prefMapHandle 5408 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {45431769-c133-4ee5-bae4-9efd482feacd} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" tab
                          7⤵
                            PID:4684
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5568 -childID 4 -isForBrowser -prefsHandle 5572 -prefMapHandle 5576 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0cd7e75-d811-4240-94fa-51f538afb9d3} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" tab
                            7⤵
                              PID:1388
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5848 -childID 5 -isForBrowser -prefsHandle 5768 -prefMapHandle 5776 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {10ce7a4b-6e63-49cf-b10d-6e3c878318bb} 2996 "\\.\pipe\gecko-crash-server-pipe.2996" tab
                              7⤵
                                PID:3884
                        • C:\Users\Admin\AppData\Local\Temp\1012348001\a12f727a9b.exe
                          "C:\Users\Admin\AppData\Local\Temp\1012348001\a12f727a9b.exe"
                          4⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5648
                        • C:\Users\Admin\AppData\Local\Temp\1012349001\d263f2c36a.exe
                          "C:\Users\Admin\AppData\Local\Temp\1012349001\d263f2c36a.exe"
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          PID:5936
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2O9294.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2O9294.exe
                      2⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2836
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 1632
                        3⤵
                        • Program crash
                        PID:3316
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\AppData\Local\Temp\MoUsoCoreWorker.exe'" /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:3212
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "MoUsoCoreWorker" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\MoUsoCoreWorker.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:2496
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\Local\Temp\MoUsoCoreWorker.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Scheduled Task/Job: Scheduled Task
                    PID:1388
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2836 -ip 2836
                    1⤵
                      PID:1932
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4808 -ip 4808
                      1⤵
                        PID:3316
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4808 -ip 4808
                        1⤵
                          PID:5028
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3964 -ip 3964
                          1⤵
                            PID:3216
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:6068
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:6216

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\MsContainer\GHGhSTUsO1Bq4f5yX2eWVB.bat

                            Filesize

                            76B

                            MD5

                            f64211e9d1ec38ede33666033382d99c

                            SHA1

                            b602450c1b9d00043f20dcb60537e8706fcad872

                            SHA256

                            6e4d045d43e97c5fca3ddc26016db1f1c73b334c6fe4cee92b65974c745a9cca

                            SHA512

                            1e80f74c7a6582ac8187bb22dd70fa38e8d18840d4a45d27098c6eb517228b836218211418b147fc0060cc7029ae12d6abd0d6348b731169b93c9062876c677d

                          • C:\MsContainer\P69CZ8d7qXWcyOsB66pHSLt72y6yplqEAs.vbe

                            Filesize

                            212B

                            MD5

                            ccc3de297113f78d2b92b26bf192fce3

                            SHA1

                            417dcfba717ce68ebd96b71a2edac15f93e91aae

                            SHA256

                            2e776534dab440e19bda0f46b1bd2a21f2f9c2dee1c225632f87907939516d37

                            SHA512

                            f4c1aefddfcc7a9eb3fe5f333ad287fc0f4353c475ead34890ffc1609605ce1544bbe0ee4a7192b856af7540a5d1fcdfe9649856c3a04150c6edc709b1bb6459

                          • C:\MsContainer\chainportruntimeCrtMonitor.exe

                            Filesize

                            1.9MB

                            MD5

                            38514f88aff517ea6be4724d24b28fe2

                            SHA1

                            0d9ce3815f04c401561339b056c7ab2ba907e16c

                            SHA256

                            92c34270df9842c931ab9e4af87a0cbdd1f3b12e70482d474c3a9d0029f09add

                            SHA512

                            c7516e29a99fc053d07da626bdce8ab37917267de2911685debd3e0764819b3a387626d98413ec62808789e28e15739e0b533a9c8ab765215506bdf6ad5ef707

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G94T3PNL\download[1].htm

                            Filesize

                            1B

                            MD5

                            cfcd208495d565ef66e7dff9f98764da

                            SHA1

                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                            SHA256

                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                            SHA512

                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json.tmp

                            Filesize

                            19KB

                            MD5

                            d78f1eec5ca025a000b7d7a9e215f25c

                            SHA1

                            d140f682afb49058739ca4f9448b257e561b27e5

                            SHA256

                            21e24e2a10b2eaa082c682f8942bec84331c36578c3e2ccd3a87aee7706db707

                            SHA512

                            701115649674c8ce75c11c3e060aac0b6c9f2c6d4742e8d24cfde55739cacf6a86df7b36c19e549448765c961dc5edcf1fafb14ecec030736b4001026e328372

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                            Filesize

                            13KB

                            MD5

                            228615f183b33d01da5e093239724881

                            SHA1

                            aadb1444e09fe4fe233a98ba3d894cc1962b1434

                            SHA256

                            df83f86c87aa6d777d0a8cc6f2f320a353f3488754514d2a745717a965e8a167

                            SHA512

                            7b8c7cca0b7e054d74854a642dcfab7bf2e264a3152fe13ed2dfd64f61a81abe5575a8ecbca297af2ce839f9fa9eae3ebf7ac81516cf5a6bcd7fe79237c61e88

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                            Filesize

                            15KB

                            MD5

                            96c542dec016d9ec1ecc4dddfcbaac66

                            SHA1

                            6199f7648bb744efa58acf7b96fee85d938389e4

                            SHA256

                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                            SHA512

                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                          • C:\Users\Admin\AppData\Local\Temp\1012333001\Go.exe

                            Filesize

                            2.2MB

                            MD5

                            c9059dfb76ad9e011d4e11608ccc98cc

                            SHA1

                            c7ec739a977cc99a19e39103e2a20d59a6094508

                            SHA256

                            906e30690506eb761b3f84f7ae1146db9dc796e60d87303173fc99370485c58f

                            SHA512

                            da494d85e5689c65f2369bcff41479ec9a797322c761e18138c1e2397e0879986dc9bca64d9cdc20999902db90fdec8f94ad36184997d396433ab1a7c2e1b9ce

                          • C:\Users\Admin\AppData\Local\Temp\1012341001\3c171b2b07.exe

                            Filesize

                            4.2MB

                            MD5

                            928d3b616e73c926bc35d596c432a62b

                            SHA1

                            83f772926daa9beb0f1a60b0a5145685be6f82cd

                            SHA256

                            cc9929b67e24ad058371096529fda098fc1171df19097b4a05e79e3641b8d71f

                            SHA512

                            6bb0d25b857fb48ccf81b51c4348ff240083ff8069d8d96bf9b62df9534f6c0891c6954afb30ca5a43ee0d096396a8cd42dcfafff4b0152663ca75bcf3177ade

                          • C:\Users\Admin\AppData\Local\Temp\1012344001\rhnew.exe

                            Filesize

                            1.8MB

                            MD5

                            f7286fef9317fe91e24cda721ec0be81

                            SHA1

                            0e0197c0f87200f7c1ebb4bba314f7bb875a638c

                            SHA256

                            4dcf1cc20990dace1f3e7c5a4b94ea7b823f90eb6de639b2b1b6494838f1cc62

                            SHA512

                            314b3f5cf1a0c15db568d33647b97887b37e987ba253ee9f5ded045446328307ebd04acd832fbdf66ad29be9510bd0c378e2fcb889509dca84df9b9106602c6e

                          • C:\Users\Admin\AppData\Local\Temp\1012345001\5da218c60b.exe

                            Filesize

                            1.8MB

                            MD5

                            8c230debcaa0241cdf437c61b620b77a

                            SHA1

                            9a16380b7a2f8328b04f060791f7ad52466c374f

                            SHA256

                            572a83147fc938c1ff176431438955f77fc5dd10cedca752fd7da8bab4506b6d

                            SHA512

                            de539b4e190bc279969ba97513da91d903fef0eae7d91844f820665e9c1ebd303c5641b39229f5810771d7a590842bd30f41c3627ec694bc2799ce06a1a22132

                          • C:\Users\Admin\AppData\Local\Temp\1012346001\c04b2d72d6.exe

                            Filesize

                            4.9MB

                            MD5

                            834caa1ea7e5fadc7aa0735eed542c0e

                            SHA1

                            1c077c5230136337722a6c127ddbe2ebb49f67b3

                            SHA256

                            c6502746b552f7a74d91fd5e6574e5059b6e4a6b027f1b3ca68a2d604756c074

                            SHA512

                            4d8e99d401c0025c38eae93a8b6b41804e83a104a92753eb4a48e9d27c6c901948d7ca0cebaf6771031259039346bb3a2582cce32550bfcba06757edd9b1fe7d

                          • C:\Users\Admin\AppData\Local\Temp\1012347001\6fb35ce065.exe

                            Filesize

                            945KB

                            MD5

                            8517a8167dc00d5cb9b5f0ab6a170552

                            SHA1

                            d1592531656e09f8aaf724c27e785e1b30498940

                            SHA256

                            bbec4bc64a4a9ae0c765b71fcdc033b430f50c56b1f5a0e581a3d8117795c11b

                            SHA512

                            854482678dd01d889b80d794fcc804cc567dc121149beb64b07c4f98a9d476ba99473c0a7f80819156fb41fd73f67bffdf36a6520e19b3912b5d5bc6d293e012

                          • C:\Users\Admin\AppData\Local\Temp\1012348001\a12f727a9b.exe

                            Filesize

                            2.6MB

                            MD5

                            80a4a9bd8cdb150cbc228ad88557260f

                            SHA1

                            057931385a2bd410d5c5502a2f6461471fa0377f

                            SHA256

                            10ee97136471d63c17d88a987c7b7282b87c2456f7082310c79fe9c2b6e6ffa1

                            SHA512

                            ff5117d04af0459b8dc7f6f747026fbc9538954db44489d151a85cdcc238563964593326691dcfa440b6ab379e276074c2c9f231255cd5b844e1bb5cce8a0146

                          • C:\Users\Admin\AppData\Local\Temp\1012349001\d263f2c36a.exe

                            Filesize

                            1.9MB

                            MD5

                            032aa8264c2ccbdd008693fd9c29a1fb

                            SHA1

                            86a99c6498d68c8af759afd61ed56637a46bb016

                            SHA256

                            eab9619df6b82520165d2b4455fbdf147077932f8f53b80d6adb9501e822cdbc

                            SHA512

                            bb5c07246b6bbac5ccfd26fd32e4f8fb1b337590593475ee8a289bb92a502d7f95c7f74dcfdf0c71389290ee4c415fb1328618d081e3c7dbb31a3a5c7aa8a679

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1C03U2.exe

                            Filesize

                            1.9MB

                            MD5

                            6d17158239deaa10445332a320d93bb4

                            SHA1

                            d7928e790267e50aa28a8f734329ea302f8176bb

                            SHA256

                            547aec0f988c87b03e73231738462dd61c430708e6f9120eddfa1310b34524cf

                            SHA512

                            c002e6913b1a5674d00e9077af4fada039b06f290114c47d3cd58b5ababc713bf9ba84defcf791e1dd51f93662e940baee376214b24c01fcdca0fd867bde55ff

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2O9294.exe

                            Filesize

                            1.8MB

                            MD5

                            70f314a25f00b355a279523a9697b6d0

                            SHA1

                            c178ca3e12e65ddf72b5da4e824ca266420b94b7

                            SHA256

                            0ac722bdbc25fb4932ec228a7285f44210149c8880707e55f79f67a1a60090cb

                            SHA512

                            40229050e3a9a30fbceacf7f089ac1fff24d428e59a2cc8bd5bd2b3efc443d63e69eb660d12de07a946bf846192a5f04f1ecf931c0608e306a7703937dd928b5

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xaxucpx1.sbe.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\gG5y4eJ6JP.bat

                            Filesize

                            181B

                            MD5

                            0e8cda46e7482551530460682ccbbda7

                            SHA1

                            d3df6d9b60fde0bdff233264959c66f16179d278

                            SHA256

                            a5c42b4c7302c4a7ea3b9b665162b285e80c21bdaca0dc608c1e2358f15e2683

                            SHA512

                            ad41f7aaa9eb6ec549b6af819fd0d3625aff1940a10a9f5db4c7d1e34c438da08932af18d3220868076f57aa0c92763d70cef78e54d616ea3685773727b09281

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                            Filesize

                            479KB

                            MD5

                            09372174e83dbbf696ee732fd2e875bb

                            SHA1

                            ba360186ba650a769f9303f48b7200fb5eaccee1

                            SHA256

                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                            SHA512

                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                            Filesize

                            13.8MB

                            MD5

                            0a8747a2ac9ac08ae9508f36c6d75692

                            SHA1

                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                            SHA256

                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                            SHA512

                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                            Filesize

                            6KB

                            MD5

                            5a33f32c8501e6e450ac29a5369e84de

                            SHA1

                            4e2649d09cbe05b8d2d84dee320b8d91d5ed8ee6

                            SHA256

                            d1c3f97d9a724fe167b90b1ce2280be4d7b2a376b007df7ce15aa607d9875903

                            SHA512

                            6eebce71c4b352c97ec34587d084d024eb9028c09a548314e762d8e8c0802d1775c6161b2204a832873c8fb136920edb2201741cf4607553455eda2dc0dc487e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                            Filesize

                            8KB

                            MD5

                            54f444cdc43ed4416434224d48a427b6

                            SHA1

                            1c35fc593cf189d048e1fa3499a07a7664a13281

                            SHA256

                            292c6db94ff7f4684ccbd2208b7838eb649a7cff75b009ed741c022e88424a9b

                            SHA512

                            e76a48a2f69a591f4eda48e9d2d45d478f9579a0e960459e68832c3acb21d0ad0244fabba78df9fd038e38b9e851360ac6271e95746a12be66a3ceb52b68c3e4

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                            Filesize

                            10KB

                            MD5

                            7209496f1d32eba8650ab4a5f84504b6

                            SHA1

                            9fb041aee6f849e823273115b9bdf97f6428a02d

                            SHA256

                            df7a526d37225dc51851a3c1b23a750befe04eef429bea8ccc828d71c31ea8b8

                            SHA512

                            255524014c6e1920017e94697104254e23597760aa13cd6d184097566a6c893c5c5f00d4261e1554de264b986ba86f82fdddba2b5414613c3f1282af19a3da03

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cookies.sqlite-wal

                            Filesize

                            256KB

                            MD5

                            628288276f188aaf9db6628147fef017

                            SHA1

                            4a3a5b4104780315d626eacf6426c7ff47ff25e5

                            SHA256

                            a612686990f01a3d48bff460388a001774bd3dc1c4a94c577838206735858291

                            SHA512

                            ecfb5241e53347b1c7aaea06ea9196ebd77200c80d4e1a8348295222b660d2192f4f83e49f1df168e54c61821d637df9bc3a403ff9a78c840b09d8a200df9e16

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            15KB

                            MD5

                            041f5fb6487fa200e160df0f799b7d0d

                            SHA1

                            e67befdec0ecd062b130eae7f7afebd5c420d4d3

                            SHA256

                            582d2a88068e63d17f1bc9dd95cb4f68bc76e435feae8ed60d0aac807578f5bb

                            SHA512

                            1ea223e506fba2fff8c7f4e03533c5936894a9ac5bea99f142ec27394e2ce905671741d3cb0fed76843b177d994b08ef70610f515a5ebfe6af2c7d49e0f95b23

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            23KB

                            MD5

                            757fbf29e9a98f16977cb5c8bcd9890b

                            SHA1

                            efcbeaf406601b4d23ab46201b27d0c660f35cd8

                            SHA256

                            0f29d438eda90298a74847a1debec7664e73d58ec0053ee6d7e209bb41cb4f19

                            SHA512

                            0a61a8abe1aeeee4afb52add70676623c92e78c7e2fdac3825f031e054ad66b082dc3ff004fff29010100428901aa5c83b365a6fe9209d0274fe118b7b2d79ec

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            5KB

                            MD5

                            32ea075eb5299350922921ce80aeb0ef

                            SHA1

                            a1e9572d76e72c45a649206f8955e3d714b658ca

                            SHA256

                            52386fa52555c122fb01882706d728e5629cd5588263770fa88ef58df27ea837

                            SHA512

                            dbcbc2e7a0d2bc15b9b97fd7cb16fb91592975d22006bc31007a0cec72f64f1c970f807c283c5621e68e7d46a897fe2760d5beb32890afa1277bec4b92db29af

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            6KB

                            MD5

                            fa6bbb6d1b0acfb96f4c78ddf55c6acb

                            SHA1

                            0729ddc61c3083356c9cb90d1060d583ac9b4719

                            SHA256

                            eb1c18898fa22027b46797c1723a634905597a00d2b45637b652999e2874a366

                            SHA512

                            9f94b2786e8b570ecb1fd94e3f57a1dbdb080a0241f63d79e6f0348f97c0d23f0b13146cde4ad7178fca98aee37c2ea7071ebef81011090cccd68f969bea7e91

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            a3936417c77ff5c54d498f91b0cd898e

                            SHA1

                            6a6df58f8a1dccb19acc7828324bb7c25d246ca0

                            SHA256

                            a3d1d6321ed4b35faefc9d97a309c6454b04b51fc6d1f35aa2a076666a87bd6e

                            SHA512

                            c1e3b774163b962ef8d86a6ce95224d7633c49bbd0dc99a424f090c4a94b40760a4345b6c5f4d267008affbd9e77791f4ae66a14f86d785099dfd7c3acceb6ff

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            694891ebf48c6b21ddbf8841654fa707

                            SHA1

                            cc4856b7e3c2c9cc7152234c480786c3a07bce2c

                            SHA256

                            97287db488ff505b60d12ebf9fe370412de33e51701cac7974de49ad9a14b8d2

                            SHA512

                            830791ee13d953b32f251457aae33c8da6c4bc26e0f615ad75e967ce48ee2f8e13f155fe204b711881b06dbdf90af44abd656675f3158eea103bfdecb32adfb0

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            5KB

                            MD5

                            694185b091562850d6841531dad5db9e

                            SHA1

                            f99582be5d5d1c538d43faa985c442fc9f3d7425

                            SHA256

                            b48c6e06eb0d5a7babe51f98455302db8900ffa1083f52b6a054abee589a30a6

                            SHA512

                            7f9612511b4c59aa6619397e2395a9503efb32e516492b16c0bca97768995caeda295799016de0c326b36a79418cfc17d318dbea5282e467faf9f26dca9a73a5

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            6KB

                            MD5

                            535c16f54826e44823d07abe163b11ba

                            SHA1

                            199e1f7c9973ca9591f66019e9e44e2911eb49b6

                            SHA256

                            9a04aea2896118d240cb59ff92b992d5657fe70dc56028bdc1c4fe8fc1787bc6

                            SHA512

                            de4d48a1ed5de258c9f5731b7ff20d38de661e03a398c42ce6ac4229ce0b00c582c90e36eb9c6871c72ceb45a954f50d2000826096ee4953707a45859e5f5086

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\4c24ab21-37c0-40b6-8d9c-6046f5658d5c

                            Filesize

                            671B

                            MD5

                            74ce2dbfd3bcf5106f7eb787a339837e

                            SHA1

                            45e033e0575c73558c1483c71c06b714070639f7

                            SHA256

                            82bc96dee2be72452a7e5848e1951e9cb19a17d9ddc92b9423ee440ad766a096

                            SHA512

                            7fb28e44065c5078e56d56835613cd755aefacbbe24571d837205f46a7963646e1a96937221e0930c7237be747cd3f0c5272ac96d960ccda5ad15bafa521e042

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\e7dd7d39-bef0-4d1c-8c02-388bc0867990

                            Filesize

                            982B

                            MD5

                            aff39a16f97d9cdb55b960d76527a733

                            SHA1

                            6e1aeae379a58b54193305c2da0babd72874014f

                            SHA256

                            d9e696e395861c02c468becd934921d9beba901b639959a254291a8e41fe4841

                            SHA512

                            bc3bd2a5d7bb5b83db4c86b0407a81a05bece0ab1e85486b22990e5f1126a22185db37c7436267601f76b4890a3580401a2e6d5cc75fdf17b025a131dca7e7ed

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\ee4930d4-35a0-4fac-a6c3-3e357c19883f

                            Filesize

                            26KB

                            MD5

                            3442433d7d3bfcc37867290d04ab0f04

                            SHA1

                            81cd7fc8baec17d5220ac7ab3dfff87e4408da13

                            SHA256

                            0869db109fa1fc0fdf96c74b2da6a9fc99aff966b7cb9002a444248362a46f1c

                            SHA512

                            d962e4d43f6d9affa535675d494add1f8968bc46c46b8482c460180aea689fee0f5641a52348dba6e33562b9a77e4e2fe87988ee3166d19de4f2d34ffc9841b5

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                            Filesize

                            1.1MB

                            MD5

                            842039753bf41fa5e11b3a1383061a87

                            SHA1

                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                            SHA256

                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                            SHA512

                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                            Filesize

                            116B

                            MD5

                            2a461e9eb87fd1955cea740a3444ee7a

                            SHA1

                            b10755914c713f5a4677494dbe8a686ed458c3c5

                            SHA256

                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                            SHA512

                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                            Filesize

                            372B

                            MD5

                            bf957ad58b55f64219ab3f793e374316

                            SHA1

                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                            SHA256

                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                            SHA512

                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                            Filesize

                            17.8MB

                            MD5

                            daf7ef3acccab478aaa7d6dc1c60f865

                            SHA1

                            f8246162b97ce4a945feced27b6ea114366ff2ad

                            SHA256

                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                            SHA512

                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                            Filesize

                            10KB

                            MD5

                            b1079af26e1c2234abf374da53385233

                            SHA1

                            2aea1ce65a4cff00e11d8e02129cc38cd9a00e78

                            SHA256

                            e34f9441a887234d33a0d65b9d0f716897711ebe56526fe6b499728430552e0f

                            SHA512

                            3f7914c018923ac0523dc4b1c178bf30370f54eacd5bb46f604421879ea54ad3f7111fa60a6790a11fb7935bab47014b2aa24e1b7e13895e8f1cc82f416fffd7

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                            Filesize

                            11KB

                            MD5

                            24cb135d4f7468fa109fa0524a58616c

                            SHA1

                            cd1f765b3eac1bc75c6228911123b19946ba4e43

                            SHA256

                            8debd3c2b3eaf269741a8b8dd9f4ba06f628f8e51cf9bd2b227d38380a44818c

                            SHA512

                            9a0f8c2e779f242bf4e399ca7d37b68f1ebd07813011b68103d3dff1b0542615753b24310a93db6e66ae0af7f36d82f7329c5f3de2fee605dae834dd97758d61

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                            Filesize

                            15KB

                            MD5

                            c476a0af3f9080d684fe1060b4ea560f

                            SHA1

                            03ca5fe0ed3b990363a42f9806ab802f278ed81a

                            SHA256

                            46dce65b4200c4d8cd8aae6599e73c7970d83484aeee398b6de9be47a228d0f4

                            SHA512

                            addd3c6cc1c49e0bc51f4cec8024bc12c5426ed28bda86b0d4aa450b76ee0f8c6c71e7576bf0cde2ed468ac9c85736fa3b38d935b26c299f53b0a8442a0408d8

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                            Filesize

                            10KB

                            MD5

                            1651128ec2663b64861f03fe8a32484c

                            SHA1

                            f22946bf2d1831c056abd749f259ec2fae703ac8

                            SHA256

                            c568ef93a8558877238f7e4cde7686ee486062b222c1a2089be3e3f10a27f92a

                            SHA512

                            ac224c0cc914c63e3ceef04eaa9d078aecf8a11b14aea80f1422cbfeb4432f8581933122d83035cbc4dc442ef8e500ed76782609ee9413cf95da15c032c8588a

                          • memory/744-168-0x0000000000410000-0x00000000008F0000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/744-173-0x0000000000410000-0x00000000008F0000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/804-148-0x000001EEE9860000-0x000001EEE9A7C000-memory.dmp

                            Filesize

                            2.1MB

                          • memory/804-138-0x000001EEE9830000-0x000001EEE9852000-memory.dmp

                            Filesize

                            136KB

                          • memory/2768-121-0x000000001B7B0000-0x000000001B7BE000-memory.dmp

                            Filesize

                            56KB

                          • memory/2768-113-0x000000001B740000-0x000000001B74E000-memory.dmp

                            Filesize

                            56KB

                          • memory/2768-119-0x000000001B950000-0x000000001B968000-memory.dmp

                            Filesize

                            96KB

                          • memory/2768-117-0x000000001B9A0000-0x000000001B9F0000-memory.dmp

                            Filesize

                            320KB

                          • memory/2768-116-0x000000001B790000-0x000000001B7AC000-memory.dmp

                            Filesize

                            112KB

                          • memory/2768-115-0x000000001B7B0000-0x000000001B7CC000-memory.dmp

                            Filesize

                            112KB

                          • memory/2768-123-0x000000001B7C0000-0x000000001B7CC000-memory.dmp

                            Filesize

                            48KB

                          • memory/2768-125-0x000000001B970000-0x000000001B97C000-memory.dmp

                            Filesize

                            48KB

                          • memory/2768-105-0x0000000000890000-0x0000000000A82000-memory.dmp

                            Filesize

                            1.9MB

                          • memory/2836-29-0x0000000000070000-0x0000000000505000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2836-150-0x0000000000070000-0x0000000000505000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2836-70-0x0000000000070000-0x0000000000505000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2836-72-0x0000000000070000-0x0000000000505000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/2836-129-0x0000000000070000-0x0000000000505000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/3592-8-0x0000000077964000-0x0000000077966000-memory.dmp

                            Filesize

                            8KB

                          • memory/3592-7-0x0000000000470000-0x000000000094C000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/3592-9-0x0000000000471000-0x000000000049F000-memory.dmp

                            Filesize

                            184KB

                          • memory/3592-10-0x0000000000470000-0x000000000094C000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/3592-11-0x0000000000470000-0x000000000094C000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/3592-24-0x0000000000470000-0x000000000094C000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/3964-152-0x0000000000BC0000-0x0000000001069000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/3964-203-0x0000000000BC0000-0x0000000001069000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/3964-109-0x0000000000BC0000-0x0000000001069000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/4000-71-0x0000000000E20000-0x0000000001ACC000-memory.dmp

                            Filesize

                            12.7MB

                          • memory/4000-111-0x0000000000E20000-0x0000000001ACC000-memory.dmp

                            Filesize

                            12.7MB

                          • memory/4312-3445-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-1065-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-3461-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-1913-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-3438-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-3454-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-2915-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-3462-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-3463-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-25-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-53-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-998-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-68-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-128-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-767-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4312-169-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/4808-88-0x0000000000190000-0x0000000000623000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4808-199-0x0000000000190000-0x0000000000623000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/4808-151-0x0000000000190000-0x0000000000623000-memory.dmp

                            Filesize

                            4.6MB

                          • memory/5648-955-0x0000000000840000-0x0000000000AE8000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/5648-956-0x0000000000840000-0x0000000000AE8000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/5648-957-0x0000000000840000-0x0000000000AE8000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/5648-1011-0x0000000000840000-0x0000000000AE8000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/5648-1006-0x0000000000840000-0x0000000000AE8000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/5936-1003-0x0000000010000000-0x000000001001C000-memory.dmp

                            Filesize

                            112KB

                          • memory/5936-3460-0x0000000000400000-0x0000000000C62000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5936-3434-0x0000000000400000-0x0000000000C62000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5936-1515-0x0000000000400000-0x0000000000C62000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5936-3442-0x0000000000400000-0x0000000000C62000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5936-1019-0x0000000000400000-0x0000000000C62000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5936-3448-0x0000000000400000-0x0000000000C62000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5936-987-0x0000000000400000-0x0000000000C62000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5936-2722-0x0000000000400000-0x0000000000C62000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5936-1014-0x0000000000400000-0x0000000000C62000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/6068-991-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/6068-989-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/6216-3453-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB

                          • memory/6216-3450-0x0000000000610000-0x0000000000AEC000-memory.dmp

                            Filesize

                            4.9MB