Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2024 13:12

General

  • Target

    6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe

  • Size

    6.7MB

  • MD5

    c734ddf8670478beeb6a6cc4fbe37e31

  • SHA1

    dcd9cadd264d6d4e3934fe04e642149b7fc7be66

  • SHA256

    6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b

  • SHA512

    a9340e9e9a6587cf09f0ce0c88662611be08a4ccc7e9eced4633f56056e87ede0a578ee56303f4f22ee1b5f9c1b4fb2c8b59ba96efc827b04a761aedb1fd66f0

  • SSDEEP

    196608:k+P6n8mqb7h+bDMP93Fj9rHms6jBINIqZOjd1O:Ktqh+bIP93h4FqMjd

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

gcleaner

C2

92.63.197.221

45.91.200.135

Extracted

Family

cryptbot

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

https://dwell-exclaim.biz/api

https://formy-spill.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://print-vexer.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 26 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 19 IoCs
  • Identifies Wine through registry keys 2 TTPs 13 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 27 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe
    "C:\Users\Admin\AppData\Local\Temp\6ab62c0214d54519bd6b67b7483cb12b30c0ff44ce4c3b37a23f6e13359f3b6b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6s02.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6s02.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3u44.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3u44.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1r83T1.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1r83T1.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2992
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3408
            • C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe
              "C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4856
              • C:\Users\Admin\AppData\Local\Temp\is-EBOAT.tmp\i1A5m12.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-EBOAT.tmp\i1A5m12.tmp" /SL5="$90234,3291517,54272,C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:388
                • C:\Windows\SysWOW64\net.exe
                  "C:\Windows\system32\net.exe" pause raf_encoder_1252
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4700
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 pause raf_encoder_1252
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:4844
                • C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe
                  "C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe" -i
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2444
            • C:\Users\Admin\AppData\Local\Temp\1012384001\rhnew.exe
              "C:\Users\Admin\AppData\Local\Temp\1012384001\rhnew.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1036
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 1668
                7⤵
                • Program crash
                PID:5328
            • C:\Users\Admin\AppData\Local\Temp\1012385001\90f1105f73.exe
              "C:\Users\Admin\AppData\Local\Temp\1012385001\90f1105f73.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2948
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 1636
                7⤵
                • Program crash
                PID:5520
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 1656
                7⤵
                • Program crash
                PID:5528
            • C:\Users\Admin\AppData\Local\Temp\1012386001\2399fa05fc.exe
              "C:\Users\Admin\AppData\Local\Temp\1012386001\2399fa05fc.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:748
            • C:\Users\Admin\AppData\Local\Temp\1012387001\fb6ab44ca5.exe
              "C:\Users\Admin\AppData\Local\Temp\1012387001\fb6ab44ca5.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:5104
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4092
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1996
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2532
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3116
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4780
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:4444
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:1504
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd2c5b1d-4533-416b-aefa-7f6e9d114a00} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" gpu
                      9⤵
                        PID:1888
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2456 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2420 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {affaf08f-ccbe-484f-a6a7-e5d1e3850234} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" socket
                        9⤵
                          PID:2392
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3172 -childID 1 -isForBrowser -prefsHandle 3208 -prefMapHandle 2676 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0433201-c1c7-456f-95cc-b69abfdccec2} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab
                          9⤵
                            PID:1656
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4052 -childID 2 -isForBrowser -prefsHandle 4044 -prefMapHandle 4040 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e736036-5859-4be2-981a-26a260be2849} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab
                            9⤵
                              PID:4132
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4596 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4592 -prefMapHandle 4624 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f607623-57d8-495d-ab34-cb5180802cc2} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" utility
                              9⤵
                              • Checks processor information in registry
                              PID:5424
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5208 -childID 3 -isForBrowser -prefsHandle 5228 -prefMapHandle 5224 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {43371a76-51e1-48e2-8c7a-2e575bc53d68} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab
                              9⤵
                                PID:7520
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 4 -isForBrowser -prefsHandle 5452 -prefMapHandle 5448 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ae7f1c2-c30e-4a40-a8d5-0e227880ea0e} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab
                                9⤵
                                  PID:7592
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5584 -childID 5 -isForBrowser -prefsHandle 5592 -prefMapHandle 5596 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {94c2261f-94b2-44d4-b164-b9743c3bbc35} 1504 "\\.\pipe\gecko-crash-server-pipe.1504" tab
                                  9⤵
                                    PID:7640
                            • C:\Users\Admin\AppData\Local\Temp\1012388001\9f5aa457a4.exe
                              "C:\Users\Admin\AppData\Local\Temp\1012388001\9f5aa457a4.exe"
                              6⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3776
                            • C:\Users\Admin\AppData\Local\Temp\1012389001\312480c537.exe
                              "C:\Users\Admin\AppData\Local\Temp\1012389001\312480c537.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5704
                            • C:\Users\Admin\AppData\Local\Temp\1012390001\a53c189fec.exe
                              "C:\Users\Admin\AppData\Local\Temp\1012390001\a53c189fec.exe"
                              6⤵
                              • Enumerates VirtualBox registry keys
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6140
                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J2225.exe
                          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J2225.exe
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2008
                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3O58K.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3O58K.exe
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4820
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4O989c.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4O989c.exe
                      2⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2280
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1036 -ip 1036
                    1⤵
                      PID:5288
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2948 -ip 2948
                      1⤵
                        PID:5388
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2948 -ip 2948
                        1⤵
                          PID:5396
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5896
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1604

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json.tmp

                          Filesize

                          22KB

                          MD5

                          235b331e3dbdaed98174fa34a495d74c

                          SHA1

                          0ae43ee29fd4663978368b1e3fc3d89d54edde81

                          SHA256

                          bc152ed352e41b61258fcb06d6f0e594cfb11ba2016918ee512d882eb83bd4a2

                          SHA512

                          a7fab0ca4fb31567cdd0d49199dc12e141b0808b44e3f59c59c804beff5542860af5b965b6720adc2e4adf8896834e6743702c4edabbef0822eb9cb44127d7e1

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\0EA2E1AC3653A248EDE38E975FF2A4ADDA308244

                          Filesize

                          480KB

                          MD5

                          99f4dca564173fc1305cb6be80a31ae3

                          SHA1

                          1a2a352bfb5dc251bb3ec04b8515ba84bba29bd7

                          SHA256

                          3c0dab9a0b74cf081b456fea6de061335d8bf3e323432f8e63df4ce9252f347c

                          SHA512

                          370400963be62c816828a56c19418651d5baa0940ce29187a2b28e5538f4392c7d346afdf6fc8997e81eaf4c6f27dca08ab64779d36e9a053bd480b14e9021ff

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                          Filesize

                          13KB

                          MD5

                          ecc0d35e58eaf662516a6195c5e7fe08

                          SHA1

                          99bc63bd3014abd14865624633570bede6581402

                          SHA256

                          b32deac68c78cb55ed4a53c8e26d111684030704ed50de2a09f6a5b698cd81b5

                          SHA512

                          07aab726981ab9ec088a14d5d2f6a49b75b03c881b80ad98e4d7451c6471b05230ef6da9e39b57adf3cff4e221a6ba4021c6ad12df5423ec1d16d30ca6acac97

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                          Filesize

                          15KB

                          MD5

                          96c542dec016d9ec1ecc4dddfcbaac66

                          SHA1

                          6199f7648bb744efa58acf7b96fee85d938389e4

                          SHA256

                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                          SHA512

                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                        • C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\rafencoder.exe

                          Filesize

                          2.8MB

                          MD5

                          b466bf1dc60388a22cb73be01ca6bf57

                          SHA1

                          21eb9665e42d6c4a8d9e764627049b2a6e3a69a4

                          SHA256

                          e5f0f0c3383080fc2702779e3040c490ab022af69a4bc8c61bf9b1f6514ae7ad

                          SHA512

                          6cb51dae17b3bcef6254ecf6538ecc49cdd53c40c979fd743f49987b28d05c033781b1047dbf25b203b02bf70ce4205dcc1cc5bbea46119cb0e2cd0ce140cbe2

                        • C:\Users\Admin\AppData\Local\RAF Encoder 1.0.1.55\sqlite3.dll

                          Filesize

                          630KB

                          MD5

                          e477a96c8f2b18d6b5c27bde49c990bf

                          SHA1

                          e980c9bf41330d1e5bd04556db4646a0210f7409

                          SHA256

                          16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                          SHA512

                          335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                        • C:\Users\Admin\AppData\Local\Temp\1012382001\i1A5m12.exe

                          Filesize

                          3.4MB

                          MD5

                          3a16d0e4e4522073da3c8a5a9f9e790b

                          SHA1

                          7a42a21a348d2e49c67b426d333a5c354ed2c83e

                          SHA256

                          ccc4dd64df98c26da462a17a8df9f927d02e202d88ada8cfba92b7bbeb954c3e

                          SHA512

                          1213c3e077b660afa65133f0b5943bd866f02d736284791dc99ae4d30c6ed7705eb55999cb4a3be1cc0a394111904154bc72a2d0f1fdc453893ecf9a4a25b99a

                        • C:\Users\Admin\AppData\Local\Temp\1012384001\rhnew.exe

                          Filesize

                          1.8MB

                          MD5

                          f7286fef9317fe91e24cda721ec0be81

                          SHA1

                          0e0197c0f87200f7c1ebb4bba314f7bb875a638c

                          SHA256

                          4dcf1cc20990dace1f3e7c5a4b94ea7b823f90eb6de639b2b1b6494838f1cc62

                          SHA512

                          314b3f5cf1a0c15db568d33647b97887b37e987ba253ee9f5ded045446328307ebd04acd832fbdf66ad29be9510bd0c378e2fcb889509dca84df9b9106602c6e

                        • C:\Users\Admin\AppData\Local\Temp\1012385001\90f1105f73.exe

                          Filesize

                          1.8MB

                          MD5

                          8679b0deef4b3d4f9cd8f90d0b339072

                          SHA1

                          ca4b77ad94e677808c5f830c0dd1912c0ae73636

                          SHA256

                          0d1fea700dd2a7efde5e2b34ad0416bcb65200b6253297c9b3fa157ca7d581b3

                          SHA512

                          502f101ccc1ba0fc03d6f68dd19768befc7ff84be3a0eba94ee66d0b75465ad48543636e486e9dd7cb879150b449ae324b7ee924e379bd3c43e9488b2a411b20

                        • C:\Users\Admin\AppData\Local\Temp\1012386001\2399fa05fc.exe

                          Filesize

                          4.9MB

                          MD5

                          941507da4995f8296b61a3a35d8b406d

                          SHA1

                          a90f5209ca0d56938957ed8f5122de984e6ebbe4

                          SHA256

                          50e4484fb6ee4b27ba6e22b5d65e5da71a5699e92999cc0ea450d5c90f3b5361

                          SHA512

                          9762bca1fe65fcd816dc08e45a167a3321ee50778161a8241f0f42cb573528d9ffd714857d31192033b25f5654b2f3ec5e655c2238a7756403d77bf227109efd

                        • C:\Users\Admin\AppData\Local\Temp\1012387001\fb6ab44ca5.exe

                          Filesize

                          948KB

                          MD5

                          5d07496592fcbb447233327756e6605f

                          SHA1

                          8b443c3fe93a1da708859be38bb3f54b3b749a55

                          SHA256

                          844bfb44822d04e6ddfebd86492bb85af519234b1675e178402f7f61723bee8e

                          SHA512

                          ebbc673400d148251458067b41b9139ab36015a8802724b1e92b3b7196a597807c475fc18b04817ec6fe17ba831a24fcbdd4f561cd879d77a8cdca15e23f5a82

                        • C:\Users\Admin\AppData\Local\Temp\1012388001\9f5aa457a4.exe

                          Filesize

                          2.7MB

                          MD5

                          a5ebf91bcc1e092e07a46d6c90127358

                          SHA1

                          19459f6f1a555563c2f86d1ddd48072e2f5e32a2

                          SHA256

                          af6c8125aaedec62ccfc4eec54c4dd8687c4baec2c82b968997c2410f360b553

                          SHA512

                          5fb412413b505da08effcc0f5e59f53491796d826a14b3e4878b010788aa3c5532dfcacb08c1f248c31466b64e17a62aa9718d8084883fefd5de1ffa3c857b5f

                        • C:\Users\Admin\AppData\Local\Temp\1012389001\312480c537.exe

                          Filesize

                          1.9MB

                          MD5

                          6d00ea43be88c32392e2a3b543d0a1f4

                          SHA1

                          1dfb0cb50425d6bf72467ae0894d614f26f0b987

                          SHA256

                          747ebc458a95ab80f371b899d4b6e54eaefba46bf5343ae39eeeafba61ba8365

                          SHA512

                          f111a1b9812891d9ddda571e798545743ff9628bcf2c258a9fcb34a89b3d5286a2882d9d635c16062d974aac4d11904ac95fcbb45ecce38aa0e314cba7e7bbbf

                        • C:\Users\Admin\AppData\Local\Temp\1012390001\a53c189fec.exe

                          Filesize

                          4.3MB

                          MD5

                          72950603b12d5d99f2ebcedeb3aed5d6

                          SHA1

                          3587c298d27279b481f9efa0c02be575b6a06599

                          SHA256

                          76d86e157a4fa1f1b3abf649b931cdc91af733e2b50a863cc9a1dcbb131148b4

                          SHA512

                          1fbcb1f8793eab0107924f6ec8789eb1752fd39eb4683193b6962803911abbb7ff1d05a362dec349c768e656f7f84144150b06a35e13f74d60afe422cbb407c8

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4O989c.exe

                          Filesize

                          2.6MB

                          MD5

                          80a4a9bd8cdb150cbc228ad88557260f

                          SHA1

                          057931385a2bd410d5c5502a2f6461471fa0377f

                          SHA256

                          10ee97136471d63c17d88a987c7b7282b87c2456f7082310c79fe9c2b6e6ffa1

                          SHA512

                          ff5117d04af0459b8dc7f6f747026fbc9538954db44489d151a85cdcc238563964593326691dcfa440b6ab379e276074c2c9f231255cd5b844e1bb5cce8a0146

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6s02.exe

                          Filesize

                          5.2MB

                          MD5

                          869630a6dbdd3f32b0e1ea30dfa80abe

                          SHA1

                          225748e2099496f0c2799491fe5471b80deac1d5

                          SHA256

                          fb46fb0d2038f1ca1ef5a153130f5b930dcb7dd0c456536e5417c0f26639c366

                          SHA512

                          27905cb6a136ae4ad21d527d1c307215da5f18955b2761ee25f874eed0fdccba8ed52ebbf3289febb2b3b30576e6fcfa251706bc46804f4dc760670eb6b216b1

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3O58K.exe

                          Filesize

                          4.9MB

                          MD5

                          834caa1ea7e5fadc7aa0735eed542c0e

                          SHA1

                          1c077c5230136337722a6c127ddbe2ebb49f67b3

                          SHA256

                          c6502746b552f7a74d91fd5e6574e5059b6e4a6b027f1b3ca68a2d604756c074

                          SHA512

                          4d8e99d401c0025c38eae93a8b6b41804e83a104a92753eb4a48e9d27c6c901948d7ca0cebaf6771031259039346bb3a2582cce32550bfcba06757edd9b1fe7d

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3u44.exe

                          Filesize

                          3.6MB

                          MD5

                          bdba6366ae217739e5962428725c5c8b

                          SHA1

                          34e40c21b761e2b570e890dc8ea3b25b14b9cf77

                          SHA256

                          0a0a72d2f739500b96b5f0005c11900f56eb2c6c0de0306cb4aea792d548d3c6

                          SHA512

                          459fabd83792bffe865c32e528ba888444e5f3b680bd80f7e5e92b3d55491e098fc6d49d182144516d893bc0edca17fd456c6523e667789dc57444701ef5463a

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1r83T1.exe

                          Filesize

                          3.1MB

                          MD5

                          a398cef26b922bac9e24be75f0bd85e6

                          SHA1

                          050ccebd0d1ba7e648f6ea1f9eb04d7a526e97e4

                          SHA256

                          53db2aba7ab8228cb7ab85108918241ce77e527d7688d2590d5b5c5c69e3b83f

                          SHA512

                          83ab8015f358fb70bfe4fc1f83a8a62c20b0e610f93bd774334258bd7c56e46764e73f210b703759f6f05f627b33c4d7f6c1a2ce52861367aadad17f5e7ca061

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2J2225.exe

                          Filesize

                          1.8MB

                          MD5

                          8c230debcaa0241cdf437c61b620b77a

                          SHA1

                          9a16380b7a2f8328b04f060791f7ad52466c374f

                          SHA256

                          572a83147fc938c1ff176431438955f77fc5dd10cedca752fd7da8bab4506b6d

                          SHA512

                          de539b4e190bc279969ba97513da91d903fef0eae7d91844f820665e9c1ebd303c5641b39229f5810771d7a590842bd30f41c3627ec694bc2799ce06a1a22132

                        • C:\Users\Admin\AppData\Local\Temp\is-EBOAT.tmp\i1A5m12.tmp

                          Filesize

                          689KB

                          MD5

                          e672d5907f1ce471d9784df64d8a306b

                          SHA1

                          6d094cae150d72b587c5480c15127d7059e16932

                          SHA256

                          9f9250be71bd6254790a9630990f4560d53995db3d8737b7f49986e3551283e5

                          SHA512

                          9cf10e997d8d99e6eb2f6ccac00ab365f63e03d96c2e2354fdf67683b85553a60cd9542cfb21cbea468c6a2bda454cde71937c0d21c4b738451b5e2c30690c39

                        • C:\Users\Admin\AppData\Local\Temp\is-PF4TN.tmp\_isetup\_iscrypt.dll

                          Filesize

                          2KB

                          MD5

                          a69559718ab506675e907fe49deb71e9

                          SHA1

                          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                          SHA256

                          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                          SHA512

                          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-2

                          Filesize

                          13.8MB

                          MD5

                          0a8747a2ac9ac08ae9508f36c6d75692

                          SHA1

                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                          SHA256

                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                          SHA512

                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                          Filesize

                          17KB

                          MD5

                          0d4260f3d817063880a92973104e8eff

                          SHA1

                          7f65bbd143ac7134e7e70d14db5219f4f72443fb

                          SHA256

                          8d5946b644b2ef417f5ce09a99cd05ba750dd2c3550015f160ad329a76d3c3eb

                          SHA512

                          eeb7bc7866e83bb2010f6f3ea10199fd2942f6d97d2678047089ff6620f5d544acb753d945718b57e980b837ae6cb7e9490ac96a5af9cf3248ff52a0396da427

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                          Filesize

                          7KB

                          MD5

                          f363cdbcd27e44ec771eb3e8fa812969

                          SHA1

                          b70badb299b3bace58f29c133d58c5b506a5900b

                          SHA256

                          543b8a431e312ae8bb735355742229fab081ea66d0edc55de4ba1e075cc8a5cd

                          SHA512

                          aa4e7cd2840848d7f3c84eeac105b35413094f4668fbb56d7b889163f3f23c5c4da21d102f89fb1e89da264eb8932da9dd7d9cb6ce415993d25b11ad263c9a37

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                          Filesize

                          8KB

                          MD5

                          129f995c094a2ae33d04d8d7b539b06c

                          SHA1

                          2d9a805c1881343a792dd4bac31bd12705ee1931

                          SHA256

                          77603dfa03a07649acaa23c5a0d21d4bee214f6e3fb31e7abeebdd4909c2b939

                          SHA512

                          9b818dc7315908cacb528151ddd07b4407f35557bc47eb6a4b4168adb0a7093ce6a8438de4ebf0b673ec8076e8a7cbc595f74e3bc487d959d726021b247ae1b9

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          28KB

                          MD5

                          8661b13dafd1b94584d73ff3fa5254ff

                          SHA1

                          b20838ec16df48f2510657e57171930e226c355c

                          SHA256

                          87282770512f2ea773fec5736d0b7880dabb14c2dee6e782527af6b32e06bfa3

                          SHA512

                          2214569731c655f9fb30f3b9832e7527e65569f62cf70f8268769ebbce459ea2f370a53e577692559280e483a7522f629f31fdfd4f0166304571af2ba4a40c73

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          23KB

                          MD5

                          4ea9d862dc3b62e00a7c7de27d06a62c

                          SHA1

                          5d853e2691f2e978023e1516a73d2e89c668562a

                          SHA256

                          06b9746c3ceb8592ac31b4f0df0f08dfe6ee6067c6d16c193a2626439bf28bf2

                          SHA512

                          6613cd3353a44902157535fa094d03d2ced6026e8b14030267e627c7cf21991daa77cce121933effb804b7771572a25b66118b5ff7b74852107fe885017291ad

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          6KB

                          MD5

                          8d3a25c6435a8f235c3c000d0dc0e61c

                          SHA1

                          09b75bac2ed40aa6d98366ab92c18cf20a3da26d

                          SHA256

                          7d3ea6a3d1edb7a22c4ca61aa43eb953459d5acd166e18b0c275c7bc6ac44484

                          SHA512

                          ef192f49c0ceff6e5471d86d251ece215e353d587b3a1bc3193a34a7432ca1815cc3738ec770c7deffa22fa8a72bc157b6b91c96eb45a6bfbe7b842874da98cc

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          28KB

                          MD5

                          b3a885f228d2a20266d46bc785e9a151

                          SHA1

                          90dbb90fc2b2c4b045ac2d861e72e7125fe344dc

                          SHA256

                          baccc2a7fc544b02c56dca9bf7022c60a02fc0d7187f7640a62585dd4ef51029

                          SHA512

                          6393faa906a3c90ab234c1d4ea22953d9f0df3d877a6635450e8e51c8381a8b033ec1691ddeae0e0b0e6250c8442caffe864bd53590e6bc852c4328c3227997a

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          28KB

                          MD5

                          bce04deb47dd05dc2b7daac31d2ea930

                          SHA1

                          61366aad89912be0742fa6f756887af5afe44187

                          SHA256

                          38412a45e69cc2bf5f06554296d7f01487eaa8a3304a5667eaa40cc1a6ed8cde

                          SHA512

                          3039ac62f1dffa6ac6f14611474e0157b85eda58589badca3a64f33c803cadf5e51c7ff4f6ef3742a72f800e3fb6ff44ec11d1170cffe0746ce30c03f86b5b22

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          28KB

                          MD5

                          0c35a62f1b03bef245e1f3863ba9778c

                          SHA1

                          02917e80ff2f2ab3ab75835d69aa788639afb989

                          SHA256

                          6cb34ea5b1efe0f59f6c8e97f4df43c18a42aa3918185c3457b4eab310edda17

                          SHA512

                          8358806a5a53268b2d041657cb6d34b2f38d530da6205edd6d315466bc4e55bce6027ef55fc6bc8a31c120a16cf8decc96c6ceff0d2c0ba7565aeeb0a95eda2d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          5KB

                          MD5

                          6afed77096af4aa985597567a64c9a78

                          SHA1

                          0e0bda12b8e6a98d05bd2cb4ed9e59fad41cf8e1

                          SHA256

                          3cc1c1ade2cb77535b78cab0ce5db5af68a56ab808120293c2f2bb88c9de4c95

                          SHA512

                          e9f795012db88deba359c97011e749dc3ea906cf835c4990c1b82ff92161ec0eb9fe0b13dfa3e9c2b1a5b094f70e645172a63b9a1a76567468dafdbfafebc35e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          6KB

                          MD5

                          5f4bcf79def8b082b722108c7e0403d8

                          SHA1

                          1ffc94c20cde12c3321baee421bd516b466a7e4d

                          SHA256

                          0117363e6f2068c76484b44169d6de8c5d5aae30e04c87cc3a6cf9312e5dc173

                          SHA512

                          308849eaf95be3e1481e639747274d70adac5a6938921e944e9e92e7df42c1e654b4d23e3e8c11840126994047ad825dffee0b5f75f58de0fc02443d9d3561a2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\a9e91666-fbbb-4ce9-a840-f8a11f424160

                          Filesize

                          671B

                          MD5

                          53192bbcc14cb29af517ed6bb44bd41d

                          SHA1

                          718033e6e65d146f594aa4db529585e32816a703

                          SHA256

                          f473f40ffd3a15c0ca165d611277e7599acfade609d55dd256a2a1c22d7b1655

                          SHA512

                          7dd347daaa3881f346d96e8cfa734ac7e53a4b74644b2e411d43dab98c7ae5ada0d45888dbfe53f8d1897f4fbfb4334e68ba1565f5f01a602c60553e9742bc3e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\ca8cee00-6f56-4c2f-8518-1761e933eecd

                          Filesize

                          29KB

                          MD5

                          83b8bc26312ad7b3fef735fe3b6278e6

                          SHA1

                          932810016cdae0a745fc16e78464e5f0dea1d8f7

                          SHA256

                          6213d31e5af66b6f415bc21cd5b4181d362a7e878fa3d8c9c7f42baac068d827

                          SHA512

                          0447b398c75cc75b3e2de6200b6acba790eec4774764b1b7e0549308d01b633b22de2027648b6420a8aa9f639cc470222c00ee401e98649800cedaaed3442c64

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\dd6eeb49-7edd-4dc6-a3a4-55f36584dca7

                          Filesize

                          982B

                          MD5

                          34b5fc1c23b20af8cdc58f1d3c68d968

                          SHA1

                          91a3f8b6ba0fe44d72ae06552ae1161b488ee04d

                          SHA256

                          2da11259fd171f6490fb1010501ac5edc0bc984d7a53c1c79ea969e15e963c54

                          SHA512

                          57374632f37f9138b8c80d3e7a768cdd7b5f50e9565ca4e3aa7074309175e0183734a784825f30cf924dcb503cbf914210b14af0164bf4fcc4df03d9f70b68c8

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                          Filesize

                          1.1MB

                          MD5

                          842039753bf41fa5e11b3a1383061a87

                          SHA1

                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                          SHA256

                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                          SHA512

                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          2a461e9eb87fd1955cea740a3444ee7a

                          SHA1

                          b10755914c713f5a4677494dbe8a686ed458c3c5

                          SHA256

                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                          SHA512

                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp

                          Filesize

                          479B

                          MD5

                          49ddb419d96dceb9069018535fb2e2fc

                          SHA1

                          62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                          SHA256

                          2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                          SHA512

                          48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                          Filesize

                          372B

                          MD5

                          bf957ad58b55f64219ab3f793e374316

                          SHA1

                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                          SHA256

                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                          SHA512

                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                          Filesize

                          17.8MB

                          MD5

                          daf7ef3acccab478aaa7d6dc1c60f865

                          SHA1

                          f8246162b97ce4a945feced27b6ea114366ff2ad

                          SHA256

                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                          SHA512

                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp

                          Filesize

                          1KB

                          MD5

                          688bed3676d2104e7f17ae1cd2c59404

                          SHA1

                          952b2cdf783ac72fcb98338723e9afd38d47ad8e

                          SHA256

                          33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                          SHA512

                          7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp

                          Filesize

                          1KB

                          MD5

                          36e5ee071a6f2f03c5d3889de80b0f0d

                          SHA1

                          cf6e8ddb87660ef1ef84ae36f97548a2351ac604

                          SHA256

                          6be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683

                          SHA512

                          99b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                          Filesize

                          11KB

                          MD5

                          f27565876133908e7bd902b9bef52703

                          SHA1

                          26d1d6c03080377add14ab7327dcc30fa49c2b0a

                          SHA256

                          cb3516599ef38b6b06b86222e0008e39cb81727e4beb67481300d21479418af3

                          SHA512

                          e024ceda8046db23df9092f0ba83b030e565108a2e5d19f5d7b7e70ee002e12571830e5bc223ead4b793f1a83cdb344121629c05344afba4b203f60b6c984f34

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                          Filesize

                          10KB

                          MD5

                          e835a9bd37212589dd73626481e0ad3b

                          SHA1

                          c4dabf01e151df3893ee0ca31d8ea5294c32784a

                          SHA256

                          21913827b2a9d86a459e3fb6cef937c087d6d8197dff527a2de758470cb1413e

                          SHA512

                          8328f7c32820511dc96f6256e1029039c6beb9b20976dfc5e46668bcf2b1ca5643c6d1fa1c285db23d58accdfedeea3370bfe756af3bf7b632a60ad9cf07d688

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                          Filesize

                          10KB

                          MD5

                          ed58a0ae2a8c3b8a0f284055084f81af

                          SHA1

                          5cc52c4ba761b5b1d98ad6a5983ad6ef522e8c86

                          SHA256

                          86bccd300c5f6acbb3b756268752dbb82ecd4bb4636d17ef5613a6fc226c8856

                          SHA512

                          91217dc8647a857d96daad5a2b99b56b07ae0bbf16a746c97c5d2fc0f8c91eeeb82ee53ab9c7549343f6b94d4715751d456307b69cdd6ac85aabc841b0c33ff2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                          Filesize

                          10KB

                          MD5

                          cbd7097ddb814b24ac86afa44ad280d8

                          SHA1

                          e9002d38397a29d98f342b8e84bf22bb54f79a16

                          SHA256

                          72319079fab965c6306475cbab41c6d6f3136f52b934e7f4fa9aeeb76cd415a8

                          SHA512

                          70d4dcecb1e367843b5082c843c51e3616ea0278f22ae31699a4ccc979251b12b0cf558194f89d2c63a7dc5e1276566a5302226dbbc28f7baa0b570900779d9c

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                          Filesize

                          1.2MB

                          MD5

                          d94239b2cbcb2fd9e7b9e58bc8fab860

                          SHA1

                          f7f2406fe3e0c4525a4bf15258302d6f33d0cb39

                          SHA256

                          b0ebcb2391eb9006b3d1ba3d888061e59fea6920ff74ce99782e4f89c9d5ad49

                          SHA512

                          b121655c740337b2d298aac2db099ba318f91f6b936a24511f5a163fbb464a2284dcec0b5ba37f7af5a67d3d7f925bfe7710026c434fd98d5ca227785a04d082

                        • memory/388-140-0x0000000000400000-0x00000000004BC000-memory.dmp

                          Filesize

                          752KB

                        • memory/748-172-0x0000000000250000-0x0000000000745000-memory.dmp

                          Filesize

                          5.0MB

                        • memory/748-175-0x0000000000250000-0x0000000000745000-memory.dmp

                          Filesize

                          5.0MB

                        • memory/1036-949-0x0000000000850000-0x0000000000CE3000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/1036-170-0x0000000000850000-0x0000000000CE3000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/1036-122-0x0000000000850000-0x0000000000CE3000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/1036-944-0x0000000000850000-0x0000000000CE3000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/1036-162-0x0000000000850000-0x0000000000CE3000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/1604-3910-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/1604-3912-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2008-39-0x0000000000180000-0x0000000000629000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2008-106-0x0000000000180000-0x0000000000629000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2008-142-0x0000000000180000-0x0000000000629000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2280-161-0x0000000000AC0000-0x0000000000D68000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/2280-895-0x0000000000AC0000-0x0000000000D68000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/2280-173-0x0000000000AC0000-0x0000000000D68000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/2280-174-0x0000000000AC0000-0x0000000000D68000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/2280-948-0x0000000000AC0000-0x0000000000D68000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/2444-147-0x0000000060900000-0x0000000060992000-memory.dmp

                          Filesize

                          584KB

                        • memory/2444-1032-0x0000000000400000-0x00000000006DF000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2444-99-0x0000000000400000-0x00000000006DF000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2444-3863-0x0000000000400000-0x00000000006DF000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2444-985-0x0000000000400000-0x00000000006DF000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2444-3854-0x0000000000400000-0x00000000006DF000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2444-2394-0x0000000002180000-0x0000000002221000-memory.dmp

                          Filesize

                          644KB

                        • memory/2444-2202-0x0000000000400000-0x00000000006DF000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2444-100-0x0000000000400000-0x00000000006DF000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2444-141-0x0000000000400000-0x00000000006DF000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2444-145-0x0000000000400000-0x00000000006DF000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2444-758-0x0000000000400000-0x00000000006DF000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2444-1041-0x0000000000400000-0x00000000006DF000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2948-194-0x0000000000290000-0x0000000000732000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/2948-138-0x0000000000290000-0x0000000000732000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/2948-956-0x0000000000290000-0x0000000000732000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/2948-195-0x0000000000290000-0x0000000000732000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/2992-20-0x0000000000590000-0x00000000008A2000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2992-35-0x0000000000590000-0x00000000008A2000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3408-3856-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3408-3867-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3408-1043-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3408-943-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3408-2708-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3408-33-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3408-1034-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3408-169-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3408-1005-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3408-103-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3408-104-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/3776-760-0x0000000000430000-0x00000000006EC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/3776-988-0x0000000000430000-0x00000000006EC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/3776-796-0x0000000000430000-0x00000000006EC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/3776-1004-0x0000000000430000-0x00000000006EC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/3776-793-0x0000000000430000-0x00000000006EC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4820-148-0x0000000000CE0000-0x00000000011C0000-memory.dmp

                          Filesize

                          4.9MB

                        • memory/4820-149-0x0000000000CE0000-0x00000000011C0000-memory.dmp

                          Filesize

                          4.9MB

                        • memory/4856-58-0x0000000000400000-0x0000000000414000-memory.dmp

                          Filesize

                          80KB

                        • memory/4856-139-0x0000000000400000-0x0000000000414000-memory.dmp

                          Filesize

                          80KB

                        • memory/5704-1539-0x0000000000400000-0x0000000000C78000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/5704-3761-0x0000000000400000-0x0000000000C78000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/5704-1025-0x0000000000400000-0x0000000000C78000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/5704-1022-0x0000000000400000-0x0000000000C78000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/5704-3857-0x0000000000400000-0x0000000000C78000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/5704-981-0x0000000000400000-0x0000000000C78000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/5704-1038-0x0000000000400000-0x0000000000C78000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/5704-3903-0x0000000000400000-0x0000000000C78000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/5896-993-0x0000000000B00000-0x0000000000E12000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/6140-1021-0x0000000000730000-0x00000000013FE000-memory.dmp

                          Filesize

                          12.8MB

                        • memory/6140-1037-0x0000000000730000-0x00000000013FE000-memory.dmp

                          Filesize

                          12.8MB

                        • memory/6140-1036-0x0000000000730000-0x00000000013FE000-memory.dmp

                          Filesize

                          12.8MB

                        • memory/6140-1035-0x0000000000730000-0x00000000013FE000-memory.dmp

                          Filesize

                          12.8MB