Malware Analysis Report

2024-11-30 22:01

Sample ID 240704-1pk87s1cjk
Target cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242
SHA256 cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242
Tags
amadey 4dd39d evasion trojan stealc nice discovery spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242

Threat Level: Known bad

The file cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242 was found to be: Known bad.

Malicious Activity Summary

amadey 4dd39d evasion trojan stealc nice discovery spyware stealer

Stealc

Amadey

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Downloads MZ/PE file

Checks computer location settings

Reads user/profile data of web browsers

Reads data files stored by FTP clients

Loads dropped DLL

Executes dropped EXE

Checks BIOS information in registry

Identifies Wine through registry keys

Accesses cryptocurrency files/wallets, possible credential harvesting

Checks installed software on the system

AutoIT Executable

Suspicious use of NtSetInformationThreadHideFromDebugger

Drops file in Windows directory

Enumerates physical storage devices

Unsigned PE

Suspicious use of SendNotifyMessage

Suspicious use of AdjustPrivilegeToken

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Uses Task Scheduler COM API

Suspicious use of WriteProcessMemory

Checks processor information in registry

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-04 21:49

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-04 21:49

Reported

2024-07-04 21:52

Platform

win11-20240508-en

Max time kernel

147s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe"

Signatures

Amadey

trojan amadey

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\explorti.job C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe

"C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe"

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

Network

Country Destination Domain Proto
RU 77.91.77.82:80 tcp
RU 77.91.77.82:80 tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

memory/4596-0-0x0000000000880000-0x0000000000D36000-memory.dmp

memory/4596-1-0x00000000774E6000-0x00000000774E8000-memory.dmp

memory/4596-2-0x0000000000881000-0x00000000008AF000-memory.dmp

memory/4596-3-0x0000000000880000-0x0000000000D36000-memory.dmp

memory/4596-5-0x0000000000880000-0x0000000000D36000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

MD5 614662fb204fcdb5b6ffb872780847db
SHA1 eacce19db94bfc22c3ee1a21b043b9282ad64c2e
SHA256 cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242
SHA512 996a5fa85bd53b9081283a6cff572edecdcaef7b5f6cf84a4b4a6b684a06b29114dfa93b9e32de2ba573caa1e15586b628c42918a44fbb934e373bcb7355d23b

memory/3592-18-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/4596-17-0x0000000000880000-0x0000000000D36000-memory.dmp

memory/3592-19-0x00000000009A1000-0x00000000009CF000-memory.dmp

memory/3592-20-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-21-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-22-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-23-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-24-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/2388-26-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-27-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/2388-28-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/2388-29-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-30-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-31-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-32-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-33-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-34-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-35-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/2460-37-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/2460-38-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-39-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-40-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-41-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-42-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-43-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/3592-44-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/2000-46-0x00000000009A0000-0x0000000000E56000-memory.dmp

memory/2000-47-0x00000000009A0000-0x0000000000E56000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-04 21:49

Reported

2024-07-04 21:52

Platform

win10v2004-20240704-en

Max time kernel

150s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe"

Signatures

Amadey

trojan amadey

Stealc

stealer stealc

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\EHJKJDGCGD.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A

Downloads MZ/PE file

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\EHJKJDGCGD.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\EHJKJDGCGD.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\1000006001\fb750bb711.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\cmd.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\EHJKJDGCGD.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe N/A

Reads data files stored by FTP clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Checks installed software on the system

discovery

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\explorti.job C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\Temp\1000006001\fb750bb711.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\Temp\1000006001\fb750bb711.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files\Mozilla Firefox\firefox.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000_Classes\Local Settings C:\Program Files\Mozilla Firefox\firefox.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000006001\fb750bb711.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2444 wrote to memory of 2420 N/A C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
PID 2444 wrote to memory of 2420 N/A C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
PID 2444 wrote to memory of 2420 N/A C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
PID 2420 wrote to memory of 1244 N/A C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000006001\fb750bb711.exe
PID 2420 wrote to memory of 1244 N/A C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000006001\fb750bb711.exe
PID 2420 wrote to memory of 1244 N/A C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000006001\fb750bb711.exe
PID 2420 wrote to memory of 3400 N/A C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe
PID 2420 wrote to memory of 3400 N/A C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe
PID 2420 wrote to memory of 3400 N/A C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe
PID 3400 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 3400 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2884 wrote to memory of 2456 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2884 wrote to memory of 2456 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2884 wrote to memory of 2456 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2884 wrote to memory of 2456 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2884 wrote to memory of 2456 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2884 wrote to memory of 2456 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2884 wrote to memory of 2456 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2884 wrote to memory of 2456 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2884 wrote to memory of 2456 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2884 wrote to memory of 2456 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2884 wrote to memory of 2456 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2456 wrote to memory of 4092 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe

"C:\Users\Admin\AppData\Local\Temp\cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242.exe"

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"

C:\Users\Admin\AppData\Local\Temp\1000006001\fb750bb711.exe

"C:\Users\Admin\AppData\Local\Temp\1000006001\fb750bb711.exe"

C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe

"C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe"

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2456.0.1059277972\1290009691" -parentBuildID 20230214051806 -prefsHandle 1756 -prefMapHandle 1748 -prefsLen 22076 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9165e1a0-7860-406f-b9f7-772d05e59d9a} 2456 "\\.\pipe\gecko-crash-server-pipe.2456" 1836 22cd65f5158 gpu

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2456.1.1869974013\740630288" -parentBuildID 20230214051806 -prefsHandle 2416 -prefMapHandle 2412 -prefsLen 22927 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {00a04d8b-2651-4e32-bcb7-e3207f012132} 2456 "\\.\pipe\gecko-crash-server-pipe.2456" 2428 22cca889c58 socket

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2456.2.1618114161\1129220834" -childID 1 -isForBrowser -prefsHandle 2992 -prefMapHandle 2988 -prefsLen 22965 -prefMapSize 235121 -jsInitHandle 1256 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f5f8472f-c8ee-4c75-b71e-877e6942f3ce} 2456 "\\.\pipe\gecko-crash-server-pipe.2456" 3004 22cda54a558 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2456.3.1104106864\1560621516" -childID 2 -isForBrowser -prefsHandle 3636 -prefMapHandle 3632 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1256 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e8f73235-6a28-40b0-b061-7543f3350a22} 2456 "\\.\pipe\gecko-crash-server-pipe.2456" 3656 22cca87ab58 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2456.4.201714325\589325663" -childID 3 -isForBrowser -prefsHandle 5124 -prefMapHandle 5116 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1256 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53fbc670-37e4-4fe3-8a3d-74310d0b463e} 2456 "\\.\pipe\gecko-crash-server-pipe.2456" 5136 22cdb38d258 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2456.5.1756390119\141003487" -childID 4 -isForBrowser -prefsHandle 5276 -prefMapHandle 5280 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1256 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d00e3fd-d21a-4bae-94c4-d495cb65f4cd} 2456 "\\.\pipe\gecko-crash-server-pipe.2456" 5268 22cdb38e158 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2456.6.2140531630\444065466" -childID 5 -isForBrowser -prefsHandle 5468 -prefMapHandle 5136 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1256 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4455502e-072f-48a7-95e8-60dde15efcda} 2456 "\\.\pipe\gecko-crash-server-pipe.2456" 5456 22cdb38db58 tab

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\EHJKJDGCGD.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\DGHDHIDGHI.exe"

C:\Users\Admin\AppData\Local\Temp\EHJKJDGCGD.exe

"C:\Users\Admin\AppData\Local\Temp\EHJKJDGCGD.exe"

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
RU 77.91.77.82:80 77.91.77.82 tcp
RU 77.91.77.81:80 77.91.77.81 tcp
US 8.8.8.8:53 81.77.91.77.in-addr.arpa udp
US 8.8.8.8:53 82.77.91.77.in-addr.arpa udp
RU 85.28.47.30:80 85.28.47.30 tcp
US 8.8.8.8:53 30.47.28.85.in-addr.arpa udp
N/A 127.0.0.1:64975 tcp
US 8.8.8.8:53 www.youtube.com udp
US 8.8.8.8:53 contile.services.mozilla.com udp
US 8.8.8.8:53 spocs.getpocket.com udp
US 8.8.8.8:53 content-signature-2.cdn.mozilla.net udp
US 34.117.188.166:443 spocs.getpocket.com udp
US 34.117.188.166:443 spocs.getpocket.com tcp
US 8.8.8.8:53 contile.services.mozilla.com udp
GB 216.58.213.14:443 www.youtube.com tcp
US 8.8.8.8:53 youtube-ui.l.google.com udp
US 34.160.144.191:443 content-signature-2.cdn.mozilla.net tcp
US 8.8.8.8:53 youtube-ui.l.google.com udp
US 8.8.8.8:53 contile.services.mozilla.com udp
US 8.8.8.8:53 prod.content-signature-chains.prod.webservices.mozgcp.net udp
US 34.117.188.166:443 contile.services.mozilla.com udp
US 34.117.188.166:443 contile.services.mozilla.com tcp
US 8.8.8.8:53 push.services.mozilla.com udp
US 8.8.8.8:53 prod.ads.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 prod.ads.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 autopush.prod.mozaws.net udp
US 8.8.8.8:53 prod.content-signature-chains.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 firefox.settings.services.mozilla.com udp
US 8.8.8.8:53 autopush.prod.mozaws.net udp
US 8.8.8.8:53 prod.remote-settings.prod.webservices.mozgcp.net udp
US 34.149.100.209:443 prod.remote-settings.prod.webservices.mozgcp.net tcp
GB 216.58.213.14:443 youtube-ui.l.google.com udp
US 34.107.243.93:443 autopush.prod.mozaws.net tcp
US 8.8.8.8:53 consent.youtube.com udp
US 8.8.8.8:53 prod.remote-settings.prod.webservices.mozgcp.net udp
GB 216.58.201.110:443 consent.youtube.com tcp
US 8.8.8.8:53 consent.youtube.com udp
US 8.8.8.8:53 consent.youtube.com udp
US 34.107.243.93:443 autopush.prod.mozaws.net tcp
GB 216.58.201.110:443 consent.youtube.com udp
RU 77.91.77.81:80 77.91.77.81 tcp
US 8.8.8.8:53 14.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 110.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 234.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 getpocket.cdn.mozilla.net udp
US 34.149.100.209:443 prod.remote-settings.prod.webservices.mozgcp.net tcp
US 34.120.5.221:443 getpocket.cdn.mozilla.net tcp
US 8.8.8.8:53 prod.pocket.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 prod.pocket.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.180.4:443 www.google.com tcp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.180.4:443 www.google.com udp
US 8.8.8.8:53 227.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 4.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 aus5.mozilla.org udp
US 35.244.181.201:443 aus5.mozilla.org tcp
US 8.8.8.8:53 prod.balrog.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 prod.balrog.prod.cloudops.mozgcp.net udp
US 34.160.144.191:443 prod.content-signature-chains.prod.webservices.mozgcp.net tcp
US 8.8.8.8:53 ciscobinary.openh264.org udp
GB 88.221.134.209:80 ciscobinary.openh264.org tcp
US 8.8.8.8:53 a19.dscg10.akamai.net udp
US 8.8.8.8:53 a19.dscg10.akamai.net udp
US 8.8.8.8:53 redirector.gvt1.com udp
GB 142.250.200.14:443 redirector.gvt1.com tcp
US 8.8.8.8:53 redirector.gvt1.com udp
US 8.8.8.8:53 redirector.gvt1.com udp
GB 142.250.200.14:443 redirector.gvt1.com udp
US 8.8.8.8:53 r2---sn-aigzrnse.gvt1.com udp
GB 74.125.168.199:443 r2---sn-aigzrnse.gvt1.com tcp
US 8.8.8.8:53 r2.sn-aigzrnse.gvt1.com udp
US 8.8.8.8:53 r2.sn-aigzrnse.gvt1.com udp
GB 74.125.168.199:443 r2.sn-aigzrnse.gvt1.com udp
US 8.8.8.8:53 201.181.244.35.in-addr.arpa udp
US 8.8.8.8:53 209.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 14.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 199.168.125.74.in-addr.arpa udp
US 8.8.8.8:53 firefox-settings-attachments.cdn.mozilla.net udp
US 34.117.121.53:443 firefox-settings-attachments.cdn.mozilla.net tcp
US 34.117.121.53:443 firefox-settings-attachments.cdn.mozilla.net tcp
US 34.117.121.53:443 firefox-settings-attachments.cdn.mozilla.net tcp
US 34.117.121.53:443 firefox-settings-attachments.cdn.mozilla.net tcp
US 34.117.121.53:443 firefox-settings-attachments.cdn.mozilla.net tcp
US 34.117.121.53:443 firefox-settings-attachments.cdn.mozilla.net tcp
US 8.8.8.8:53 attachments.prod.remote-settings.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 attachments.prod.remote-settings.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 53.121.117.34.in-addr.arpa udp
US 8.8.8.8:53 play.google.com udp
US 8.8.8.8:53 play.google.com udp
GB 142.250.200.46:443 play.google.com tcp
GB 142.250.200.46:443 play.google.com udp
US 8.8.8.8:53 play.google.com udp
US 8.8.8.8:53 46.200.250.142.in-addr.arpa udp
N/A 127.0.0.1:64999 tcp
US 8.8.8.8:53 25.140.123.92.in-addr.arpa udp
GB 216.58.201.110:443 consent.youtube.com udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

memory/2444-0-0x0000000000250000-0x0000000000706000-memory.dmp

memory/2444-1-0x0000000077114000-0x0000000077116000-memory.dmp

memory/2444-2-0x0000000000251000-0x000000000027F000-memory.dmp

memory/2444-3-0x0000000000250000-0x0000000000706000-memory.dmp

memory/2444-5-0x0000000000250000-0x0000000000706000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

MD5 614662fb204fcdb5b6ffb872780847db
SHA1 eacce19db94bfc22c3ee1a21b043b9282ad64c2e
SHA256 cb66a75afddb6ffcd09f236b8c81402513402599250094d4bed44b6f5231f242
SHA512 996a5fa85bd53b9081283a6cff572edecdcaef7b5f6cf84a4b4a6b684a06b29114dfa93b9e32de2ba573caa1e15586b628c42918a44fbb934e373bcb7355d23b

memory/2444-17-0x0000000000250000-0x0000000000706000-memory.dmp

memory/2420-18-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-19-0x0000000000E61000-0x0000000000E8F000-memory.dmp

memory/2420-20-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-21-0x0000000000E60000-0x0000000001316000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000006001\fb750bb711.exe

MD5 de1d8c161d81ba79c888fef77c75db93
SHA1 55e3b5e658d41d98779214afb48d34c66bf17346
SHA256 31cbdcdb540d6bc6fbc616c288f6f7ad7c74fe74eff55a135dafc31853b76126
SHA512 4d243246e4476555a4b018d2df63ae93da8c64096523c8f8b20ba616b0dec97c21e4bed7dced51da50c0908ad3da6b882b11de6d668b71852f2290850a6810ea

memory/1244-37-0x0000000000E10000-0x0000000001A03000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000007001\851ff20d31.exe

MD5 38f1b82ff1391199c4b2492611b567d2
SHA1 c80f4bcdda438b5ae909d3140cbdfd0ef48ae1c7
SHA256 0f3152e58aae7a25f17278aa655179b611f7f48388d639a9e3d116fd53394881
SHA512 0170e822e41ca0f9bbdb14549160b9ef46b123e193b09eb3b90e257e38037c794f27dbddb7ac7a0468a6022766060d4eae49ae90161965d11caf28f5898a4cbe

memory/1244-56-0x0000000061E00000-0x0000000061EF3000-memory.dmp

C:\ProgramData\nss3.dll

MD5 1cc453cdf74f31e4d913ff9c10acdde2
SHA1 6e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256 ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512 dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

C:\ProgramData\mozglue.dll

MD5 c8fd9be83bc728cc04beffafc2907fe9
SHA1 95ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256 ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512 fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

memory/2420-109-0x0000000000E60000-0x0000000001316000-memory.dmp

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\prefs.js

MD5 fa9b57a0582d8d473bdb415bc65f753c
SHA1 f36984791e4899604c0b4f98aa01b33da781d5d5
SHA256 f0e6da0f168223a829d8e234c3894b2451d2b2a9800ec1733cee4e5959a5ea2b
SHA512 ff9a42617da7dc29ab4342326cfc701d813ca86a1380ffad8a651eac80a84d6c715c05a8853e1b4c5183f6b3bb83860e8b9c4a3b459fddd382667a1324e95eac

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\activity-stream.discovery_stream.json.tmp

MD5 19fb8bcd277cdbb7489df8c4fafe34e8
SHA1 66088d41da52bee0df133951ec528476c746ce14
SHA256 91e5b2672c8bd355f74acc581e78ecc40326e1f7856854ac0dab8f6e08ccaac6
SHA512 4eddc213ea6a310ae7d489720bddf0400a887c114ba2b017626b8b694e73acafecf0d58730ac678937f0779d0c7e1f83be7f85cb827e2cd159faf3ba48f178bc

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\activity-stream.discovery_stream.json.tmp

MD5 098e5f12e799419115d0ea92468e272e
SHA1 e668586bd037e38399afe2d5f5cca18fe3c361ce
SHA256 ec71e16265b18467697b7996504d7b4e60a582b82dffcae2135e808b0e21240a
SHA512 e40d0c160d90fb2cd9733024a6428f9e1ceaf648ded19e1d013c0dd8675796c672e6c75a3087c8534dd55d08893e18c33f28925e54c64b51a9e4210e70a74f4c

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\prefs-1.js

MD5 f7ecdf32e380893885dfdb36cfc52d68
SHA1 df548fd885facc678820421d95a1212e0a793f41
SHA256 1234a3be9608a6904e5f64d6ece91343ba162ffe1aef006c98bb52696e6ddc3c
SHA512 7ba8c2aa8d311a5a869b36948138682d21cd87a50dedd4c48e094bf444112f4577faf39df634d94025704d6129187e1c91b7a2a7a5be7c3b5531baad1e4706cd

memory/1244-221-0x0000000000E10000-0x0000000001A03000-memory.dmp

memory/756-225-0x0000000000820000-0x0000000000CD6000-memory.dmp

memory/756-227-0x0000000000820000-0x0000000000CD6000-memory.dmp

memory/2420-231-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/3664-233-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/3664-234-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-235-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-238-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-237-0x0000000000E60000-0x0000000001316000-memory.dmp

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\sessionstore-backups\recovery.jsonlz4

MD5 4aa47580c43846fbb8c55cff90ee465f
SHA1 bc1a35e21ce46ff3f4c2d15a7e5e5a5a5d819461
SHA256 184edd14d081b69899c3253c4fea08d5affe2bb4e9e0d29c7a6e5ce6ec26729f
SHA512 793286c863d5c195c81685a1b70a7e02aebeb12887fe05ea3ef67f0d220592dbf454b6ca6df754da1501a9458831487135ef3711a427e2b4f7dce406bf1c3782

memory/2420-254-0x0000000000E60000-0x0000000001316000-memory.dmp

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

MD5 3538969c978c95db1d98374435ebb498
SHA1 5314d20bb19cb7384a03f32cf7d3ddfbe0b4179b
SHA256 c7d473529ce96c4240f7a76e3a52e8e6985e6d2d183a1482046bcd7b51f22b1d
SHA512 1c025b4461721565a65ab6b4dd385076cca5b6bc09f8d662927cb759423102a84ff0f8c3f3f787e91fe2ebe4a0c4b64b0bf4fabe923933a5c841da2383a25734

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\cache2\entries\5CD1EBDF6B57F13C7E783CE5E6D8E9C44014FE1A

MD5 070aea7d8580cba49a2441fff8487c05
SHA1 b7f1808e78b448f31288209e4ba775a7ec7f45a0
SHA256 66533aebd1af0b6e9a297b18941e8f3451824830e80f854664936cc0e8c2c4a1
SHA512 104c812c01bd6f6d764fa3c8dd4fa98f0f4a5dd56cee357034d10427868ed07cbd35e45ff082b02d11047a8eedbeab0a4754b1372438d22b54b9f94e7d8dd435

C:\Users\Admin\AppData\Local\Temp\tmpaddon

MD5 85430baed3398695717b0263807cf97c
SHA1 fffbee923cea216f50fce5d54219a188a5100f41
SHA256 a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA512 06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

MD5 3d33cdc0b3d281e67dd52e14435dd04f
SHA1 4db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256 f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512 a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

MD5 fe3355639648c417e8307c6d051e3e37
SHA1 f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA256 1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA512 8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\prefs-1.js

MD5 d54040243894cee6759abb532edb6bc2
SHA1 5558696d0dfcc1d21e61f7b56af92eeb00ae58f7
SHA256 37295c7f714481df0056295466283a6571c2280e2ae865bcfaced1e6c96c9bdb
SHA512 eb23c4d8400fd63a9baae0ef3b413fc24302cc271b7e44bb8205d4cfc01015e815f92ac46051bdba43cefc883277d8251976ee5ef1e33615f28210aaafa981ae

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

MD5 8be33af717bb1b67fbd61c3f4b807e9e
SHA1 7cf17656d174d951957ff36810e874a134dd49e0
SHA256 e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA512 6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

MD5 49ddb419d96dceb9069018535fb2e2fc
SHA1 62aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA256 2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA512 48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

MD5 a01c5ecd6108350ae23d2cddf0e77c17
SHA1 c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256 345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512 b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

MD5 937326fead5fd401f6cca9118bd9ade9
SHA1 4526a57d4ae14ed29b37632c72aef3c408189d91
SHA256 68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512 b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

MD5 688bed3676d2104e7f17ae1cd2c59404
SHA1 952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA256 33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA512 7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

MD5 33bf7b0439480effb9fb212efce87b13
SHA1 cee50f2745edc6dc291887b6075ca64d716f495a
SHA256 8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512 d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

memory/2420-546-0x0000000000E60000-0x0000000001316000-memory.dmp

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4qx8f0t2.default-release\prefs-1.js

MD5 42951917f7e958bab25f1434499e86c1
SHA1 10f348a085446f014b3ffebbbe6a9d34cc064466
SHA256 4c6a6bd1cea2d418e6e0099e9617b1c5e2e191be0f282eba3a9ae9d3aa2e78aa
SHA512 c3d9e4b4ec40fa1bd9a3cf6812f26d6a7ae35db319a4d10594389bb538538a90c9710bc8b49291210af8fe03b0042834ef5772cc336330aa11f1a5dfb36a69e6

memory/2420-2213-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-2222-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-2230-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/3312-2243-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/3312-2244-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-2245-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-2246-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-2247-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-2248-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-2249-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-2250-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/3500-2257-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/3500-2258-0x0000000000E60000-0x0000000001316000-memory.dmp

memory/2420-2259-0x0000000000E60000-0x0000000001316000-memory.dmp