Analysis

  • max time kernel
    30s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2024, 06:35

General

  • Target

    441f614bb8a71a458b9f8274f807c33550d0a91304b7b1bc25c23c6cd8d9b616.exe

  • Size

    2.4MB

  • MD5

    7ad17f11aa6b1408999981b11078d674

  • SHA1

    57a4856e4db83685852d7c6037bb1bbde4793415

  • SHA256

    441f614bb8a71a458b9f8274f807c33550d0a91304b7b1bc25c23c6cd8d9b616

  • SHA512

    06f7dbbe0fbba7615742840c5aa0e77f87bca47eb85bc5d5b33d5785d76e9a705e4d6ce0e068f43f45986405dcaf7171dfd6bd2bbd832e2eced0032ab4695e65

  • SSDEEP

    49152:xyOXuqDgypjKg6wY7p6ZJ99hZUNs9TlID4zmjfs49s/9khpXnDD:RDdj97Y7p6ZJhZeCJOTsqD

Malware Config

Extracted

Family

stealc

Botnet

Nice

C2

http://85.28.47.30

Attributes
  • url_path

    /920475a59bac849d.php

Extracted

Family

amadey

Version

4.30

Botnet

4dd39d

C2

http://77.91.77.82

Attributes
  • install_dir

    ad40971b6b

  • install_file

    explorti.exe

  • strings_key

    a434973ad22def7137dbb5e059b7081e

  • url_paths

    /Hun4Ko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\441f614bb8a71a458b9f8274f807c33550d0a91304b7b1bc25c23c6cd8d9b616.exe
    "C:\Users\Admin\AppData\Local\Temp\441f614bb8a71a458b9f8274f807c33550d0a91304b7b1bc25c23c6cd8d9b616.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\CBAFIDAECB.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Users\Admin\AppData\Local\Temp\CBAFIDAECB.exe
        "C:\Users\Admin\AppData\Local\Temp\CBAFIDAECB.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2256
        • C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
          "C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2100
          • C:\Users\Admin\AppData\Local\Temp\1000006001\6a2bb9b9d8.exe
            "C:\Users\Admin\AppData\Local\Temp\1000006001\6a2bb9b9d8.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetWindowsHookEx
            PID:1340
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\1000008021\005231c2eb.cmd" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1848
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
              6⤵
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2284
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7fd9758,0x7fef7fd9768,0x7fef7fd9778
                7⤵
                  PID:1912
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1092 --field-trial-handle=1384,i,974620307022812384,16905791052836939721,131072 /prefetch:2
                  7⤵
                    PID:2400
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1384,i,974620307022812384,16905791052836939721,131072 /prefetch:8
                    7⤵
                      PID:1796
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1384,i,974620307022812384,16905791052836939721,131072 /prefetch:8
                      7⤵
                        PID:2660
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2132 --field-trial-handle=1384,i,974620307022812384,16905791052836939721,131072 /prefetch:1
                        7⤵
                          PID:2132
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2140 --field-trial-handle=1384,i,974620307022812384,16905791052836939721,131072 /prefetch:1
                          7⤵
                            PID:1012
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2948 --field-trial-handle=1384,i,974620307022812384,16905791052836939721,131072 /prefetch:1
                            7⤵
                              PID:1616
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1572 --field-trial-handle=1384,i,974620307022812384,16905791052836939721,131072 /prefetch:2
                              7⤵
                                PID:2780
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
                              6⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2524
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
                                7⤵
                                • Checks processor information in registry
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                • Suspicious use of WriteProcessMemory
                                PID:1104
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1104.0.1208356996\2052410217" -parentBuildID 20221007134813 -prefsHandle 1232 -prefMapHandle 1224 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7e3b843-c8c9-47af-a741-b56a8675d174} 1104 "\\.\pipe\gecko-crash-server-pipe.1104" 1324 123d1e58 gpu
                                  8⤵
                                    PID:2572
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1104.1.1100236231\1096542825" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5196ba16-f07a-4a94-be33-9812588631e5} 1104 "\\.\pipe\gecko-crash-server-pipe.1104" 1496 e6f858 socket
                                    8⤵
                                      PID:776
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1104.2.1856080639\416793529" -childID 1 -isForBrowser -prefsHandle 2188 -prefMapHandle 2184 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b68418f3-06df-4dca-9374-6f33829102eb} 1104 "\\.\pipe\gecko-crash-server-pipe.1104" 2200 199f3558 tab
                                      8⤵
                                        PID:2304
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1104.3.1041240375\610362809" -childID 2 -isForBrowser -prefsHandle 2840 -prefMapHandle 2836 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b64b4d5d-ff03-4153-a94c-baa4c35643c1} 1104 "\\.\pipe\gecko-crash-server-pipe.1104" 2852 e61c58 tab
                                        8⤵
                                          PID:764
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1104.4.1945667805\43640195" -childID 3 -isForBrowser -prefsHandle 3740 -prefMapHandle 3660 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {be9e88e0-73d7-4455-b95c-28e8bcf985dc} 1104 "\\.\pipe\gecko-crash-server-pipe.1104" 3752 1f09a058 tab
                                          8⤵
                                            PID:3760
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1104.5.106106217\329471686" -childID 4 -isForBrowser -prefsHandle 3884 -prefMapHandle 3888 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c743905d-9a85-41b6-9545-dd6dc6daf4f3} 1104 "\\.\pipe\gecko-crash-server-pipe.1104" 3868 1efdeb58 tab
                                            8⤵
                                              PID:3768
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1104.6.607803357\1802469685" -childID 5 -isForBrowser -prefsHandle 3860 -prefMapHandle 3960 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {92afca3c-14c6-4c4d-848e-4df99964a830} 1104 "\\.\pipe\gecko-crash-server-pipe.1104" 3968 1f099158 tab
                                              8⤵
                                                PID:3780
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\FIIEHJDBKJ.exe"
                                    2⤵
                                      PID:2876
                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                    1⤵
                                      PID:1052

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                      Filesize

                                      264KB

                                      MD5

                                      f50f89a0a91564d0b8a211f8921aa7de

                                      SHA1

                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                      SHA256

                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                      SHA512

                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      13f4ec75e52f4ba89fc2fdf8bc8e1cac

                                      SHA1

                                      9c8cf84b4f89ebdf8f02b2a468c13d683709ae5e

                                      SHA256

                                      b54721b8a26d975a4199ec4295e71f2ab8ddec086d13d66a511832e03f3e45b3

                                      SHA512

                                      8554086de9b3d65bfcdd8a1306c1dc916f12c49782854246c66a51f8468cd8c87cb404585d30e73a98e8c3318b7e126a41210428e325f7a0c9f45ae20bcb2948

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      a4cb04de6a7e7ba118e6c53761f8f3cb

                                      SHA1

                                      3a10c8e67f6c097573b3ca252256dd2f4f64f315

                                      SHA256

                                      37ac6d06fe7d6c6756536b2b0b9bb4fabc52c13b61659bfbe60e4ca68a5cb5bc

                                      SHA512

                                      ba0c00a0728f3713a1543b3d7d50f626eb4b94a0386eee4d37f32b234889146b68ff2becbec1f8a3f910e0be7aed875d90e6b1c73329274588f5227996052ab2

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                      Filesize

                                      16B

                                      MD5

                                      18e723571b00fb1694a3bad6c78e4054

                                      SHA1

                                      afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                      SHA256

                                      8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                      SHA512

                                      43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\nndpnsl0.default-release\activity-stream.discovery_stream.json.tmp

                                      Filesize

                                      30KB

                                      MD5

                                      309d055502c91f2b3f87017a992421ae

                                      SHA1

                                      8e8dc2248665c6b4de7176c7b10bc5f4ac257d79

                                      SHA256

                                      1bd92cff8c1ddcef29d0fafb843a7e9e984131b56802061cf0c2a06f43927005

                                      SHA512

                                      4aad6032ab98be1380f58986f2284eda2f07599f88cf546c4721d808a0056b41c970b46165ad754d70d63750f5b364b7a3ccd8e93fc1c723de03b8a3605b1dcc

                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\nndpnsl0.default-release\activity-stream.discovery_stream.json.tmp

                                      Filesize

                                      30KB

                                      MD5

                                      36230842ebbead65a6940e9d7aeee2d2

                                      SHA1

                                      0760c03f8c5e217cc582f9f47d65972b48ac4503

                                      SHA256

                                      d6580a48f1b6ab29e6092682e54bbcf62c415f4f1f7c54cae64a5c1339fa8d65

                                      SHA512

                                      f6a0a88536763b3e434c0db33f4bb4ff72185385ede239cb50a0b57a33b3f0ee74dcb72ae92cf2b0334e8c021fd1de57b23d5e56cec150cecfff976775a3a485

                                    • C:\Users\Admin\AppData\Local\Temp\1000006001\6a2bb9b9d8.exe

                                      Filesize

                                      2.3MB

                                      MD5

                                      6a86015f6861255a686e50eba395b43f

                                      SHA1

                                      59d347d84af863e1184ebd06a967a5bec7b860fd

                                      SHA256

                                      c5bd507d607a85292dbd26e9ef87924d525680eb08eaf489f5dabb46a15a8ce1

                                      SHA512

                                      acef8012797e815cc2cb63063cec2d79a4a14bdb827ba57def6c090fe002f85b5e0d786ca631eb055379564d42c467af4ca8dc110ac4e084bd12749bb077a2a5

                                    • C:\Users\Admin\AppData\Local\Temp\1000008021\005231c2eb.cmd

                                      Filesize

                                      2KB

                                      MD5

                                      c1b73be75c9a5348a3e36e9ec2993f58

                                      SHA1

                                      84b8badeca9fa527ae6b79f3e5920e9fd0fbd906

                                      SHA256

                                      a75e65563e853c9fb8863bcf7c2103ec23893f31a42b9332042ea3f5f2d40ea0

                                      SHA512

                                      fe6d1df55358ba710c25e0e6b189beca8ce991d65a0fcecefdecacd2b96e0802ea549157c1449d2853f0ab37b8e865ec70e51772d2deefe8238d7581c81bc4a3

                                    • C:\Users\Admin\AppData\Local\Temp\CBAFIDAECB.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      12d8ad5f3c254d1fbce12df873e1c57b

                                      SHA1

                                      ba2c94b3130f4053db4ed78f9621cccc3b16c214

                                      SHA256

                                      2330900f4892d5a48bd61d786d7cb36a01a6f9bd66b914b858498080a85bb72f

                                      SHA512

                                      8d3f450675bfc1f54181238146ea8dd7993c9f3469f44420cf986b7d15955052a5b9c7d076afbc19d43eea49ff06bb96bea321defc8cea1416421e5d425a718c

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                      Filesize

                                      442KB

                                      MD5

                                      85430baed3398695717b0263807cf97c

                                      SHA1

                                      fffbee923cea216f50fce5d54219a188a5100f41

                                      SHA256

                                      a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                      SHA512

                                      06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                      Filesize

                                      8.0MB

                                      MD5

                                      a01c5ecd6108350ae23d2cddf0e77c17

                                      SHA1

                                      c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                      SHA256

                                      345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                      SHA512

                                      b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\datareporting\glean\db\data.safe.bin

                                      Filesize

                                      2KB

                                      MD5

                                      d5b754c5a9452b6b788d2ff6e3def2d9

                                      SHA1

                                      f2962022af312188b444e4057ec03a5116003977

                                      SHA256

                                      7296bc0a08152dbeba64d391ea8d7c47b69d35b7e1bf56e51743ec35ad55b519

                                      SHA512

                                      810e51b9c920151b81cd3a34f284ca8579e94babf886a2d7cedddd8f7901189fc7e552adcb469b5080048dcebf114e92f0537825581839b1db9ad7ea018c56a8

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\datareporting\glean\pending_pings\557f74c4-c08a-4e0a-8a5c-283c69c390fa

                                      Filesize

                                      10KB

                                      MD5

                                      4286dd5668ded5c8518f6404ab786614

                                      SHA1

                                      f63747170400d738dc5f10a694b14b3de12e888b

                                      SHA256

                                      2e449be6f900c4769a92205cdfcaff6c30dc2e13028334cba5e1ebc88f9fda40

                                      SHA512

                                      42ef140d0b88be4e45662ef020b43e2235eb9bd4497fd110dddaaad967fa1a8e4f5ad3b6d5494e461299f1af9b926e43eae947035f6ffa269465edb1a1ae7dc8

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\datareporting\glean\pending_pings\8155b8b6-8d3b-4b9e-b343-5c2737064859

                                      Filesize

                                      745B

                                      MD5

                                      48a883dfef28d8e62fb3b6bf43cdebf2

                                      SHA1

                                      632177f5fd80f6eeecc10ff61a0b9bda985c31a0

                                      SHA256

                                      491fb413294596c749329c1c46b9d14c2bed2b52e7739db03ef96575fa68e619

                                      SHA512

                                      a5c1efaca5424a5ed379d081cf281e752f5068cd2455bcd23751b4b03753c51ed8d4d5077ddfbfdbb568ff494447a76133ab36997e7037584f70abbe055876fc

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                      Filesize

                                      997KB

                                      MD5

                                      fe3355639648c417e8307c6d051e3e37

                                      SHA1

                                      f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                      SHA256

                                      1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                      SHA512

                                      8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                      Filesize

                                      116B

                                      MD5

                                      3d33cdc0b3d281e67dd52e14435dd04f

                                      SHA1

                                      4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                      SHA256

                                      f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                      SHA512

                                      a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                      Filesize

                                      479B

                                      MD5

                                      49ddb419d96dceb9069018535fb2e2fc

                                      SHA1

                                      62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                      SHA256

                                      2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                      SHA512

                                      48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                      Filesize

                                      372B

                                      MD5

                                      8be33af717bb1b67fbd61c3f4b807e9e

                                      SHA1

                                      7cf17656d174d951957ff36810e874a134dd49e0

                                      SHA256

                                      e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                      SHA512

                                      6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                      Filesize

                                      11.8MB

                                      MD5

                                      33bf7b0439480effb9fb212efce87b13

                                      SHA1

                                      cee50f2745edc6dc291887b6075ca64d716f495a

                                      SHA256

                                      8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                      SHA512

                                      d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                      Filesize

                                      1KB

                                      MD5

                                      688bed3676d2104e7f17ae1cd2c59404

                                      SHA1

                                      952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                      SHA256

                                      33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                      SHA512

                                      7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                      Filesize

                                      1KB

                                      MD5

                                      937326fead5fd401f6cca9118bd9ade9

                                      SHA1

                                      4526a57d4ae14ed29b37632c72aef3c408189d91

                                      SHA256

                                      68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                      SHA512

                                      b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\prefs-1.js

                                      Filesize

                                      6KB

                                      MD5

                                      661479f302716189590a6abb545691ae

                                      SHA1

                                      52580da26341e9baf217799b5b69cfd1f5b956d5

                                      SHA256

                                      7802e431bc6ca9ac2729fdbdd220d64947699f5a9f4396bd0ef0d17483d052cb

                                      SHA512

                                      8337babbc35f077a59bbac8ae04ce30ca826bcb46deb8f1b9d5517b81c69b0d01e59d746f446c5f224bfe5bf2a30abc892217a94ae56d9fecf2ee0cd434b0ba1

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\prefs-1.js

                                      Filesize

                                      7KB

                                      MD5

                                      58261fc7521c46b3332f07aa3acd80ca

                                      SHA1

                                      26b2314ef3015624f538554a4e0e4dcdee84cc00

                                      SHA256

                                      046ad00fd481f456addaa49059960047245a7f854941744b545f6d278b0fe57e

                                      SHA512

                                      5076f3817d1f1fafd46f01181eb19ac91db08075b7b11b4e4c7ac83234b0e39d3d031a36e48512284b3b5049f96dfe5a13ea8ec3ffd8484a69bc7a1cbe3a8ee9

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\prefs-1.js

                                      Filesize

                                      7KB

                                      MD5

                                      79ba172bd6471a42ef56cd074b466f96

                                      SHA1

                                      a9c1ad12fc91c516bdab96a4452e2ab31cafd744

                                      SHA256

                                      af9ae2a874c961656a067afbac23c0949771554a848ba886f9e77417c9cd0fcd

                                      SHA512

                                      9cc034d399de84505eae524e7f741f4041b93985678501542ddea8d3c65a88c3975e2154dbcd4f830a74075e6149f7559cc10f87dadd127ea960b0a0c54a22ee

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\prefs.js

                                      Filesize

                                      6KB

                                      MD5

                                      d9a5f1955da56d2bab9d648873405d6b

                                      SHA1

                                      5d07a3c203f3f604d16abd5803d94ad9c37d5a78

                                      SHA256

                                      aff6679b1c78e617206f4a0a60ea7d1f79b081ba1737b9e4940eb27e584afcc2

                                      SHA512

                                      b5fade0a115413e83b8f59a9fd274684cca1b85ee982ef9a0cc8a78a4b7e3b8e68aefe461de6b7b1c5f74c1571ea461130c2d7979332d9f758307e194b325a34

                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\sessionstore-backups\recovery.jsonlz4

                                      Filesize

                                      4KB

                                      MD5

                                      76ade105416972a42aca1e0ebd641311

                                      SHA1

                                      609919285ebe058e22243568270744a1157347a0

                                      SHA256

                                      97c124be7a930a9f383b863d210f063f476c1e3b81f2d5e52b06e701be25003d

                                      SHA512

                                      47de7da7d370bdecf6de528266a398236a195318a28f19f713ca8bb4f2aa723b040876a2dcb05a697ed0421a9d88a2e2272ddc82ca0bbedf54158a146d13416a

                                    • \ProgramData\mozglue.dll

                                      Filesize

                                      593KB

                                      MD5

                                      c8fd9be83bc728cc04beffafc2907fe9

                                      SHA1

                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                      SHA256

                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                      SHA512

                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                    • \ProgramData\nss3.dll

                                      Filesize

                                      2.0MB

                                      MD5

                                      1cc453cdf74f31e4d913ff9c10acdde2

                                      SHA1

                                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                      SHA256

                                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                      SHA512

                                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                    • memory/1052-88-0x0000000002020000-0x00000000024D4000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/1340-158-0x0000000000D80000-0x0000000001957000-memory.dmp

                                      Filesize

                                      11.8MB

                                    • memory/1340-162-0x0000000000D80000-0x0000000001957000-memory.dmp

                                      Filesize

                                      11.8MB

                                    • memory/2100-404-0x0000000000850000-0x0000000000D04000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2100-507-0x0000000000850000-0x0000000000D04000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2100-414-0x0000000000850000-0x0000000000D04000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2100-408-0x0000000006D70000-0x0000000007947000-memory.dmp

                                      Filesize

                                      11.8MB

                                    • memory/2100-234-0x0000000000850000-0x0000000000D04000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2100-516-0x0000000000850000-0x0000000000D04000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2100-508-0x0000000000850000-0x0000000000D04000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2100-530-0x0000000000850000-0x0000000000D04000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2100-118-0x0000000000850000-0x0000000000D04000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2100-535-0x0000000000850000-0x0000000000D04000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2100-392-0x0000000000850000-0x0000000000D04000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2100-159-0x0000000006D70000-0x0000000007947000-memory.dmp

                                      Filesize

                                      11.8MB

                                    • memory/2100-536-0x0000000000850000-0x0000000000D04000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2100-495-0x0000000000850000-0x0000000000D04000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2100-155-0x0000000006D70000-0x0000000007947000-memory.dmp

                                      Filesize

                                      11.8MB

                                    • memory/2256-117-0x0000000006F40000-0x00000000073F4000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2256-116-0x0000000000860000-0x0000000000D14000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2256-96-0x0000000000860000-0x0000000000D14000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2256-403-0x0000000006F40000-0x00000000073F4000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2644-2-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                      Filesize

                                      972KB

                                    • memory/2644-0-0x00000000009D0000-0x00000000015BC000-memory.dmp

                                      Filesize

                                      11.9MB

                                    • memory/2644-1-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

                                      Filesize

                                      3.8MB

                                    • memory/2644-65-0x00000000009D0000-0x00000000015BC000-memory.dmp

                                      Filesize

                                      11.9MB