Malware Analysis Report

2024-10-18 23:40

Sample ID 240812-frbsbs1cqg
Target 98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247
SHA256 98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247
Tags
amadey stealc 0657d1 kora credential_access discovery evasion persistence stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247

Threat Level: Known bad

The file 98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247 was found to be: Known bad.

Malicious Activity Summary

amadey stealc 0657d1 kora credential_access discovery evasion persistence stealer trojan

Stealc

Amadey

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Credentials from Password Stores: Credentials from Web Browsers

Downloads MZ/PE file

Checks BIOS information in registry

Loads dropped DLL

Identifies Wine through registry keys

Executes dropped EXE

Adds Run key to start application

AutoIT Executable

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of SetThreadContext

Drops file in Windows directory

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Browser Information Discovery

Unsigned PE

Modifies registry class

Uses Task Scheduler COM API

Suspicious use of SendNotifyMessage

Checks processor information in registry

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-12 05:05

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-12 05:05

Reported

2024-08-12 05:11

Platform

win7-20240704-en

Max time kernel

299s

Max time network

300s

Command Line

"C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe"

Signatures

Amadey

trojan amadey

Stealc

stealer stealc

Credentials from Password Stores: Credentials from Web Browsers

credential_access stealer

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A

Downloads MZ/PE file

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\2a4c8777ce.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000036001\\2a4c8777ce.exe" C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2424 set thread context of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 set thread context of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\explorti.job C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\1000037002\e672e77be6.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000038001\6248e45db8.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Program Files\Mozilla Firefox\firefox.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings C:\Program Files\Mozilla Firefox\firefox.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2728 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PID 2728 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PID 2728 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PID 2728 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PID 2752 wrote to memory of 2424 N/A C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe
PID 2752 wrote to memory of 2424 N/A C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe
PID 2752 wrote to memory of 2424 N/A C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe
PID 2752 wrote to memory of 2424 N/A C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe
PID 2752 wrote to memory of 2920 N/A C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\Admin\1000037002\e672e77be6.exe
PID 2752 wrote to memory of 2920 N/A C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\Admin\1000037002\e672e77be6.exe
PID 2752 wrote to memory of 2920 N/A C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\Admin\1000037002\e672e77be6.exe
PID 2752 wrote to memory of 2920 N/A C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\Admin\1000037002\e672e77be6.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2424 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 wrote to memory of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 wrote to memory of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 wrote to memory of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 wrote to memory of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 wrote to memory of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 wrote to memory of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 wrote to memory of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 wrote to memory of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 wrote to memory of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 wrote to memory of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 wrote to memory of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 wrote to memory of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2920 wrote to memory of 2096 N/A C:\Users\Admin\1000037002\e672e77be6.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2752 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000038001\6248e45db8.exe
PID 2752 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000038001\6248e45db8.exe
PID 2752 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000038001\6248e45db8.exe
PID 2752 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe C:\Users\Admin\AppData\Local\Temp\1000038001\6248e45db8.exe
PID 2392 wrote to memory of 2376 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2392 wrote to memory of 2376 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2392 wrote to memory of 2376 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2392 wrote to memory of 2376 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2376 wrote to memory of 2228 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2376 wrote to memory of 2228 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2376 wrote to memory of 2228 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2376 wrote to memory of 2228 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2376 wrote to memory of 2228 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2376 wrote to memory of 2228 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2376 wrote to memory of 2228 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2376 wrote to memory of 2228 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2376 wrote to memory of 2228 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2376 wrote to memory of 2228 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2376 wrote to memory of 2228 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2376 wrote to memory of 2228 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2228 wrote to memory of 1952 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2228 wrote to memory of 1952 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2228 wrote to memory of 1952 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2228 wrote to memory of 744 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2228 wrote to memory of 744 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe

"C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe"

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"

C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe

"C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Users\Admin\1000037002\e672e77be6.exe

"C:\Users\Admin\1000037002\e672e77be6.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Users\Admin\AppData\Local\Temp\1000038001\6248e45db8.exe

"C:\Users\Admin\AppData\Local\Temp\1000038001\6248e45db8.exe"

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2228.0.557550260\77053359" -parentBuildID 20221007134813 -prefsHandle 1236 -prefMapHandle 1228 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {512adb14-5a9f-4267-b071-b622665ac511} 2228 "\\.\pipe\gecko-crash-server-pipe.2228" 1312 101d9758 gpu

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2228.1.709084901\323235773" -parentBuildID 20221007134813 -prefsHandle 1504 -prefMapHandle 1500 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {845cdc80-7509-43f1-9c89-8f2925fc5746} 2228 "\\.\pipe\gecko-crash-server-pipe.2228" 1516 e74e58 socket

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2228.2.813508220\241699813" -childID 1 -isForBrowser -prefsHandle 2112 -prefMapHandle 2108 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd698840-547f-4afa-8c69-359d6a3ba885} 2228 "\\.\pipe\gecko-crash-server-pipe.2228" 2124 1a2bc858 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2228.3.240732226\882417449" -childID 2 -isForBrowser -prefsHandle 2856 -prefMapHandle 2852 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec4d16e9-56e9-4046-8c31-9b52e30b171f} 2228 "\\.\pipe\gecko-crash-server-pipe.2228" 2868 1c8ed858 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2228.4.2123861828\19915271" -childID 3 -isForBrowser -prefsHandle 3812 -prefMapHandle 3808 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5bb12d66-b453-44a4-a6a5-b028f150b655} 2228 "\\.\pipe\gecko-crash-server-pipe.2228" 3828 20c34558 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2228.5.1530522210\310306940" -childID 4 -isForBrowser -prefsHandle 3928 -prefMapHandle 3932 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b4e41bb-f43b-4d04-98f6-f2f351f7a518} 2228 "\\.\pipe\gecko-crash-server-pipe.2228" 3916 1e572258 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2228.6.801076529\1092612459" -childID 5 -isForBrowser -prefsHandle 4064 -prefMapHandle 4060 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c8d4622d-4251-4840-86dd-119c7955fa36} 2228 "\\.\pipe\gecko-crash-server-pipe.2228" 4028 1e56fb58 tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2228.7.1666678979\1426796926" -childID 6 -isForBrowser -prefsHandle 4336 -prefMapHandle 4232 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b4123f0-749f-4eee-bd91-4864d89f513e} 2228 "\\.\pipe\gecko-crash-server-pipe.2228" 4368 2082da58 tab

Network

Country Destination Domain Proto
RU 185.215.113.19:80 185.215.113.19 tcp
RU 185.215.113.16:80 185.215.113.16 tcp
RU 185.215.113.100:80 185.215.113.100 tcp
N/A 127.0.0.1:49311 tcp
US 8.8.8.8:53 accounts.google.com udp
RU 185.215.113.100:80 185.215.113.100 tcp
US 8.8.8.8:53 spocs.getpocket.com udp
US 8.8.8.8:53 getpocket.cdn.mozilla.net udp
US 8.8.8.8:53 prod.ads.prod.webservices.mozgcp.net udp
US 34.120.5.221:443 getpocket.cdn.mozilla.net tcp
US 8.8.8.8:53 prod.pocket.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 prod.ads.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 shavar.prod.mozaws.net udp
US 8.8.8.8:53 shavar.prod.mozaws.net udp
US 8.8.8.8:53 prod.remote-settings.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 prod.remote-settings.prod.webservices.mozgcp.net udp
NL 142.250.102.84:443 accounts.google.com tcp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 prod.pocket.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 prod.content-signature-chains.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 prod.content-signature-chains.prod.webservices.mozgcp.net udp
NL 142.250.102.84:443 accounts.google.com udp
US 8.8.8.8:53 accounts.youtube.com udp
NL 142.250.179.174:443 accounts.youtube.com tcp
US 8.8.8.8:53 www3.l.google.com udp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 www3.l.google.com udp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.179.174:443 www3.l.google.com udp
US 8.8.8.8:53 play.google.com udp
US 8.8.8.8:53 play.google.com udp
NL 216.58.214.14:443 play.google.com tcp
NL 216.58.214.14:443 play.google.com tcp
US 8.8.8.8:53 play.google.com udp
NL 216.58.214.14:443 play.google.com tcp
NL 216.58.214.14:443 play.google.com tcp
NL 216.58.214.14:443 play.google.com udp
US 8.8.8.8:53 www.google.com udp
N/A 127.0.0.1:49320 tcp
NL 142.250.179.196:443 www.google.com tcp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
NL 142.250.179.196:443 www.google.com udp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 prod.balrog.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 prod.balrog.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 ciscobinary.openh264.org udp
GB 88.221.134.155:80 ciscobinary.openh264.org tcp
US 8.8.8.8:53 a19.dscg10.akamai.net udp
US 8.8.8.8:53 a19.dscg10.akamai.net udp
US 8.8.8.8:53 redirector.gvt1.com udp
NL 142.250.179.174:443 redirector.gvt1.com tcp
US 8.8.8.8:53 redirector.gvt1.com udp
US 8.8.8.8:53 redirector.gvt1.com udp
NL 142.250.179.174:443 redirector.gvt1.com udp
US 8.8.8.8:53 r5---sn-4g5lzney.gvt1.com udp
DE 74.125.163.138:443 r5---sn-4g5lzney.gvt1.com tcp
US 8.8.8.8:53 r5.sn-4g5lzney.gvt1.com udp
US 8.8.8.8:53 r5.sn-4g5lzney.gvt1.com udp
DE 74.125.163.138:443 r5.sn-4g5lzney.gvt1.com udp
US 8.8.8.8:53 play.google.com udp
US 8.8.8.8:53 play.google.com udp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.102.84:443 accounts.google.com udp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.102.84:443 accounts.google.com tcp
US 8.8.8.8:53 accounts.google.com udp
RU 185.215.113.19:80 185.215.113.19 tcp

Files

memory/2728-0-0x00000000001E0000-0x00000000006B3000-memory.dmp

memory/2728-1-0x0000000077000000-0x0000000077002000-memory.dmp

memory/2728-2-0x00000000001E1000-0x000000000020F000-memory.dmp

memory/2728-3-0x00000000001E0000-0x00000000006B3000-memory.dmp

memory/2728-4-0x00000000001E0000-0x00000000006B3000-memory.dmp

memory/2728-10-0x00000000001E0000-0x00000000006B3000-memory.dmp

memory/2728-15-0x0000000006210000-0x00000000066E3000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

MD5 6c5e8693bc139c7fcf400a184ce74b6d
SHA1 c1af3ca004dc6158251db2e450a4b15eaa8469c7
SHA256 98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247
SHA512 03d6559539fd79c4410151b7569c4f407a99864e2d820389c4a114968bc11d193dd1f2e3775c668d0670534e35c68ff12384212b60efb57f29e23158ccd69dfb

memory/2728-14-0x00000000001E0000-0x00000000006B3000-memory.dmp

memory/2752-17-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-18-0x0000000000C31000-0x0000000000C5F000-memory.dmp

memory/2752-19-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-20-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-22-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-23-0x0000000000C30000-0x0000000001103000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000036001\2a4c8777ce.exe

MD5 db946418424011c782182c76ab8c179f
SHA1 d640d54d341cf6341bd434c9015d23d22156612a
SHA256 bfdffea79fd6126c2256fab3f3b0421ec9b3a77a618fc406cd0f2e7d4a38f04e
SHA512 a73c645fe96ff6e49207326af35635998af343d2aa5ddd5e8b2bbd2bcded52869d588bb8c69eb220593d3152be99812e3462b1b09deea80adcac30bed9ed8956

memory/2424-38-0x00000000013C0000-0x00000000014F0000-memory.dmp

C:\Users\Admin\1000037002\e672e77be6.exe

MD5 62c81eb8cd78dbcf5767f84caad6972e
SHA1 9a508e8724c1431394717ebd3c6dee2f9f21d082
SHA256 166a8fac98b553a4e3647cefc034fe826b753958c0be902d9483148edb001250
SHA512 2feaa6cb070e548790b01601fe13846cd7eb005e2f1b8441092f4f92a1e4cfea6c1bc84314f78ea023e10bec8e3d5712ca43336c090eed0073c7ed99ebbf5af5

memory/2096-82-0x0000000000400000-0x0000000000643000-memory.dmp

memory/2392-68-0x0000000000400000-0x000000000052D000-memory.dmp

memory/2096-85-0x0000000000400000-0x0000000000643000-memory.dmp

memory/2392-87-0x0000000000400000-0x000000000052D000-memory.dmp

memory/2096-83-0x0000000000400000-0x0000000000643000-memory.dmp

memory/2392-65-0x0000000000400000-0x000000000052D000-memory.dmp

memory/2392-63-0x0000000000400000-0x000000000052D000-memory.dmp

memory/2392-61-0x0000000000400000-0x000000000052D000-memory.dmp

memory/2392-59-0x0000000000400000-0x000000000052D000-memory.dmp

memory/2096-81-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2096-79-0x0000000000400000-0x0000000000643000-memory.dmp

memory/2096-77-0x0000000000400000-0x0000000000643000-memory.dmp

memory/2096-75-0x0000000000400000-0x0000000000643000-memory.dmp

memory/2096-73-0x0000000000400000-0x0000000000643000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000038001\6248e45db8.exe

MD5 278ee1426274818874556aa18fd02e3a
SHA1 185a2761330024dec52134df2c8388c461451acb
SHA256 37257ddb1a6f309a6e9d147b5fc2551a9cae3a0e52b191b18d9465bfcb5c18eb
SHA512 07ec6759af5b9a00d8371b9fd9b723012dd0a1614cfcc7cd51975a004f69ffb90083735e9a871a2aa0e8d28799beac53a4748f55f4dd1e7495bc7388ebf4d6a0

memory/2152-106-0x0000000000F20000-0x0000000001163000-memory.dmp

memory/2752-105-0x0000000006310000-0x0000000006553000-memory.dmp

memory/2752-104-0x0000000006310000-0x0000000006553000-memory.dmp

memory/2096-71-0x0000000000400000-0x0000000000643000-memory.dmp

memory/2392-57-0x0000000000400000-0x000000000052D000-memory.dmp

memory/2392-55-0x0000000000400000-0x000000000052D000-memory.dmp

memory/2392-70-0x0000000000400000-0x000000000052D000-memory.dmp

memory/2920-54-0x0000000001070000-0x00000000010A8000-memory.dmp

memory/2752-107-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2152-121-0x0000000000F20000-0x0000000001163000-memory.dmp

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\datareporting\glean\db\data.safe.bin

MD5 5ce5450eb3f6f7b893ca3af90b8a2f55
SHA1 b79cbdc1d98375a1265230ef9b0084cd4e8d397a
SHA256 2a3f66720ac3b435ddefa964ab7c77f80595d59b5721f811e72f9c44fdf5a620
SHA512 b9c5f924a930ddce5bbdb5862b2e334aac1970aa34b020a277e69a57ec5964e303d8719f2475c4eef854f2cc376cda06183e2e8bc8bc2e7cd5f9889e70a0aa8f

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\datareporting\glean\pending_pings\d8734416-49d6-4761-97e0-d9b49f662ff4

MD5 f98cfe508f8fd1e423f01bbf214d8254
SHA1 c0f9241472dd3bf9a5ddaf65ac50669d7b10ad36
SHA256 c520d5c41bb70d502e005dbb66838b54e358a5bc43f872f78efe044b978c702b
SHA512 7ffbfa148a8f2a9d550c2e4a8a7bcc29caf95d881f06f4f0d66e4d02a8f725434dcd324fef2231c785b578f3e51b68115f6eaca272f4e97051e60bbfec202913

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\datareporting\glean\pending_pings\c0e5bf59-b654-4272-ba5a-75ce3a6416ed

MD5 24fdc8adb44033ef59309d8517daa998
SHA1 7543acd0ba7fdbe77b2e69122c528e3d472e835d
SHA256 3a2cc9be936f234a3a6046a7590a84e121a3f0d9544dc1258f5e3b3d76ca4ad0
SHA512 9dd83b1414ce36b1322b6e3b20ae541b86f1f7dc0b5a87d15c5a98c14623606cdce52db8e033f7aa5f8897980227d2b57c2455f2a61b2eb4ed09b8b93b8149a0

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pzuz3epu.default-release\activity-stream.discovery_stream.json.tmp

MD5 8ba713c019c3e6204f11d97f67c932e6
SHA1 4bda135c4a7d79ec63ddba7b508a08861d1bec34
SHA256 bdca9d9638fabbf9f46621e366a969a731de5f1a7ae68c84137c271d761871d1
SHA512 9bdb2c13c2913f6c4ac0fe8beba31187cc6dff616334b392d69b4c972f22fc9f16760bb485d680f8fcb7b7875db1c824e286538c77fd7a1781a2f8b50138bf06

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\prefs.js

MD5 ccb69b53f45404a4a6dbc00fff6a913c
SHA1 4a10b9bce017c49f2190b9580567dc50e1cdbb7f
SHA256 cbedeb9816ff57659322bbb01b79b1dc9ad5be9dbe8e96eecfbbdee6674a3694
SHA512 6060c9b3fc66ae5c80629caac7a14d13da8b55c0c2c56e4a644265bd3b3c585c9d975ad49ef5676afc444bffb24ed641b418224f87c4a2352ac215aca5cce963

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

MD5 0d16b1f00813aefd08dccb17f4591ded
SHA1 82a3a2479fc30cc7fc0706d9544dcc7ae78f42f5
SHA256 6c6fd4242096c38f77948108ec0c14dba3e434704984cca72cb2b38065cd2a49
SHA512 c7b016d9cdca5514758ee9ad566f93dc737ab2fedf820a64e83e4b07a5f29724a9cbdba4eaee936de9ddbb8a3acf25d42c4e669affec72cfd059cc9cb30bf2d9

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\prefs.js

MD5 7a511c5620494ad350225dc5a702fd23
SHA1 5b58be9249dd373d728bf8298a34cb50c29727c9
SHA256 75a80f45192c685ec045ae6dfb9dbfdde3fff48433be8a6c7235115178beb964
SHA512 6a576f0729e53d14aa822c823996d47f8a98ef750282b3908b96b4c1ead512ee0e2e710893f7b8c18b143484956505ac60369b7281ca6d57118369ea5774e3d6

memory/2752-259-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-260-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-261-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-264-0x0000000000C30000-0x0000000001103000-memory.dmp

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\sessionstore-backups\recovery.jsonlz4

MD5 02fd592e055d40c6074e3c26a40e9f52
SHA1 d30203d2f3f284225f4a386df371033ea7692b92
SHA256 ae89b7a583510864f4b233f5bde2a4284a97bdb60bccf66516ab726376af16b1
SHA512 945fa16dabcc1d3a6a8626e45a11d35cbbccaea872c0871748858e790081c4c6bd0521a36026a19b155c587c23fd65d2d58fc71846532a3da7e661b648cb35a9

memory/2752-277-0x0000000000C30000-0x0000000001103000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpaddon

MD5 85430baed3398695717b0263807cf97c
SHA1 fffbee923cea216f50fce5d54219a188a5100f41
SHA256 a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA512 06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

MD5 fe3355639648c417e8307c6d051e3e37
SHA1 f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA256 1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA512 8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

MD5 3d33cdc0b3d281e67dd52e14435dd04f
SHA1 4db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256 f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512 a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\prefs-1.js

MD5 8841e5d8295be9f52ada890f6eb58e8b
SHA1 1971960d4c3bdf93515b2683a9a64307690a796c
SHA256 7d9223bea8330b03d86b2e5be6860d2e5ae19625232502eb70f0dcbb2e06ec5b
SHA512 32ff2a630b296667ecb5e6f2892e9fdde9e492c5179bf83bafd6d59f0ab5aecefe79b0d7ef20808641440fb9c397a3178f80e6d02206452b8421fccb5c3f6737

C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

MD5 a01c5ecd6108350ae23d2cddf0e77c17
SHA1 c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256 345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512 b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

MD5 49ddb419d96dceb9069018535fb2e2fc
SHA1 62aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA256 2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA512 48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

MD5 8be33af717bb1b67fbd61c3f4b807e9e
SHA1 7cf17656d174d951957ff36810e874a134dd49e0
SHA256 e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA512 6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

MD5 33bf7b0439480effb9fb212efce87b13
SHA1 cee50f2745edc6dc291887b6075ca64d716f495a
SHA256 8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512 d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

MD5 688bed3676d2104e7f17ae1cd2c59404
SHA1 952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA256 33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA512 7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

MD5 937326fead5fd401f6cca9118bd9ade9
SHA1 4526a57d4ae14ed29b37632c72aef3c408189d91
SHA256 68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512 b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

memory/2752-347-0x0000000000C30000-0x0000000001103000-memory.dmp

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\prefs-1.js

MD5 04953520e25e57bb5f1a37ddc65c24ab
SHA1 5d6a190bb36ea9b3ba7f1c28a3510022c1f2fa6f
SHA256 fd87713651b46ef745c16f1a23fed9f1185b531de9d0afca8c8ead6088a18c9c
SHA512 60fca57d2f7785799a6d45faf89f6cdd0965555806bcb675f66086a5c257326f81a12fe1f7632a79345947cda3d8e518e365a91f6f5a85cd17154a258a51e1b2

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\sessionstore-backups\recovery.jsonlz4

MD5 8bdd1d8116160391d9e712080f03bf7f
SHA1 82daa2f344a0e70f3a0a38abb585ca77135bac9a
SHA256 c5e2fa8f95799915f95338e487161eaf38b1ebdd7a2481de5cc1fe5979cbec00
SHA512 63276cc538c6def08ea89ca25104fdd4286bc912db7b6722e974cb942785a717a5be13e157888787b46aea2e365f2c87198cb6b0e7492411937280d99eedca7b

memory/2752-368-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-370-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-375-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-383-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-384-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-385-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-386-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-387-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-388-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-394-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-395-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-396-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-402-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-403-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-404-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-405-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-406-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-407-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-408-0x0000000000C30000-0x0000000001103000-memory.dmp

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\prefs-1.js

MD5 d45694868bb7e36696e8640c79320cb9
SHA1 207aaf53ac776da278f0bc140cc87c14d1d0000b
SHA256 4d1e25fe9476399a3660f65b974eb05eba9627611ed7558f995ce435d5e567f1
SHA512 3fd27707d6887af6b4d55cc57a62aede18b56c45c98d6d0f12c53910590714346add8ba245e33f4e5f12baabc185c76a0bd423576c2ccaed543f352df0bf33a4

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pzuz3epu.default-release\cache2\entries\5CD1EBDF6B57F13C7E783CE5E6D8E9C44014FE1A

MD5 cdd64195124a3d0885f9cfcc6c502962
SHA1 4988efe950a682a03c35d72e41db403f9c5408b4
SHA256 d558dbf51038b68f4c8306e2da707b3eaa132780e1a70264fa1908d804b5e8c1
SHA512 d80317e4fe7e16054d241db964e3e326c1664419428ba5591b3813f4a29a4394d744e46baac7bc7488558f6720943120b24854834d85a3b039401ab3e7c66418

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pzuz3epu.default-release\cache2\entries\E88F5F527BFA9DD5BD5AD69954319C352B17ED1A

MD5 588cb3d0084bf3dbb4be01cc9f3aafe9
SHA1 fe4a97b4eee91d5226322b242206934ff5d48a60
SHA256 103e7652273d09fb896a76b1bf7b7a962d5fa22676de995e625a928e7175a735
SHA512 5c9a7a126a05c217b429a72dea9f18a8452948e5b5d6483ab242f3242232eb6739b9ae75254b857fb2d99938c94ce146db197c74eb11e7ed847ccc392d2b0e11

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pzuz3epu.default-release\cache2\entries\037778A55E1B7E9BED3390289866D09402D6C913

MD5 9a123f3bd7cea774369ab164fea483e3
SHA1 00de891a59edf79b4bcabcba5431bdcad27fdc9a
SHA256 fd0a4aaf088050ba9d34874571e091416f8d44b1b4b39e95183be85a36dea5bd
SHA512 c104b5d52f0dba4aa5415c5225c8cf9f5ee9f91e80776a78d882d889b01bd124bacd0f49590feb03548c0551fcf12326fee63d112e58d2f535e6c699dc0ef37f

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pzuz3epu.default-release\cache2\entries\254256B27E0C48CF9B80B695F0B3B8CA84610495

MD5 32fcdf9f5d79ae3cca54a1e205cf3d54
SHA1 a02da20f949b392f742b1944ef1511257680ca23
SHA256 82309a24e30da8cddcf01dbd2ebc6c90c2ffcc2e2ba65607195d70bf2b0797ed
SHA512 48e0aecbac1e7ce198a8e365cec853a65667a6890fe81e482a293c6d5fc4ee9fe67ed519934a1eb4285f9c1dc6545e34632d807aeba11e8908bff22fd6672487

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pzuz3epu.default-release\cache2\entries\F210D48319A1879FD1C5213FA010C613B99BA085

MD5 2503e7ba385b525469127965e04481d5
SHA1 e4e83362bcd1caa56b81bcd7f01e0af34cd02749
SHA256 9197d6e13a47946b113f5899fce0f88837f9b21139c7448d726eb68425098b15
SHA512 7e59d2503f7df0abf9936128e88f8006e7eab136aa66539e487877ae4975904f3eb65a3908f42fe45a641e495547432ac5ad7ef1e4794354abd2780922545689

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pzuz3epu.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B

MD5 1acfba5160893aa485c71b7e785eab8f
SHA1 fa0b986290679eded4b5852f9aa071644aec6f91
SHA256 3b87dc00620fb14597852fc0b707b5fae083f34e28b0f39da0ebbb4518b98679
SHA512 358949815f9232275f8949814f9d6081f57efb805f97e031e188189cf7d9ab052e2c8dd84eb5b2f66144cb18596a348064b19e601d61fcab3ea2f2419495c8c8

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pzuz3epu.default-release\cache2\entries\099EB2BF8827A4F91EAB3E38B14650D0205226F2

MD5 f1314ca6181880404e01d1485e2e0065
SHA1 4e1a151bf23b3bf78ea2984ee44b0ea42c5335fb
SHA256 bfac508a211f43b874cc74147f7b25b9c246e257b332ad753a85d78bd3a3429b
SHA512 4d4a7b2eeae1497620e193d6242ced155af7aedc8a70f8cd560367f2e8fbdbfa5cc830bb5d45283e8bd1878e862132f38e6f5beed8fc0f159c17c9a98067def2

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pzuz3epu.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F

MD5 05cc3f2f388e8921c23f92582e9782c4
SHA1 29a18f95ba8df51ba922ed66f808915b4072251e
SHA256 f519e8b9a401a8105445e5574eee2f1e9ea034ed7e0c7137fe199924249fa608
SHA512 f3ae1826d409e3bb475f6bd177176895677866a076dac6b1efadef64fec466aa1f3e6b100bebb79586fccc28a05a52acd76088f77153eb0603b309e51fc54e9e

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\broadcast-listeners.json

MD5 72c95709e1a3b27919e13d28bbe8e8a2
SHA1 00892decbee63d627057730bfc0c6a4f13099ee4
SHA256 9cf589357fceea2f37cd1a925e5d33fd517a44d22a16c357f7fb5d4d187034aa
SHA512 613ca9dd2d12afe31fb2c4a8d9337eeecfb58dabaeaaba11404b9a736a4073dfd9b473ba27c1183d3cc91d5a9233a83dce5a135a81f755d978cea9e198209182

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\sessionCheckpoints.json

MD5 c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA1 5942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA256 00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA512 71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\targeting.snapshot.json

MD5 f20d4bd8059c8eab3ef2e90dd2b99608
SHA1 0f280b901a5322de4caf43c3c0189c16eb487579
SHA256 09f43fe6cabc5afd9c3822d988aab8a3244a2b32897f580829575aa5979a753a
SHA512 0184bd5c3ed6fd63a9456dce3dfb14062608133a5849590bb59bea72cae2e35048f514c4454810d104db5a678b06c79ceb4fa92da02c041c5933b6f92873f727

memory/2752-476-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-480-0x0000000000C30000-0x0000000001103000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms

MD5 cd85098395f4da8a14a8e9dbe37c534e
SHA1 1c6efd2a81b821cb7f10e7f0791ba29851a4d488
SHA256 de7d1ccf53b326b652fc8fef4e45691c434f45651cbcfc7fe858b8b8084917c2
SHA512 327dbf004da2058efdc2c59fb6dd6e533312a174b3987269e56834c7011f95439ed6846273a0c78b95606a7d05d7f4f223d4cc136f72041b08f0dae57b480370

memory/2752-489-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-490-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-491-0x0000000000C30000-0x0000000001103000-memory.dmp

memory/2752-496-0x0000000000C30000-0x0000000001103000-memory.dmp

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pzuz3epu.default-release\bookmarkbackups\bookmarks-2024-08-12_11_EejuE-rfbOdjQfRPO14-ew==.jsonlz4

MD5 067bcb44cde4efaf5434bcba139001a7
SHA1 fca9ab5c188f7ab7d9cc2558ac13f4b22b4a08c6
SHA256 19a88e6a2334c7a73ded85085bb404007dc641b7ca36eb99f54905621f9e621b
SHA512 e1928f47761af9a07703c5eb16e12d3c12b8cdff473712014ef062b85ecde4f6d1b6e5d9fc66a331ff38377d0bd8fcbae6cc99af50ff3af60853ca7bb19c4722

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-12 05:05

Reported

2024-08-12 05:11

Platform

win10-20240611-en

Max time kernel

296s

Max time network

266s

Command Line

"C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe"

Signatures

Amadey

trojan amadey

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\explorti.job C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe

"C:\Users\Admin\AppData\Local\Temp\98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247.exe"

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

Network

Country Destination Domain Proto
RU 185.215.113.19:80 185.215.113.19 tcp
US 8.8.8.8:53 19.113.215.185.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
RU 185.215.113.19:80 185.215.113.19 tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp

Files

memory/3708-0-0x00000000003D0000-0x00000000008A3000-memory.dmp

memory/3708-1-0x00000000776B4000-0x00000000776B5000-memory.dmp

memory/3708-2-0x00000000003D1000-0x00000000003FF000-memory.dmp

memory/3708-3-0x00000000003D0000-0x00000000008A3000-memory.dmp

memory/3708-4-0x00000000003D0000-0x00000000008A3000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

MD5 6c5e8693bc139c7fcf400a184ce74b6d
SHA1 c1af3ca004dc6158251db2e450a4b15eaa8469c7
SHA256 98ba4992b17d587790c5609bcd18fb2eb259ff3ae1c1759c729a33c71999a247
SHA512 03d6559539fd79c4410151b7569c4f407a99864e2d820389c4a114968bc11d193dd1f2e3775c668d0670534e35c68ff12384212b60efb57f29e23158ccd69dfb

memory/2532-14-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/3708-13-0x00000000003D0000-0x00000000008A3000-memory.dmp

memory/2532-16-0x0000000001211000-0x000000000123F000-memory.dmp

memory/2532-17-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-18-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-19-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-20-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-21-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-22-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-23-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-24-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-25-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-26-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-27-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/3404-30-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-31-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-32-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-33-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-34-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-35-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-36-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/4136-39-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-40-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-41-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-42-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-43-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-44-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-45-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/3524-48-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-49-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-50-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-51-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-52-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-53-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-54-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/4716-57-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-58-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-59-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-60-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-61-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-62-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/2532-63-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/3376-65-0x0000000001210000-0x00000000016E3000-memory.dmp

memory/3376-67-0x0000000001210000-0x00000000016E3000-memory.dmp