Analysis

  • max time kernel
    37s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 09:25

General

  • Target

    420a1ba2737e39704e52e1ea0c2494d8c232f10e2b40971923959da4708b3b0c.exe

  • Size

    1.8MB

  • MD5

    6e5042ff1ec6df9aee18f4eea7864524

  • SHA1

    19e4eaaec31c8512b191138a439b6c4c7ba73d18

  • SHA256

    420a1ba2737e39704e52e1ea0c2494d8c232f10e2b40971923959da4708b3b0c

  • SHA512

    ac5c8537bfd0a509ab49911cdf180778e9e47f9f9fb600933b2ba03f939f9bc9834db5a106840382ee648b289cddaf69b55cf969f51b9f89c49c678f1edc202c

  • SSDEEP

    49152:2M3rvEOaXgE3YC8ZtDYYuyVcBUpxOePEEmeweNX9:24E9QiYC2DYscuEEmdu

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

c7817d

C2

http://31.41.244.10

Attributes
  • install_dir

    0e8d0864aa

  • install_file

    svoutse.exe

  • strings_key

    5481b88a6ef75bcf21333988a4e47048

  • url_paths

    /Dem7kTu/index.php

rc4.plain

Extracted

Family

stealc

Botnet

nord

C2

http://185.215.113.100

Attributes
  • url_path

    /e2b1563c6670f193.php

Extracted

Family

stealc

Botnet

kora

C2

http://185.215.113.100

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\420a1ba2737e39704e52e1ea0c2494d8c232f10e2b40971923959da4708b3b0c.exe
    "C:\Users\Admin\AppData\Local\Temp\420a1ba2737e39704e52e1ea0c2494d8c232f10e2b40971923959da4708b3b0c.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
      "C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Users\Admin\AppData\Local\Temp\1000008001\0b5b4c70f5.exe
        "C:\Users\Admin\AppData\Local\Temp\1000008001\0b5b4c70f5.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1524
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CBB8.tmp\CBB9.tmp\CBBA.bat C:\Users\Admin\AppData\Local\Temp\1000008001\0b5b4c70f5.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1940
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd"
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2900
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d29758,0x7fef6d29768,0x7fef6d29778
              6⤵
                PID:1508
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1292,i,12879550814772009446,16367874235319083541,131072 /prefetch:2
                6⤵
                  PID:1532
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1420 --field-trial-handle=1292,i,12879550814772009446,16367874235319083541,131072 /prefetch:8
                  6⤵
                    PID:1552
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1292,i,12879550814772009446,16367874235319083541,131072 /prefetch:8
                    6⤵
                      PID:1776
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2308 --field-trial-handle=1292,i,12879550814772009446,16367874235319083541,131072 /prefetch:1
                      6⤵
                        PID:1748
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2072 --field-trial-handle=1292,i,12879550814772009446,16367874235319083541,131072 /prefetch:1
                        6⤵
                          PID:1640
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1292,i,12879550814772009446,16367874235319083541,131072 /prefetch:2
                          6⤵
                            PID:2620
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2768 --field-trial-handle=1292,i,12879550814772009446,16367874235319083541,131072 /prefetch:2
                            6⤵
                              PID:3084
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=1336 --field-trial-handle=1292,i,12879550814772009446,16367874235319083541,131072 /prefetch:1
                              6⤵
                                PID:3720
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3476 --field-trial-handle=1292,i,12879550814772009446,16367874235319083541,131072 /prefetch:8
                                6⤵
                                  PID:3636
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd"
                                5⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2836
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
                                  6⤵
                                  • Checks processor information in registry
                                  • Modifies registry class
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  • Suspicious use of WriteProcessMemory
                                  PID:1592
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1592.0.877836964\282689682" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3cef7731-dcc2-481b-8308-1272edcbc7c7} 1592 "\\.\pipe\gecko-crash-server-pipe.1592" 1288 119e0e58 gpu
                                    7⤵
                                      PID:2216
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1592.1.1479270709\335487793" -parentBuildID 20221007134813 -prefsHandle 1472 -prefMapHandle 1452 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0fddad07-3248-4524-b1c8-98d475e0a7c9} 1592 "\\.\pipe\gecko-crash-server-pipe.1592" 1484 11904458 socket
                                      7⤵
                                        PID:2588
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1592.2.1877373332\2022046723" -childID 1 -isForBrowser -prefsHandle 2060 -prefMapHandle 2056 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 820 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {16b7bf3f-0e83-4a7d-92bd-4fc4aa0f3caa} 1592 "\\.\pipe\gecko-crash-server-pipe.1592" 2072 1195be58 tab
                                        7⤵
                                          PID:1600
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1592.3.1375860229\593390975" -childID 2 -isForBrowser -prefsHandle 2576 -prefMapHandle 2568 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 820 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e4263291-4d52-46ce-89e0-fd89ccbdc7a4} 1592 "\\.\pipe\gecko-crash-server-pipe.1592" 2588 d63b58 tab
                                          7⤵
                                            PID:2976
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1592.4.496689991\2018857780" -childID 3 -isForBrowser -prefsHandle 3768 -prefMapHandle 3512 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 820 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a521a72-63b9-46a4-8d5b-79582c4534fd} 1592 "\\.\pipe\gecko-crash-server-pipe.1592" 3780 1fbede58 tab
                                            7⤵
                                              PID:3744
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1592.5.1696513801\1879106657" -childID 4 -isForBrowser -prefsHandle 3888 -prefMapHandle 3892 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 820 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc9bb62a-0e49-4352-86a5-3614ed17b4b2} 1592 "\\.\pipe\gecko-crash-server-pipe.1592" 3876 202b0958 tab
                                              7⤵
                                                PID:3752
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1592.6.1776766565\317196131" -childID 5 -isForBrowser -prefsHandle 4052 -prefMapHandle 4056 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 820 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7472ca47-c98d-4b1d-843c-e6c96246897b} 1592 "\\.\pipe\gecko-crash-server-pipe.1592" 4040 202afd58 tab
                                                7⤵
                                                  PID:3772
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1592.7.720584269\174879338" -childID 6 -isForBrowser -prefsHandle 3920 -prefMapHandle 3620 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 820 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {03814a44-860e-4b6c-b6e2-ce0ad5d00c14} 1592 "\\.\pipe\gecko-crash-server-pipe.1592" 3932 1dd42b58 tab
                                                  7⤵
                                                    PID:3900
                                          • C:\Users\Admin\AppData\Local\Temp\1000009001\0adf852914.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000009001\0adf852914.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            PID:3060
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3464
                                          • C:\Users\Admin\1000010002\5fe1842881.exe
                                            "C:\Users\Admin\1000010002\5fe1842881.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:3672
                                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                        1⤵
                                          PID:1688

                                        Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\1000010002\5fe1842881.exe

                                                Filesize

                                                187KB

                                                MD5

                                                278ee1426274818874556aa18fd02e3a

                                                SHA1

                                                185a2761330024dec52134df2c8388c461451acb

                                                SHA256

                                                37257ddb1a6f309a6e9d147b5fc2551a9cae3a0e52b191b18d9465bfcb5c18eb

                                                SHA512

                                                07ec6759af5b9a00d8371b9fd9b723012dd0a1614cfcc7cd51975a004f69ffb90083735e9a871a2aa0e8d28799beac53a4748f55f4dd1e7495bc7388ebf4d6a0

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                Filesize

                                                264KB

                                                MD5

                                                f50f89a0a91564d0b8a211f8921aa7de

                                                SHA1

                                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                SHA256

                                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                SHA512

                                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                Filesize

                                                1KB

                                                MD5

                                                07072522c8a314389333f8d5429a78f0

                                                SHA1

                                                70251328bba536f5dd3f00d687138724b9066769

                                                SHA256

                                                551b9f0c792e01686f319363aa534fabbc139bc2fd9536d4c54b38468719da83

                                                SHA512

                                                4477ca84427f75973af93bcff9f808fe6b0c78a13af91af084526f6d284d74c33a99bdfe45c280e82fd3d6b55aa844f232cbdd7873a05db1bd78a737357a8b8b

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                Filesize

                                                363B

                                                MD5

                                                f9bae68e34c0ad2b07dcbc81d86019da

                                                SHA1

                                                b82a6d045f05e6b7cd30d7c1847f9880ae3658a2

                                                SHA256

                                                5f7b494b17639042806f1cd5939b4b4dad3a2b8fb1980ccd30f1ee380393956c

                                                SHA512

                                                821eee39880d51b44ac5fd0c6914a291a9ccc673935e2ba98f1d19764dec6a77e0df2ec6570e3ce1ff8f6279b0a4531404d934c7755019bbc4df7278a2dc75e8

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                4a3dc6056db10a050a8a85b8bd9b9c4f

                                                SHA1

                                                0eba5eb98f69caf4a5b056e8c80a34dbc2192cf1

                                                SHA256

                                                c9f2268130d76a36967ce632ec3c894d2460d2d8cd5bb461c58c57950ab06574

                                                SHA512

                                                9ca572708ccb8b3174d6b11986ac263c4d36d7d92afe41a8abdc77cc10de0436b883b29444388582dc2daeaac5e26de2728f23a63888c3800472d0afa9dffe6d

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                90a2f9e19e6d586f1742206b77f91b54

                                                SHA1

                                                a51dea9b689b730221998bc822b27831ed25583f

                                                SHA256

                                                687c23b59a29cd20d6262e52c7d4f127b499d4f9cc153ee7ea3860ae351784c5

                                                SHA512

                                                2b49cfd473aa7e33f001b3ed237e5541c826fd2a4341d499b86378409695540f7d408e7f97d3105f5bcdc6bf9bd7088fa11f971d234215feb453327de3c03580

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                                Filesize

                                                16B

                                                MD5

                                                18e723571b00fb1694a3bad6c78e4054

                                                SHA1

                                                afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                SHA256

                                                8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                SHA512

                                                43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\activity-stream.discovery_stream.json.tmp

                                                Filesize

                                                40KB

                                                MD5

                                                2135961156b748e24bb3f24706883b1e

                                                SHA1

                                                d70b653d89d07e7685265d52d509b87cb7647ae4

                                                SHA256

                                                d65e299c24aedfafe6b35ebbe5374c82ad31f443a95adc91d16f80dfb2f7be06

                                                SHA512

                                                16c2450efc2bedb32408705f19e33fb6166a5c7b64ec59f4cae558a4538e6113f6079f7bd34d2f7cd09ae6776bad02158d7a805e6d0db6d9d341ef2510590e01

                                              • C:\Users\Admin\AppData\Local\Temp\1000008001\0b5b4c70f5.exe

                                                Filesize

                                                89KB

                                                MD5

                                                756e102f825f638385a1ec3652879887

                                                SHA1

                                                037b387d67f9b7dafd20066a327842c9d318396f

                                                SHA256

                                                99e372d6f076aa4cdd7253b826fa64ae56489c94c47b6dac36caed7c2cfaeee7

                                                SHA512

                                                436f8e5e92033e0e7433836531cc31ec61566ad5ec54a73f753901e3050063d2d831726c9b4fc3259e43adb8a216126f8bacb96b98cf18795ab2d10c2c706c42

                                              • C:\Users\Admin\AppData\Local\Temp\1000009001\0adf852914.exe

                                                Filesize

                                                206KB

                                                MD5

                                                1cb6cd3065a063cd37b26c9b5bd041c8

                                                SHA1

                                                41ed2908e22e291dfdab57f71fd98451e49f9ada

                                                SHA256

                                                748e5bcfd362774e0376d3eb001fda29367d859dddcc193cf567230380e4ee71

                                                SHA512

                                                6444abb6ecb165923aa6a9f2bc4602785d3fcbf1803607cd7d85f1cf12f13fdddead4ee5fdb378f9a76bf1d1f2fdf6e59c66cbaace10c1554c1109e480c6d69a

                                              • C:\Users\Admin\AppData\Local\Temp\CBB8.tmp\CBB9.tmp\CBBA.bat

                                                Filesize

                                                2KB

                                                MD5

                                                31c09b550c61042384ef240a1cd226df

                                                SHA1

                                                731fbe63179f646915f8fa37ca9f8c85fdb9b48a

                                                SHA256

                                                752a176e12900c9f3cf947bc36d506e360f86da00a2dbc1e5fa821f2584c75db

                                                SHA512

                                                8fcd654736e4b71765b5379c6e1699771e83c5c1df1b5e3fa7f74e4d3b5629ffa1f54aaedfdf9979416d3704bcfb38d73dba7c36c7b6f1ac9804737e7af698a6

                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                Filesize

                                                442KB

                                                MD5

                                                85430baed3398695717b0263807cf97c

                                                SHA1

                                                fffbee923cea216f50fce5d54219a188a5100f41

                                                SHA256

                                                a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                SHA512

                                                06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                Filesize

                                                8.0MB

                                                MD5

                                                a01c5ecd6108350ae23d2cddf0e77c17

                                                SHA1

                                                c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                SHA256

                                                345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                SHA512

                                                b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\datareporting\glean\db\data.safe.bin

                                                Filesize

                                                2KB

                                                MD5

                                                55a9d2af4d0ba1d10edb17d595cc0205

                                                SHA1

                                                7f116167440cdcc85f156b39c9c216f99c035892

                                                SHA256

                                                ae6065db88cf38c11fbbeaac425a51ac444b886f3cf76f259b5144f1a43bf7b7

                                                SHA512

                                                cd51d5d6cc0349f35d1e2183c8b2af9065c241232a8ac6287393b7e6ff89c4e5eb582a6e6171768d6a2402c5dde7373d8d72820bb0365f3f983303c4f85c3f33

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\datareporting\glean\pending_pings\3b66fdc4-7f89-425b-8d24-8c570f7d5c1d

                                                Filesize

                                                745B

                                                MD5

                                                0a3673a48ac809d19958c1b83500aa61

                                                SHA1

                                                e8fe7dc32de0709e9873fba8c431eadf6c3c7c22

                                                SHA256

                                                c128d6af42998e9254f71e68c9d8ff8aa46100dc46946b7bc375c0c9c80ce363

                                                SHA512

                                                d290b7bd7f49177118ac92c3c641be0d3dcac544e589e3480026a2f8a97fc5bbed4cac9ecb1d30ab51d415b0437ee842e3ade077c2c1db6402e1bfbb42272fe2

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\datareporting\glean\pending_pings\fc09097f-8a5f-4a5b-994f-e02573d54b5a

                                                Filesize

                                                12KB

                                                MD5

                                                b6eeafbaffed8ed0fc757c285a733134

                                                SHA1

                                                3108db7a36d11d0e3b80cae7a50ab3e8bbd98abc

                                                SHA256

                                                a7c1f07415d6bb51c077ee4ebee6372e669d5d80b54519cdfce7a3f21184595e

                                                SHA512

                                                ecdc21532881ca8303e09891f76a2dd590f8144d5341ff0bada60f4bea04dc43e2dca6a3129b30aff84cdc22462465019407cef7ddbc2df2d1aa2f8e616baa26

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                Filesize

                                                997KB

                                                MD5

                                                fe3355639648c417e8307c6d051e3e37

                                                SHA1

                                                f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                SHA256

                                                1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                SHA512

                                                8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                Filesize

                                                116B

                                                MD5

                                                3d33cdc0b3d281e67dd52e14435dd04f

                                                SHA1

                                                4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                SHA256

                                                f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                SHA512

                                                a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                Filesize

                                                479B

                                                MD5

                                                49ddb419d96dceb9069018535fb2e2fc

                                                SHA1

                                                62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                SHA256

                                                2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                SHA512

                                                48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                Filesize

                                                372B

                                                MD5

                                                8be33af717bb1b67fbd61c3f4b807e9e

                                                SHA1

                                                7cf17656d174d951957ff36810e874a134dd49e0

                                                SHA256

                                                e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                SHA512

                                                6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                Filesize

                                                11.8MB

                                                MD5

                                                33bf7b0439480effb9fb212efce87b13

                                                SHA1

                                                cee50f2745edc6dc291887b6075ca64d716f495a

                                                SHA256

                                                8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                SHA512

                                                d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                Filesize

                                                1KB

                                                MD5

                                                688bed3676d2104e7f17ae1cd2c59404

                                                SHA1

                                                952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                SHA256

                                                33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                SHA512

                                                7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                Filesize

                                                1KB

                                                MD5

                                                937326fead5fd401f6cca9118bd9ade9

                                                SHA1

                                                4526a57d4ae14ed29b37632c72aef3c408189d91

                                                SHA256

                                                68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                SHA512

                                                b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\prefs-1.js

                                                Filesize

                                                6KB

                                                MD5

                                                273e95cece6feae83e5887b2f4e8a2e2

                                                SHA1

                                                cdc279a1507dc203b92cd6d6a8ab0ee3e2ec50cb

                                                SHA256

                                                6e9a380d38c89086c0917959b6a2b4fcfd1c9d84e8203f845cc8544d497f4b2f

                                                SHA512

                                                6346ad4e1c936475fb088615757901708a117dbbcc4500361df336dcab968a709a13c415f4d35a934966e254caa386a17b5ece23b8cb4984870f00d15ea3f9b1

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\prefs-1.js

                                                Filesize

                                                7KB

                                                MD5

                                                2a4dbdb5f2c802a3f848712fc7a6674b

                                                SHA1

                                                12be569ce0fa0565cbbc29624e4f4f00ab0bb58f

                                                SHA256

                                                b95b3e3f9a4729ed543ed6fb2ecc9d40e95de0b79c6b2f163d5bee4428dc30c1

                                                SHA512

                                                12761acf72a58f01c91dbd7ca4e303e134a7d302e88408a481906e7ccdd0b0b85a61238a709fd65615210073c38934aba6e6d4781f07e6ada18f78f1d34815cb

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\prefs-1.js

                                                Filesize

                                                7KB

                                                MD5

                                                470a30468169f5cf4ff3855016a894b1

                                                SHA1

                                                30ea1b7247630c4473fa25131dd0b749cc0cfa6c

                                                SHA256

                                                9c74f0b3d145fb9344e2d3768d02b1d84a6d66c2f6a4e2ee43bd371941180bf2

                                                SHA512

                                                4362ee55f5542345f012eac307d08e5b92828068b6762c85e5cab3e36a6ce926405383f30451992b1dbffe872feabc29bdf5fef59b5f47b7fc838b62dd30349d

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\prefs.js

                                                Filesize

                                                6KB

                                                MD5

                                                ea704b814fdc333d754fb6a5b23ca58a

                                                SHA1

                                                07c3cbc964622405c4e74454aa34aa302000dfb8

                                                SHA256

                                                ca7ba46115d4d2e8027709acdd8eb3fe08a7749bdf54f2af3bac23fdc9371b7f

                                                SHA512

                                                454e2c5c388aa2442777f0f8fbce384072735e02290455c6ce50b7382d2e07ad2880b9f0a090ef3f51967cf0b44e453cd07c94ecdb5f64aa0a08d179c370a078

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\sessionstore-backups\recovery.jsonlz4

                                                Filesize

                                                4KB

                                                MD5

                                                85b69442650f54fd7b369b0e80cc0301

                                                SHA1

                                                345d17bac5670c8b28387dcd4732348fb6aba02e

                                                SHA256

                                                488708b599287a9685dbb7ec1b7b5a82e03089b8db59b7ba92f2b1c02c68858b

                                                SHA512

                                                ee47b79c993cfdbe2fd28123bdfa3f70383629a8e3ba401766f42ddd0983fff3f0939a6ae2c0f1c92c08a3d3d1830e2c2aaaf1b489a8898484e804c7821bc562

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9tg2k5l8.default-release\sessionstore-backups\recovery.jsonlz4

                                                Filesize

                                                4KB

                                                MD5

                                                235c4f0b92be843e0b3406f06ca88158

                                                SHA1

                                                30df13152dbc97d0231b335814a8830d69f2cb3f

                                                SHA256

                                                5637183070a319222d49d3d38e47728b019c2863cbf5ecad6cb689f3c2cb2c1a

                                                SHA512

                                                d4bcc14c4ca60e75bed4c768c7d8477565c832cb9455ff3684fed587a2fde8819d1829bda84894eb814a6cf5c07f3484440857dab1b640a508cb708022cfc742

                                              • \Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

                                                Filesize

                                                1.8MB

                                                MD5

                                                6e5042ff1ec6df9aee18f4eea7864524

                                                SHA1

                                                19e4eaaec31c8512b191138a439b6c4c7ba73d18

                                                SHA256

                                                420a1ba2737e39704e52e1ea0c2494d8c232f10e2b40971923959da4708b3b0c

                                                SHA512

                                                ac5c8537bfd0a509ab49911cdf180778e9e47f9f9fb600933b2ba03f939f9bc9834db5a106840382ee648b289cddaf69b55cf969f51b9f89c49c678f1edc202c

                                              • memory/2056-1-0x0000000077680000-0x0000000077682000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/2056-2-0x0000000000871000-0x000000000089F000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/2056-16-0x0000000006D20000-0x00000000071DF000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2056-13-0x0000000000870000-0x0000000000D2F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2056-5-0x0000000000870000-0x0000000000D2F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2056-3-0x0000000000870000-0x0000000000D2F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2056-0-0x0000000000870000-0x0000000000D2F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-118-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-494-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-17-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-243-0x0000000006240000-0x0000000006483000-memory.dmp

                                                Filesize

                                                2.3MB

                                              • memory/2712-229-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-503-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-338-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-230-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-348-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-233-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-502-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-496-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-495-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-19-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-493-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-491-0x0000000006240000-0x0000000006483000-memory.dmp

                                                Filesize

                                                2.3MB

                                              • memory/2712-492-0x0000000006240000-0x0000000006483000-memory.dmp

                                                Filesize

                                                2.3MB

                                              • memory/2712-18-0x00000000009C1000-0x00000000009EF000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/2712-483-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-241-0x0000000006240000-0x0000000006483000-memory.dmp

                                                Filesize

                                                2.3MB

                                              • memory/2712-22-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-447-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-21-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-456-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-457-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2712-469-0x00000000009C0000-0x0000000000E7F000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/3060-117-0x0000000000980000-0x00000000009B8000-memory.dmp

                                                Filesize

                                                224KB

                                              • memory/3464-195-0x0000000000400000-0x0000000000643000-memory.dmp

                                                Filesize

                                                2.3MB

                                              • memory/3464-210-0x0000000000400000-0x0000000000643000-memory.dmp

                                                Filesize

                                                2.3MB

                                              • memory/3464-207-0x0000000000400000-0x0000000000643000-memory.dmp

                                                Filesize

                                                2.3MB

                                              • memory/3464-206-0x0000000000400000-0x0000000000643000-memory.dmp

                                                Filesize

                                                2.3MB

                                              • memory/3464-205-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/3464-203-0x0000000000400000-0x0000000000643000-memory.dmp

                                                Filesize

                                                2.3MB

                                              • memory/3464-201-0x0000000000400000-0x0000000000643000-memory.dmp

                                                Filesize

                                                2.3MB

                                              • memory/3464-199-0x0000000000400000-0x0000000000643000-memory.dmp

                                                Filesize

                                                2.3MB

                                              • memory/3464-197-0x0000000000400000-0x0000000000643000-memory.dmp

                                                Filesize

                                                2.3MB

                                              • memory/3672-317-0x0000000000E40000-0x0000000001083000-memory.dmp

                                                Filesize

                                                2.3MB

                                              • memory/3672-244-0x0000000000E40000-0x0000000001083000-memory.dmp

                                                Filesize

                                                2.3MB