Analysis

  • max time kernel
    112s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 08:00

General

  • Target

    0341c85ca79dd94606a80b217ccb3e60N.exe

  • Size

    1.8MB

  • MD5

    0341c85ca79dd94606a80b217ccb3e60

  • SHA1

    8c62747c0170ffb2006b8152cde98bf254a685c4

  • SHA256

    d64d4f34e806bfe57f907f4576c7d79ca36abca05e3884b1f1006dc93f55f07a

  • SHA512

    afc2258f90fe4343f4af4a5d2f598958ccc83e6d58339693f9a0f03b3e31ce70ff3f9d927a4592c2e5537e2bd6bd7d0bf731efd5c56779a2378bf2676098ba91

  • SSDEEP

    49152:FcOtBefrOlh5FVPANGemCDzK4Z8E0i/ppkSR/8Y:FWfrOlXANGemwzKTYpOS

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

c7817d

C2

http://31.41.244.10

Attributes
  • install_dir

    0e8d0864aa

  • install_file

    svoutse.exe

  • strings_key

    5481b88a6ef75bcf21333988a4e47048

  • url_paths

    /Dem7kTu/index.php

rc4.plain

Extracted

Family

stealc

Botnet

nord

C2

http://185.215.113.100

Attributes
  • url_path

    /e2b1563c6670f193.php

Extracted

Family

stealc

Botnet

kora

C2

http://185.215.113.100

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 44 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0341c85ca79dd94606a80b217ccb3e60N.exe
    "C:\Users\Admin\AppData\Local\Temp\0341c85ca79dd94606a80b217ccb3e60N.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
      "C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Users\Admin\AppData\Local\Temp\1000009001\fd3a74ff76.exe
        "C:\Users\Admin\AppData\Local\Temp\1000009001\fd3a74ff76.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4980
      • C:\Users\Admin\1000010002\908143de99.exe
        "C:\Users\Admin\1000010002\908143de99.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4912
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1000011021\file.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:184
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /IM chrome.exe /F
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4728
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd"
          4⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:3468
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffcd73946f8,0x7ffcd7394708,0x7ffcd7394718
            5⤵
              PID:2916
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2622252182153447783,11827937068027435847,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:2
              5⤵
                PID:2696
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2622252182153447783,11827937068027435847,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3972
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2622252182153447783,11827937068027435847,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:8
                5⤵
                  PID:4808
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2622252182153447783,11827937068027435847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                  5⤵
                    PID:3064
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2622252182153447783,11827937068027435847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                    5⤵
                      PID:4468
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" "https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd"
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2384
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
                      5⤵
                      • Checks processor information in registry
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:3796
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1944 -parentBuildID 20240401114208 -prefsHandle 1860 -prefMapHandle 1852 -prefsLen 23602 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0a3f4c3-7f87-4236-a036-059db2f94f3c} 3796 "\\.\pipe\gecko-crash-server-pipe.3796" gpu
                        6⤵
                          PID:64
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2404 -prefMapHandle 2400 -prefsLen 24522 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f83daee-b217-4e71-9307-ede9bf034045} 3796 "\\.\pipe\gecko-crash-server-pipe.3796" socket
                          6⤵
                            PID:3472
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3100 -childID 1 -isForBrowser -prefsHandle 3012 -prefMapHandle 2788 -prefsLen 22590 -prefMapSize 244628 -jsInitHandle 1008 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd5ce51e-e5dd-4579-b770-ad1e1f305b0c} 3796 "\\.\pipe\gecko-crash-server-pipe.3796" tab
                            6⤵
                              PID:4804
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3676 -childID 2 -isForBrowser -prefsHandle 3668 -prefMapHandle 2780 -prefsLen 29012 -prefMapSize 244628 -jsInitHandle 1008 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e4c0c43-2874-48b1-91f2-c1b01983a00a} 3796 "\\.\pipe\gecko-crash-server-pipe.3796" tab
                              6⤵
                                PID:5168
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4584 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4572 -prefMapHandle 4568 -prefsLen 29012 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {132a7a0d-b8ab-452b-9b7f-e92240cf8fac} 3796 "\\.\pipe\gecko-crash-server-pipe.3796" utility
                                6⤵
                                • Checks processor information in registry
                                PID:5512
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5632 -childID 3 -isForBrowser -prefsHandle 5644 -prefMapHandle 5640 -prefsLen 26989 -prefMapSize 244628 -jsInitHandle 1008 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {08fdd654-aa19-41e6-8191-f62be6d4e893} 3796 "\\.\pipe\gecko-crash-server-pipe.3796" tab
                                6⤵
                                  PID:6020
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 4 -isForBrowser -prefsHandle 5588 -prefMapHandle 5572 -prefsLen 26989 -prefMapSize 244628 -jsInitHandle 1008 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b564e7df-877c-4bdf-8169-254be4ed6ba8} 3796 "\\.\pipe\gecko-crash-server-pipe.3796" tab
                                  6⤵
                                    PID:6076
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5852 -childID 5 -isForBrowser -prefsHandle 5932 -prefMapHandle 5928 -prefsLen 26989 -prefMapSize 244628 -jsInitHandle 1008 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {40197a0a-2eff-44c3-b810-bc99ef870371} 3796 "\\.\pipe\gecko-crash-server-pipe.3796" tab
                                    6⤵
                                      PID:6104
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6296 -childID 6 -isForBrowser -prefsHandle 6276 -prefMapHandle 6264 -prefsLen 27039 -prefMapSize 244628 -jsInitHandle 1008 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65d632aa-194b-42a5-8dd6-e3c4b678cacd} 3796 "\\.\pipe\gecko-crash-server-pipe.3796" tab
                                      6⤵
                                        PID:5448
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1876
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4760
                                • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                  C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:6996
                                • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                  C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:6600

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\1000010002\908143de99.exe

                                  Filesize

                                  187KB

                                  MD5

                                  278ee1426274818874556aa18fd02e3a

                                  SHA1

                                  185a2761330024dec52134df2c8388c461451acb

                                  SHA256

                                  37257ddb1a6f309a6e9d147b5fc2551a9cae3a0e52b191b18d9465bfcb5c18eb

                                  SHA512

                                  07ec6759af5b9a00d8371b9fd9b723012dd0a1614cfcc7cd51975a004f69ffb90083735e9a871a2aa0e8d28799beac53a4748f55f4dd1e7495bc7388ebf4d6a0

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  38f59a47b777f2fc52088e96ffb2baaf

                                  SHA1

                                  267224482588b41a96d813f6d9e9d924867062db

                                  SHA256

                                  13569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b

                                  SHA512

                                  4657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  ab8ce148cb7d44f709fb1c460d03e1b0

                                  SHA1

                                  44d15744015155f3e74580c93317e12d2cc0f859

                                  SHA256

                                  014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff

                                  SHA512

                                  f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  336B

                                  MD5

                                  b3ea07c486859af1e0a0a5eae697a1cf

                                  SHA1

                                  0af37ca489cd1a836fa1233a75985f3f8e4a91c7

                                  SHA256

                                  751533feca7533c99332a728caea391764ad51a5faf24ebb9b28560020948590

                                  SHA512

                                  d7e52a74d5575fbae939b43f57a788e4e78aee1c83acc10fb43947ce26a92ed317fd5b9c87148c83521046c7b94c33754f3400631f45db741ecf8d3e6ee3a6fb

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  70140552f2c709da0f41db66c7f34057

                                  SHA1

                                  8fde0b46b7a46544a3ecc1074d29cb0c7d11a6a2

                                  SHA256

                                  41e4bd39024078dbade0adef3e52689b5aec018749de108d9edad0600e604a24

                                  SHA512

                                  e185abc54fe4b7c8166426671a234ae2f37db56cb22b371132ea416f42f7f90d9ed2ac671a551cc81e499fdde9d519b50c39c9a445949e35f139699d7bf0453f

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  b450d37511e2e9ea369d7291aa0c5479

                                  SHA1

                                  091d95f53f6c03f418b3afe2cde3df356202095c

                                  SHA256

                                  3ab3c153e265d1606c2b7df72ebacc6b24b02a17684e16fdc3d746e2debc282e

                                  SHA512

                                  1d1676e56a1b97137bf3991dfd3b867786a8292bede7be1ee3e3758095b86e9bf532116639282d18a3daf46a3c7a82c60a20f38f022550961c8df8a5d3943906

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  4fd9d9291383d426214275c86703ae13

                                  SHA1

                                  23d747dd0d7bd9c6153aabb29e751c061eed31d6

                                  SHA256

                                  a026418a489092a0d9383612a65611d2a70dc0d0dd5603c09ccfb7c1ebd45ce6

                                  SHA512

                                  b12bb7e59bedf8193c31fc6f86a457c4f8eb76248a314677dd7c0c6cb0d3396a976ecf65bfcf7302c1f7d43da905eb57e9f0ee34de606408a808a72297edf593

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  b688da80e24b57f8721b221f1b7ccf8d

                                  SHA1

                                  70f30860efa7552c32efad653c90ffd7b9fa2f03

                                  SHA256

                                  c06ba1b7862458eeef7bd9a6b9fc5df59e7c2653c42dee0c98900eafd95b60f9

                                  SHA512

                                  3a552f0a7f2490ba1ade3ce687b758aac6160538bb40b9cce0c4f13601ee604513e967774ff22088f56b321eddcbd14077a281d1641ece2fa05b8e00da07cb4c

                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yaq795em.default-release\activity-stream.discovery_stream.json

                                  Filesize

                                  33KB

                                  MD5

                                  b84b15c6ce3a82ec31282dc5c30decaa

                                  SHA1

                                  b0b6621862f1b775cee20ea9eab191b72b33e2b0

                                  SHA256

                                  f0ca01154e1a8eb8b9e09477ab714852c9edcf0727b72bf1b63ff1c96c37b5db

                                  SHA512

                                  e37ef0bdffe234639e2c475e02b5f701ee488d50a539ccff6a13803d46db7f3e0e07fca4145cdd8a567869f3f67ce3c70606e29f06e9f1d4c8d152e0304d35d8

                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yaq795em.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B

                                  Filesize

                                  13KB

                                  MD5

                                  fc9a03aa55af2be3479a5eaa961cc577

                                  SHA1

                                  d0163768434dda02cc6cf8b547086a9a5180e495

                                  SHA256

                                  fc805c2dd6be188106a57519057a4eac7f74710f2de4d1ca513e24c469af3384

                                  SHA512

                                  acca808b7a231b27205728eac3dbc1da1dd899a70d3e648d81ebfc16993be547565e813eda1fa100b8fbe7ef398b18908c94931613ba0a1d1bc789d0e5e6639d

                                • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  0341c85ca79dd94606a80b217ccb3e60

                                  SHA1

                                  8c62747c0170ffb2006b8152cde98bf254a685c4

                                  SHA256

                                  d64d4f34e806bfe57f907f4576c7d79ca36abca05e3884b1f1006dc93f55f07a

                                  SHA512

                                  afc2258f90fe4343f4af4a5d2f598958ccc83e6d58339693f9a0f03b3e31ce70ff3f9d927a4592c2e5537e2bd6bd7d0bf731efd5c56779a2378bf2676098ba91

                                • C:\Users\Admin\AppData\Local\Temp\1000009001\fd3a74ff76.exe

                                  Filesize

                                  1.7MB

                                  MD5

                                  e07ec9b7af22f54b9929e5431a32dbab

                                  SHA1

                                  025d297ad5cf9d2e93a80e153cede621118a8152

                                  SHA256

                                  12847c870546d30d8992c191775c0e2ce051c7536edb0c9aacc86eecef2e1179

                                  SHA512

                                  b98f711e5c3b00f7e31b15ee51033cceae17e43a8acf40575e477aaf12417b1fea63a9ed18816278f18123e46b982c818e3c0b5d60aefec5699d66624dd45adc

                                • C:\Users\Admin\AppData\Local\Temp\1000011021\file.cmd

                                  Filesize

                                  2KB

                                  MD5

                                  2d52690f8f97f525409e6e2ffb0b8199

                                  SHA1

                                  cc61c9161a920526b71b5fd9221672401fe2dc9b

                                  SHA256

                                  acf10d95b975cf6c558ed179e61b2d6e3d207b09fc6a47bdfe0b1b7ade8a834e

                                  SHA512

                                  bdb5a23f341539bab37398ba984ca57036f7fb1240a079394a0d5b81851016f4cfb9b4b097634ae7f3838e35c69fdc3314eaf43e3cbf85201e3e0e23f612d59f

                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                  Filesize

                                  479KB

                                  MD5

                                  09372174e83dbbf696ee732fd2e875bb

                                  SHA1

                                  ba360186ba650a769f9303f48b7200fb5eaccee1

                                  SHA256

                                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                  SHA512

                                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                  Filesize

                                  13.8MB

                                  MD5

                                  0a8747a2ac9ac08ae9508f36c6d75692

                                  SHA1

                                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                                  SHA256

                                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                  SHA512

                                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\AlternateServices.bin

                                  Filesize

                                  10KB

                                  MD5

                                  0bdc939002a0966f1e5b6ea2eea63319

                                  SHA1

                                  25761515092c3dd8acf98ef4624b3c798cedbd3f

                                  SHA256

                                  8b8cc8d4cf2dc180632c5bd3e2268f2e2ea20f2ab21e7b55090cf320621e55f3

                                  SHA512

                                  0654ba7614361276bb3de8073ddcf693782869aec871b0db097e486dc5d09160c584a2e194ba79483355d1309a3f5dd2785fa72ee230d0c87b0d447fddecdbf2

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  5KB

                                  MD5

                                  31c3992f63a8069a2cfb1507044e012d

                                  SHA1

                                  6d8d05b6d2ee273db54435e88dfbd2b2ff569515

                                  SHA256

                                  7c57ed785f61e5faad9930cf7d22608ee83e1a0ea2b46230860b76a535728526

                                  SHA512

                                  053aa5e8c1b1026a9ba64a66b99fa68094f169b378e4744a9e64d86b331ed4dd0e1c5ff93bf668c0c7181b04501ba79ee56f27faade16541043d6733df1c0a38

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  15KB

                                  MD5

                                  c2a23084a4dc2a56f2d31b7e936052c8

                                  SHA1

                                  ccf200da3bcb6d730cee2cce8d103d6882662ab4

                                  SHA256

                                  c297a53e874a19b319d38011baeda90755d51df7516fd2155f4254ea2ce96b2d

                                  SHA512

                                  cc5b07f33d82b2743870c35fb93e19fdeafc265d3cb813eae1b9a624e42c47bf0cc349eab579dee4edff19f729f826a1761d4e86c1f2278fb62d771ab085e55c

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  6KB

                                  MD5

                                  51887d7c1e07dae14ac050304dc92e86

                                  SHA1

                                  86c5dd782037eb4592c27d8ba2fdf848974598b0

                                  SHA256

                                  a046ed5d745ce9c4b094c2e29e55b1240c2c9ad21857c67c3aac0c1893731134

                                  SHA512

                                  ff8d5ff2c5a0d56f06a4bd8d24de5f93cd99538dd9f29a45f214a671062fd33b9c3cd048c0304818771eb189073460cc1dcc55aba03b20992f20468a6421e0c9

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  15KB

                                  MD5

                                  1f4fab3e2ada603afd5f68ccfddaf590

                                  SHA1

                                  2469197aba923e8e2751570643a3dc9ee9686bd2

                                  SHA256

                                  6182c39815a0105dc24ee238b2ca1a1f23f7e27b50c5b19244661ec89c1e1478

                                  SHA512

                                  770ce906cc4ec82bf7bc0370654cfbb1bffe786d5691e7c419e15f40e59058202daa20e0d08d3dd85972c927cf1f1f1924476cfd454e3efd3992b706f7eb2176

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\datareporting\glean\db\data.safe.tmp

                                  Filesize

                                  6KB

                                  MD5

                                  45ac16d3cd89dd460c817e3ed7a7428a

                                  SHA1

                                  cb49fb75a92301a152d31fc49d29be6eb1b6ad7a

                                  SHA256

                                  5cc60e20d3cfcfd1954f5579e2df8d3822438eb8ebd88914a859522a2a328e4b

                                  SHA512

                                  d45a6d532056f69c38c0eb33a7dcc0e23e28f5b607c15c64d5d134bb6b519c9507cce137debf72c79e9441e272c7444577cd5e1d2418fc3384b43ad8cf9b1d47

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\datareporting\glean\pending_pings\3288faed-ea8a-4a07-a4b1-92d76f28e5b7

                                  Filesize

                                  26KB

                                  MD5

                                  d7424a8c162fa5c7489b29f47108b07b

                                  SHA1

                                  cf53c2884d3a26df880da407ea4a5b24a893264d

                                  SHA256

                                  4afc2d8a2c5a8c9a60d8d5597f7501870ae74dc86826da9f1ee1eb6b868dfd59

                                  SHA512

                                  e97a4f5864d4b4344f8e26da9e2d2c5224c8f74e95f742550d2bd30c91a9cabeab3cfb637a1c319ca295842692785f0d759049abd43a5cda7a9a9931ac4680f3

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\datareporting\glean\pending_pings\993188b8-aaf5-4267-97af-2f9f277a07e1

                                  Filesize

                                  671B

                                  MD5

                                  09946574e9e36ab98fe3123b2c3c415d

                                  SHA1

                                  07bc0dd0cf65cc70bc9bc4c9422cad50cc0fe9ae

                                  SHA256

                                  8f9a70b5200fe84e82cc9e636aa6fdd2cf38926579a3bc79bd4351dae0f5ef48

                                  SHA512

                                  ea2090e861dba976af241e601cb3a4321eec8d94321876cd4e53246589b48bdc30fe844b63845ec321aa86608e7bfab170adf0929b1470cf3ac0c26fdfa7996d

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\datareporting\glean\pending_pings\a71ac03e-c42b-4d8b-8edc-db4ebf6405b9

                                  Filesize

                                  982B

                                  MD5

                                  febd10994567226640e2b1ff9c32111e

                                  SHA1

                                  4703b6611efe22db4ecdd11ad10ea32dfc910c8c

                                  SHA256

                                  a2ca1ca1e88542d6e577c2e59d096c08b4704972d2f6d588aaf34229decea485

                                  SHA512

                                  46403780f68f2dc31de1807d4c95694f576ad53bdd3e0e5881fb84c91fd02e82627c2c2cddd129428732b1674d132f8cfd313ba24c3ad70c2ab324590bf98c4e

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                  Filesize

                                  1.1MB

                                  MD5

                                  842039753bf41fa5e11b3a1383061a87

                                  SHA1

                                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                  SHA256

                                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                  SHA512

                                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                  Filesize

                                  116B

                                  MD5

                                  2a461e9eb87fd1955cea740a3444ee7a

                                  SHA1

                                  b10755914c713f5a4677494dbe8a686ed458c3c5

                                  SHA256

                                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                  SHA512

                                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                  Filesize

                                  372B

                                  MD5

                                  bf957ad58b55f64219ab3f793e374316

                                  SHA1

                                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                  SHA256

                                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                  SHA512

                                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                  Filesize

                                  17.8MB

                                  MD5

                                  daf7ef3acccab478aaa7d6dc1c60f865

                                  SHA1

                                  f8246162b97ce4a945feced27b6ea114366ff2ad

                                  SHA256

                                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                  SHA512

                                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\prefs-1.js

                                  Filesize

                                  12KB

                                  MD5

                                  9f99371a3d613b9847c5b18d9805e20e

                                  SHA1

                                  d92e2bb84f9edd0b55277f91fd660259dea8eb53

                                  SHA256

                                  0e9bd0a74ce2aed432d5e100c794eb80358bba59bcd032d70759dca065cf8554

                                  SHA512

                                  9ef1b97812dedcf3995ef9dbaf64d5a5a6267c11ae629996425497d71bc59963be8b48fd5170c695e9b265209ef8d0b614fe1d5723b18b9f5a5ab2a547dd83e4

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\prefs-1.js

                                  Filesize

                                  16KB

                                  MD5

                                  f131b85d8664adfc1b39217fd8d8d57f

                                  SHA1

                                  52eb199b5d8d98ca7bd9024de4defae463ef3135

                                  SHA256

                                  b39d6fe8ec44e4665b5914a54c1bc1ff09e412f71ea2a095ebd3cc82acc320fc

                                  SHA512

                                  a36d76fa967213fd64215e9cda9703b4541f5a033048ad8e2ec71afa3468ace323cfa4e4de3a379428101f8eaa2b07eefa8f181792a0b7e14bd05eaa698fc204

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\prefs-1.js

                                  Filesize

                                  11KB

                                  MD5

                                  add04559bd1c3b9bd1ec2562b1683f77

                                  SHA1

                                  6e752462f3318d208082196d6cb21f0b13d36d96

                                  SHA256

                                  af37931b3ba8c544bfbf8ee7ed14b262e8d1270791e8998194f294d9df71b5ec

                                  SHA512

                                  150e30b782434e82bce64e5792d03539ddfc41e9e57d24c5c721024228f891bc088d943cab78747d1775cba75e2ab0a53e071e48a0fb546725df692a6174d67b

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\prefs.js

                                  Filesize

                                  11KB

                                  MD5

                                  debdb2e08a7b5cac83f88f3f8b096c98

                                  SHA1

                                  49bf1d7e7401b5e8986ffe9b03d02570470c265f

                                  SHA256

                                  efbbab5f33ce6410eaf04a24c7aee6ada76d23012633a4efec1e739f7b76e3da

                                  SHA512

                                  646b16b3f6fae4f5003b1b22b609813885166ae7b95479785d4848b0bfb8cd1ca7f90ce643f9a96d86b82dc30d8bba34f04a6f3b3fcc2d452006cb74059f0de0

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\sessionstore-backups\recovery.baklz4

                                  Filesize

                                  5KB

                                  MD5

                                  7aa569e33b0813b9254f7b75490116c2

                                  SHA1

                                  0b3f025fce21cb24a334e6cd695610533ecd48b3

                                  SHA256

                                  e0352b7bdbbb3f0050821b2e318226db16dc8365dacded0b21e6212a4805a190

                                  SHA512

                                  56d64e063c21f74c9db7e0a82934a56e17ae24db7fc6fe0f24dad7914f23de76afc7041db260821edc96f6c2b4d4cabd5464fd7fe1dac8a30658a327dd8d4b1d

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yaq795em.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                  Filesize

                                  1.5MB

                                  MD5

                                  91d41f64f4db33009dc210f0e88bdb80

                                  SHA1

                                  b26bf35d3d4c9421c463056fdcc6c363bb66d1c0

                                  SHA256

                                  52d5daa8353887680336c1db10e0198e187b35098f3a1aec37546ffe07b33f88

                                  SHA512

                                  e0db1e9ed9bb74fd0f083df437f5327495a1665eec65737fc3d7badaba0d4005dd39f15b3d34bcf0db2ee1a72b5de4abfcc588ddf7b4a2426c93b33f95820408

                                • memory/748-0-0x0000000000600000-0x0000000000AB2000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/748-1-0x0000000077214000-0x0000000077216000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/748-2-0x0000000000601000-0x000000000062F000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/748-3-0x0000000000600000-0x0000000000AB2000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/748-4-0x0000000000600000-0x0000000000AB2000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/748-18-0x0000000000600000-0x0000000000AB2000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-3204-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-464-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-3234-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-21-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-19-0x00000000007D1000-0x00000000007FF000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/1716-3230-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-20-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-16-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-3229-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-531-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-799-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-3228-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-405-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-3212-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-2332-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-3205-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1716-308-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/4912-57-0x00000000003F0000-0x0000000000633000-memory.dmp

                                  Filesize

                                  2.3MB

                                • memory/4912-56-0x00000000003F0000-0x0000000000633000-memory.dmp

                                  Filesize

                                  2.3MB

                                • memory/4980-38-0x0000000000220000-0x00000000008B1000-memory.dmp

                                  Filesize

                                  6.6MB

                                • memory/4980-48-0x0000000000220000-0x00000000008B1000-memory.dmp

                                  Filesize

                                  6.6MB

                                • memory/4980-39-0x0000000000220000-0x00000000008B1000-memory.dmp

                                  Filesize

                                  6.6MB

                                • memory/4980-37-0x0000000000220000-0x00000000008B1000-memory.dmp

                                  Filesize

                                  6.6MB

                                • memory/6600-3232-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/6600-3233-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/6996-3201-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/6996-3171-0x00000000007D0000-0x0000000000C82000-memory.dmp

                                  Filesize

                                  4.7MB