Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 12:34

General

  • Target

    d9c0e7625329b9c334c1e7b651705092b952f9380d9f57d1c6bae5ca947f33d7.exe

  • Size

    1.9MB

  • MD5

    fdcd8bbf65e17d1bbbe56d9f2ff603e3

  • SHA1

    70d11950aafc98b3a18b6ca3088f228fc4291078

  • SHA256

    d9c0e7625329b9c334c1e7b651705092b952f9380d9f57d1c6bae5ca947f33d7

  • SHA512

    e8ec0edb5b812c7860d10f83e56b379e3621832d955535e88bebb3034cb7af954807e1be90ac4f3c9232451ac36d24a4f4658fae3cbb9d406dfc4bcc051631cd

  • SSDEEP

    49152:mYOoJgl+634bx5gDZZZiq1YabN3PHbkf39fk1nW5/o:wonviriqyy1HilkY5

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

c7817d

C2

http://31.41.244.10

Attributes
  • install_dir

    0e8d0864aa

  • install_file

    svoutse.exe

  • strings_key

    5481b88a6ef75bcf21333988a4e47048

  • url_paths

    /Dem7kTu/index.php

rc4.plain

Extracted

Family

stealc

Botnet

leva

C2

http://185.215.113.100

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9c0e7625329b9c334c1e7b651705092b952f9380d9f57d1c6bae5ca947f33d7.exe
    "C:\Users\Admin\AppData\Local\Temp\d9c0e7625329b9c334c1e7b651705092b952f9380d9f57d1c6bae5ca947f33d7.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3320
    • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
      "C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4768
      • C:\Users\Admin\AppData\Roaming\1000026000\65c5362aea.exe
        "C:\Users\Admin\AppData\Roaming\1000026000\65c5362aea.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1956
      • C:\Users\Admin\AppData\Local\Temp\1000029001\1e80160c30.exe
        "C:\Users\Admin\AppData\Local\Temp\1000029001\1e80160c30.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3884
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
          4⤵
            PID:3624
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2372
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4508
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d0cc1fa-e0b5-444e-a199-79c7ceff217a} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" gpu
                6⤵
                  PID:4064
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2472 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7de04ef-742a-447a-82d7-e41cdc9e3f0a} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" socket
                  6⤵
                    PID:720
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3324 -childID 1 -isForBrowser -prefsHandle 2988 -prefMapHandle 3276 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {920fa0f9-6857-4bdf-83bf-83590de2f68c} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" tab
                    6⤵
                      PID:5536
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3888 -childID 2 -isForBrowser -prefsHandle 3112 -prefMapHandle 1276 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {217babe1-ea83-4c96-9690-714df851db65} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" tab
                      6⤵
                        PID:5856
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4748 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4708 -prefMapHandle 4728 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3001c4e9-9657-4426-a23c-d37d5a40aab2} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" utility
                        6⤵
                        • Checks processor information in registry
                        PID:6204
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5044 -childID 3 -isForBrowser -prefsHandle 5088 -prefMapHandle 5084 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f000e15c-31ba-433a-ae91-4fbab3f2dead} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" tab
                        6⤵
                          PID:6512
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5276 -childID 4 -isForBrowser -prefsHandle 5256 -prefMapHandle 5260 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e4fea3d-a5dc-4866-879e-6270e4626d61} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" tab
                          6⤵
                            PID:6524
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5460 -childID 5 -isForBrowser -prefsHandle 4860 -prefMapHandle 4668 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8c9563d-1107-413b-9fbe-1006f33abc21} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" tab
                            6⤵
                              PID:6560
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6280 -childID 6 -isForBrowser -prefsHandle 6292 -prefMapHandle 6296 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cdcfb746-20a1-44e3-a1ad-878996063243} 4508 "\\.\pipe\gecko-crash-server-pipe.4508" tab
                              6⤵
                                PID:5508
                        • C:\Users\Admin\AppData\Local\Temp\1000030001\295ead7edd.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000030001\295ead7edd.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2352
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1020,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=4068 /prefetch:8
                      1⤵
                        PID:5012
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4988,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=5044 /prefetch:1
                        1⤵
                          PID:1816
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=4252,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=5276 /prefetch:1
                          1⤵
                            PID:2420
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5516,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=5556 /prefetch:8
                            1⤵
                              PID:4868
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --field-trial-handle=5824,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=5820 /prefetch:1
                              1⤵
                                PID:5216
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --field-trial-handle=6052,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=6092 /prefetch:8
                                1⤵
                                  PID:5432
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --field-trial-handle=6064,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=6112 /prefetch:8
                                  1⤵
                                  • Modifies registry class
                                  PID:5440
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=6080,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=6292 /prefetch:8
                                  1⤵
                                    PID:5448
                                  • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                    C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:6288
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=6576,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=5588 /prefetch:8
                                    1⤵
                                      PID:5420
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=6316,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=6488 /prefetch:8
                                      1⤵
                                        PID:5244
                                      • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                        C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:6508
                                      • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                        C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:6796

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmd08l7e.default-release\cache2\entries\58EFA56DB4BFFECB0EDA547894BC9A057159E22F

                                        Filesize

                                        13KB

                                        MD5

                                        b6e26f2c1933db4b857bb86ce8c778d0

                                        SHA1

                                        d0c8efd396fae4bceebd0343e9115bd9a4f02e6e

                                        SHA256

                                        f66704209cecc4c859205d80d30d83c444806b6b39a946bf90bb9e49c28dff69

                                        SHA512

                                        3ca5c696347b1ba26379bd36c92a6850a67b034318f15d9a1063ae2103b7094e85ae9b8341010884980531fdb1a144e8a8dc11fe1f6f29dc04856c1d39fa322f

                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmd08l7e.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                        Filesize

                                        7KB

                                        MD5

                                        c460716b62456449360b23cf5663f275

                                        SHA1

                                        06573a83d88286153066bae7062cc9300e567d92

                                        SHA256

                                        0ec0f16f92d876a9c1140d4c11e2b346a9292984d9a854360e54e99fdcd99cc0

                                        SHA512

                                        476bc3a333aace4c75d9a971ef202d5889561e10d237792ca89f8d379280262ce98cf3d4728460696f8d7ff429a508237764bf4a9ccb59fd615aee07bdcadf30

                                      • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

                                        Filesize

                                        1.9MB

                                        MD5

                                        fdcd8bbf65e17d1bbbe56d9f2ff603e3

                                        SHA1

                                        70d11950aafc98b3a18b6ca3088f228fc4291078

                                        SHA256

                                        d9c0e7625329b9c334c1e7b651705092b952f9380d9f57d1c6bae5ca947f33d7

                                        SHA512

                                        e8ec0edb5b812c7860d10f83e56b379e3621832d955535e88bebb3034cb7af954807e1be90ac4f3c9232451ac36d24a4f4658fae3cbb9d406dfc4bcc051631cd

                                      • C:\Users\Admin\AppData\Local\Temp\1000029001\1e80160c30.exe

                                        Filesize

                                        896KB

                                        MD5

                                        9174e680d1b0ea8cdb3ee932ec2dfc6f

                                        SHA1

                                        49ba7df579d1b30e9c4474ba6733748614ab5c68

                                        SHA256

                                        136d5473ded4b9a2bef3ef6160a377c0965b4e7292fb81980219ef8cc7d96cfd

                                        SHA512

                                        de67a3bbe4a4ebe5bce9e039d9a111ad65885baeb0a8da3412bf8694d1bbfddf39d2175478e69ae36395d5f550c457c899582d7388c0c1a39c0094c3de1f1d0a

                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                        Filesize

                                        479KB

                                        MD5

                                        09372174e83dbbf696ee732fd2e875bb

                                        SHA1

                                        ba360186ba650a769f9303f48b7200fb5eaccee1

                                        SHA256

                                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                        SHA512

                                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                        Filesize

                                        13.8MB

                                        MD5

                                        0a8747a2ac9ac08ae9508f36c6d75692

                                        SHA1

                                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                                        SHA256

                                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                        SHA512

                                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                      • C:\Users\Admin\AppData\Roaming\1000026000\65c5362aea.exe

                                        Filesize

                                        1.7MB

                                        MD5

                                        61a83d27f9373c43a548ccee926bdba9

                                        SHA1

                                        dceaa00791bf48e192755ff66925a9dc226bdbe9

                                        SHA256

                                        488a3eb3efaf19a0eee8131c369c47d7efd0a7e33bbf2262173a61438b471b9f

                                        SHA512

                                        86b5151809ad4e05837eac1d34109d7f287f5b01a65fe747f8b93de1dd133e9fa6904ea935555744bbcce89920bac9fdb9ef10596c0066015c34ca901528a17b

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\AlternateServices.bin

                                        Filesize

                                        10KB

                                        MD5

                                        942a2da8eea9159398e9be5f25d108c9

                                        SHA1

                                        8cbcccc7503c3f204552d3c322d462c147155afb

                                        SHA256

                                        751549f5ec035620987b88814961bf65e5d245064ccac5775b441ba40393d7c6

                                        SHA512

                                        25737ac6becb8287ca5aa983e35dd519cc1ba4a0e946f391ae17e1148a7e0f170eed646d5bd226b621e5d193ca30c0ec4bbddbc5caf6b14c57e41ea0d62242fa

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\AlternateServices.bin

                                        Filesize

                                        12KB

                                        MD5

                                        87299a3d9dafd395f92de00356b46884

                                        SHA1

                                        fb8cb63c61b44f3dac18f66058b090450b2c52d7

                                        SHA256

                                        365e6c60546beeb3c572bd608f2e7de0c85f655c0a254305625bbed8f0e7145b

                                        SHA512

                                        92e1d6f925a7ce3413cd25a2e57479f43e0bcf5d925bb104a7ca8c10d0bdaecac0ee75f5e3b386b065f0f3eb7e451cd5372aceababcc0ba67bfcc691383169bf

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\AlternateServices.bin

                                        Filesize

                                        16KB

                                        MD5

                                        7e48e1be0a94d04a931bf3bbb8621d6f

                                        SHA1

                                        e8d76a8c515d4090281d1a3a892b5ad7abd5f88d

                                        SHA256

                                        1bda0f7a56c8338a22d0021ca0bc812ce00910ee48e3888ba62ec01c6c9c5e1d

                                        SHA512

                                        b8df34d54baecf33a0c77dd6028205fc9bf038fc2b7b82f242883a97db01ef744033ca28ae4ca5617a1373c64309a1194704b70b5c69c54081ab0cb4152286ad

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\AlternateServices.bin

                                        Filesize

                                        6KB

                                        MD5

                                        e5af22e47f724f290e3fdd7947910f2d

                                        SHA1

                                        a48c114d71a1db252499c98b183e63ba947e8b80

                                        SHA256

                                        65f3345d5922a71e201b0977248d76d3af58f8a79366da573a07922940fdbd86

                                        SHA512

                                        643ac5444434b109b13009837f9cc193b51faba950cb47245e82c1d228f157b4d2d6935ce7bfc910d17d701a15bffb5bd1ca4d955e6ae8469a3f12d865065747

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp

                                        Filesize

                                        6KB

                                        MD5

                                        228fcf5ab4fb54c837ba8fcf6aad6938

                                        SHA1

                                        71901a1c81514f95563bc3847d8299af09d3e123

                                        SHA256

                                        4e5a0d65ab184f02aea56cb1de5dc67908d2d4f8fa31bb4716fd6b851a548a35

                                        SHA512

                                        430a054fa15be161bd73e800bde0f5b1e18802a569f10cbf43634c95b78f7df3a7c9662f8256bf791c97d64fd4a76cbef42757358ee2c910327662fce64022ca

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp

                                        Filesize

                                        5KB

                                        MD5

                                        e5de9b37f6d292ec2c293f9d12013b6e

                                        SHA1

                                        10a1dfd8b7ebc4ccd66e80ee70392a6d70bee5be

                                        SHA256

                                        53b0e292f3ab3641ef1875269e03b9758a5e16dd1599a7f5057039b9c35cd920

                                        SHA512

                                        c96e25a4faeeeab9db7f4710bf21bd9e8d3d11d5801690af83d4af904d8f2d3152310f78734c34ab2cf00c86b1ffaaabb371eb59b9c08de69665937c485f1ad3

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp

                                        Filesize

                                        15KB

                                        MD5

                                        5324535001c1a82aec47b3f2f6c67273

                                        SHA1

                                        ec449383bc54f8bf6e0e275cd46731df589f981d

                                        SHA256

                                        4ebf6b028c27d16486e932d00fbf07123b7b5c3a4eec742dc9b22d617e05bd23

                                        SHA512

                                        c31b0eddc3a061209bf38dc87f9771891b34fd7f6cdca0b04b0c49275e13f0ebcdd4ef3efeec0d9658a29b1bdec87160e595bc07f68ea5ce18ad378bc4e9c984

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp

                                        Filesize

                                        15KB

                                        MD5

                                        6052525d350a38661a04afaca9b18ad4

                                        SHA1

                                        279ae7fbbd998a9d0515b42f80412fc801c019a8

                                        SHA256

                                        73fb41fb6b58f0065ebf1a84583625cd041acff7b1a15ddadbaa93b2c5d84f17

                                        SHA512

                                        7c70f2c1f1cc09f4a3a3a46b6e89369a3517ade1cc83fc02acf0ce84b043dd624d1c66e3d47399f5461006fb2fd28c6bac59b1557e0e0b238d3a9025dad10a33

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\c35539a1-081e-4530-9091-2355af638e97

                                        Filesize

                                        671B

                                        MD5

                                        2e7c41a6bf1d377219d04c2db6446abb

                                        SHA1

                                        1f13ae2c0ca073345e24006d1ea3df859e40fdc5

                                        SHA256

                                        a354cf11126a5ce59e00667ab8fdae1bdd021844e974a8c8d63a38fbf3b12b68

                                        SHA512

                                        4660ce01db9043abbacbc393cedfbff17a45f02827743bdb86d819d47b996aca234aa20f7fd2487be9949957ef6a003b6c40a98e40a83278d57a0a5bc31c4a75

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\f20697c1-1051-4f5a-a6ed-aebd34c2002d

                                        Filesize

                                        27KB

                                        MD5

                                        ba9155d8b11380d5359597351c90680a

                                        SHA1

                                        1ab81f8e2f25ca53dfdeb4ab8308d57ef8753624

                                        SHA256

                                        bf4c1257100177280c9f822eb2e3869211d24e1dbb9c733e35e0bdca5b7feb0c

                                        SHA512

                                        f905e833a4f8b494f9d6042a5c68420b5d9184d44f8b74608dec277a54f963ce3ecd8ab81afc1d5d40f5624129cf5754063b28e26efc738f1d0d251077f34fe5

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\f2ed4c95-e9fd-4f50-aa94-ffe6dcb7a0ae

                                        Filesize

                                        982B

                                        MD5

                                        97acc5fbe179dd8993827fe7ba7c0b41

                                        SHA1

                                        8932a93467af834e08388a75d1456419f9697c3d

                                        SHA256

                                        5ed9cc4dd382501fab1af62b880caf133c21f3f9343f45f91343b0eab0ea62a4

                                        SHA512

                                        6f1ba2ad3c70fa1d4ad29f0cfe93fc6c3ff43a34a0f85934f6e08cc57fdec80f8829a5d21be55981cf64184b3dc5e7b8b10792f8d2e390276f0808f22b093bca

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                        Filesize

                                        1.1MB

                                        MD5

                                        842039753bf41fa5e11b3a1383061a87

                                        SHA1

                                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                        SHA256

                                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                        SHA512

                                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                        Filesize

                                        116B

                                        MD5

                                        2a461e9eb87fd1955cea740a3444ee7a

                                        SHA1

                                        b10755914c713f5a4677494dbe8a686ed458c3c5

                                        SHA256

                                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                        SHA512

                                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                        Filesize

                                        372B

                                        MD5

                                        bf957ad58b55f64219ab3f793e374316

                                        SHA1

                                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                        SHA256

                                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                        SHA512

                                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                        Filesize

                                        17.8MB

                                        MD5

                                        daf7ef3acccab478aaa7d6dc1c60f865

                                        SHA1

                                        f8246162b97ce4a945feced27b6ea114366ff2ad

                                        SHA256

                                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                        SHA512

                                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\prefs-1.js

                                        Filesize

                                        15KB

                                        MD5

                                        c2afdeded1acbb54ae7bbca739954a33

                                        SHA1

                                        5b45af4a0717a4831fe2af67d7b81f7f39622839

                                        SHA256

                                        050f332ef8c77885d8c7ba0491bb1e64cb41947fe285cc825e6573ac5abe6297

                                        SHA512

                                        4dbfe6e9b7a2a94cf47edcddf0fb456eb1ddf59aa6e993e0fbfecaa9d70b04064f390f205bd663923175652ad5c88befbe5cbcf4b9de52cd8db7cf516aa58fb3

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\prefs-1.js

                                        Filesize

                                        12KB

                                        MD5

                                        da2a8c8e8a356341b77205c125623359

                                        SHA1

                                        44e1ad8197e2d14a7fff0934ac0517405b7ec33a

                                        SHA256

                                        7d72e614bacea5b361fbc84425258e5dba6806817de85888260ee42a61ae1a1a

                                        SHA512

                                        de9270bba74b559cae174cd2b2d1db691f9b57af3bfaf8d4e124b27df3b0ebe122f18fd3d9fdb987ecc1c551e055ca4c1db484b01d72d516bda0acc44b473a71

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\prefs.js

                                        Filesize

                                        11KB

                                        MD5

                                        90efeaa822ff3a2cdeccaac95811f0ba

                                        SHA1

                                        09f838af3cf8b38339338ed70a74870568a80a95

                                        SHA256

                                        1b2b3e008be50030567443bbae6b1fbdf52d83415a740c2c5cd4c8fd5159be87

                                        SHA512

                                        4f44a426261ed93cf341a182d870c6ef60188757a91041bad98d8327f0c3a22ce190790f8342aca8b1e130700f0e43862ab8ead8c8dd66662b3d10f373a3e9a7

                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionstore-backups\recovery.baklz4

                                        Filesize

                                        5KB

                                        MD5

                                        c0b7aceebcc72052d99a1dbe62453065

                                        SHA1

                                        7f504e4e2559a655f637724211170bbf1353d933

                                        SHA256

                                        47c601659a424649f11ae210eb51577078ed6070e0a9eb99af1718496d6bb8ae

                                        SHA512

                                        82c6f48d9d558385611e2a6a223d90c7fb5e180b7e3f5d33a0cf825ac52eea3b8d937dc35b62fd4fe57826cfe852c66ad57f0a9f9f6725ea4af60c7bfd984a57

                                      • memory/1956-39-0x0000000000871000-0x0000000000885000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/1956-40-0x0000000000870000-0x0000000000EE9000-memory.dmp

                                        Filesize

                                        6.5MB

                                      • memory/1956-60-0x0000000000870000-0x0000000000EE9000-memory.dmp

                                        Filesize

                                        6.5MB

                                      • memory/1956-38-0x0000000000870000-0x0000000000EE9000-memory.dmp

                                        Filesize

                                        6.5MB

                                      • memory/2352-78-0x0000000000960000-0x0000000000FD9000-memory.dmp

                                        Filesize

                                        6.5MB

                                      • memory/2352-88-0x0000000000960000-0x0000000000FD9000-memory.dmp

                                        Filesize

                                        6.5MB

                                      • memory/3320-1-0x0000000077584000-0x0000000077586000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3320-16-0x00000000004C0000-0x0000000000995000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/3320-0-0x00000000004C0000-0x0000000000995000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/3320-2-0x00000000004C1000-0x00000000004EF000-memory.dmp

                                        Filesize

                                        184KB

                                      • memory/3320-3-0x00000000004C0000-0x0000000000995000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/3320-4-0x00000000004C0000-0x0000000000995000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-394-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-87-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-20-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-17-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-461-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-2797-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-22-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-591-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-411-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-21-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-89-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-293-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-77-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-19-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-1526-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-2583-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-2767-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-2774-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-2792-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-2779-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-2780-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-2781-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-2782-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/4768-2783-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/6288-452-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/6508-2778-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/6796-2796-0x0000000000070000-0x0000000000545000-memory.dmp

                                        Filesize

                                        4.8MB