Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2024, 08:04

General

  • Target

    fce3e333499d76aab0a1f02f5359b356478fbf155d4cf300c300e2708db01316.exe

  • Size

    6.1MB

  • MD5

    4545320bb3994cd68d7138ea11606522

  • SHA1

    484a74736b3619575d87a66f61ec900748c97f14

  • SHA256

    fce3e333499d76aab0a1f02f5359b356478fbf155d4cf300c300e2708db01316

  • SHA512

    00d97abea608bfe7ce0dec6eeae9ab019b6ca75becca5678556c5e416dc7369d2524ace80e1aed57771fbcdc299fed9e1d411733b60b3c10f5bbf4e448ae72f6

  • SSDEEP

    98304:4SD/JRvHwivvFXk3EenpVDqV0beiF+4EDB9V4W4Q855Nkw/M0oTxK4j72QzQtxju:V9lvvZ/VQ+47pPuw/MDDH2v

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://founpiuer.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fce3e333499d76aab0a1f02f5359b356478fbf155d4cf300c300e2708db01316.exe
    "C:\Users\Admin\AppData\Local\Temp\fce3e333499d76aab0a1f02f5359b356478fbf155d4cf300c300e2708db01316.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l6w24.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l6w24.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9y25.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9y25.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3912
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1b51J8.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1b51J8.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4804
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4420
            • C:\Users\Admin\AppData\Local\Temp\1004562001\d0f0dc8f95.exe
              "C:\Users\Admin\AppData\Local\Temp\1004562001\d0f0dc8f95.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1276
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 1584
                7⤵
                • Program crash
                PID:1132
            • C:\Users\Admin\AppData\Local\Temp\1004563001\e5cad665be.exe
              "C:\Users\Admin\AppData\Local\Temp\1004563001\e5cad665be.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1576
            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
              "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
              6⤵
                PID:5412
              • C:\Users\Admin\AppData\Local\Temp\1004565001\a0a2a4542d.exe
                "C:\Users\Admin\AppData\Local\Temp\1004565001\a0a2a4542d.exe"
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Windows security modification
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:6020
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2u6959.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2u6959.exe
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4500
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 1612
              5⤵
              • Program crash
              PID:1328
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 1572
              5⤵
              • Program crash
              PID:3628
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3f59z.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3f59z.exe
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4656
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4e798x.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4e798x.exe
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1320
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:628
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1584
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:396
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3612
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4976
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3728
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            4⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3328
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2012 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e452d1b8-e776-4837-bceb-ce9315354eb3} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" gpu
              5⤵
                PID:3376
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2488 -parentBuildID 20240401114208 -prefsHandle 2480 -prefMapHandle 2468 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {50811c9e-ec0e-43a8-8b67-9d0aa3a821bf} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" socket
                5⤵
                  PID:3496
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3048 -childID 1 -isForBrowser -prefsHandle 3168 -prefMapHandle 2772 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7854748f-6788-41b0-9208-0c37cca72ca7} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab
                  5⤵
                    PID:2928
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3848 -childID 2 -isForBrowser -prefsHandle 3860 -prefMapHandle 3856 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d60c2455-f046-428e-aff3-40ad3c9d661b} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab
                    5⤵
                      PID:2192
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4640 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4624 -prefMapHandle 4592 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {066de1c2-818d-4672-a0c1-77a20fa054dd} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" utility
                      5⤵
                      • Checks processor information in registry
                      PID:6364
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5292 -childID 3 -isForBrowser -prefsHandle 5284 -prefMapHandle 5280 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {956f0124-9538-4ca1-9a23-963efc88bc72} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab
                      5⤵
                        PID:3512
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5324 -childID 4 -isForBrowser -prefsHandle 5440 -prefMapHandle 5444 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9cfa6141-a5f4-4614-8534-04d7bd42e298} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab
                        5⤵
                          PID:5144
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5624 -childID 5 -isForBrowser -prefsHandle 5628 -prefMapHandle 5632 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 944 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {41802316-45ac-4d09-9e43-825bd3cbd122} 3328 "\\.\pipe\gecko-crash-server-pipe.3328" tab
                          5⤵
                            PID:5156
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4500 -ip 4500
                    1⤵
                      PID:1780
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4500 -ip 4500
                      1⤵
                        PID:2084
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1276 -ip 1276
                        1⤵
                          PID:1488
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4804
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:764
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1612

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json

                          Filesize

                          21KB

                          MD5

                          1e2338cc5c702955a92c7408bcc52faa

                          SHA1

                          496aca6cfd775b782bfe2097b132be058ec4399d

                          SHA256

                          d213b914a6d5b55a60c2de504f75bb7ec820588c657039145bf1ea5154390132

                          SHA512

                          4364e7f17d4ff76078a8f9447014ddbbd24af2fc4c70ec3da5663e0fdda84361db740487a02467c9e76d401baeca3aadd1dd14d91668961e67dbfa0d08f2add2

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                          Filesize

                          13KB

                          MD5

                          1266ac9b2fad38698022f6e1f243ad5e

                          SHA1

                          831886b6ee34761ba20842d7e59659ee4298976e

                          SHA256

                          e955dc2d9f0bc7757bde5da2a73215734d56291b480d49d4f93a0cb1009daf19

                          SHA512

                          eee7bee4f0ceb85289fd3963aba87abd8a1b50fcf1e14ca79e69104e6b723309c33913de4b66c95c2c6d1fada0022156311344fc10a24b407ffec888941e8901

                        • C:\Users\Admin\AppData\Local\Temp\1004562001\d0f0dc8f95.exe

                          Filesize

                          3.0MB

                          MD5

                          3dfbd3921a8a2469536af72874339edc

                          SHA1

                          dc4732d04efea9a48bcaa78cf7ff363b5cba94ad

                          SHA256

                          84fc1601c66cd260329c1da0e1fa59e5adc76973e550cd392dee3505fd54e67a

                          SHA512

                          6ceea839b37015ef24619875d7da96d0352f883cb90e68ec4fb34e80aca92a5c846076e3b8e42f854e1d75395cbf7725f896ed4166ed5253f31af63320da527d

                        • C:\Users\Admin\AppData\Local\Temp\1004563001\e5cad665be.exe

                          Filesize

                          2.0MB

                          MD5

                          27638f27ce52d0f5706be8e8c68deb0c

                          SHA1

                          80161582298a90680adcf582f0e9013eb61f66ec

                          SHA256

                          de0a019ecad9bd6ae010848b388ed737c496395b77fd66f16f8f8f8a1395de90

                          SHA512

                          6a307f925443979aa1c185da98fb56ec3a4312741791743ddcbdea4e9f67d6a4049e7fcf8ad2417eca44f1c42fc0b0bc1dc7f56c02d9f9854b5a17c78dbcb6dd

                        • C:\Users\Admin\AppData\Local\Temp\1004565001\a0a2a4542d.exe

                          Filesize

                          2.7MB

                          MD5

                          12d1f73951007fea7cc6a52679e48258

                          SHA1

                          d7c0dd643bb88f6c80e74badd79176a4c18d507b

                          SHA256

                          fdd8f707444f51081a364604f50bcdd92eb72896866caee81effd380cb3728b8

                          SHA512

                          41c4c4df272bebcc338ad0e194de51bea59a89d19ccdf4da22beacd7ded424f64e45cb84ae53f8d0bd8af440261b4b16ceeeddde76cf894ceb87df898f76cc1c

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4e798x.exe

                          Filesize

                          898KB

                          MD5

                          392687ff2715a1cf682038c32970f276

                          SHA1

                          9220f7f3fa6dd6b902394890237657bc3ffffdbd

                          SHA256

                          8dea406190e12b5a7efee3ad1e158b2ccb699061eff12ec473bb6f257ac5c2d5

                          SHA512

                          278a6cef0ce5a4bcb29139cd4218917135089cec7aa876ea3185a9cdeb117cbb47e5f898866629ffc2cef09f1d9bc7e75bb0b7a7017debfb0f064aca0dabddf3

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l6w24.exe

                          Filesize

                          5.6MB

                          MD5

                          ca6467918d039f5e7302ef8e0eb2c569

                          SHA1

                          f2930bdc1e0379c93332e5fe6c523a91e4c101f6

                          SHA256

                          9a517f265cec177d61b07ed2c1bb3b85c83aed6bfce08a057ccee9b501ee5f5f

                          SHA512

                          cc530217f2fbd36eb3ea7b1dce3d5fe42715899dc6309187cbd0787f79678fa2caf5213ed53b31b018b6246e611a370b749c33bc5ee1ae66faeae5b30fcba431

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3f59z.exe

                          Filesize

                          2.1MB

                          MD5

                          466494b576d92a3101ce8878d41bc976

                          SHA1

                          885b7fe5faa7a830be8977115fc47c8d13f56a42

                          SHA256

                          19e74e54b9bbd79fa2c509788e31eac6005f265b9174d2bcca6293a6b3977f12

                          SHA512

                          7cef8b1a106ef19ef42ac7a342311ad7058684cf85384d148bbd5c584a4b61f8f0ae3c03a29fc28af95e59211d1815fb2fedf3b335354ac8ef19499e016b07ca

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9y25.exe

                          Filesize

                          3.4MB

                          MD5

                          eb704f284296bd737dd4a5d6e1b4fa90

                          SHA1

                          e51a5cbd6f0c4d4d5c547552b856b9bbe724010c

                          SHA256

                          933eb46ec61d5a1a7ec745a420bb3397ff327b55b71edd4877c10c7c6379dabf

                          SHA512

                          b2313cf7267951c9128c1f5d5a970d0f74bf1f07e00e463f14a4070eec74977e927fe9e6645a10f89e3ab46a9ee685ecbe9bc5695d12b92b9e45a1c942c8619f

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1b51J8.exe

                          Filesize

                          3.1MB

                          MD5

                          1a81dffb83d8e7ff3adf172aaadaf388

                          SHA1

                          8cedfd2a864c409afef1cb0a8ad002f8a5f0ef8e

                          SHA256

                          447fa6e76e1f5060cf82af86a9f8f4a7916d77a25ae28214f9469c3f66c6ba66

                          SHA512

                          77289ebb8ff65befc192ff32cd123b2bda303dc48b5e1738bd689ad71139a7dbced09a65ff2597264137b7d11e855af9cdef715e52a8c0c4bac71baa8ae9f8db

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2u6959.exe

                          Filesize

                          3.1MB

                          MD5

                          d5a05e0b1911a70a90fa1a9cf1ba3c0c

                          SHA1

                          796eb4acbb957af2d0dc23302788a34baddcc893

                          SHA256

                          961e19159b02db2e1af27cde622fbcf715dbc67b7af88c2782d26f8c9141561d

                          SHA512

                          2220e40b683e43bcc21b8c5e911e37f9b2b6dd993dd80e344f3fae28b85f0a8cf9203d5496a2e5891c84fc59e9b7aa92ae2e21198dfbcf9ea7175c19c339c760

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          479KB

                          MD5

                          09372174e83dbbf696ee732fd2e875bb

                          SHA1

                          ba360186ba650a769f9303f48b7200fb5eaccee1

                          SHA256

                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                          SHA512

                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                          Filesize

                          13.8MB

                          MD5

                          0a8747a2ac9ac08ae9508f36c6d75692

                          SHA1

                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                          SHA256

                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                          SHA512

                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                          Filesize

                          10KB

                          MD5

                          d998d89e90649f42e214e6fa05996d12

                          SHA1

                          b6686364f51ff942fbccf5e918b57e0ce5d9d39e

                          SHA256

                          4b93e001e0311aa864f4862ecdf77bbb54e57ac112ee33844f7f6dc121163b8b

                          SHA512

                          b1fce4f48460cc0456be0c12f9ce30a4442963969e5ae53049a7f35482cf60c50b38e33aa14c458b24e19bb63f50f501f9aa73d0f183b9d0fb7cc65df49adc2d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          23KB

                          MD5

                          ab302d10c5ba894b03a7771a8159dd52

                          SHA1

                          f88648473d25f6237f205e8c5b886885db6cdcae

                          SHA256

                          677ecce682f9f7a18ae67aa7ee3c747bd61f62c79569318712bf5e104423c571

                          SHA512

                          5e92b17b138c1f69b7c0aae9c22d24f5b1d66776851871e2394c84586961e97f19409beab5efc49a1e6084cdcb16202d9a7689ead32ad9a2502780989fd7f0b0

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          6KB

                          MD5

                          02113376a81edc9a3ce6e1b5cc38c6e7

                          SHA1

                          586e706a4579436e849d31837670a7b5a04c75c2

                          SHA256

                          7a387620a29709b5d2f099e4a06be59ea3310590caf44c674dc08129d1cc32ee

                          SHA512

                          4777afc0fb281d55608c1758934f013d9272326a009b77b7b40e1f3ed3addfa177adaaf01e7a6cb24c6d09b5af63090118b4fd671aaa1dfa6ecf7a79a016369c

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          15KB

                          MD5

                          81f3029ca2df0d30b6e128582a26925c

                          SHA1

                          b92d2d8bd13e193127b4617dfd354b48efee6b98

                          SHA256

                          065e92136ab17716e6465e2236160d2742885c346d373d9e5065381393e23812

                          SHA512

                          208d6befcb3ef0cf320cf47d676eceb0b849f9f1b16db65b10eaaab0e912f90c628b885e27f4ea4fbe9e0713b1f7b197ecff0e9dfa12b51179c39ef2c0132344

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          5KB

                          MD5

                          7d8cc943ee685838e796778fc1cf5d21

                          SHA1

                          3243746056b746a7eeda87f59aa4c883a1bec708

                          SHA256

                          ec8523b7678e9ac5271843a8116dd996f490963b7a07a31498074d96c9321693

                          SHA512

                          f340c30d01c6ab3500b6a49b8293046d4fee389f97c19930f47b5e1e37585548fe0822a1f0c9351b2a0c59e6218caa2171c30d58f46cb6f97188e03b0e3fbb28

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          c9c88257c2b33afb289f5fa0fd1346bc

                          SHA1

                          fc424310f305c418439270180efea8ec00c0b321

                          SHA256

                          814fd5b37982dd2443d90b887a360161525e52562b0b1cd2e1c6f578fa32c177

                          SHA512

                          4d4d2920e672826e4c6421d9ce718b70b9602d494f2ef7a99c61131a9654d52df760cb602d4d7e52048a7cf0a5b7ef14dfc30fbff93646c9611503af1d3dac3c

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          6KB

                          MD5

                          ec9d34dcc78d7764497a25940591e239

                          SHA1

                          c85357c252f387d999635ed7adf0c7290730549e

                          SHA256

                          20b40db759ae2975861055a3cd1fa365f4bbfb083d76441ec0fb9d641be02d40

                          SHA512

                          8e4bb2cb4036dc6e6687842b2c89a0a3b2c85d2c381d83c171288bfd76965379a5e3707e9fc65b04a3225476e621818ff571da1e48622256ff2b156694f907f3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          c1b0d45a2ee76700d0f1fde32fa27afb

                          SHA1

                          9f2e43cc0b1bf3dde0a48cf0c66d609582c053a6

                          SHA256

                          bbc04a81cbae47fc827d87192a9a5f4c8a8501e72693c29a82ced6c7a180cbf5

                          SHA512

                          f051ef600b178e15831ef8f5cd06c30f0c27b2f273d6bacf494382fe068011027c155e3e265a6c543f22b0d83813722e9633a71e69998645d5f22e8fbbe280bd

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          5KB

                          MD5

                          9653cd3a59641a6ac3fa20e8c1a6f1e6

                          SHA1

                          84664736b5631a5825d4c15a1e3853c2f7051f70

                          SHA256

                          b34d941ee1f24b68768fd1ae7d9ea74c0cf1969f04ec3a193f2b904b113fcc04

                          SHA512

                          713a53796423fefc3ce7366fc6a3569846d4bbca8507338dcf816e8817c11d03de795ac43146419068c9aee7c4141c938a6f4100893cb14dc35c3e86f8a41e24

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          6KB

                          MD5

                          d2d0a31ebbf8feb34ebbc5f43a5a47ba

                          SHA1

                          df4c3fe14a280139a36e7c30581256b9527619ee

                          SHA256

                          bec0c9024c91229b5adf056ad8583e407c673ab836281117076b5b35ed9b1db6

                          SHA512

                          bf5b7d6003a72fc5f8dbf60d1a3d8a0645d8bbd1fb78a56ef5f5a6eba21a933d0d056203304544d08dee0a48ebf96b0efb30ebbd427264431b2fa65139d30b5b

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\3f517755-42b6-4d5c-bcd8-a0b67765d57f

                          Filesize

                          26KB

                          MD5

                          2a270c57b00626ec2a687d0652a8b928

                          SHA1

                          ccbb5be8d0b82e467d971acfca2320f5e0a10abe

                          SHA256

                          c9910fceb79edeedfe797604639f13ac35eebf34903395b35e22a5444d6a8379

                          SHA512

                          602fe65b3cf0ad93d38f0531657a314f0da1ce1e2b62f39291c606fb1a1b8db6165eb5b70bff74577a1d879f984b162bf6d96b4d0d0d799637c01f1a15ed5b55

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\b01f1e5a-356e-4144-ab2d-a974317b0586

                          Filesize

                          982B

                          MD5

                          1ac5d5fb6ab2e57e7eb904c4b57b1b7d

                          SHA1

                          686727c5433ed4a1f5a4be369e31f6fde0eee09e

                          SHA256

                          d139540cd394071072029a59e5fcd7092dae9e76c1c2d5dc4a50862368386c3c

                          SHA512

                          af14f89d2ee4e9ab73cb02065c87c0c9131d448ac36fd5fdfe5f438547c6cb95583b7c7a00a576d0d6baef1f4a714562061c668b4d1fb2e9f8fe4cd546228e3e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\f364087b-432b-49b0-9efd-53d449833356

                          Filesize

                          671B

                          MD5

                          de6cdb46dd16e9012834b4de09f492e3

                          SHA1

                          77b3cb610c8e287e21f2f33c4abcd68388b77f8e

                          SHA256

                          88d5fdabbfc73027a97d27d0d415e9ad45c8f86f0be459d62ec9d8c1c506fbbe

                          SHA512

                          5c4381ee2480004adb6061c3295f4a177cd34a6de141946f06f2cd2ffb60cd0fc7091fda61bf4b24669a61c2e6e4ecdd7f4165f57fc3c2d8ef7c6ac91ba69e17

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                          Filesize

                          1.1MB

                          MD5

                          842039753bf41fa5e11b3a1383061a87

                          SHA1

                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                          SHA256

                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                          SHA512

                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          2a461e9eb87fd1955cea740a3444ee7a

                          SHA1

                          b10755914c713f5a4677494dbe8a686ed458c3c5

                          SHA256

                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                          SHA512

                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                          Filesize

                          372B

                          MD5

                          bf957ad58b55f64219ab3f793e374316

                          SHA1

                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                          SHA256

                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                          SHA512

                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                          Filesize

                          17.8MB

                          MD5

                          daf7ef3acccab478aaa7d6dc1c60f865

                          SHA1

                          f8246162b97ce4a945feced27b6ea114366ff2ad

                          SHA256

                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                          SHA512

                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                          Filesize

                          12KB

                          MD5

                          1f9a869504d32c1a3b5648cd5036e959

                          SHA1

                          59207486b05be408628cdb035f5f29e71ec09b69

                          SHA256

                          f1d62f6ab99c28f1c40ec5ff0dad846c325cee0a2530ef543487229e03ddcaa1

                          SHA512

                          086259218b91c269fbc429530150ea03a4e3575cbee81b3ff37f7e593ce0e6ae91d1f7ed88f46aaf7c4b867ab16dbac792f6b1954ece1d9dea201db94309fc2e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                          Filesize

                          15KB

                          MD5

                          20dc63b78555a88f6d528e6f5c6da4af

                          SHA1

                          9678c3fcd40f56bbafd2b95fda56e99855de6430

                          SHA256

                          ed06c2c2e83132d8d6ccaa92686401c12b5f53972d5bac660040a55a662d8dca

                          SHA512

                          98ba8ad535c99784f4bb1cb2617fb8504840c6897bf8a3799ca0a8cdf2946e8cf930347b2cec9c787dc43405cecd377a9f06834f24d3e0bd65b9074dc4526d5e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                          Filesize

                          10KB

                          MD5

                          959241a1ee340322537a4863cda2dc08

                          SHA1

                          db6c5153ef96fcef845d44a35545711f8b305b99

                          SHA256

                          bd49e38186924f9fadbf4c528768be5427a1b066584e3ff815a5f495d5a9f808

                          SHA512

                          c4185ebe28c8183d29d020ddc0afaece93784dc1944d2fe621295b55a48b8756c4d827eec16582bebbae5eaae2d7cae6618d0dcd7b340a3e7a58203e4d04fcea

                        • memory/764-4638-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/1276-685-0x0000000000D40000-0x0000000001047000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/1276-61-0x0000000000D40000-0x0000000001047000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/1576-94-0x0000000000930000-0x0000000001057000-memory.dmp

                          Filesize

                          7.2MB

                        • memory/1576-84-0x0000000000930000-0x0000000001057000-memory.dmp

                          Filesize

                          7.2MB

                        • memory/1612-4650-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-853-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-4639-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-4657-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-837-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-69-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-4651-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-66-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-4648-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-4647-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-4646-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-4645-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-4644-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-4636-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-33-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-1847-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4420-4632-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4500-39-0x0000000000350000-0x0000000000668000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4500-41-0x0000000000350000-0x0000000000668000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4656-44-0x0000000000320000-0x0000000000A71000-memory.dmp

                          Filesize

                          7.3MB

                        • memory/4656-62-0x0000000000320000-0x0000000000A71000-memory.dmp

                          Filesize

                          7.3MB

                        • memory/4804-21-0x00000000008C0000-0x0000000000BD1000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4804-35-0x00000000008C0000-0x0000000000BD1000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/4804-68-0x0000000000F00000-0x0000000001211000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/6020-830-0x00000000004B0000-0x0000000000778000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/6020-848-0x00000000004B0000-0x0000000000778000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/6020-831-0x00000000004B0000-0x0000000000778000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/6020-827-0x00000000004B0000-0x0000000000778000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/6020-845-0x00000000004B0000-0x0000000000778000-memory.dmp

                          Filesize

                          2.8MB