Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 22:30

General

  • Target

    5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe

  • Size

    1.8MB

  • MD5

    add4bf165f7138d46d9fb140a1237b9b

  • SHA1

    6aee0aa45ec0cac927f48eed41213d07ace05e81

  • SHA256

    5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b

  • SHA512

    08b581b5d9473c725aa33fe26f07cf291016b5f738a3a262e41d11cc2e0edbb25bf4cafd4a2859d30525ca90a46eeeddf03f2160053e96d65df5bfe8988742e0

  • SSDEEP

    24576:7sK8LXOfFyi7iFo3mV1V5GlCqjS8ZpZUNmYc1QO758iFt1pXE6ZE4qoPpNq:7s3zKYi7iFUmV1yCqe8quV8iT06LN

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe
    "C:\Users\Admin\AppData\Local\Temp\5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4636
      • C:\Users\Admin\AppData\Local\Temp\1008861001\9PFgzLM.exe
        "C:\Users\Admin\AppData\Local\Temp\1008861001\9PFgzLM.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1012
      • C:\Users\Admin\AppData\Local\Temp\1008866001\bbefafb868.exe
        "C:\Users\Admin\AppData\Local\Temp\1008866001\bbefafb868.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4336
      • C:\Users\Admin\AppData\Local\Temp\1008871001\6017abab0d.exe
        "C:\Users\Admin\AppData\Local\Temp\1008871001\6017abab0d.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5072
      • C:\Users\Admin\AppData\Local\Temp\1008872001\87d22be945.exe
        "C:\Users\Admin\AppData\Local\Temp\1008872001\87d22be945.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3476
      • C:\Users\Admin\AppData\Local\Temp\1008873001\82a19fbffa.exe
        "C:\Users\Admin\AppData\Local\Temp\1008873001\82a19fbffa.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1588
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:452
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4880
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2680
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2092
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4536
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3256
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3932
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {81a254a2-5a12-46db-a5a9-9352ad7d930f} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" gpu
              6⤵
                PID:652
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7ef71e2-3837-40f2-a731-35c96d2b6d0e} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" socket
                6⤵
                  PID:2652
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3168 -childID 1 -isForBrowser -prefsHandle 3064 -prefMapHandle 3332 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1332 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9cc0bddd-1d7a-49f3-a747-89b42e3d3cbc} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab
                  6⤵
                    PID:1576
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3716 -childID 2 -isForBrowser -prefsHandle 3708 -prefMapHandle 3704 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1332 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc5abd0d-303e-4494-a14b-c97481eae415} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab
                    6⤵
                      PID:3048
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4312 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4296 -prefMapHandle 4136 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef2e966f-e502-4aa5-831c-c2de838bb965} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5152
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5724 -childID 3 -isForBrowser -prefsHandle 5680 -prefMapHandle 5684 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1332 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b58637d-a8e1-449f-8e42-4b3c8e39179a} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab
                      6⤵
                        PID:5976
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5936 -childID 4 -isForBrowser -prefsHandle 5724 -prefMapHandle 5704 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1332 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0efbaa70-75be-4d69-8ce9-ae31b1eb33cd} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab
                        6⤵
                          PID:5996
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6068 -childID 5 -isForBrowser -prefsHandle 6076 -prefMapHandle 6080 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1332 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {64389646-6790-4f90-bef0-19cc583baeeb} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab
                          6⤵
                            PID:6008
                    • C:\Users\Admin\AppData\Local\Temp\1008874001\23b5739e7e.exe
                      "C:\Users\Admin\AppData\Local\Temp\1008874001\23b5739e7e.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4868
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 1132
                        4⤵
                        • Program crash
                        PID:5284
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4372
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5168
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4868 -ip 4868
                  1⤵
                    PID:5372
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4356

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json

                    Filesize

                    19KB

                    MD5

                    c09d21b2430ccaa92bee51f0e5979819

                    SHA1

                    72cbd6c95483bbe736bd2b1bf975243efa9b9164

                    SHA256

                    e16e560da1a22e737647de4125414b1ea0b032bd018cfbbed4069b055ba71cc6

                    SHA512

                    cb20067ae5004341850d51023d1da645317b8c5dd8c0c81f7ec5e4e0519dc03a825978cd012a170f265a3a2110cb08c94507f9cba97d8ba7c590653451a134a6

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                    Filesize

                    13KB

                    MD5

                    4a7c0acaf7646a904f8b930e36bfb172

                    SHA1

                    fcfa4a95b0f719d17d842632bd218ba0b2e375a4

                    SHA256

                    2ad7e09f4f4f0bf593348b987ebf88173006837282dc71b47dab30f47d94f5b8

                    SHA512

                    8f086b056551b76b9dcd4976dea1b1851e753a8ed9ec15a3673cd4b24dffe856c12a948b97e7fe00938cc2e55d3b0f29a1d690dbfd3bb1fa9b43352696478fd6

                  • C:\Users\Admin\AppData\Local\Temp\1008861001\9PFgzLM.exe

                    Filesize

                    1.9MB

                    MD5

                    77f26249620c649cb0f488fb1e8872a3

                    SHA1

                    c0aed36a57e0b3f88845f2f2c4a623724716e3b3

                    SHA256

                    f7905c0fa8eb13a30cdbc40f432aa54bc0b546f7ab97d2d4923f244f9c7407af

                    SHA512

                    261bbe3906e4cdd554a93798465fbeacaaeac4c25e8dda0f6e06efd586deea1454f178547fc72b6a952a01baa891ea7328bd2226cb0738ec448db3bcf3e6f3b5

                  • C:\Users\Admin\AppData\Local\Temp\1008866001\bbefafb868.exe

                    Filesize

                    4.2MB

                    MD5

                    6c2e06aafb4acb8c62410c0e7e31bc49

                    SHA1

                    834df800ddb24027200ee7bc3913601b7233897f

                    SHA256

                    3943d3d4ea41f1da39b9a5af2b0770c62e81779d2f20852c21e1608c5e6bfdfc

                    SHA512

                    ae7a2335cfc39fffc503e55a3f903f3cdc5b63ed960b49128607ee7247316345d74497afa7c40847499625f90556523d2c3219e246fecf3b8e631cac715b5684

                  • C:\Users\Admin\AppData\Local\Temp\1008871001\6017abab0d.exe

                    Filesize

                    1.8MB

                    MD5

                    3a68742dc50809ac2ea0f339d3a1f1c5

                    SHA1

                    b2f1b40240f651c2849928a1c6f3d1b1a4c91b2c

                    SHA256

                    1d94cf7ba1566319f76cf67973ca6aa32efec7783a40d2f52652df47231f4475

                    SHA512

                    0d0b43db112772e6b631e95c8aad41a6b5365c0dc8031c9894450d123e8ccb15d21fb477f9159575314a0a2c9e300fd17dd1e39d6e76f641e4b72e89bfee064b

                  • C:\Users\Admin\AppData\Local\Temp\1008872001\87d22be945.exe

                    Filesize

                    1.7MB

                    MD5

                    6467f0b3f7c25edc1259d28371015177

                    SHA1

                    3fbde0653380909d0a4a35c032c9fe80131c0925

                    SHA256

                    32ebf905a6ed43b5e163ba71f7a836fd3b6d2f866c18294278cb86e85ec01a3c

                    SHA512

                    b88fe4f81932f235691e1f0a3a1b8b69e5dc747b04d5838b907bb477fc7aa9c49673db9149b693c94f9814d9f138bdfeb391ac3ef6c0a78bb80d87c3ed86a651

                  • C:\Users\Admin\AppData\Local\Temp\1008873001\82a19fbffa.exe

                    Filesize

                    901KB

                    MD5

                    ff11ae234a4cc63ae952def66174b9fb

                    SHA1

                    dbd5118361c76bdd0912f2cdf30329885d554f6d

                    SHA256

                    84f2a6dec84bba3c40a0b36d426045c4d34b815385cf98773957b625f3d63c64

                    SHA512

                    e33d4c14296941e9a4a47a4a33c1afeafb31acfc8f011f487fef845dc89a31969296a932d83563c35eff266b5a93f71d5b732495eab4c0fbc40338e3c54416b7

                  • C:\Users\Admin\AppData\Local\Temp\1008874001\23b5739e7e.exe

                    Filesize

                    2.6MB

                    MD5

                    ab936f1daab5747602a65d0303bacf25

                    SHA1

                    49c7172b67628fb2cb85fd7fa351d38aee3ce893

                    SHA256

                    fc83e1d55a08f7c0d0b7561304be2f02425d1e3b4fe43d033cc5eb2d0aabc6c9

                    SHA512

                    ee001bd48ba62c4b578576e02fc21b8314310321e8f7d2b17c565f07c6aaa18e1dc77630982be3f760233d1d1cd85915452524e69c7e0634bbd4caf6dc28b689

                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                    Filesize

                    1.8MB

                    MD5

                    add4bf165f7138d46d9fb140a1237b9b

                    SHA1

                    6aee0aa45ec0cac927f48eed41213d07ace05e81

                    SHA256

                    5358eec7605247602552deca5b148bfd9e5c9880dcb09991e0de9885d095653b

                    SHA512

                    08b581b5d9473c725aa33fe26f07cf291016b5f738a3a262e41d11cc2e0edbb25bf4cafd4a2859d30525ca90a46eeeddf03f2160053e96d65df5bfe8988742e0

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    479KB

                    MD5

                    09372174e83dbbf696ee732fd2e875bb

                    SHA1

                    ba360186ba650a769f9303f48b7200fb5eaccee1

                    SHA256

                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                    SHA512

                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    13.8MB

                    MD5

                    0a8747a2ac9ac08ae9508f36c6d75692

                    SHA1

                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                    SHA256

                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                    SHA512

                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                    Filesize

                    18KB

                    MD5

                    d606fa6059d010aa86b4a47ccddf74a8

                    SHA1

                    321aa41f0c8d5e3c20d0c98dc9bdfa7dbc349071

                    SHA256

                    1cc6db01d15218feddfcfe410bb715cb76cd80475efc823a35fb8e971a925a8e

                    SHA512

                    bc0524177ea32e102869e58ad1b009a26345f4b0c7041423f1c521f972a3460b06f6e6f69c6040c74397da342c8114aec7840a1c126830fb61d132ccf81bc2af

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                    Filesize

                    6KB

                    MD5

                    832ba61bac2eee78baadda633cafc0fa

                    SHA1

                    cd534b0e104834d99b6edd596f0478ede51c1d0a

                    SHA256

                    eb02e3060b530812c1dba36ae598e1682a7b1583ddb0c90b33891023b6c19ce4

                    SHA512

                    14fcb535f3ec894ff845de60e88b7abd9c175d47a819b452ed81574ac26419ea3ee33c901358d64b0f88552bfb807fd2972bd182a36a2c4373b7596a345b130f

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                    Filesize

                    8KB

                    MD5

                    53477160220c8eae87e77890028d0b7d

                    SHA1

                    235623b5a10279f92aa91f9bb88ac674d3101d25

                    SHA256

                    a293c7439f29339680f1f1ce4b9288de36ea7c1c4e25bc6d07f5fca3565e5d97

                    SHA512

                    27bf5774200200ce61ff871b6bc41cdf3a8bbe3ddd259a500825312da344600f593f115baeff14d888f2575957eebf1f43b86c2bc3f3a85a3cd86dd825a2bf00

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                    Filesize

                    10KB

                    MD5

                    61f48d3b4651773b2209bece1f6ff1b1

                    SHA1

                    7fad600f075333cc64398a90c5a4b9533dacbe20

                    SHA256

                    8f5a2ec8dbd89459d1b45d5132c6ebccb6bdf51539e0d230d543831da2997cb2

                    SHA512

                    9e45623974b1d882f5399fa216a90227dbfd97c12c7398a7e32c1e5b4453f11c599aa740dae993089f949457a6f15092ab661d3a3d795c6338044a105311e589

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    15KB

                    MD5

                    3465d65c0bc948060be17696c4674214

                    SHA1

                    648398b91868cba768ba3f9cf87f0c19cf4d5cb1

                    SHA256

                    2db00efe1be55cfcd84c621e57f545f7fec16c3b96aea316060e0cdc4a1832ac

                    SHA512

                    1879e3c7e62800ef0059926cf933c5f0bb2d57f441de12ae5758ae018b7a81d3143d08567e5adb031e45b679f1eef9ee4205cb7a64fe828eb45dbf07d35de86b

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    5KB

                    MD5

                    4c84ca1eb9c91621602e0cb8cedec4fc

                    SHA1

                    7b3704f66ed2c31c411069d9381ee97ede11fabd

                    SHA256

                    cc04ca6207267443026731814c458d4b8873872af960697a97049d0023848869

                    SHA512

                    1417ccd3a8b9b9776a02638072863321c1cb432c50e793cf656f907e7f9b2a44e25d569df1a17204ccd22ea3d8e838c7fd50ed972f9cc07b48d0ae0765dacb99

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    15KB

                    MD5

                    73bad4b14768133a8db9f19b6fcf597e

                    SHA1

                    96cfb55b69601c287cc5d54817e0f737f307bee7

                    SHA256

                    8dc01c58059494d1b23bc968df07190c0c39d0efe17b7763a38871399298927b

                    SHA512

                    e50e74e804dac5a140585efdb20e1108d20bd7a0269abdc00f8dba407ff888f033e8ca6a4f4d8a7c5f995c960bccabb35bada51f981ac31a3390bb19140b935e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    6KB

                    MD5

                    dc930f5fbd8507d3b33b617ad2778380

                    SHA1

                    56ba0f52ab9c15a919a0355ca4377a6db1465f52

                    SHA256

                    64d8871b764c8477528931b40ad4d9094f69b048374b87da840424c140dafa97

                    SHA512

                    56470d9d99878f58ee1276aeaa2ff478cc91ea5d2f5bfd50de60179bc9bad10825d914106f980e101285e928174ea00972fa21682bd6e0c7c6880bbaa2a3d19d

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\4c86b608-46c5-40be-bbca-26da19484bf2

                    Filesize

                    29KB

                    MD5

                    8e2e54218dc331b0d1d5e30634a3378b

                    SHA1

                    7ca565da1190eb8adf620fda5ce9647edd0ec828

                    SHA256

                    8344746cba307e3bff0de6a07e5839cd26e8fb449f23819d9e8ad9e578a8fad8

                    SHA512

                    faadd9e498c1b1f381e7a251b2a7c0e7e08490c343fffa7abff8db15af069cfc2c133cfd6030c1c11a3f0c65a4a120f9200fb806cb4aeacdecc773274f8f0923

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\8d06cf99-052f-48d4-a616-f0980de2f858

                    Filesize

                    982B

                    MD5

                    d19eae1048511f6a9182bd61e8faf3e0

                    SHA1

                    92379dbf3221f1ff921f87a286c6e01fa66f6761

                    SHA256

                    edb17f1979d00108b1abe52b90275782e7967037abfd649ec4206caf651981c3

                    SHA512

                    c8e34112c2f6a0c611fec9f7aeceb38225b166f34b55a34753ed5b3758afe61187d188a94919e858193a37d4dac1d1bd9ff5fcd32db555bf1e0a2525a41d790a

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\96eda08a-a0d1-41da-9728-182813f2aa62

                    Filesize

                    671B

                    MD5

                    a66dfaf7a1b998f3d1b970d6e622b2a8

                    SHA1

                    cb8a7e6d67d208a9630bf55c2f14cab7dbb16ae9

                    SHA256

                    8e0de4d9e013f2b42130cb28a215d1109205ef65af3ed3084423bc867fc5d6a7

                    SHA512

                    a816212629efae792a0ea056d2109a610112f0a914c4936356d9f80d8ef913e7cdb1c4faae975b278215c065ee96df865bb20934e09c3d41a4ed74344cee7fb6

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                    Filesize

                    1.1MB

                    MD5

                    842039753bf41fa5e11b3a1383061a87

                    SHA1

                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                    SHA256

                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                    SHA512

                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    2a461e9eb87fd1955cea740a3444ee7a

                    SHA1

                    b10755914c713f5a4677494dbe8a686ed458c3c5

                    SHA256

                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                    SHA512

                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                    Filesize

                    372B

                    MD5

                    bf957ad58b55f64219ab3f793e374316

                    SHA1

                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                    SHA256

                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                    SHA512

                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                    Filesize

                    17.8MB

                    MD5

                    daf7ef3acccab478aaa7d6dc1c60f865

                    SHA1

                    f8246162b97ce4a945feced27b6ea114366ff2ad

                    SHA256

                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                    SHA512

                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                    Filesize

                    10KB

                    MD5

                    93c33fe85921235f955d5c7b11775f69

                    SHA1

                    a9d442a07968c4cdcddfc2a2418b8a20fb3e0793

                    SHA256

                    f3fba51e342c276572d110da3cd01979bd4f42346f40be52a5d17e93e900b427

                    SHA512

                    50820bd96e52a9c6264ec80d0f8a5191efb4764ea4b97c4a58e717922c78620ed82d5334e42ea5dffcd094f3f61451e6c027c33f7aa4d587ac71eed73fbcb83f

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                    Filesize

                    15KB

                    MD5

                    4f392b18301c81cbb91b6fb262df7f33

                    SHA1

                    e2464957d68b8fa8211c5c9e693f692cbe2272f1

                    SHA256

                    63370582ccc7d931e66c7c36bf72ef493165f31d82fb42cff2a9ffef76711402

                    SHA512

                    e1656e45dafd7a1e2a03cf7439466d9c3d635127126b42f31f03584c002b9e25bbf22e5244a707de915999f90f4238d292065e1f556f36444a7dc9666c74f3f4

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                    Filesize

                    11KB

                    MD5

                    bcb0322b000b69024f6adb63f319b24e

                    SHA1

                    2ad478c5cdfcf5bdcfde6b24c75970041c746048

                    SHA256

                    98c006c63f7910fc44a61d210b14ba28dace5e9b64763ab2475a107ec7590d5e

                    SHA512

                    787547811c72b9acee0a743023ed87bfc7a262e58eab1d75612eeb1984a059b0fc16dca9b2cd6cc8a84388e073bd2eb28e8a029b90a2a39d1ba3f6e2d2a31358

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                    Filesize

                    10KB

                    MD5

                    3848bddbe8731461dcbfe713fe16b413

                    SHA1

                    dd3265c0b5f393b7b1046655c4c36b745a27038a

                    SHA256

                    e5953844b0ba0bc207bac431c74a9457e9c1b06ce1bb2d0a4a2fc5ea1213c1a6

                    SHA512

                    a6496a926aa8d8fd8e2677e232092d705561cc3f3c8de9df02d9265c361fa0b685e728f28801e0783da62847b603a7ef5b594a1f6e0395b356b4df07edad948b

                  • memory/1012-40-0x0000000000EC0000-0x00000000010AF000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/1012-37-0x0000000000EC0000-0x00000000010AF000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/3476-99-0x0000000000B30000-0x00000000011BF000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/3476-100-0x0000000000B30000-0x00000000011BF000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/4336-102-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-1606-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-1378-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-81-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-80-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-540-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-904-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-517-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-2735-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-58-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-1769-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-2082-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-422-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-2291-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4336-2538-0x0000000000470000-0x00000000010DC000-memory.dmp

                    Filesize

                    12.4MB

                  • memory/4356-2722-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4356-2717-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4372-77-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4372-79-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4460-0-0x0000000000220000-0x00000000006CB000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4460-18-0x0000000000220000-0x00000000006CB000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4460-4-0x0000000000220000-0x00000000006CB000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4460-3-0x0000000000220000-0x00000000006CB000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4460-2-0x0000000000221000-0x000000000024F000-memory.dmp

                    Filesize

                    184KB

                  • memory/4460-1-0x0000000077514000-0x0000000077516000-memory.dmp

                    Filesize

                    8KB

                  • memory/4636-76-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-21-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-519-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-504-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-123-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-16-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-20-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-19-0x0000000000FD1000-0x0000000000FFF000-memory.dmp

                    Filesize

                    184KB

                  • memory/4636-649-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-2716-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-101-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-41-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-1257-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-2454-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-38-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-2290-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-39-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-1556-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-1934-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-1758-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-42-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4868-883-0x00000000009B0000-0x0000000000C60000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/4868-1430-0x00000000009B0000-0x0000000000C60000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/4868-1342-0x00000000009B0000-0x0000000000C60000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/4868-882-0x00000000009B0000-0x0000000000C60000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/4868-856-0x00000000009B0000-0x0000000000C60000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/5072-73-0x00000000000E0000-0x0000000000588000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/5072-82-0x00000000000E0000-0x0000000000588000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/5072-103-0x00000000000E0000-0x0000000000588000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/5072-122-0x00000000000E0000-0x0000000000588000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/5168-1267-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/5168-1258-0x0000000000FD0000-0x000000000147B000-memory.dmp

                    Filesize

                    4.7MB