Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 03:21

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    5ca58d76edc0e7291bf3d6bad7edbbe9

  • SHA1

    694124bf2e8d817b7f188706bbc49d0088317fe2

  • SHA256

    d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103

  • SHA512

    82b990ce963247c140161ce9ab28c79c5b4d648ddf46d622e152e3c0d79842be1cf1009a493b7af37b83976f36c05b56e353c6f7166dfc701979f87447f51fad

  • SSDEEP

    49152:JzqRbJAOwImTwJuvYsiI5kDbZF6j9FWHK:wRVA8xobiI566j9Aq

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3316
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008608041\J2W0oF3.ps1"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:872
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008609041\EM2BsXU.ps1"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1680
      • C:\Users\Admin\AppData\Local\Temp\1008610001\b8f604c4ff.exe
        "C:\Users\Admin\AppData\Local\Temp\1008610001\b8f604c4ff.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2236
      • C:\Users\Admin\AppData\Local\Temp\1008611001\e53997e7be.exe
        "C:\Users\Admin\AppData\Local\Temp\1008611001\e53997e7be.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1100
      • C:\Users\Admin\AppData\Local\Temp\1008612001\80facd8a8e.exe
        "C:\Users\Admin\AppData\Local\Temp\1008612001\80facd8a8e.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1848
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2544
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3592
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:460
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:524
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2112
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:232
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3552
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7bcf047f-185f-4db9-a49d-3ad436eed1ed} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" gpu
              6⤵
                PID:3260
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2412 -parentBuildID 20240401114208 -prefsHandle 2404 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b14e22c5-8837-44f5-87fb-a7058a1c7246} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" socket
                6⤵
                  PID:4512
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3400 -childID 1 -isForBrowser -prefsHandle 1512 -prefMapHandle 2996 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bc2535d3-f21d-4a1d-aa8a-9dae2e143ab6} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab
                  6⤵
                    PID:1304
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2772 -childID 2 -isForBrowser -prefsHandle 2596 -prefMapHandle 3880 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {93191004-734a-4289-a330-84ff662d7ee3} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab
                    6⤵
                      PID:2640
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4880 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4848 -prefMapHandle 4844 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d81d8f7-5d04-49bb-8e19-f1bff8460c37} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5304
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5316 -childID 3 -isForBrowser -prefsHandle 5308 -prefMapHandle 3904 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7951465-e847-4f2b-a984-77344b6ee695} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab
                      6⤵
                        PID:5872
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5448 -childID 4 -isForBrowser -prefsHandle 5456 -prefMapHandle 5460 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e3984d7-37f5-4921-b5f0-2904fe17fc88} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab
                        6⤵
                          PID:5904
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5640 -childID 5 -isForBrowser -prefsHandle 5648 -prefMapHandle 5652 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6791aa54-5553-47b4-8959-40b42694f6a3} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab
                          6⤵
                            PID:5920
                    • C:\Users\Admin\AppData\Local\Temp\1008613001\afaac3e617.exe
                      "C:\Users\Admin\AppData\Local\Temp\1008613001\afaac3e617.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:948
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008614041\wE2lFM5.ps1"
                      3⤵
                      • Command and Scripting Interpreter: PowerShell
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5792
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1756
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5240

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                  Filesize

                  2KB

                  MD5

                  3d086a433708053f9bf9523e1d87a4e8

                  SHA1

                  b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                  SHA256

                  6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                  SHA512

                  931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  18KB

                  MD5

                  fa817a42815ca7d2470b952cf51e6093

                  SHA1

                  f2be90814b3076ecea2ddd3fb4bf76315e04291c

                  SHA256

                  c14fcc7e6860ef6192b2dc1e13cb0d16c36838e672a59f141bd97340e63a319c

                  SHA512

                  7f02deb93c289b971d319b5d09abb2e39fc904a0c5abbb5b3d4f254060b6bc85ae0a3127e1c2a82688c7e31e89e7220a03f7dd7854467370b3a778a38f33ee77

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json

                  Filesize

                  27KB

                  MD5

                  9c413023ea1338668d82ad56d3c49971

                  SHA1

                  37be6436448572087cced1c83319caafdabfcbe5

                  SHA256

                  45e913c7c36b43ecf5a0843a3088a99b2b5dc6a85c6c4f0cdcc3d2ae8cf90ec4

                  SHA512

                  fbedb0480f3d90340f71298281eb2c7016879b1fd6e1d23c5891cb94b2f5f38a3487af6bb60986d1127a6ed180d02dfbdf51cd971c4c8f2a84c76d3559b28cce

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                  Filesize

                  13KB

                  MD5

                  c463c4e14f499c3ee8c9761e497193ee

                  SHA1

                  889e8bdfdf28ecf8b3450295c97c208f67c4e4b4

                  SHA256

                  218c3b50d75492b1486c109a02524fc6b3cb110e6eb87e3afc78129fd4df6ed6

                  SHA512

                  366406da5c204b515bb28276114dcfe322262dc079a63c3c7cb4b3ee0e7b7c947f6eb64058f2c6c3f30873ce6669e24dc7f29684b9337bc3b6f31fe84003e333

                • C:\Users\Admin\AppData\Local\Temp\1008608041\J2W0oF3.ps1

                  Filesize

                  612B

                  MD5

                  e3eb0a1df437f3f97a64aca5952c8ea0

                  SHA1

                  7dd71afcfb14e105e80b0c0d7fce370a28a41f0a

                  SHA256

                  38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521

                  SHA512

                  43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf

                • C:\Users\Admin\AppData\Local\Temp\1008610001\b8f604c4ff.exe

                  Filesize

                  1.8MB

                  MD5

                  64f25a20bc6a8730e6d230e5d63dac8e

                  SHA1

                  f1c8a90fefc9e7789013cf9228827634ad8410f3

                  SHA256

                  daa2f6c445600573a591de7b8ad352699dcc9ff8b5bd2e1a6f93dc373572ceae

                  SHA512

                  4b0e9001c5304b3deee2dd463ab5d310cf61423d773983994167093299878f28833772a746336aaa583b036a7a6510051602bc2064f7df983ae5999aae487c87

                • C:\Users\Admin\AppData\Local\Temp\1008611001\e53997e7be.exe

                  Filesize

                  1.7MB

                  MD5

                  d3fb62af150353d3cb05f84d328d5601

                  SHA1

                  98be84b348beaf1abb2a9327c5918322e840a274

                  SHA256

                  3a0642019f4c38e2b2b89e00492dfa809723534f7753ce480e01482ca191b950

                  SHA512

                  428034b57853c7b0a9e1fd47590f9816a53ef497cad88bba5bf1094a12089c2022ce75be1cfe760da9342ef8d3adb853d70d01fe05f2cc6622e9c6decb91d0aa

                • C:\Users\Admin\AppData\Local\Temp\1008612001\80facd8a8e.exe

                  Filesize

                  900KB

                  MD5

                  4676050a0ef5a185953ab79d47cb8585

                  SHA1

                  dec41077d44ded9ce6d7bcf29848ebf49a89b6fe

                  SHA256

                  bba632ef9970be97837b7cd9fad3df8c7a0f8476cb2bb8805e1f05c6b5167fd0

                  SHA512

                  3c5f5c50c9c75ebd664fe4b962f0b70791472f33e731dac34547aea673cd65253d31d51f146ad181ddd6bd173636ddf3d0768098d1ba1dd76d853f1e4d72e350

                • C:\Users\Admin\AppData\Local\Temp\1008613001\afaac3e617.exe

                  Filesize

                  2.6MB

                  MD5

                  439e7c18eefd3d53793669e1c9575d84

                  SHA1

                  8d6cf9ea7bcecbce59a28430636f3a6920b97d85

                  SHA256

                  0926fb4154569379a0a942b34acf902d259a7e8d89b0c033ca8858a5503e3965

                  SHA512

                  5f75a4b985dc1d05772a03a3cac8283be54c1cea5a4a6a093796b260b44f8f0ce0549ad979b31c06ae1ea16dd29a5c742ced0fc7f849940c07009df48cd59df9

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vhcoa4mj.nl4.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                  Filesize

                  1.8MB

                  MD5

                  5ca58d76edc0e7291bf3d6bad7edbbe9

                  SHA1

                  694124bf2e8d817b7f188706bbc49d0088317fe2

                  SHA256

                  d4e13faefc09eb85be337713e8899e9f6761d45593e33d19b14ac6f986b2a103

                  SHA512

                  82b990ce963247c140161ce9ab28c79c5b4d648ddf46d622e152e3c0d79842be1cf1009a493b7af37b83976f36c05b56e353c6f7166dfc701979f87447f51fad

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                  Filesize

                  479KB

                  MD5

                  09372174e83dbbf696ee732fd2e875bb

                  SHA1

                  ba360186ba650a769f9303f48b7200fb5eaccee1

                  SHA256

                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                  SHA512

                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                  Filesize

                  13.8MB

                  MD5

                  0a8747a2ac9ac08ae9508f36c6d75692

                  SHA1

                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                  SHA256

                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                  SHA512

                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                  Filesize

                  8KB

                  MD5

                  60ea34c3d6b0f680863061a97f48d209

                  SHA1

                  b64497f1de6db57ff0c4f6739eb0d72c54d47eff

                  SHA256

                  d087c6bc1e36e028231443cfadffd5708bcc8d9b18b992efade579e4c61c2b00

                  SHA512

                  443aa8eda57f4539a23aac0dab94eee5ea6f6a90a93a0d0b49dc6a6de2e8d5483bc385a10973417d45572d01113361005d39f9884b054897b5721bdbf70a35b7

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                  Filesize

                  11KB

                  MD5

                  d1f57587952d5ca33541d2dd0b8687d3

                  SHA1

                  7e367d0e49a1ba443b6d58b8226f080dd922028f

                  SHA256

                  9cba4f9834e8e27d7a64fa40df2ac6169edc1adf48a779a6f508373ede469637

                  SHA512

                  e3b7d91f32cf25dbf976a44041549ab37f1117864b5d4982bf57d5a990f7512c998c835e02bb37b399835c5e1951710e77a5c75552f79c0c8317fb18e42ecd9f

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                  Filesize

                  13KB

                  MD5

                  cf8497eb64f483813d2a99f260341380

                  SHA1

                  ee35954a86e4d7c0313e8fbec839ed33490c874a

                  SHA256

                  8c3213df9dd9575bf5056941691db3dbe5df46d1f0755bd289a934c860032798

                  SHA512

                  ce7601923cd1f0c4efc5d5444daf2e34fc7fba86b262cbe28e0039880ffc83f58e74def50bb173461a76270350240e4c7d5a3e275e1c6b51f8cbc59b5dcb8959

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  21KB

                  MD5

                  8de15121ddb1307fbc24a1e890679456

                  SHA1

                  359bb3ff7e8b1d294d8505eb4f328f6482c6bffd

                  SHA256

                  4bdf3631070d162376b3fe60034348f6fb60f362a8fbdf66c43d267a45fd355f

                  SHA512

                  867b190de43ffa67dddda724bcab1ab69b0a8f255216cab8687be84d4149576485659e867542970024187c2935e034a33d4b8f54a7ae55b0c45317a53e424ef2

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  22KB

                  MD5

                  d346b0d26774d5c38213563409d64718

                  SHA1

                  90a4bf6f169c25f73bf0412b1274b1111aa0d9d9

                  SHA256

                  1b873bdfb59d6f7301af69b192eae37d47f4e588bcf39092e489856d5a5d7c3d

                  SHA512

                  a6eac2c9acccd50927bd98c207a45913c1b870624722c0e9398c182bc5492953c760c56610c48e21ccca437e2a2c1ea485efce3ca6328a3c9f580f568687bebb

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  25KB

                  MD5

                  659582e896862841df0841a16bc652d2

                  SHA1

                  b752f53feeaaf9aba0e0ac0d22fd850adc3c6adb

                  SHA256

                  c5154b87f398fedb8269267757615686fb2d13f4e8e7a4c10846e448f1638aca

                  SHA512

                  28d48d685eaed30c04a63bfc26ceaaa2bb6e6809073b3c75179374bc500e2653b068c3d37b8cd45c59ed3c45b3f79ac02965d5011e252ea6c3859227c4332807

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  22KB

                  MD5

                  bb2215847d439a8abfcbb7f06158dee0

                  SHA1

                  d313a3a2ca23f7eb1acb18858c8a6259417b18b9

                  SHA256

                  963a58c8488693214e49897f5e7eeaec8720561f2d7f98e063c65fe7caec0677

                  SHA512

                  5b1d29e801304ed2aa8c59d0ddeb3a67eba50ecf683b16e184f836ce7745386414717e8a222979f2c7cfca63b04e3adca3799539363d12c1332fb9726d7a9260

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  24KB

                  MD5

                  c28ed8251f19273f26711f43803aefa2

                  SHA1

                  dd12cfbd4c8bc489076d293efd01d03b7ae41f56

                  SHA256

                  341c7634f531980e342cb1d8af21c738b4e99a65e9f140207ea6299889940e15

                  SHA512

                  e900320439bbf704bf6081c39e989475a6706cee3dc0ecf9556890ac5c648cb7239a62dfaa1cd0f90245103813229567ed108094b24688f85f88d70e9f258b66

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  25KB

                  MD5

                  c44dd9975953d7ca2e5e3b5ef755db18

                  SHA1

                  f1b1c9baf36b9b946eb97250cdd8d20fb1c12dac

                  SHA256

                  a133c3d52f96d7dc6ef1adbf7a4f299d96931a8cebc65ecacef1b4b49b4f3ba7

                  SHA512

                  70ffa16f0813698e6f6e1d1cae80b0790078141ac90b2ea95540f1f18ab948663116779c56a69fa04a21b38c3cc779bdf2bf25ce206d6b8872196aa7c8e87882

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\05f2a91f-75c7-437f-9ebd-f4479bc830c7

                  Filesize

                  659B

                  MD5

                  1ed3482a9c431c2779a238714585a6bc

                  SHA1

                  bd1b77c029ac6069df4f456428a9a683f8ff49d8

                  SHA256

                  83f4cd630bbd72ff227ed2a31571ea405fc05086c55dd157bb5aaa79fcd60a61

                  SHA512

                  fef1b3a80403af7708749cb591bf6fe91c4c0d5c595d202660e7dc823d5e000065cd4ba28ca333283d3e0b53b962e91727635c98fa3d5b136b2e57c1c23da324

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\b8c94435-ab46-4b50-993b-80c6d93219ac

                  Filesize

                  982B

                  MD5

                  8bfbe579b765e8792ed4cb480fd2f5f2

                  SHA1

                  072ae692986c18c45a79007a5862fa3378601b90

                  SHA256

                  0c777c4322e6c1406f7089a5e93624b59edefa673b3a58813d03ccbe06088b2b

                  SHA512

                  7a8e56329354ccec442a4af9134a7af19b5bca508869518c8bdde5f940e7412447890e16de609e9c7c0703e70eb42adf5323ca692d25349598065b18cb623fe6

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                  Filesize

                  1.1MB

                  MD5

                  842039753bf41fa5e11b3a1383061a87

                  SHA1

                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                  SHA256

                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                  SHA512

                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                  Filesize

                  116B

                  MD5

                  2a461e9eb87fd1955cea740a3444ee7a

                  SHA1

                  b10755914c713f5a4677494dbe8a686ed458c3c5

                  SHA256

                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                  SHA512

                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                  Filesize

                  372B

                  MD5

                  bf957ad58b55f64219ab3f793e374316

                  SHA1

                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                  SHA256

                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                  SHA512

                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                  Filesize

                  17.8MB

                  MD5

                  daf7ef3acccab478aaa7d6dc1c60f865

                  SHA1

                  f8246162b97ce4a945feced27b6ea114366ff2ad

                  SHA256

                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                  SHA512

                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                  Filesize

                  11KB

                  MD5

                  5b51daab6f6c7a917ec5a6fdaf420bd1

                  SHA1

                  692747dc765011e72c7c4526748e658caa1a85c9

                  SHA256

                  1476484c95903eaa8bb3b082b38b7967f530452e95daa31a40c4117d7f5c9aea

                  SHA512

                  37a1701e0b7e5da0e4361930ce9a624adc708829ec00ea106f706a11d602e0ab8108036a24d3640e0c81138600dcd3d7311809f031eb4e64cdabdf29973a74d7

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                  Filesize

                  15KB

                  MD5

                  3c6abcd2cfe8758d4a26f2e3e9be0b0c

                  SHA1

                  6fd53ffe81c04da4dbd3dd16e6c6b6b4d00cdfaf

                  SHA256

                  4255bb992034dcbc4fbcba9176fcdbeb2d3a789aad7cd888e9bf8b47e4cd8ed5

                  SHA512

                  a33456dafe008aeb7bf9fb6639b6e9360be0e5b442f0799ed2b433cde78f8cb953fb8540b5ffdb7eaf9917ac7a45ee23947348b8759e74ff066024058d6c1d2a

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                  Filesize

                  10KB

                  MD5

                  79f73443487af3d16ad1d91002751e8a

                  SHA1

                  498267aa7972f3b4a9a1679f9457eee00383e50b

                  SHA256

                  4f9e6c53c2881d3aaa07d180bbd3aaebcbf21769a7f1641e8f35b41288827cbf

                  SHA512

                  55e75a21586e4464312bee2625d8b5d32a4f179f0d02b6e8070b80c58257675df4f67d1c38e5cf3d1bb34f2bd479724e5c561f4f44fab91e244235a0c8ba68ef

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                  Filesize

                  11KB

                  MD5

                  d7b9b101898379bcf95ebfec0251cc5e

                  SHA1

                  5154e4d630294f0e1f92fd63f58a21bfe96444d7

                  SHA256

                  75df76560e20696a6c5828b0563684b90c4674fe1cb55e270ba71eacf76226d1

                  SHA512

                  d81ba07c90adfd825721ff95f1febdacd6a48ee81f8d3fd655ecb500ec3f4200ca36b79d51600fefb7f2d67d4753e3acc1da6a104875ca7862c74b84d888a72c

                • memory/872-31-0x0000000002790000-0x00000000027C6000-memory.dmp

                  Filesize

                  216KB

                • memory/872-30-0x0000000072EEE000-0x0000000072EEF000-memory.dmp

                  Filesize

                  4KB

                • memory/872-93-0x0000000007A00000-0x000000000807A000-memory.dmp

                  Filesize

                  6.5MB

                • memory/872-70-0x0000000006600000-0x0000000006632000-memory.dmp

                  Filesize

                  200KB

                • memory/872-57-0x00000000060B0000-0x00000000060FC000-memory.dmp

                  Filesize

                  304KB

                • memory/872-56-0x0000000006050000-0x000000000606E000-memory.dmp

                  Filesize

                  120KB

                • memory/872-99-0x00000000075D0000-0x00000000075DE000-memory.dmp

                  Filesize

                  56KB

                • memory/872-71-0x000000006F770000-0x000000006F7BC000-memory.dmp

                  Filesize

                  304KB

                • memory/872-47-0x0000000005AF0000-0x0000000005E44000-memory.dmp

                  Filesize

                  3.3MB

                • memory/872-94-0x00000000073B0000-0x00000000073CA000-memory.dmp

                  Filesize

                  104KB

                • memory/872-36-0x00000000059A0000-0x0000000005A06000-memory.dmp

                  Filesize

                  408KB

                • memory/872-37-0x0000000005A80000-0x0000000005AE6000-memory.dmp

                  Filesize

                  408KB

                • memory/872-35-0x00000000051C0000-0x00000000051E2000-memory.dmp

                  Filesize

                  136KB

                • memory/872-34-0x0000000072EE0000-0x0000000073690000-memory.dmp

                  Filesize

                  7.7MB

                • memory/872-32-0x0000000072EE0000-0x0000000073690000-memory.dmp

                  Filesize

                  7.7MB

                • memory/872-33-0x0000000005370000-0x0000000005998000-memory.dmp

                  Filesize

                  6.2MB

                • memory/872-126-0x0000000072EE0000-0x0000000073690000-memory.dmp

                  Filesize

                  7.7MB

                • memory/872-92-0x0000000007230000-0x00000000072D3000-memory.dmp

                  Filesize

                  652KB

                • memory/948-585-0x00000000000E0000-0x000000000038A000-memory.dmp

                  Filesize

                  2.7MB

                • memory/948-183-0x00000000000E0000-0x000000000038A000-memory.dmp

                  Filesize

                  2.7MB

                • memory/948-582-0x00000000000E0000-0x000000000038A000-memory.dmp

                  Filesize

                  2.7MB

                • memory/948-191-0x00000000000E0000-0x000000000038A000-memory.dmp

                  Filesize

                  2.7MB

                • memory/948-189-0x00000000000E0000-0x000000000038A000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1100-142-0x0000000000AD0000-0x000000000116B000-memory.dmp

                  Filesize

                  6.6MB

                • memory/1100-143-0x0000000000AD0000-0x000000000116B000-memory.dmp

                  Filesize

                  6.6MB

                • memory/1680-72-0x000000006F770000-0x000000006F7BC000-memory.dmp

                  Filesize

                  304KB

                • memory/1680-100-0x0000000007580000-0x0000000007594000-memory.dmp

                  Filesize

                  80KB

                • memory/1680-91-0x0000000006FD0000-0x0000000006FEE000-memory.dmp

                  Filesize

                  120KB

                • memory/1680-95-0x00000000073A0000-0x00000000073AA000-memory.dmp

                  Filesize

                  40KB

                • memory/1680-97-0x00000000075E0000-0x0000000007676000-memory.dmp

                  Filesize

                  600KB

                • memory/1680-98-0x0000000007540000-0x0000000007551000-memory.dmp

                  Filesize

                  68KB

                • memory/1680-102-0x00000000075B0000-0x00000000075B8000-memory.dmp

                  Filesize

                  32KB

                • memory/1680-101-0x00000000075C0000-0x00000000075DA000-memory.dmp

                  Filesize

                  104KB

                • memory/1756-901-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1756-882-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2236-162-0x0000000000650000-0x0000000000AEB000-memory.dmp

                  Filesize

                  4.6MB

                • memory/2236-120-0x0000000000650000-0x0000000000AEB000-memory.dmp

                  Filesize

                  4.6MB

                • memory/2236-190-0x0000000000650000-0x0000000000AEB000-memory.dmp

                  Filesize

                  4.6MB

                • memory/2236-172-0x0000000000650000-0x0000000000AEB000-memory.dmp

                  Filesize

                  4.6MB

                • memory/3316-19-0x0000000000EA1000-0x0000000000ECF000-memory.dmp

                  Filesize

                  184KB

                • memory/3316-1939-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-2898-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-2897-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-2896-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-118-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-580-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-2894-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-2892-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-592-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-69-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-48-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-22-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-21-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-20-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-103-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-18-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-2891-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-2884-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-2815-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-171-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-96-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3316-883-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/5056-2-0x0000000000671000-0x000000000069F000-memory.dmp

                  Filesize

                  184KB

                • memory/5056-1-0x00000000772F4000-0x00000000772F6000-memory.dmp

                  Filesize

                  8KB

                • memory/5056-3-0x0000000000670000-0x0000000000B35000-memory.dmp

                  Filesize

                  4.8MB

                • memory/5056-4-0x0000000000670000-0x0000000000B35000-memory.dmp

                  Filesize

                  4.8MB

                • memory/5056-17-0x0000000000670000-0x0000000000B35000-memory.dmp

                  Filesize

                  4.8MB

                • memory/5056-0-0x0000000000670000-0x0000000000B35000-memory.dmp

                  Filesize

                  4.8MB

                • memory/5240-2895-0x0000000000EA0000-0x0000000001365000-memory.dmp

                  Filesize

                  4.8MB

                • memory/5792-541-0x0000000006C40000-0x0000000006C8C000-memory.dmp

                  Filesize

                  304KB

                • memory/5792-522-0x00000000062B0000-0x0000000006604000-memory.dmp

                  Filesize

                  3.3MB

                • memory/5792-565-0x0000000007C30000-0x0000000007C41000-memory.dmp

                  Filesize

                  68KB

                • memory/5792-562-0x0000000007990000-0x0000000007A33000-memory.dmp

                  Filesize

                  652KB

                • memory/5792-552-0x0000000073630000-0x000000007367C000-memory.dmp

                  Filesize

                  304KB