Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 16:36

General

  • Target

    aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe

  • Size

    7.0MB

  • MD5

    3a41c8a33484f96bc90e2cb48e991b2a

  • SHA1

    b54959b4847473baa24620ab2e0dbdc2f0062118

  • SHA256

    aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa

  • SHA512

    6474a44b0025fdda52c188a8d24b04fcf057356a8551a79aa282807f446e0f97761ea3b87f4654ee6b33ebc58bdbe7190656091593755ecafd0e318be5b5093b

  • SSDEEP

    196608:/jofebKHGP/rZGuIWy1hs2RF+4EL4l3Qee:/jofeZP/rZQIY1E8lAZ

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe
    "C:\Users\Admin\AppData\Local\Temp\aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2C66.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2C66.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4L83.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4L83.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1736
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1U32L7.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1U32L7.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2276
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:548
            • C:\Users\Admin\AppData\Local\Temp\1009074001\0f31b182cf.exe
              "C:\Users\Admin\AppData\Local\Temp\1009074001\0f31b182cf.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5096
            • C:\Users\Admin\AppData\Local\Temp\1009075001\53157ba1e0.exe
              "C:\Users\Admin\AppData\Local\Temp\1009075001\53157ba1e0.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4400
            • C:\Users\Admin\AppData\Local\Temp\1009076001\5da7961cdd.exe
              "C:\Users\Admin\AppData\Local\Temp\1009076001\5da7961cdd.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1372
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4532
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2952
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3156
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4528
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4424
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3260
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  8⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:4460
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2000 -prefMapHandle 1992 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {74343252-261b-4b68-8014-790eb53140b7} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" gpu
                    9⤵
                      PID:116
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e03be6a4-bd27-48db-897b-3a5070af6182} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" socket
                      9⤵
                        PID:1496
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2944 -childID 1 -isForBrowser -prefsHandle 3116 -prefMapHandle 3372 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {44a89912-6e90-4d53-8228-f4557c72ad34} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" tab
                        9⤵
                          PID:1104
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3936 -childID 2 -isForBrowser -prefsHandle 3940 -prefMapHandle 3196 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b5bd93c-ce50-4199-b638-454b8dd07dfa} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" tab
                          9⤵
                            PID:756
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3196 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4700 -prefMapHandle 4588 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d679b6ff-f310-48f7-b4e9-d3dbdb3a57a3} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" utility
                            9⤵
                            • Checks processor information in registry
                            PID:6168
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5648 -childID 3 -isForBrowser -prefsHandle 5504 -prefMapHandle 5500 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f21c0a86-b482-4246-97d1-e4b1bf3a7172} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" tab
                            9⤵
                              PID:2188
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5904 -childID 4 -isForBrowser -prefsHandle 5896 -prefMapHandle 5892 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b94d168-83f0-4276-904d-fed122e63690} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" tab
                              9⤵
                                PID:4220
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5808 -childID 5 -isForBrowser -prefsHandle 6040 -prefMapHandle 6044 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f41f3d1-3f75-4dd8-b46d-e95af4e44783} 4460 "\\.\pipe\gecko-crash-server-pipe.4460" tab
                                9⤵
                                  PID:2860
                          • C:\Users\Admin\AppData\Local\Temp\1009077001\059608bb77.exe
                            "C:\Users\Admin\AppData\Local\Temp\1009077001\059608bb77.exe"
                            6⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2700
                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l6357.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l6357.exe
                        4⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2636
                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h52S.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h52S.exe
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4368
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c900k.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c900k.exe
                    2⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Windows security modification
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5040
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:6128
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5208

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json

                  Filesize

                  19KB

                  MD5

                  67eb1056cd8f4f6df600fa2c0b7a60ad

                  SHA1

                  a532fae69fb71837ba4c6cc7697a6d5df216f102

                  SHA256

                  3db2fafacaa5588925c3228609d51253aadea76f73e0addf035d211efa2de7f1

                  SHA512

                  9f61c692557dd2fc4cb2a83cde7ccd3696c4195f831e43b24323ec7ec773dac8289aedd63ad0b1f90d0cfb0daf5b5f370ffa7359d4d20e8f45315f479939533c

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                  Filesize

                  13KB

                  MD5

                  29bf47d2221126eff57770646e3d9cff

                  SHA1

                  3f054cf33dd269dcafaed710e690b1833c2cf5b5

                  SHA256

                  9c7ba2584368a349423c2d91bbf1f0560675cf797f58480936f74038f34e119a

                  SHA512

                  edbcf9dd22198777e7a5f03214c94db142069bb9ed9b816baa15da459b78e848706da021b29c87302c3fe122ff53b58f162e871e84678d521c83da3b036ab483

                • C:\Users\Admin\AppData\Local\Temp\1009076001\5da7961cdd.exe

                  Filesize

                  901KB

                  MD5

                  7708ca287b5703fd3e733e3abb32c5f5

                  SHA1

                  bf349adc93f015eae3053e5cb6f69ae287334931

                  SHA256

                  19ce538d200b7d328f4615475ffa78d2ebb9c5fa8d7f49bc5f5b1a605cf28f45

                  SHA512

                  e62ae32a27b2e60e3b391f98a4fc1c4bd63b891d42ff64ea16ac3abdd883c88154ed42f4adad5bc1fae1b6f9b84b2713b31cd5eb9fa955eea642e5ee0de638aa

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c900k.exe

                  Filesize

                  2.7MB

                  MD5

                  004ab6e9671359a4b40cefac032cb778

                  SHA1

                  493eb400d94aae837fcf4a29d76d388d0411e007

                  SHA256

                  51a6dc406c24cccdcff7f8ed9d38940007bfab29560198805350142b9945cb6d

                  SHA512

                  e99be2fd72c751a3e990ba52f172f99f3ef83d455f4e93d2a5f8f6720414c606ba032f2b4221ddf121bcfdbe2e46ebe9f53aad7f8d9c1b3afd7659dce9cb6d2c

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2C66.exe

                  Filesize

                  5.4MB

                  MD5

                  a5cfb2c12218b3e50f3f673de458cce1

                  SHA1

                  5131f99518cdf42160a3f564d3902e93b1cf2b1d

                  SHA256

                  0cf41e5242876a90a8abf49497e591ce7e5bc17308509cfd5faba0bc42b4344a

                  SHA512

                  13754494bfe1820c39e29fbf87658fcf853f5b3de1569ea8c5e49a6a0f5f18583144cef527e26820973be90bb87ae9cac77053f15b7c4d66bdaf5f7680eb7067

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h52S.exe

                  Filesize

                  1.7MB

                  MD5

                  3456608218e19c82196acb63550eac9f

                  SHA1

                  8aac0299aba455e064b65b2ea03e7b7709e26afd

                  SHA256

                  198e241277eeabe643ccbe84f7c384b5a4f4e276fac38340dc29618ed1dd012a

                  SHA512

                  307cd22f54ab49ee078a12f290dd32c7260f7abd6cfcf0385c086423ea8e4f71b56712de26850c53e8c721eb033a8b54198322e0f1b5db2191315858d6db0d72

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4L83.exe

                  Filesize

                  3.6MB

                  MD5

                  d6f949b8d4fb0708ac1ddeef0a4bfd6f

                  SHA1

                  451193e2abaf095834e36adeb46e39548399adee

                  SHA256

                  e3f69f318470eda80a02d28d3099147a5f537341afadc1a5720288c7c5519028

                  SHA512

                  d6e818d94d0f3dff6cf3f99c0a46ee6cbe42c8bbfff869d758a3c5a713134682de5f468a43d03e1528e5c90be731c7775f76e60953d1945cd9e9cbd3b855b65b

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1U32L7.exe

                  Filesize

                  1.8MB

                  MD5

                  45ad1540f6f9792ba5bb88e00358ce0c

                  SHA1

                  317409f6f729e31e9f74633c78526d908f2b8760

                  SHA256

                  8c0b95971d30bd0f553ef53c17b6e1569a7959c6ae4c00fdbdcf37146506890a

                  SHA512

                  c025e5b6e9f97f90d6e29a863fff761bc17d44ccdae4c54f7eb7ff6a22fec135de427228b70ad2f80f80e7efe66537e1eb09fd6c9854f4361d166e6d2af8aadd

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l6357.exe

                  Filesize

                  1.7MB

                  MD5

                  ad8c2e682a2304872d34b870c7838533

                  SHA1

                  270385c022377e941abc235009da0e6e4e9dfb7b

                  SHA256

                  81bf308c76d66c3c8d93f5202ff2211f2aad1442b9c64b1eb40aef60685b78ba

                  SHA512

                  078df8229a19289b782e715531812dceb83a4515c644849fc6e5efbb5aa2e0d34569065646ebc14ed847a52ce1b12f7e2d5a061dec39bf03d8fab346a4a5fb02

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                  Filesize

                  479KB

                  MD5

                  09372174e83dbbf696ee732fd2e875bb

                  SHA1

                  ba360186ba650a769f9303f48b7200fb5eaccee1

                  SHA256

                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                  SHA512

                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                  Filesize

                  13.8MB

                  MD5

                  0a8747a2ac9ac08ae9508f36c6d75692

                  SHA1

                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                  SHA256

                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                  SHA512

                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                  Filesize

                  8KB

                  MD5

                  3dc986ac66c9377d55ed31c93e7bcfa3

                  SHA1

                  f2c64003d53bd1b086d21e7e6ecabe95c7e8231e

                  SHA256

                  9bd4fc9c5c879ac61e77b3c9c3c14c730b80f8e1bc78d13cfe3b739435a835e4

                  SHA512

                  2a19816f494fffa66049cb8fc145ffd351d945177e3d68484e13a9e0edbb83f08a20bb23797069ec44ef2b4ac5e39f10d0dc770f2588a3a5ef08327b42dcfce1

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                  Filesize

                  13KB

                  MD5

                  8fc1184296d0f05c1f80ee3d19bc43b1

                  SHA1

                  19376979968929fa65f0028681449fa4d1cd1cf4

                  SHA256

                  ef30ae98af8423915a9e884a251697af9bd73ecd4f0ed4dfe279e58bc21716b4

                  SHA512

                  c7f803c1baa69b1a90f206fed7837eb8dbbd0f2bb0d3f32b9da2b9cf331bc6541a3e38fac64be86039a2407bbc169ac9bf40d4aeba5ef93fb6a7ce068e0a9a99

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  14KB

                  MD5

                  24863b3fc86bb2c3a30af49b9c1a269b

                  SHA1

                  71ba3aad6387baac8233eaa74eb353dde1e0c121

                  SHA256

                  238505b80f1dff5081921c023f202c2f8234d1bafbd4b696f3bbe4b0ca688f90

                  SHA512

                  0d994d846060d1a12a4e6b3ee45eef681365eb97bb456580a258ee30c07fbaaa0740169763ede1c8fc5a753df0a185f7f8fd75b30828dee5216be598424062cc

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  23KB

                  MD5

                  99e8ded5131e7a88d5ac4f80ffd4ae4b

                  SHA1

                  fb5b37e73a1ebf124d68b86eb71eb7b93c863397

                  SHA256

                  70bf2a4a7142debb041a00ec29f995bb60a0b53b61e22ef1003ddc9d7c618872

                  SHA512

                  9f2e71c7bb33a9fe2769c04db2fec85d648b86e081091e3bc2ada12cefa8dc298967898e53f6634bd50beac3beacf86761d40b01c5e52c5a252bddabf785d3c2

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  15KB

                  MD5

                  f5779100ceee587e8cf04c028803e15a

                  SHA1

                  91809fe252e73532bb3f811c08b1fec88ae9da1b

                  SHA256

                  13c1d916e1ee17ba0ef3a31c514462dee189b10bb52be25bf2e76ede8e0d6e9e

                  SHA512

                  572cf76d2c0b62af303c4407a1ee1ed7f77b340d22efb90d36a52a0cbece898947c0fea3b7c4699a923b18ef68670ff49b43f665e36bf893ca7db7b7411bdeac

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  5KB

                  MD5

                  2824ac07b002bf4ea001cd9ecbdc2790

                  SHA1

                  601a0e378e89eb74d10ffac17d376e51bb0f6de1

                  SHA256

                  e0d9b486ee85765ad48e872e91cc6120033951bbf516fa01ea3b860df91be3f2

                  SHA512

                  cf3b96545b2308deacfe0a35100bfb4e63de6f4a5144140c34b15f7d3e782e6ed696cd0d8d7ddf84aca00ad99417542e0702c47fb9c3486e1e64c2919bdb7324

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  15KB

                  MD5

                  253cabda586df4089beb88cff6fa2cd6

                  SHA1

                  1d3529c4112baa6de3c58146dd90dd550f71078f

                  SHA256

                  17035a78c0a1be0b1d0a586936fd1f67fa3b5d9f7a3d3ed2ab1db589d438f418

                  SHA512

                  9a78d1ecd3f42fb3ff2d2827207b5eea1346d2d61ab9fe80bc2dc3968bfbb67362abaf411e6f71c89ce65f71cc0d970d474a7582134218a092d27f2ea85555dc

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  15KB

                  MD5

                  e3b0f298d0d2e94a89d2dfa8eb2bb1cf

                  SHA1

                  8530b678942ac5330cb9b74306c12e6db848718b

                  SHA256

                  0783c517d4f2333a0c85b2af09437d7eb6bfdaf26d8b941908546485628b1ec7

                  SHA512

                  c70099c3091b7985652593222ebe6214e2426828d3b81264046ae59680ec213834fa26faf1f1fdd207cf6e2f874b42aca92804cc546cd9360957945819368c3a

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  6KB

                  MD5

                  bce1f6eb4e13fa95b5d640a9fd48621f

                  SHA1

                  6aebd12c9ad56a3fa398ec41e3e19f20923f3e4e

                  SHA256

                  a65723aa4500e8d867eeeb334de42076cb7415e6d9b8f302512ede4546b805a0

                  SHA512

                  03a8a1cc1beaec0f65980f2d2a9fbaf2c4ab4bd30d89156f35fd1a8f0374ddee41a807618fd895a87914d6199aa2b35be7262b9ed34c3b2a85910b171fccbdef

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  5KB

                  MD5

                  7187f8ce205cd9ed34ea0981dd272efc

                  SHA1

                  5efee37caa67d5d72e0ab3492505dc801770a526

                  SHA256

                  e54181a4fcaffa86f6e4ec3c933142779965dba5cf682823f703f5d2cc9f987a

                  SHA512

                  e2aa629f8d196af485896f6e6270749489caf97c3c45a576631a6a47d65d959ce5ac27a616eb0fad55c329d938f36e11963f62fac011e9c41c4ea836d5ca6ecf

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\0a2dcd4a-40c9-4735-bc48-2681f43afecd

                  Filesize

                  25KB

                  MD5

                  e5ee019d0f5c666e99fbfe4024980462

                  SHA1

                  404227640b37632a4adfec30feded6dbe1e617c4

                  SHA256

                  1ac9776178c6c7d9c1bf96ff7f4a55aa4b1e92ff761e4fee0bebd7fd9bbc201d

                  SHA512

                  06b8cb3968d63a27001e1ba1d926e9eed7bc15d0d4f20d6b7373b3fbb53545e41f5173b8def7c073fffbe7b52b2a6c9794b5bc66fc697b28e4ed0f9235601b29

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\87623de8-930c-45a0-a245-4458ba1b890b

                  Filesize

                  982B

                  MD5

                  5153c34058592aacfc4a5391485cd90c

                  SHA1

                  532ef1f1dfc430f4f5b9bfaf1b8a5d8fe0a45961

                  SHA256

                  5c493ef05382d85acf0c1a05f656b2ac3c87b15634344d15cf8e699747fdbacc

                  SHA512

                  9a507c681334c53bbd9fa59825d24d37bcffa32bc22c6689d5ea9fd70896d041cdaf820880814e4da2e587dcbc99bc1bb7a8432af09015f598ed9411a4046b53

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\9c3c8e04-3d32-44b8-bb79-7b67f596e149

                  Filesize

                  671B

                  MD5

                  3ba8993918aaabfe7473569ee807417d

                  SHA1

                  80d5147c7abbd6626d095ca475ef889b877bf0d0

                  SHA256

                  02cdd939b196cc0ca4afdef3fd5cbdef7b4a8334dedb6b9f11a8194e0f13ff57

                  SHA512

                  41f705cbc0bea3aae26de87084021234c464c9b31ca1591462179bf535e7e85aa544e9e8f97c3235907ccbee2e4eb61f2ab835b77dcc2c6a16f3fd3503bdc8c4

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                  Filesize

                  1.1MB

                  MD5

                  842039753bf41fa5e11b3a1383061a87

                  SHA1

                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                  SHA256

                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                  SHA512

                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                  Filesize

                  116B

                  MD5

                  2a461e9eb87fd1955cea740a3444ee7a

                  SHA1

                  b10755914c713f5a4677494dbe8a686ed458c3c5

                  SHA256

                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                  SHA512

                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                  Filesize

                  372B

                  MD5

                  bf957ad58b55f64219ab3f793e374316

                  SHA1

                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                  SHA256

                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                  SHA512

                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                  Filesize

                  17.8MB

                  MD5

                  daf7ef3acccab478aaa7d6dc1c60f865

                  SHA1

                  f8246162b97ce4a945feced27b6ea114366ff2ad

                  SHA256

                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                  SHA512

                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                  Filesize

                  11KB

                  MD5

                  3d6649f8e9109b4b939e0069273fb7ba

                  SHA1

                  acd7f30a0eea8f911b2e94aa6d22e0f93937e7a1

                  SHA256

                  e14109038e4b395218b518546a8af09cdb4be7ba9f901600424c88fadffb39c1

                  SHA512

                  fb18125f03deb6dffc1a3829d42d1f9b0505a421e9f67cec120e734efe049605d10ddea98d394bb9e548e80aece925891eb245c78da62200260198e35c4909b0

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                  Filesize

                  15KB

                  MD5

                  e56203c15514ad153bbf878f210b325d

                  SHA1

                  e06f643319e5cd19dda2e647e77afdeca0ed889b

                  SHA256

                  5ef5ae8cfd6453cdb6fb8c93197f632dd7bdffcbb3eb673f232606fc9ec70dea

                  SHA512

                  6a3d9facf091e8a5d0202009993d9665b9a3881a56ba405eb939d8acfd8cf6901d942351cfbec8b8bcccecc843e7f1e23885dc172b504098660d906f62f36aa5

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                  Filesize

                  10KB

                  MD5

                  be8182e88e27aaa0a72af10cccf5e414

                  SHA1

                  db07cc16c23d8650f7642e41958a07600dd9e525

                  SHA256

                  0ac500c5b2d9e5b38d2e4c49ddabad909e4c090980e4e4b4358f01243b8b8b36

                  SHA512

                  e21f03ab4df758cb5be07a71c9657ea8aefadb323a14dff0d15e70422307968e35a4d19106c9935ab0fd2a9f42e9f51b5137da8b9b7219022d4bafae6eb72cad

                • memory/548-111-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-3275-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-49-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-3271-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-3270-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-3266-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-3257-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-33-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-2453-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-3274-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-867-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-1316-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-52-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-883-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-3276-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/548-75-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2276-20-0x0000000000A10000-0x0000000000EC3000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2276-32-0x0000000000A10000-0x0000000000EC3000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2636-39-0x0000000000660000-0x0000000000AE0000-memory.dmp

                  Filesize

                  4.5MB

                • memory/2636-38-0x0000000000660000-0x0000000000AE0000-memory.dmp

                  Filesize

                  4.5MB

                • memory/2700-848-0x00000000003C0000-0x0000000000682000-memory.dmp

                  Filesize

                  2.8MB

                • memory/2700-854-0x00000000003C0000-0x0000000000682000-memory.dmp

                  Filesize

                  2.8MB

                • memory/2700-878-0x00000000003C0000-0x0000000000682000-memory.dmp

                  Filesize

                  2.8MB

                • memory/2700-855-0x00000000003C0000-0x0000000000682000-memory.dmp

                  Filesize

                  2.8MB

                • memory/2700-875-0x00000000003C0000-0x0000000000682000-memory.dmp

                  Filesize

                  2.8MB

                • memory/4368-44-0x0000000000330000-0x00000000009C3000-memory.dmp

                  Filesize

                  6.6MB

                • memory/4368-43-0x0000000000330000-0x00000000009C3000-memory.dmp

                  Filesize

                  6.6MB

                • memory/4400-92-0x00000000003E0000-0x0000000000A73000-memory.dmp

                  Filesize

                  6.6MB

                • memory/4400-91-0x00000000003E0000-0x0000000000A73000-memory.dmp

                  Filesize

                  6.6MB

                • memory/5040-47-0x0000000000EF0000-0x00000000011B2000-memory.dmp

                  Filesize

                  2.8MB

                • memory/5040-74-0x0000000000EF0000-0x00000000011B2000-memory.dmp

                  Filesize

                  2.8MB

                • memory/5040-50-0x0000000000EF0000-0x00000000011B2000-memory.dmp

                  Filesize

                  2.8MB

                • memory/5040-69-0x0000000000EF0000-0x00000000011B2000-memory.dmp

                  Filesize

                  2.8MB

                • memory/5040-51-0x0000000000EF0000-0x00000000011B2000-memory.dmp

                  Filesize

                  2.8MB

                • memory/5096-68-0x0000000000240000-0x00000000006C0000-memory.dmp

                  Filesize

                  4.5MB

                • memory/5096-71-0x0000000000240000-0x00000000006C0000-memory.dmp

                  Filesize

                  4.5MB

                • memory/5208-3273-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/6128-1180-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB

                • memory/6128-1146-0x0000000000550000-0x0000000000A03000-memory.dmp

                  Filesize

                  4.7MB