Analysis

  • max time kernel
    145s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2024 01:18

General

  • Target

    b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe

  • Size

    7.1MB

  • MD5

    6cb8e8277a0e4a699ec12912c6a06d96

  • SHA1

    9d16dfbf893dc1cb17f00a7263026883da1cbc75

  • SHA256

    b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2

  • SHA512

    9d93662ecd191ce12a6b777cb3416463f6698db66b2a9281db598ec3df125d057b67fd3a3c49880f8eda43a159ccc036e78db5f2ef0dbd5e4e5b0c3ef2253dc1

  • SSDEEP

    196608:Tqppj4e8Q1JEoNaUDqE4tsu6jj1Wtklwz:TOTrJEoYUDqEut6fbwz

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://property-imper.sbs

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://blade-govern.sbs/api

https://story-tense-faz.sbs/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe
    "C:\Users\Admin\AppData\Local\Temp\b64bbde349b82da7e2a644888ce1ff6b935644ae22cf1f1eaf3cf2082b078ec2.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:548
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j2c19.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j2c19.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\B4J51.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\B4J51.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3428
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1c56j1.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1c56j1.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4768
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:968
            • C:\Users\Admin\AppData\Local\Temp\1009469001\b02a585018.exe
              "C:\Users\Admin\AppData\Local\Temp\1009469001\b02a585018.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1648
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 1656
                7⤵
                • Program crash
                PID:64
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 1676
                7⤵
                • Program crash
                PID:2148
            • C:\Users\Admin\AppData\Local\Temp\1009470001\c70b97a90e.exe
              "C:\Users\Admin\AppData\Local\Temp\1009470001\c70b97a90e.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:696
            • C:\Users\Admin\AppData\Local\Temp\1009471001\0e3ea9d9f3.exe
              "C:\Users\Admin\AppData\Local\Temp\1009471001\0e3ea9d9f3.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2352
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3428
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1688
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4452
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1972
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3228
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2172
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  8⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1604
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2036 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f60ab1c9-1aea-4bec-8457-0e01d7db37b3} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" gpu
                    9⤵
                      PID:1528
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b46bd1a-46f4-43e1-ae53-46308bab25fd} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" socket
                      9⤵
                        PID:1564
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2888 -childID 1 -isForBrowser -prefsHandle 3064 -prefMapHandle 2920 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c48d81a7-02d6-4e42-96e6-e4d609094f7a} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" tab
                        9⤵
                          PID:4956
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2820 -childID 2 -isForBrowser -prefsHandle 3744 -prefMapHandle 3740 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {370b682a-0b3f-450b-8ff0-2ed4fb3bfaf9} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" tab
                          9⤵
                            PID:1692
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4552 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4568 -prefMapHandle 4564 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7915f70c-0fd4-4235-bd9c-3b3c7131c3f2} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" utility
                            9⤵
                            • Checks processor information in registry
                            PID:5300
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 3 -isForBrowser -prefsHandle 5324 -prefMapHandle 5328 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b54d5953-4c3c-4014-91d2-e853b6c43edd} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" tab
                            9⤵
                              PID:6808
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5288 -childID 4 -isForBrowser -prefsHandle 5508 -prefMapHandle 5512 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {397fe8b2-9081-47e8-9ecd-4cf061013786} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" tab
                              9⤵
                                PID:6824
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5692 -childID 5 -isForBrowser -prefsHandle 5700 -prefMapHandle 4612 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {89959d40-d443-4472-b22e-005848d00aa7} 1604 "\\.\pipe\gecko-crash-server-pipe.1604" tab
                                9⤵
                                  PID:6880
                          • C:\Users\Admin\AppData\Local\Temp\1009472001\22d966908e.exe
                            "C:\Users\Admin\AppData\Local\Temp\1009472001\22d966908e.exe"
                            6⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4616
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 824
                              7⤵
                              • Program crash
                              PID:1448
                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G6996.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G6996.exe
                        4⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:964
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 1700
                          5⤵
                          • Program crash
                          PID:3372
                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h01z.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h01z.exe
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:828
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4z653g.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4z653g.exe
                    2⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Windows security modification
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5000
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 964 -ip 964
                  1⤵
                    PID:4504
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1648 -ip 1648
                    1⤵
                      PID:2744
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1648 -ip 1648
                      1⤵
                        PID:4032
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4616 -ip 4616
                        1⤵
                          PID:3896
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2948
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3440
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2688

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json

                          Filesize

                          28KB

                          MD5

                          eb79111cc428995638583a2d237ea32d

                          SHA1

                          799bbaf1c7de6921037784a05287c054e8a6df04

                          SHA256

                          8c3497ea50442252f86f17134c3659f27ea60f6eea303171a4fa22a898363212

                          SHA512

                          08d00ae2afbeca5ff66844d5ad2dcd387884b5c6b5c219493f482b7fc65b4113ca210d650852f1064095742340151655f9a263279443dc63c46829ed759b450d

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                          Filesize

                          13KB

                          MD5

                          abcd67593d7b8b3bda2e5797d848831e

                          SHA1

                          e53cd12c986ba9eddb56296738b6cd28b75edd06

                          SHA256

                          a874773db05fe554481c8a3b6c7b9961caaa0fe9fc0c6af32ffdb1125a716ed1

                          SHA512

                          f05d75aa8babf930ec241e2334d3f87d5e07d1f7def6c15edf02721821c13b0a058150e77a265f128abc1e254f6f204ce2a7caa312b45a2abed107e332b339f3

                        • C:\Users\Admin\AppData\Local\Temp\1009471001\0e3ea9d9f3.exe

                          Filesize

                          901KB

                          MD5

                          02efc01b5599a6e5f021767a6a16deb4

                          SHA1

                          2eb11d0ed62d8ab3f51143e8e69dad6f596379b8

                          SHA256

                          03dff2a3ef928cc73243dea6e2b426c14c4889b47a169d4820b1dbbb053c9613

                          SHA512

                          77f956502bb7ba33d50934668b808e4914a14e28f2f7a534669c2af705d8baac6e11b247cea77da42a24a6c8944cfd12801fe0c0f362d06ba97d45e113b00077

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4z653g.exe

                          Filesize

                          2.7MB

                          MD5

                          9dea695dfad32ec439d077eb815b0b58

                          SHA1

                          3d817569c6fbcb0757ec47d97492f2a5fa2d2b08

                          SHA256

                          10a4bfdc91b931d5ed67c58f8db81ca7d3560da9bdd41f7a39b19617a7581ad8

                          SHA512

                          58c17aab073e20b7d59f3d5d283a86cb512e64e7e895cf181336f620b6be12d27b531e8aadc9518f4a4e665d780072a78ddbb4845f51e463af8f54db54c1c0da

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j2c19.exe

                          Filesize

                          5.5MB

                          MD5

                          b53c2307fb16b74db5d8f89f7a961585

                          SHA1

                          e226d9e50a416524cc0f296d6f8ebef96a3a6c37

                          SHA256

                          34fe7f711b9e4d3a0d9bf7d05914fe98f6126563eb53d59ac047671d0c4db812

                          SHA512

                          6559d5bc30ba5b309709cbd56913197f65da7ee22324df50e73c665c9d00a51d94ecaa9f1bcce4d6687c8e2e8e14d4cd7441135dde304e938ce47a1d1b417613

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h01z.exe

                          Filesize

                          1.7MB

                          MD5

                          17d580563cbdd3a37f8ef159c70f0b8e

                          SHA1

                          b0532976bd695b39384aa81d89b54fbde900b778

                          SHA256

                          9bba12864f0e8b64600e4252b589fd4f1f0b0339ecde4bc1c130a0d96945ffa7

                          SHA512

                          784fff522205ce44534474cdb26c7b456aeb6e2c42e4de96b3d5f6b4a36a0d329cf05a847f0a292979aaa09935fc9445390063faca4f0f492ee61ade0540f775

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\B4J51.exe

                          Filesize

                          3.8MB

                          MD5

                          f0c5f81710b930d1837e733ed25f08ec

                          SHA1

                          caa76c50cd90b0c7cdafb2f0a722be3307824070

                          SHA256

                          8b93752db008fb23aa0bc5bb5511a23de18d784f54b16ddb7cdcb3d15983c771

                          SHA512

                          d04a2e0e7a8b50ad1be17a0e70387c14ae8b4d9208ba3a6be34b42f40b863aafaff2ac0ce9568b62e9ad47f9d328aec026a7118de1ba85ba5fafdd2463350e3c

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1c56j1.exe

                          Filesize

                          1.8MB

                          MD5

                          5fcab4c0e9af5adc2963461bf81e0a5d

                          SHA1

                          f81122d741b6de1503e7625feea68233ae29f670

                          SHA256

                          8c5f58b2abcbb73f05d0d96bc1dd056bce130ce4f3209cfe02529b6b03ef86f1

                          SHA512

                          9fb90dbe48aba5ba7ac1e44cc97d5c498d8bb9a4f1fa397c3be1dfc76e1d072a319c13551d56677bcb156a37e8dcb8f464335d9e785c9e262087faa36ac88932

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G6996.exe

                          Filesize

                          1.8MB

                          MD5

                          95a269acc2667e85ec3c67f5f76e0fe5

                          SHA1

                          85b4c01a1f5a65cfe084165bbba00493a74b6a1a

                          SHA256

                          d8bf15f010a88817bfff05c7df61fba23676d5fe4d3a8deb5073fc7fa5255a3c

                          SHA512

                          be24721f2eec1b3240837a1d42030d58de00cbcd66d6db183a11d3f00e2829859b4813b1a6bcdffcba0c7352975618df95212e723d0bb65a0c360dd8fd1a20dd

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          479KB

                          MD5

                          09372174e83dbbf696ee732fd2e875bb

                          SHA1

                          ba360186ba650a769f9303f48b7200fb5eaccee1

                          SHA256

                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                          SHA512

                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                          Filesize

                          13.8MB

                          MD5

                          0a8747a2ac9ac08ae9508f36c6d75692

                          SHA1

                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                          SHA256

                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                          SHA512

                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                          Filesize

                          10KB

                          MD5

                          a8892986eb789ad13db9089879af7afa

                          SHA1

                          bcaf56a2a5a957dfd3270d165fa404e3766dcb64

                          SHA256

                          6d8bf7738b3c5d0d6093c460150a9195eda72beb9e71dc6dc03b66b4febbed1c

                          SHA512

                          6fe52db1e4298eabf4e9dcd1a122db8af050394000c4eb82be961ef2e094198da440bf0aad12d45527f6342cf6ddb8f5df09d6f0ad04d576818ca3e294ae75eb

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          23KB

                          MD5

                          90c5fdfe0908ac35f2191956d1bbad56

                          SHA1

                          d7e30015e65f450822ba4ea05cc0d1fe091f0797

                          SHA256

                          f15fcb768a5ea26c24187e4b9547a980e87f2aac0e856cbe181ec625272e4936

                          SHA512

                          c5a385babec7bba062bc72d0080b832747fb33de63f2988052626e0df4d0f209e1b3464ec64212c9a7fef1727c769a56c9796531cc0f40d501644397ac7bb59e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          22KB

                          MD5

                          5fd7ee1b9e92dd97fd80db182733bf36

                          SHA1

                          f911d0304a085a7e9b7275443a2feabee4c924d6

                          SHA256

                          c6f144c60cb29e8fd4392c4823a0ac8c314061cb6c30d7e56c162ade2f74f5d6

                          SHA512

                          435e2f2a32ed366ccdcd5924ef6163496deccd6b9f98cf5e74963a9fec82e916ddb4fd9ddf51f044f392400eaa66af65f62c40514a7d954049082fffef8d0389

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          25KB

                          MD5

                          1628231ac40c9c83a938dd878be18187

                          SHA1

                          aa54d173b8c473ca1e1bfc7c17a377015a6df767

                          SHA256

                          5fa176ed3b207c49eab4cab7cd7671df79383a4c244f5fcb65ba544189b526a6

                          SHA512

                          9f95f3b43cccb490db43faebc56995223f852a555da8b96400fcfb961fa2f99d744fbf35cdd20c48ad32bc64b98c740a0e40714cf45c929ed32f3143833f5f52

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          21KB

                          MD5

                          d50689752d5d2a85433306856c2aa771

                          SHA1

                          5de8e7b4d9c7d6a22ca32f578bcde0816d969bec

                          SHA256

                          73a303bea75745dbf07bb4d9fe7a590291a2aa0fddd5d058d1af6694aec8c121

                          SHA512

                          7f8a075cf7ec89a8b94ed2d7cfa7a1de585e2a1b177cafa8605b62e39d2434820197c6a967d2aa04bfc4ae52aee5a72819bf790ba72c4248524bcfec08309e97

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          24KB

                          MD5

                          d4e8bc1308cb1cb58c54a1426517fbbb

                          SHA1

                          019243fc0edca439fb4bd92c461093ec90c3fe96

                          SHA256

                          2859c4860cd910339b869ebc973428b981aa3071a8187c56679bbd3cc6907e7a

                          SHA512

                          b5f9cf752e19ce90586c8dd29ae43106da2285b84ebfae6cc69f73a28262b17841422caba81098d9f9915e6637fd9b1a89b872516ac65b6346515539d8b97346

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          25KB

                          MD5

                          735b464d87cb8f17c8bb5ed135ce9e3f

                          SHA1

                          9d8d1fa7512f581f8b4156520a180394051905fa

                          SHA256

                          25eec56191b2f6a319b24fdbc21465ab6aec0ff3ff55d1c05f56eeb326501e13

                          SHA512

                          dc20d3cd728d40b59b5a89de7b9e00714884272bca612d243975089f2db2c506f7dd6a74cc7f4a2cc1c603d778f2d540d4daeed11ee9ed2a36638fff147f9ca6

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          25KB

                          MD5

                          855a42dc269aafd36b9f24fe274d2e7f

                          SHA1

                          17500978c485d45fad5318274e39c5a1a32a67c1

                          SHA256

                          e479f7727ea6977d330da19088e72a89e4bebba145266e6ca2e78916a9208497

                          SHA512

                          9e3816113b0629d65746bdb6c2e1ff134357373a9f81a73b95333a99ae2a6f37229c2277711d9d727225b70ad433754e83208cd307ff6cc204d727aa1000a60d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\c90c0140-08b8-4a1e-a4d4-1688a6487a5d

                          Filesize

                          659B

                          MD5

                          b118c1dfbaa85b26d0206e2366544e9b

                          SHA1

                          91ea97262ccff0e6e05aec762ab79beac9c632b6

                          SHA256

                          49d1f286c45c7d00be08a97e28390b0b34f0709edd27e5871fd68e086839b2d1

                          SHA512

                          cde7b7adf916bafe947b342eebb1ecbce7966e9c94ca2537cebe753044c035eb4c03cc9af211ec16d8598bf01f66c82d6a7379e58907870d3fd3f895ace5c19f

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\dab12ce3-4d05-46aa-80d6-e12090a0b5c0

                          Filesize

                          982B

                          MD5

                          f492cdac748af3aacc1efbaa7dd61c3a

                          SHA1

                          00112eee25bbd1d88410ca250e2a0e73e80e80ee

                          SHA256

                          c354d57809e08506b2dffa1f2cb8a53c22aaa0acf996d5ccfa0bc023ffb12624

                          SHA512

                          11d27cf972f44e95d6d86230e579f965132f05842a7e101e7da273da7ab63f9969a9508a9754a58786161fa39bc9a0e4171d3fe7ec3645dc74e7ec7a02aaf0be

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                          Filesize

                          1.1MB

                          MD5

                          842039753bf41fa5e11b3a1383061a87

                          SHA1

                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                          SHA256

                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                          SHA512

                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          2a461e9eb87fd1955cea740a3444ee7a

                          SHA1

                          b10755914c713f5a4677494dbe8a686ed458c3c5

                          SHA256

                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                          SHA512

                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                          Filesize

                          372B

                          MD5

                          bf957ad58b55f64219ab3f793e374316

                          SHA1

                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                          SHA256

                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                          SHA512

                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                          Filesize

                          17.8MB

                          MD5

                          daf7ef3acccab478aaa7d6dc1c60f865

                          SHA1

                          f8246162b97ce4a945feced27b6ea114366ff2ad

                          SHA256

                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                          SHA512

                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                          Filesize

                          10KB

                          MD5

                          ac0859ecefa776d6ca1153363fd0f7da

                          SHA1

                          d22f21decf032d0768bb444969670b4cc1b653c7

                          SHA256

                          a9c04dc4e8bf9fae8d7ff8e78d8af3a68986aa44a4fd7b0afb1826c7dbff824c

                          SHA512

                          dda3bad49da7ea6140337130a59f2c8473e043e03657309c3bbac7b83736a390e9d2f9ee88e09f544d0f9108d2198be7b8fe41e98b794b6dc90e2d59d4d1432e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                          Filesize

                          12KB

                          MD5

                          c50ac31c120fb303b389ed6577ecc6ad

                          SHA1

                          a6fe885677ed381f6bd14284a2a02e39a755f3f5

                          SHA256

                          a0346c3208390e7d733a459a04db85b60261d04d2e3509fc488f9c6993ab3ca3

                          SHA512

                          d7b0259be87eda5fa09e7a6188a57bdcb83367e1bc1ee85c8da64babbb64b7fc55541ddaad1b353db99c5f7b3655defa4e34ee61ca2a91ca1a82673ae3fb8481

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                          Filesize

                          15KB

                          MD5

                          672f9e92f771642c323d915062fb166d

                          SHA1

                          8f0b709d9165e1bc2786924702411d4b2eb451c4

                          SHA256

                          ad364bd6972ed98a9447902f8fbcc56bb09a15fc434630531b1d236cd8e545cf

                          SHA512

                          6912ee7871cd5eeb676f5045840899f8a8bce47522f50db7c6347d007b910908e904ae66fa9cc2926d457339c68bcd05b3beb39911b0cc771caf82b98a146ebd

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                          Filesize

                          11KB

                          MD5

                          3a5d8c6a73296c4229c3f67c3d54eef6

                          SHA1

                          7f04a630bff449c87a79a354b7b7c042377872ed

                          SHA256

                          b03c5c8c2402e01087f7cfadc78420a05f9cfafd98988923f86edf8d834f0e0d

                          SHA512

                          f27287afa695df14d52f19355ef6eb687e2a538ed648ff17e4a46fd3bfe24efc1b751a88ff18c6472264a1f7e267128301d5fea321d5284c353d42b38aca677b

                        • memory/696-87-0x00000000000C0000-0x000000000074E000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/696-84-0x00000000000C0000-0x000000000074E000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/828-45-0x00000000000B0000-0x000000000073E000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/828-44-0x00000000000B0000-0x000000000073E000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/964-39-0x0000000000A30000-0x0000000000EF1000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/964-40-0x0000000000A30000-0x0000000000EF1000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-3631-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-1120-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-4134-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-845-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-4131-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-4142-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-4152-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-4146-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-825-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-4145-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-68-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-4138-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-86-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-4144-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-33-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/968-4143-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1648-69-0x0000000000F90000-0x0000000001451000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1648-67-0x0000000000F90000-0x0000000001451000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2688-4154-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2948-837-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/3440-4141-0x0000000000690000-0x0000000000B52000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/4616-824-0x0000000000050000-0x0000000000302000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4616-818-0x0000000000050000-0x0000000000302000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4768-21-0x0000000000DA0000-0x0000000001262000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/4768-35-0x0000000000DA0000-0x0000000001262000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/5000-110-0x0000000000C70000-0x0000000000F22000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5000-105-0x0000000000C70000-0x0000000000F22000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5000-48-0x0000000000C70000-0x0000000000F22000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5000-50-0x0000000000C70000-0x0000000000F22000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5000-51-0x0000000000C70000-0x0000000000F22000-memory.dmp

                          Filesize

                          2.7MB