Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2024 03:01

General

  • Target

    ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe

  • Size

    1.8MB

  • MD5

    e4c570fba70843d9127a627d5f627766

  • SHA1

    9528c5de55077ba02d941300cc0960b4076b6ae8

  • SHA256

    ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86

  • SHA512

    07a920c8029b2fbaff0f938702e919bd5ce59dcac3bb09b3fb6cc9057f4cac0d49b3a62a9861de2bedac4eb8fddd8a26798ccebb138f5b25748b979f0b2cd717

  • SSDEEP

    24576:aFqinFKLQTO5GZfnT4F/MZfZLaHx8oAw6dR7x9Mc251UmzL0p9/jq4EiP+SnOo4r:aFXFNC5UfnT4VMpZLaRadFEOmzM7PBD

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe
    "C:\Users\Admin\AppData\Local\Temp\ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3880
      • C:\Users\Admin\AppData\Local\Temp\1010860001\35c5401b05.exe
        "C:\Users\Admin\AppData\Local\Temp\1010860001\35c5401b05.exe"
        3⤵
        • Enumerates VirtualBox registry keys
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4044
      • C:\Users\Admin\AppData\Local\Temp\1010861001\19a0ce83c5.exe
        "C:\Users\Admin\AppData\Local\Temp\1010861001\19a0ce83c5.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4560
      • C:\Users\Admin\AppData\Local\Temp\1010862001\31b0eaa8f5.exe
        "C:\Users\Admin\AppData\Local\Temp\1010862001\31b0eaa8f5.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4016
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 1628
          4⤵
          • Program crash
          PID:3392
      • C:\Users\Admin\AppData\Local\Temp\1010863001\2b27839aeb.exe
        "C:\Users\Admin\AppData\Local\Temp\1010863001\2b27839aeb.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2984
      • C:\Users\Admin\AppData\Local\Temp\1010864001\6c1a958e0d.exe
        "C:\Users\Admin\AppData\Local\Temp\1010864001\6c1a958e0d.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:964
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3240
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1064
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4460
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1640
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1676
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1056
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {10060f51-f33d-4204-9649-84b54476dbad} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" gpu
              6⤵
                PID:2236
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e1a5e8c-f407-48c0-b662-90c946916757} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" socket
                6⤵
                  PID:3632
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3284 -childID 1 -isForBrowser -prefsHandle 3196 -prefMapHandle 2976 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1040 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {343ba97c-eb6c-4bf8-bcaf-2f6298968139} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" tab
                  6⤵
                    PID:1560
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3940 -childID 2 -isForBrowser -prefsHandle 3932 -prefMapHandle 3232 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1040 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {585ce8bb-021d-428c-b11b-9ab0bad1cdd5} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" tab
                    6⤵
                      PID:1152
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4624 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4660 -prefMapHandle 4656 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b40b2897-b052-4883-8a6d-1ee4686042f0} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5296
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5036 -childID 3 -isForBrowser -prefsHandle 5052 -prefMapHandle 5048 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1040 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67b31b52-11d5-4490-b98c-beb3f9bee8f4} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" tab
                      6⤵
                        PID:5700
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5192 -childID 4 -isForBrowser -prefsHandle 5208 -prefMapHandle 5292 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1040 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d476a427-c258-4c7c-bcc3-7bbe74a0368d} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" tab
                        6⤵
                          PID:5728
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5500 -childID 5 -isForBrowser -prefsHandle 5424 -prefMapHandle 5428 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1040 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02419b81-d02a-4b58-bedf-6e4f19a88168} 1056 "\\.\pipe\gecko-crash-server-pipe.1056" tab
                          6⤵
                            PID:5784
                    • C:\Users\Admin\AppData\Local\Temp\1010865001\852be55311.exe
                      "C:\Users\Admin\AppData\Local\Temp\1010865001\852be55311.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:840
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4016 -ip 4016
                  1⤵
                    PID:2384
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2696
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5740

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json.tmp

                    Filesize

                    24KB

                    MD5

                    97391a93cb7e8c4c08e21e1765fba79b

                    SHA1

                    a8cbb81c2cc49b4b817fdc71ca451b262f5ec433

                    SHA256

                    2c27e915e78bb4babe058b44a9bb9e1defa422733b2ff80d5c96138ae2a40139

                    SHA512

                    442f932560b559a980ec493bcff90552adc0339affbcfefcbd56ea7e7fdbf8272a9a6035a6b35c68f175899f4f4f16a22b7dead937c1493c078a8c224533698e

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                    Filesize

                    13KB

                    MD5

                    56790880735306178b939b44b3c78498

                    SHA1

                    a5724a52286a487013c27ad564f54ce594f8fefd

                    SHA256

                    b5fbb9b57b1e183fca42804b449175486f2d08ca41e079508df6466648c3c8f1

                    SHA512

                    3d9eb72f1839f9576d1eabab9499c6a0d668d54b0abc54c36ab695afe6d928b2a026040744a943d9cb63a8023507b5262c2589a20fae4ce303a7ddcfe2607943

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                    Filesize

                    13KB

                    MD5

                    76338309c6aecb4fb0687dae6454f6f8

                    SHA1

                    ba6c826eae1b6509c8c46e946dd0b7916013aee7

                    SHA256

                    3fc3428013f651e14b574aa1cf60cb94c57211c08b62e172a89a3067fe1e03fe

                    SHA512

                    8a9e292d9a74c4d2fb185d747012bbcf77513499f13a2d296fb27705b8597995ba68ea9981c7bd04c20b369b3777902c4e4ab8995acf77ee74bb1c242c895e2f

                  • C:\Users\Admin\AppData\Local\Temp\1010860001\35c5401b05.exe

                    Filesize

                    4.2MB

                    MD5

                    c94feb7d4fe260f53cc227b9833c6b7e

                    SHA1

                    8d1f50a705256b9b8b688ed385799ed297ca0138

                    SHA256

                    9926ea0046fd1472946e4db23cd38e22ceecb5dd384ed91fc105a6c4d266ca1d

                    SHA512

                    fe606f2006ba996ca9afda8b42c89e297106541ced3b2cef15689c6e2a361b69cd2275fa21ba333031befc5321f7c463e935da0ee7a18b07d12ec4f24d191ce6

                  • C:\Users\Admin\AppData\Local\Temp\1010861001\19a0ce83c5.exe

                    Filesize

                    4.3MB

                    MD5

                    a3b6fc75e9332e814f8068fc74937028

                    SHA1

                    aacf898df6cdc6b7da5d97b7a5728108a1551a18

                    SHA256

                    a28d11a71ff174f3f011ec4b94d0c67c6c07a367f165347ad02d7004dae27a26

                    SHA512

                    3d5db5aab7952acb8bcdf670a4eaa14b606b6518219ba15ab6bc5f2c9b5feb2d0acf3c5146751965d33f5cb93bd87048f2e5f4e3928aa3358143cc682ac0bc84

                  • C:\Users\Admin\AppData\Local\Temp\1010862001\31b0eaa8f5.exe

                    Filesize

                    1.8MB

                    MD5

                    fb259c5ebc086a3062f5f3dd9e2955ac

                    SHA1

                    14a87eb04c4339f770d55b7f64e0728c87c7b840

                    SHA256

                    3af486387a0869f29281558b0d919337c181c10999865d3db09fae595b45f9c1

                    SHA512

                    ebe1b3691ab0c860b2bf8bfdf28d916e29f6d96705eaf6861715f651ec8d50a3ec06f958cebfb469dde0dc70ca844c0dda891a640aa7c3b6a9e836004b2d58e9

                  • C:\Users\Admin\AppData\Local\Temp\1010863001\2b27839aeb.exe

                    Filesize

                    1.7MB

                    MD5

                    a8d083b25843d8b182146793d9665ac5

                    SHA1

                    7d64723ba2c0fa76e3f1126d3583331364e8815e

                    SHA256

                    4597e4ff598b3353854bce87b300cc65cab353aad474b32fb2768b6931983973

                    SHA512

                    9503ec6a8959f4619108c21abf8911a721474ac486146be44362f9ceeccc5cc8a2c751546aa28215c5a0683f3785548e8ba038b74cf8fb56f8b2953afec0cd40

                  • C:\Users\Admin\AppData\Local\Temp\1010864001\6c1a958e0d.exe

                    Filesize

                    900KB

                    MD5

                    50baad51f9e2989fcea4f3252e2988b5

                    SHA1

                    9f263b9eff9e5b7dcb2d24d6c03665c539a44bde

                    SHA256

                    12ad13ced35f5d6e2d72bda3e9b5ae9ecd878a89f1bf23b546c7c03272e6aa44

                    SHA512

                    5c72df3914f0368d3775db02487fec618f262df8bc2b9d7b0d34f96465aed6f18af5575ad52c8bec759bbd8cd4f2379dedf6f6926c9fdaf42a0ec3ddf823433c

                  • C:\Users\Admin\AppData\Local\Temp\1010865001\852be55311.exe

                    Filesize

                    2.7MB

                    MD5

                    8d795116f27f70e8b4aba914ace93ca2

                    SHA1

                    574bee1fc44d913eeb64fedfb1f25dcd51f18983

                    SHA256

                    ab786f60075ddca4452dc133bc333368c8677507fe0e995f6a6a60f5a4053899

                    SHA512

                    bcb29613e2e94f8447a98a0dcc10a787b6fb47e1c0fa519c71ba831b6bca03a71f06dd69ee2617181cedfc73204a9b2fb9d2a339a4e4479b5f84a0f6317d016a

                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                    Filesize

                    1.8MB

                    MD5

                    e4c570fba70843d9127a627d5f627766

                    SHA1

                    9528c5de55077ba02d941300cc0960b4076b6ae8

                    SHA256

                    ccd674dfa452e95b5d4a97d91a8e44d2268a3b8438cc5a4fd17d9b63cdd78e86

                    SHA512

                    07a920c8029b2fbaff0f938702e919bd5ce59dcac3bb09b3fb6cc9057f4cac0d49b3a62a9861de2bedac4eb8fddd8a26798ccebb138f5b25748b979f0b2cd717

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    479KB

                    MD5

                    09372174e83dbbf696ee732fd2e875bb

                    SHA1

                    ba360186ba650a769f9303f48b7200fb5eaccee1

                    SHA256

                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                    SHA512

                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    13.8MB

                    MD5

                    0a8747a2ac9ac08ae9508f36c6d75692

                    SHA1

                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                    SHA256

                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                    SHA512

                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                    Filesize

                    6KB

                    MD5

                    fb5f632221a9420abc3882c9f7d0633a

                    SHA1

                    bab584fc69aafc02ba11472f9bd1f933e09b66c0

                    SHA256

                    fe726bfc18a73cd5fd480893fcc62bc2eba1ad2b417985ab8ad7dea09cb0a622

                    SHA512

                    c0660e2e03f6c6067eaa5f466167ce6f25456787da486ef527408aa440795bf89c55311104f4db702fe833087c3b95addd33b4757048177cca65ff44fe70af02

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                    Filesize

                    11KB

                    MD5

                    518a58fac6168e72dc4035a42d984cd1

                    SHA1

                    a2c1f50e5e59b47507f547a582557b802bc12063

                    SHA256

                    f6bff0263ec2daf7131d1a113ff05930ac8e0872f0fb6f65364cb2432eb56bf0

                    SHA512

                    66747979d212fecf79055e3602f1311ef5ee0d378af17fe2d5ce4a32a4334c400999a751cd3fb914c6a47158b687a0a10b5d784d3cf15f28eddbf1b37fab6695

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                    Filesize

                    13KB

                    MD5

                    e3a49e55987f2122c4a206d03abf75a9

                    SHA1

                    48298210114eb803aa658d024d4011a25b924435

                    SHA256

                    fdbb43ee10ccb2b63327075d2fbdfa4bfd9af945b3fdab3cb7cd4f80b200fcc0

                    SHA512

                    15713acd480bc76b88d5d0b172e381e3dcf323f8a56f305c289d9dc761173124aeae9ac18b7df800c5914f58d00c9ee8038c021fe699c410937830bb89dac0c6

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    25KB

                    MD5

                    1462ca2e4b36b5c5e0ca90e351b11c83

                    SHA1

                    eb9b2690dca8357bc81c0c3b87400f312e7a0afa

                    SHA256

                    aecf3f5e0246d4e4d77f15fd1cbdadb7e3cdbb893647ca6b86813d4ba0001bd4

                    SHA512

                    1056baf47de306b39b2527fbca9363aff63a92153ac70e2327520ace6eef2ae73be4e2f0a9bdafc384a73ba762e2b483ad029756d739729014644dd7223ce3db

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    25KB

                    MD5

                    f0b3961787d7ba51d861598cd7ae7d17

                    SHA1

                    7deb370b531843d457e213db299c6407c734a472

                    SHA256

                    2a3cc705a38904d76c6e817ed03895723ab9f158f7126674e40291a3010ea07a

                    SHA512

                    446f9d8d87908549428911cbfa91bfd04f615068ad939a2597ef3885bc7133b3aa8664629eb792d14b6903ef248cc597626197a402091be3d887d2b04ae6158f

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    21KB

                    MD5

                    be6a4a1f1b92e8e0c447f93981579098

                    SHA1

                    e3002a335889b342ff0c65d1c1479673739101a0

                    SHA256

                    b5a666adc2154a3ed4e8bce8d30b5b4cd805a2259490af6bfca8901b9cc439c2

                    SHA512

                    7cd3c39f32d72a4ec6b062768939274325af4fe7b4303d29e38e07f3cef029a414d16afb7425b11e9e6913d358e88799c44d1efe670df355245fcd2f3db0c169

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\5fd7d8d3-e3f2-4d22-8c42-395bbeb88c20

                    Filesize

                    982B

                    MD5

                    ac686154f464816df0fd6f5bab6dda41

                    SHA1

                    ca744744f518225de10ba976fc3210c622057a9a

                    SHA256

                    ba0cedd118a324a448c5dfe6462716002071f8a5ec5b1d8e081c2ed1aa7e8c02

                    SHA512

                    103b1f9b2a15b392b2a534bfe1eb2f195f41df234c8401583637bfbe3e320705fb15c259d58ac072ee10310e04017a78a1b938b3770898422d94aab39c60c23b

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\6ca81f5c-f2a6-4fb8-8c60-d7a87e71d0d2

                    Filesize

                    659B

                    MD5

                    50bf1309c50660f677d3208c7af8d6b6

                    SHA1

                    a3a00f165e4f95227dfc47310b58cc0a45b554df

                    SHA256

                    5af319ee4ed966a0eafd941f4da20caf6ddc82639ceae3d6ee973ec47837065e

                    SHA512

                    7ea68cad86bdd4468a45be80c5911899901068391f5f8441b571bfc017927f062c37b256a16a512e3dabdea9a6c5d2efd80053d184549595ca969bad0e9d4fac

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                    Filesize

                    1.1MB

                    MD5

                    842039753bf41fa5e11b3a1383061a87

                    SHA1

                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                    SHA256

                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                    SHA512

                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    2a461e9eb87fd1955cea740a3444ee7a

                    SHA1

                    b10755914c713f5a4677494dbe8a686ed458c3c5

                    SHA256

                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                    SHA512

                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                    Filesize

                    372B

                    MD5

                    bf957ad58b55f64219ab3f793e374316

                    SHA1

                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                    SHA256

                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                    SHA512

                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                    Filesize

                    17.8MB

                    MD5

                    daf7ef3acccab478aaa7d6dc1c60f865

                    SHA1

                    f8246162b97ce4a945feced27b6ea114366ff2ad

                    SHA256

                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                    SHA512

                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                    Filesize

                    10KB

                    MD5

                    bf3db5c6bc80427914cab6f01d5f298b

                    SHA1

                    c9566ecc28a3394dc76cff19f0f34f0c3970a207

                    SHA256

                    db9f3329a474095db435f9bea6e6d5b85f28970112b034e3ead0b95fddfa2ca3

                    SHA512

                    26c7cad9d79da4eaffd63e02bdf80f4a9479f2d147f4cfe32b0f5378880e787df3e454c7b4e0df7fb74d97d41789982a7a69049ec123d78f21ecea132e81b026

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                    Filesize

                    15KB

                    MD5

                    83fd61224e322e8fdac0e28af9f7dd44

                    SHA1

                    dc85ba81e4b12789222461eea7a6aa88e267cc15

                    SHA256

                    b7dae63e6cebb567d603f69c447205114ca3820d3b47993ad623f322e448ab7f

                    SHA512

                    0420fb482ebe0079d4727c2e66c1106ebf8927f4ccec1fb9387ab6a918ce59de2000583ec04478e4a46bd002364c69fcf57bce062c1d529a6f9f914edff91406

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                    Filesize

                    11KB

                    MD5

                    f007df6894b050bf729228feab37b77d

                    SHA1

                    eaf7af6895e479f6f84cfe43678e378c14489ba8

                    SHA256

                    13d38fc0b8593b62d3fdb4c8591ae19bd2a87737065e2e473b8411492977a02a

                    SHA512

                    2700ca7105dc61c203c97b462b02016a68e04f04cee5ab06eb829812c9ac7d5463e3691f6055516c23056009def5d6c75e706edbfdf6219a7e38396cd838301c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                    Filesize

                    10KB

                    MD5

                    b89184d376363372f6024017a693c4c9

                    SHA1

                    c87fa6938e328d8b357dcf186ca5de4fd6e6dbd3

                    SHA256

                    5c0fbc840c17fe88d8b2a0cfae2050cf12320bbf65ee1e347de7a943fa2777bd

                    SHA512

                    17a4690e3c596095cf665ae0a66b99f2a70af41ad4eafa208ce9a9b4c79f198a92203589203210eb14feef50cc38d6ec683c94f098cb6906ceee62c87ce6b443

                  • memory/840-146-0x0000000000820000-0x0000000000AE8000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/840-499-0x0000000000820000-0x0000000000AE8000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/840-496-0x0000000000820000-0x0000000000AE8000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/840-139-0x0000000000820000-0x0000000000AE8000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/840-145-0x0000000000820000-0x0000000000AE8000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/2696-488-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2696-494-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2984-93-0x0000000000930000-0x0000000000FC0000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/2984-94-0x0000000000930000-0x0000000000FC0000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/3480-1-0x0000000077CF4000-0x0000000077CF6000-memory.dmp

                    Filesize

                    8KB

                  • memory/3480-2-0x0000000000B31000-0x0000000000B5F000-memory.dmp

                    Filesize

                    184KB

                  • memory/3480-3-0x0000000000B30000-0x0000000000FE7000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3480-4-0x0000000000B30000-0x0000000000FE7000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3480-0-0x0000000000B30000-0x0000000000FE7000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3480-17-0x0000000000B30000-0x0000000000FE7000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-19-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-20-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-41-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-2938-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-2937-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-506-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-40-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-538-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-18-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-2925-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-412-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-2939-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-21-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-37-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-2940-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-2936-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-77-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-39-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-2931-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-1543-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3880-2584-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4016-116-0x0000000000AD0000-0x0000000000F7A000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4016-75-0x0000000000AD0000-0x0000000000F7A000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4016-113-0x0000000000AD0000-0x0000000000F7A000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4044-60-0x0000000000A10000-0x000000000169A000-memory.dmp

                    Filesize

                    12.5MB

                  • memory/4044-38-0x0000000000A10000-0x000000000169A000-memory.dmp

                    Filesize

                    12.5MB

                  • memory/4560-59-0x0000000000670000-0x000000000130D000-memory.dmp

                    Filesize

                    12.6MB

                  • memory/4560-57-0x0000000000670000-0x000000000130D000-memory.dmp

                    Filesize

                    12.6MB

                  • memory/5740-2935-0x0000000000790000-0x0000000000C47000-memory.dmp

                    Filesize

                    4.7MB