Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2024, 03:06

General

  • Target

    c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe

  • Size

    1.8MB

  • MD5

    9ec3d5ed65bf8dc11d766f25c0860001

  • SHA1

    dc7c8af390895418dc67e9fbd9cce4010b71478d

  • SHA256

    c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b

  • SHA512

    d4f87ff7eeb3eeaf96247ebaa70a5e774d23664c3226bc5fd49fc2523eceac433dd9d0d2121247128c2e59cb4d9ee24747ca26a2bc35db09252087dc8427827c

  • SSDEEP

    24576:I6y3+4gnUPo3oxelWpYrt8mM31z90huKcgNGaWYbWzl+U3XTg3RwpB9KJ1MohLGO:9A+4UyOWpYJM31k8l7ppSHrg9k0zs4

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe
    "C:\Users\Admin\AppData\Local\Temp\c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Users\Admin\AppData\Local\Temp\1010860001\0ada8c1b8d.exe
        "C:\Users\Admin\AppData\Local\Temp\1010860001\0ada8c1b8d.exe"
        3⤵
        • Enumerates VirtualBox registry keys
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2680
      • C:\Users\Admin\AppData\Local\Temp\1010861001\1028fe20fa.exe
        "C:\Users\Admin\AppData\Local\Temp\1010861001\1028fe20fa.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3872
      • C:\Users\Admin\AppData\Local\Temp\1010862001\8f3aa176bb.exe
        "C:\Users\Admin\AppData\Local\Temp\1010862001\8f3aa176bb.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3248
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 1664
          4⤵
          • Program crash
          PID:3352
      • C:\Users\Admin\AppData\Local\Temp\1010863001\32766f4739.exe
        "C:\Users\Admin\AppData\Local\Temp\1010863001\32766f4739.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4976
      • C:\Users\Admin\AppData\Local\Temp\1010864001\906fdb6219.exe
        "C:\Users\Admin\AppData\Local\Temp\1010864001\906fdb6219.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:5092
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1800
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1900
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4084
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3188
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3256
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3320
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {58133a9c-24b7-4d6c-bce4-646482e2b2fa} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" gpu
              6⤵
                PID:4860
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {358786c7-053f-4c7f-a62d-23b18038d80e} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" socket
                6⤵
                  PID:3652
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3172 -childID 1 -isForBrowser -prefsHandle 2756 -prefMapHandle 2752 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f96decb3-db49-4b3b-9abe-e87d269c268b} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab
                  6⤵
                    PID:5040
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2796 -childID 2 -isForBrowser -prefsHandle 3988 -prefMapHandle 3224 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a18c4c1d-a902-4bd6-a4ad-59c1de3fe9d2} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab
                    6⤵
                      PID:1256
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4720 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4588 -prefMapHandle 4604 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e99228fc-753c-4421-9275-99251a5fd6c1} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5340
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5512 -childID 3 -isForBrowser -prefsHandle 5500 -prefMapHandle 5440 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {86213bfe-16ab-4859-b9a4-998b39d06447} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab
                      6⤵
                        PID:316
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4576 -childID 4 -isForBrowser -prefsHandle 4916 -prefMapHandle 5712 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {748aaef5-1540-4fad-9d63-bc0901c3fabb} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab
                        6⤵
                          PID:4752
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5788 -childID 5 -isForBrowser -prefsHandle 5796 -prefMapHandle 5800 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0a925e9e-fa4b-4593-966e-cd5c2bbf5d79} 3320 "\\.\pipe\gecko-crash-server-pipe.3320" tab
                          6⤵
                            PID:4980
                    • C:\Users\Admin\AppData\Local\Temp\1010865001\e6ac380afb.exe
                      "C:\Users\Admin\AppData\Local\Temp\1010865001\e6ac380afb.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2084
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3248 -ip 3248
                  1⤵
                    PID:3940
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5780
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5780

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json

                    Filesize

                    21KB

                    MD5

                    1ef4c08b4221fb70d168ffe4e12cbe98

                    SHA1

                    c1d4673d8d64cda36dc7e454b1e85d063ba9ffcf

                    SHA256

                    4c874ffe841132fec067b36566421e75d5111ece4713bc6fea3164c6b807fb4f

                    SHA512

                    daac4db949d66568f1f6729b881884478fc1f6965a308748086c044bdf187c3e5710a7fdc0ee558bccc5d662dc0dd22726b9ff494e94dc60e7d1deb9d46048a6

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                    Filesize

                    13KB

                    MD5

                    8d73b189d9973a49a18a112ba255071f

                    SHA1

                    fbb2038fb81ed16dcd78d8b62cfe3d5f8a6dc48a

                    SHA256

                    f7feb2ce18c4640fa0e695e1abe0db36f6a0d605d78a04b18b6d167b3eb7fba3

                    SHA512

                    53bcd4b95bdced0fd80b657fb9d8a3de5d91c10f758b1d37fb40d2b9a5d046979b51844d1c0f3f5d55e74f9f52c262f326dd52ead5c79833a85e5e90db0ce48d

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                    Filesize

                    13KB

                    MD5

                    b213a2100e3a385124404855cbf25f3a

                    SHA1

                    ec6a200f593db3055ebc8a82af4f33aede5c70af

                    SHA256

                    53994a21dccfe985739cf3ee585fbb3dcf2ef63e1424d04187867388e619f8b7

                    SHA512

                    d5c8cb02420c1b21fdc8c23e8b41d155d28fca2ebb624bdd1630364c9f15a5f8d8bd6ca3940319fbdbd4fe5f17c53bdc1f966782779d8efb61de1040ba8aa223

                  • C:\Users\Admin\AppData\Local\Temp\1010860001\0ada8c1b8d.exe

                    Filesize

                    4.2MB

                    MD5

                    6c4c61c48a26ede8f3f90ecff53a580e

                    SHA1

                    8ec369f0b04dc404236cc6413aae7b1f4741e369

                    SHA256

                    d98deedd3f4e5ead06704ad629f473ab908d7522f1a81dfb0bd2d423f18f814d

                    SHA512

                    41012f90a873ad791344cd53fdda100896f70fd03d0e4006ca818ae6c53252868178dd6cb3a62365ee897a5806c924e2a2f310b42b4daee0ddb723182a66e50e

                  • C:\Users\Admin\AppData\Local\Temp\1010861001\1028fe20fa.exe

                    Filesize

                    4.2MB

                    MD5

                    dad8ca996f7637ba8ec788b6d78e7a54

                    SHA1

                    99ca456ff49b9fb2380a84bce0e7500181d911bf

                    SHA256

                    f560774162ae0f657dcd34c015ea5a83b4cea91c709dffe93725af6c49324afb

                    SHA512

                    bab10837e2271f63d7450abe62e2409d5b758d61d3896a2ee6903e58428435e054c8acfe16d2202e5e7e3d55738f6842d984266a29ee8f5def6c732581298f9d

                  • C:\Users\Admin\AppData\Local\Temp\1010862001\8f3aa176bb.exe

                    Filesize

                    1.8MB

                    MD5

                    fb259c5ebc086a3062f5f3dd9e2955ac

                    SHA1

                    14a87eb04c4339f770d55b7f64e0728c87c7b840

                    SHA256

                    3af486387a0869f29281558b0d919337c181c10999865d3db09fae595b45f9c1

                    SHA512

                    ebe1b3691ab0c860b2bf8bfdf28d916e29f6d96705eaf6861715f651ec8d50a3ec06f958cebfb469dde0dc70ca844c0dda891a640aa7c3b6a9e836004b2d58e9

                  • C:\Users\Admin\AppData\Local\Temp\1010863001\32766f4739.exe

                    Filesize

                    1.7MB

                    MD5

                    a8d083b25843d8b182146793d9665ac5

                    SHA1

                    7d64723ba2c0fa76e3f1126d3583331364e8815e

                    SHA256

                    4597e4ff598b3353854bce87b300cc65cab353aad474b32fb2768b6931983973

                    SHA512

                    9503ec6a8959f4619108c21abf8911a721474ac486146be44362f9ceeccc5cc8a2c751546aa28215c5a0683f3785548e8ba038b74cf8fb56f8b2953afec0cd40

                  • C:\Users\Admin\AppData\Local\Temp\1010864001\906fdb6219.exe

                    Filesize

                    900KB

                    MD5

                    50baad51f9e2989fcea4f3252e2988b5

                    SHA1

                    9f263b9eff9e5b7dcb2d24d6c03665c539a44bde

                    SHA256

                    12ad13ced35f5d6e2d72bda3e9b5ae9ecd878a89f1bf23b546c7c03272e6aa44

                    SHA512

                    5c72df3914f0368d3775db02487fec618f262df8bc2b9d7b0d34f96465aed6f18af5575ad52c8bec759bbd8cd4f2379dedf6f6926c9fdaf42a0ec3ddf823433c

                  • C:\Users\Admin\AppData\Local\Temp\1010865001\e6ac380afb.exe

                    Filesize

                    2.7MB

                    MD5

                    8d795116f27f70e8b4aba914ace93ca2

                    SHA1

                    574bee1fc44d913eeb64fedfb1f25dcd51f18983

                    SHA256

                    ab786f60075ddca4452dc133bc333368c8677507fe0e995f6a6a60f5a4053899

                    SHA512

                    bcb29613e2e94f8447a98a0dcc10a787b6fb47e1c0fa519c71ba831b6bca03a71f06dd69ee2617181cedfc73204a9b2fb9d2a339a4e4479b5f84a0f6317d016a

                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                    Filesize

                    1.8MB

                    MD5

                    9ec3d5ed65bf8dc11d766f25c0860001

                    SHA1

                    dc7c8af390895418dc67e9fbd9cce4010b71478d

                    SHA256

                    c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b

                    SHA512

                    d4f87ff7eeb3eeaf96247ebaa70a5e774d23664c3226bc5fd49fc2523eceac433dd9d0d2121247128c2e59cb4d9ee24747ca26a2bc35db09252087dc8427827c

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    479KB

                    MD5

                    09372174e83dbbf696ee732fd2e875bb

                    SHA1

                    ba360186ba650a769f9303f48b7200fb5eaccee1

                    SHA256

                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                    SHA512

                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    13.8MB

                    MD5

                    0a8747a2ac9ac08ae9508f36c6d75692

                    SHA1

                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                    SHA256

                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                    SHA512

                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                    Filesize

                    6KB

                    MD5

                    a89d73dc1597b3970405d4f681ed1e70

                    SHA1

                    5446929c9a14ac152ceacc62d4f1fc868d8a5d12

                    SHA256

                    615544ab4acbf54676307e34591e0d27fff95e63fd4e0ca8b7b0998fa1d03f58

                    SHA512

                    9eac05a9e6b3f4c9dd443e71eb754ccf6a4183b5704c33f7eaf34b2b1da7f51037bad5bd3725ef25f07efdef49bff324d1004e4b7a270bbe2aa4b0e5948f434d

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                    Filesize

                    18KB

                    MD5

                    549b83cc44d19adb46228229d9bcc872

                    SHA1

                    c435b89be63680bfa70a25691090af23e66c573b

                    SHA256

                    da163ea2df46ec3058e25ec445a2d18577e20da6a755fca96c897115363091ac

                    SHA512

                    4f36590a95b3fbea97818d7360606fd6ce834ba483a1339bbc7be89ca8433940310f3cd6b24967cfe8c311e5dded8f0bf4a077f730da64aa79da3dd14e1d620d

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                    Filesize

                    8KB

                    MD5

                    b6188a7ff24b6e2c5979d066c8b8df77

                    SHA1

                    57f21f889ff0251ebdfedbb4e92b25d1782c5abf

                    SHA256

                    8173219e138b23822cdcaf22598219bdd261a0ff7269a2f2a5bb24bdead9c239

                    SHA512

                    9eb70623c971e037363179d2380f51b43f92924286537af19806142271aacba4ab5fa59f7546d059784cf5e40439c8a3a6157a7ddf32cfb967631c7c16e9242a

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                    Filesize

                    12KB

                    MD5

                    187f8595fa84542376184482d89ca581

                    SHA1

                    af6e1140accf51a0a544983355e499f425389fbf

                    SHA256

                    73e6382c4377c155174298ed8408e381fe2314b6dca7dcc96df88ead82ca5f6b

                    SHA512

                    60fa6254b1ceaab185a4aae250edd7df81bb8696c5e00e9fac22428059a803c6c7c29522f5c77affcb99453cac8ae5c37a268468f7aa9e860a213ef2663a0bdb

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    24KB

                    MD5

                    fb70fd761c624e8c981d020775033428

                    SHA1

                    3c26161a793b902d6a5a40849a967a2e051629ac

                    SHA256

                    d95caf24956c9a0d37563611bd389132c97c70f125f6226ff6d6cd00a214379b

                    SHA512

                    a67f2c794c06bc3c45a797baab213e44dd6297c2ad68d342ca98ab48f2e76c082336e7d97b5ad13e3ed27918d4a0365d9a6e2fab34ce969eb0e821112b47f646

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    25KB

                    MD5

                    d2b8ce44263301ce4d2686b48d8f3f1c

                    SHA1

                    d52195e44d58668fb4fd5c0511c0a397b52f6222

                    SHA256

                    316bde8d5a684825f934e45e12d9f72924ef4dd00a2b8748708c68d8e75eaa1d

                    SHA512

                    9cdc4ad6d447f1819df7921c191ba56d7c64a069aabd3e803cdab9a0760c4d5fd4716ecda19fa5a1786961ce3cec9b4760c0b79ea58c85fa9a182bb0cbdc3a95

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    21KB

                    MD5

                    daea4f6e0d78f8e1c4e753356369c115

                    SHA1

                    e47c7f1ec93eb0b75195b0875426443b6511a509

                    SHA256

                    44072ee076120fe97f19834cfcfff443f5f177f73a6124679c1bd88bce06245d

                    SHA512

                    dccb87655f9fb5e8a7f114541e579c093362ab0faffcb4f4e46e8db14e0e8c120c30d49e2c1f2a2836703f24aa3212fb9b66b6232dc55bd9fe3c7bb1c0eb9f7b

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\42ba9ab9-6cf5-4701-9a42-4da4df315838

                    Filesize

                    982B

                    MD5

                    b4494e22b53ee3bef4775400e1ea4d0a

                    SHA1

                    109c412a62adcc0dc2c86dcb49f1f9d6540d8bbf

                    SHA256

                    44d609569dd0322c2963e309c91aae13df840216b148a3db24cdaf301fdf0d0e

                    SHA512

                    867750e83ca8ae7b97079f59433257af50ecaa4fe87f3819343806aef3afe3b84c5b5a162b0a8f0468b0aeb77a2a1f3b90c990effa5fc254d602d596b8427818

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\e43d95cf-5a21-4e27-9b42-24e24e0d0bd0

                    Filesize

                    659B

                    MD5

                    f5e84b3b97aa21917bccedae71a1c0ab

                    SHA1

                    5a87f31a225a59f026c7cd914b75dbb62ddd742e

                    SHA256

                    2fce5a6e1a16ca6b47c2df0cc929d214edc6a90ceab2927a86bf5f05be9007e4

                    SHA512

                    c6d04feaff0a0517d4fe789beb9087a802913828e6b06f5124227e50c25ba12533b267d07e51c17a712d23aae4d98ed4d12c8a26f5af009db365de3e3a3f7467

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                    Filesize

                    1.1MB

                    MD5

                    842039753bf41fa5e11b3a1383061a87

                    SHA1

                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                    SHA256

                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                    SHA512

                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    2a461e9eb87fd1955cea740a3444ee7a

                    SHA1

                    b10755914c713f5a4677494dbe8a686ed458c3c5

                    SHA256

                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                    SHA512

                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                    Filesize

                    372B

                    MD5

                    bf957ad58b55f64219ab3f793e374316

                    SHA1

                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                    SHA256

                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                    SHA512

                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                    Filesize

                    17.8MB

                    MD5

                    daf7ef3acccab478aaa7d6dc1c60f865

                    SHA1

                    f8246162b97ce4a945feced27b6ea114366ff2ad

                    SHA256

                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                    SHA512

                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                    Filesize

                    12KB

                    MD5

                    d78bc451d54566cf18857e16afc09059

                    SHA1

                    945a0f0b0c4cc9ebbf0db16c43bceff1127fcc02

                    SHA256

                    4eb26cc0a4a85c3f0da595859215bab631b1294b54bc20f9123a82d6e856bacf

                    SHA512

                    97dd2c72881a4a4463308bda822f8ae67a128bd74d0356976f7b7f6de48a29fc71a75e9cb6d09817183e281cf16bc1f1f747779c24fafa82a8a42e28f49f04eb

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                    Filesize

                    15KB

                    MD5

                    debcd22adbdd522b9d7e6bd3c66f525c

                    SHA1

                    d8fe0447a98fa3e88705b7839aea35bc3b16853c

                    SHA256

                    a1baa7ece5b71f019e6bf79d10eff907bc56e2b20be1fbbd9e4ed29272dcbc33

                    SHA512

                    a9770609c26af141b20c1c8918fab2465e55d64a9a6518dfa07547bd7b948cb422623c2a6033103c759fb3cba5ff93e6819f7ef89ff56cb82523d8e2ca8742ed

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs.js

                    Filesize

                    10KB

                    MD5

                    1a2750872e49585ecf5294aae32f5628

                    SHA1

                    ef27193831e68e007630275e674efd9f0d44f58b

                    SHA256

                    a37a97b6a86bcd429a3eb5c8c1662a5a80613d1dafdd0ba9bd678a82635e7090

                    SHA512

                    b8312fd2afd5a06540a2806eb92c62782ffe7d627e9df5896514d9e92f1201413765ce3ff64ac8f706c4d53d6ae7e6796223270d16bb2b784f3fa719de8c4123

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs.js

                    Filesize

                    11KB

                    MD5

                    b2704a8fc87d258c5d37848fec57f6e7

                    SHA1

                    3fb0fb517a092db28f5d33a0ec5a08ffd30c1f38

                    SHA256

                    c16a089b1a4ae44f4792c1c956929e4fb91c2242281f96c4d4d42ffb68db0999

                    SHA512

                    b824a43b6993f94752806ec04663c84fa7a5d1cb8cda97a0b19926f7afc06fef151d01786378051a7afa5da23399dce7f0b02e0a6c40e8af0ff18e44f9704f33

                  • memory/2084-339-0x0000000000B40000-0x0000000000E08000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/2084-338-0x0000000000B40000-0x0000000000E08000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/2084-506-0x0000000000B40000-0x0000000000E08000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/2084-497-0x0000000000B40000-0x0000000000E08000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/2084-143-0x0000000000B40000-0x0000000000E08000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/2680-38-0x0000000000E80000-0x0000000001B14000-memory.dmp

                    Filesize

                    12.6MB

                  • memory/2680-76-0x0000000000E80000-0x0000000001B14000-memory.dmp

                    Filesize

                    12.6MB

                  • memory/2736-507-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-39-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-3092-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-3104-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-3110-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-490-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-3111-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-113-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-2354-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-55-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-40-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-3109-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-791-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-37-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-21-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-20-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-19-0x00000000002C1000-0x00000000002EF000-memory.dmp

                    Filesize

                    184KB

                  • memory/2736-3103-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-16-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-3101-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2736-3095-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/3248-115-0x0000000000140000-0x00000000005EA000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3248-74-0x0000000000140000-0x00000000005EA000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3872-57-0x0000000000B00000-0x000000000177B000-memory.dmp

                    Filesize

                    12.5MB

                  • memory/3872-58-0x0000000000B00000-0x000000000177B000-memory.dmp

                    Filesize

                    12.5MB

                  • memory/4976-94-0x0000000000750000-0x0000000000DE0000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/4976-92-0x0000000000750000-0x0000000000DE0000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/5076-18-0x0000000000CB0000-0x0000000001171000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/5076-1-0x0000000077134000-0x0000000077136000-memory.dmp

                    Filesize

                    8KB

                  • memory/5076-4-0x0000000000CB0000-0x0000000001171000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/5076-3-0x0000000000CB0000-0x0000000001171000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/5076-0-0x0000000000CB0000-0x0000000001171000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/5076-2-0x0000000000CB1000-0x0000000000CDF000-memory.dmp

                    Filesize

                    184KB

                  • memory/5780-2169-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/5780-3106-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/5780-3108-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/5780-2127-0x00000000002C0000-0x0000000000781000-memory.dmp

                    Filesize

                    4.8MB