Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 12:07

General

  • Target

    1bc9cdab79f82bc9e2245ca993ebaed3f95035a256356f2c50ed88058233d28a.exe

  • Size

    7.0MB

  • MD5

    c8934b17e278f763ec221d075f220c19

  • SHA1

    3c85c4871109b5d5df2e3075b5568f187ad35476

  • SHA256

    1bc9cdab79f82bc9e2245ca993ebaed3f95035a256356f2c50ed88058233d28a

  • SHA512

    f1590a9e420728849381f57ad427612f58f7172480667080f1a2a34a4e592811425f513a901c8f22934bd910eaa55217f5281fc8e56d0e4f9aa4e098c06e58ac

  • SSDEEP

    98304:Yu0ty4id108tUnGEIBcQCDEZfHdoAF/Y4CbMmA332EHKS+dl/ZqzU:/xnYCUnSDCDTAFQRMmA33Tt+/ZQ

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bc9cdab79f82bc9e2245ca993ebaed3f95035a256356f2c50ed88058233d28a.exe
    "C:\Users\Admin\AppData\Local\Temp\1bc9cdab79f82bc9e2245ca993ebaed3f95035a256356f2c50ed88058233d28a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N5k27.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N5k27.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9T63.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9T63.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v96k5.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v96k5.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2416
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1004
            • C:\Users\Admin\AppData\Local\Temp\1013416001\33f620c264.exe
              "C:\Users\Admin\AppData\Local\Temp\1013416001\33f620c264.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1652
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 1592
                7⤵
                • Program crash
                PID:2684
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 1576
                7⤵
                • Program crash
                PID:3112
            • C:\Users\Admin\AppData\Local\Temp\1013417001\f3d98d7ce8.exe
              "C:\Users\Admin\AppData\Local\Temp\1013417001\f3d98d7ce8.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1396
            • C:\Users\Admin\AppData\Local\Temp\1013418001\1d805e6e76.exe
              "C:\Users\Admin\AppData\Local\Temp\1013418001\1d805e6e76.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:4716
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3384
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2008
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4428
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2036
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4316
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2820
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  8⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:32
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2036 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8110736-72b9-44f1-93da-a568d180b199} 32 "\\.\pipe\gecko-crash-server-pipe.32" gpu
                    9⤵
                      PID:4228
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2472 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d9150aa3-0f04-40ad-8ca1-919c341339f1} 32 "\\.\pipe\gecko-crash-server-pipe.32" socket
                      9⤵
                        PID:5112
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3232 -childID 1 -isForBrowser -prefsHandle 2856 -prefMapHandle 2972 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1160 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd8fb259-a1fb-4aea-8d64-d98045d1d229} 32 "\\.\pipe\gecko-crash-server-pipe.32" tab
                        9⤵
                          PID:428
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4248 -childID 2 -isForBrowser -prefsHandle 4260 -prefMapHandle 4256 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1160 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cccfe92e-5937-4361-8f7a-163619089905} 32 "\\.\pipe\gecko-crash-server-pipe.32" tab
                          9⤵
                            PID:1596
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4056 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4860 -prefMapHandle 4856 -prefsLen 29144 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f202b7e-dabc-4d4d-bdd7-3c1be47b63e7} 32 "\\.\pipe\gecko-crash-server-pipe.32" utility
                            9⤵
                            • Checks processor information in registry
                            PID:5752
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5300 -childID 3 -isForBrowser -prefsHandle 5292 -prefMapHandle 4164 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1160 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {61620637-26b4-4e06-aaac-cc06df4db3f9} 32 "\\.\pipe\gecko-crash-server-pipe.32" tab
                            9⤵
                              PID:7060
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5468 -childID 4 -isForBrowser -prefsHandle 5388 -prefMapHandle 5396 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1160 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d9ea4337-7967-4e23-bb8b-36f024a768c1} 32 "\\.\pipe\gecko-crash-server-pipe.32" tab
                              9⤵
                                PID:7072
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5488 -childID 5 -isForBrowser -prefsHandle 5596 -prefMapHandle 5600 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1160 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bb00720b-6465-4c52-9194-b10838134a16} 32 "\\.\pipe\gecko-crash-server-pipe.32" tab
                                9⤵
                                  PID:7092
                          • C:\Users\Admin\AppData\Local\Temp\1013419001\22604174f6.exe
                            "C:\Users\Admin\AppData\Local\Temp\1013419001\22604174f6.exe"
                            6⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2624
                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2a2211.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2a2211.exe
                        4⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4920
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 1604
                          5⤵
                          • Program crash
                          PID:4548
                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P93L.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P93L.exe
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1328
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4H262J.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4H262J.exe
                    2⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Windows security modification
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3580
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4920 -ip 4920
                  1⤵
                    PID:3936
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1652 -ip 1652
                    1⤵
                      PID:2076
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1652 -ip 1652
                      1⤵
                        PID:3532
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2948
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5284

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json

                        Filesize

                        19KB

                        MD5

                        859cc16e082c6f07fcbc27ebe01352f0

                        SHA1

                        7cc13f1a7383aaec576bc2fd2dcc0069bd090c1e

                        SHA256

                        d14da995058a91a44d0878a29d322652b992db21d562732d6c33ad1e8419adaf

                        SHA512

                        6e3d18cfd108914b6fa58b794876a68fb71eddaa8439855305543d5a8ac533c751e5c50e4ba4ab13611dc44613cb7c5ef2a8d1e9bf764734f01183dc8bda53f9

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                        Filesize

                        13KB

                        MD5

                        02b25d05b6bb8235db3a6984e256b29d

                        SHA1

                        1ae29a640a135d203fdc5668252024389dd2eb45

                        SHA256

                        7414aa0ea2d8e2f2bc83e6332eddbd69f9193111ca6cd46e66a80bf8a852f800

                        SHA512

                        b1e6ddf4de994dde5b648793000226d3cb0b9e2d26488c9538f41a110fc5b32a9c41b9436fabc307f87a7a94e2fcfee288070b258ad19114e6f61aaccde8bba1

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                        Filesize

                        15KB

                        MD5

                        96c542dec016d9ec1ecc4dddfcbaac66

                        SHA1

                        6199f7648bb744efa58acf7b96fee85d938389e4

                        SHA256

                        7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                        SHA512

                        cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                      • C:\Users\Admin\AppData\Local\Temp\1013418001\1d805e6e76.exe

                        Filesize

                        949KB

                        MD5

                        aa9538e2609a13b9d70989fee6bf50ef

                        SHA1

                        1aa2cad3d9a5220cc8608f8d2f6ddca625462fcc

                        SHA256

                        d0eb6c787139e3316220cf40be158d16a40b963b2f40fc06787dae680fa6a5e7

                        SHA512

                        a1f470a72c42d78eea0a947b794d19084c81d2f90ebf18266b06fa98121daf61eabd1caf2cd0cc8e90e76834b2f8e45cf94435eda869f4b4e5a01774b33795cc

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4H262J.exe

                        Filesize

                        2.7MB

                        MD5

                        518449380f5deab6a9fd3c7a88776aa5

                        SHA1

                        6be4e76be6bab115b709f6a7536b32c0f86efff4

                        SHA256

                        edca3a93ab5834491aa022d568bbc2d0924b3933159fbd193b550aa9ac355c5b

                        SHA512

                        36d70ec7b4726fa6ec2f92774ce7b547ea89281db76acb498a50be469e63aac977317fef1995526be6c499470490847223edb16b2801a4aae27fd9daf2767664

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N5k27.exe

                        Filesize

                        5.4MB

                        MD5

                        1b43ae0ef7b7d17cf21687539533c95e

                        SHA1

                        90402673f2153d02432a9439ac7b2ada6d797fe4

                        SHA256

                        40dcf80fb4795f755861c09936b8f56abf27410104d6acd57786aacc4f8e4530

                        SHA512

                        6a42c1b03823c7d939e6bb53ddf1f32abba324aeb49b8cf1f1741e100b2ca9d9057ef01278322d79138e640338013e1c3065ac6d03aebb97a4cd98c5fe09d305

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P93L.exe

                        Filesize

                        1.7MB

                        MD5

                        e113c7c881355590d17b82cdd27e9c7d

                        SHA1

                        ef5b7dcac182074a561fd2e1fb2eda69ac3a40bf

                        SHA256

                        e8589e69f99d96c0c35c02ac0bdbb97cf3263855396f0408ec1f52e41d75a49b

                        SHA512

                        7eb5b668f6f2d517ddbee8928756fe877c971beee8f88801d0a4a0492696a291a19c803ecbb5eb77f31febdfb0187272a3037f48fb527e8334c5dc26abdadbeb

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9T63.exe

                        Filesize

                        3.6MB

                        MD5

                        f893770b3dbb87cf5936a8e748b2ee32

                        SHA1

                        673afb7f27ff044f3d6ee4190ed1ac730c689712

                        SHA256

                        ecfe4d5b942ff27be422942deae97c6bd1bc1d82ee1e3ddf33ff8020e3910e1e

                        SHA512

                        183bc43f50bbcbec72d3274e88326de10c2aa3b79819fa2a988938d978a99cdbe0f15b9d422e946c318985800e463c0e915442c62a3b38c4c35169b48b69f482

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1v96k5.exe

                        Filesize

                        3.1MB

                        MD5

                        01f388748119f3ec48534968aa9a2a53

                        SHA1

                        584921b86b8e7b67b55ab82b5e1210b8b64e399e

                        SHA256

                        cf385b02aeecd1282df1596d851e9edfab58c22df1441b89e44dee36bf57dbe3

                        SHA512

                        41175c099e378555f81470f379f6f56cb5e37b7650300b0e30b9ac8329c833157eb9eb5f426251d6003be338ce29d1a42b534e963216e73695b1fc54cfad02c4

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2a2211.exe

                        Filesize

                        1.8MB

                        MD5

                        9035a7790366c718391f37fd13a52b71

                        SHA1

                        00cffbc4cf948aa8a4a20c535da13b90099da1f7

                        SHA256

                        7800195f1a9a7e6c04d66b85215f58ca240b9d6bb3f369d1ba8e150b95ae583c

                        SHA512

                        ef277aab36d4549a26a596dcf93131d9314e23d97ea901a212f9f57f27693baa3ae54fdbd2d7f41197fd94d7e84ca894fc5ddc97ea7f2e77258d347a123ded68

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                        Filesize

                        479KB

                        MD5

                        09372174e83dbbf696ee732fd2e875bb

                        SHA1

                        ba360186ba650a769f9303f48b7200fb5eaccee1

                        SHA256

                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                        SHA512

                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                        Filesize

                        13.8MB

                        MD5

                        0a8747a2ac9ac08ae9508f36c6d75692

                        SHA1

                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                        SHA256

                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                        SHA512

                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                        Filesize

                        18KB

                        MD5

                        efa0d272ad787e781e1df83de3297c9d

                        SHA1

                        954d2dc71b7b90a1d2db4976ba31e552f77acc1a

                        SHA256

                        f5c6d38ec2d5e733cbb49cd3e340106f7bff39f74435a2d3de4a145d38d34705

                        SHA512

                        8a120538f555d64395566a8ef44ea7657f2dabb5a311c1ff1cbca0aac072eb6d4bc7a092e86f6ea9e6fa30acbc7c877a5c6af37968a82cd365b12af4b95efdc7

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                        Filesize

                        7KB

                        MD5

                        83979bcc8526454ea9346a8e26488c29

                        SHA1

                        7c475661cdab1f7c420d1f4cce2c9b4a617cb5b1

                        SHA256

                        7a8c36d199d9f9ef4b2023f2bb57539bc90ad83c1a5da07f6562f49952c61229

                        SHA512

                        45df274cb70548dbd4238b8b42a53a4d0e70e7dd58835544434820b3c87233cb8d9def8d77e91f1bcbccb2e4fe26fc7df3e3910ff61e2daa267eccaa874e57b5

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        15KB

                        MD5

                        a2befe32725556699aa343c1c9f0638e

                        SHA1

                        33d858f71f1f673c6ef45c27cfe87318aa716394

                        SHA256

                        9d824de8401776788fd362213e81c141ab74e5550a598fd49ed99bcfa2c78fe6

                        SHA512

                        f0d453644142fe9eb633038f970eda882e22c90b9cc3973b5e9766e2a19a70e83c0a1b23ad52e998c3bf010381f5fcece0e127173e3e97c93a3d782a0faa8840

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        23KB

                        MD5

                        a53c484d4d8c16808aaa27559a8b0d43

                        SHA1

                        a5bdddc306f9e6f2713ffd66a770f0cca49e9c0d

                        SHA256

                        4f5b614e838d59ef262e80ba48eee0e52e9f9f657df0dfb58e15bcda819a68e2

                        SHA512

                        1a9e2aecbe653931758867e025d2e80e53941eb25daf775dda0deae5166f871eb8a51aec88437975fbe224791fbc9ca9d7589095e383728fc6f4d79589343754

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        6KB

                        MD5

                        e8cfe938fc07479b365f8cd62cd35e05

                        SHA1

                        6e28a58b0c39c1af7a996ca346f4092b1661bfcc

                        SHA256

                        3b5d0308af16e966b6ca629ab0ca9c326576e0aa39526a7adcd3c052a57e7d6b

                        SHA512

                        8f465a622780fc48e9eb4d5d93de210d385e933af3ec5efb00a3853922aa4437068e39b0906631fc7bb37c03e8cdbdca2589ba46c380e872505ee1cd4455c9ae

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        15KB

                        MD5

                        d90fcab15f2c6c40edd98138eb07330e

                        SHA1

                        d47071d467ff0c5eafd76c501e4bcc291dfd6f39

                        SHA256

                        7253fba82bef1cc86447c462adfca9327c03e80432922c792b174c5e69d2095a

                        SHA512

                        a7f0f36fb316f91f285110b893af4bad39a842e145ab940ad9176af467169e4e508a20261a9fc49708bc823a9607d72dfa8ef70ea5571a3611063d8f902ae372

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        5KB

                        MD5

                        cdb30926d0d13586e9bfe32b60451a70

                        SHA1

                        357a4b61e4fbed12f2351677b919ff39207c796e

                        SHA256

                        a8ec0fa5cf73a4c50ab61e90a411f6c528dfe3a0defc692380a00bb6fbb1b0fa

                        SHA512

                        6281e660495248eed6dbd378e5aa0544400cfaddccbd309879f58e0720e826dc3b690d03bbad873070184c6cacc1de485505d5faa415a66598c734d2221e0e97

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\2f81f306-1e19-4f44-aab4-bf713b8335cb

                        Filesize

                        982B

                        MD5

                        bce741d307da34debd5d32c7234d8358

                        SHA1

                        4ac81f5d6b1fe3f5879dc49880a708f406077cdc

                        SHA256

                        8f304f45e48271e5c69bab04871063c56a96b2f148e99d314edb277fc9c4b7e4

                        SHA512

                        b7949b17bfd26f154f3d51ca82cc439d9625adba4f73cfac22232e5362ceb9dd61a232d2ef267d5c1a77fcd5c53e9c2e011e76e3da9ad798b0cee5b4986a8190

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\3234c462-a667-4078-a89a-d577ea6deffe

                        Filesize

                        671B

                        MD5

                        10b53212b7b89bafe66c29f841dcf231

                        SHA1

                        e3c535804d03080c9acd239343c276aebc8c28cd

                        SHA256

                        e6f1eab0064a72f9e58c397c436a7b30f3d7045c39edd5edf8becca49712fe30

                        SHA512

                        acd3fcdb5cf279fa8ea97a1ba0a06d548d596e4c49fe867bbd9b4d683c30326d0606c4804a8badf7142b86e1cfa76f902d06bf29509254181872a81fb391defa

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\94ccdf9f-2916-445f-a91a-298e846a511c

                        Filesize

                        28KB

                        MD5

                        5c600ff4119ec42f840d486b8b7ff172

                        SHA1

                        12e340e64630b8d9653d9b036381e99388607895

                        SHA256

                        4d22140edd4ae398653ad085bcb487d3e91e1e3b1e066f34d10c78020e03679d

                        SHA512

                        cb0dc96447ad8c78e96d38fcd0dec38d82dfdd2eb1a04e36e81292e1ba594e77d593a2cad82244456c28e3a6d1abc8089fa7dd1c333b3fe2c32fc8f88eccd9b2

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                        Filesize

                        1.1MB

                        MD5

                        842039753bf41fa5e11b3a1383061a87

                        SHA1

                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                        SHA256

                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                        SHA512

                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                        Filesize

                        116B

                        MD5

                        2a461e9eb87fd1955cea740a3444ee7a

                        SHA1

                        b10755914c713f5a4677494dbe8a686ed458c3c5

                        SHA256

                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                        SHA512

                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                        Filesize

                        372B

                        MD5

                        bf957ad58b55f64219ab3f793e374316

                        SHA1

                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                        SHA256

                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                        SHA512

                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                        Filesize

                        17.8MB

                        MD5

                        daf7ef3acccab478aaa7d6dc1c60f865

                        SHA1

                        f8246162b97ce4a945feced27b6ea114366ff2ad

                        SHA256

                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                        SHA512

                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                        Filesize

                        10KB

                        MD5

                        66137022e919c561a76a9e7b6d02c824

                        SHA1

                        c6c3d4cf33e8768b33e2d59a56c029c24d5df9f0

                        SHA256

                        d065753c96f06a9a109923c79caff207d251537aa582c19f7bfde4e957626831

                        SHA512

                        c83681bb96a7afd158470e15c4029075fb42046d982793f3d11fb4d56e76dc0760bba5c06a623bd48aab0f94997b18a2a5d9afbf0520e98457d049b42e622fea

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                        Filesize

                        12KB

                        MD5

                        119cd73d43ee82b572c647f264fe4a5b

                        SHA1

                        f9beb07f756e1c6e1e3faebebabc8cf9318ba46e

                        SHA256

                        a3d2c8cac8fa4387711a010c937b42a5fb52b071f732f93a497ca5dd9c2259f9

                        SHA512

                        a9405bc9138c9eb9f0cdb20a1b40912fb0fdc34ba16713a08d3182c7b938d124ea4a4e40e6c455d67f626f55f5d18e56c1cda775ffcf0516022db2265ca3741b

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                        Filesize

                        15KB

                        MD5

                        f6b4698169e19ad2b5bf4d4bff992a75

                        SHA1

                        47af898cbe6f1641d5b76b59ae3f18066a9f4130

                        SHA256

                        8063c6e7b7924f410346a875885aca415e7736a8a6ff6cd1ba5283d8063afce0

                        SHA512

                        ab19b4d1679c537a76a1f0cda86298e6d9ae7aa14969303cfa0c850251d18a155b46aa8b503baff6730a8ad601385453689f94b54c6aeebfb656fd131ab55320

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                        Filesize

                        10KB

                        MD5

                        39cfab785a809ff65d13e8c592483831

                        SHA1

                        7f7a523cdd9bc3494a3af64e0ba8fd585ea3d418

                        SHA256

                        a99fe1d63004c7abae1264032584b136c43384c2c93a2bfc38e3a1673f515e60

                        SHA512

                        772ae32eba3dce3fec144ff777aa7cf9c2328fa87c7c8b41516f4e6982d607eeb26f4fae7328dd2932ac7c1b5f54d410138110a740682674e8fad39aaf242e2b

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                        Filesize

                        10KB

                        MD5

                        70b6990a58fcce457b84b2aabe3c216c

                        SHA1

                        75602bbe0abaf89834e004246d1257e47031c3e5

                        SHA256

                        9e751248e65035b031bf16fd108a6ef0792167264e8ef2f5610b3517f4e5d741

                        SHA512

                        3228bb0b060ae31cafcebda6182f447a8b03bc5546f94f5a732f8797f2332e417f6b79e602dc9d001c42603cfaf56f56b3e086b272263be51a31b3b7b10275fc

                      • memory/1004-3649-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-3635-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-3650-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-88-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-32-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-64-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-3652-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-988-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-843-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-3646-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-3644-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-3638-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-885-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-3651-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-2510-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1004-3653-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1328-45-0x0000000000DC0000-0x0000000001455000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/1328-44-0x0000000000DC0000-0x0000000001455000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/1396-86-0x0000000000EC0000-0x0000000001555000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/1396-87-0x0000000000EC0000-0x0000000001555000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/1652-70-0x00000000007A0000-0x0000000000C53000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1652-66-0x00000000007A0000-0x0000000000C53000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2416-21-0x0000000000870000-0x0000000000B98000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/2416-35-0x0000000000870000-0x0000000000B98000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/2624-875-0x0000000000400000-0x00000000006B8000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2624-132-0x0000000000400000-0x00000000006B8000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2624-138-0x0000000000400000-0x00000000006B8000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2624-137-0x0000000000400000-0x00000000006B8000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2624-878-0x0000000000400000-0x00000000006B8000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2948-887-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/3580-68-0x0000000000250000-0x0000000000508000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/3580-140-0x0000000000250000-0x0000000000508000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/3580-107-0x0000000000250000-0x0000000000508000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/3580-48-0x0000000000250000-0x0000000000508000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/3580-67-0x0000000000250000-0x0000000000508000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/4920-40-0x0000000000D10000-0x00000000011C3000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/4920-39-0x0000000000D10000-0x00000000011C3000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/5284-3648-0x0000000000050000-0x0000000000378000-memory.dmp

                        Filesize

                        3.2MB