Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 13:28

General

  • Target

    0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe

  • Size

    5.3MB

  • MD5

    718f53eb11f4730fac1f40bd5a1ea164

  • SHA1

    1646f7000d950f7de88c60d8c10e07a0c3de896e

  • SHA256

    0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47

  • SHA512

    1178289c2e70d5314459605554bdeefbc80edd5056aa2988b5766a3c4762f0612f88174aa237d36115c5b16a21263fba93682d3c6e1f40b12589a6ab4d9f531a

  • SSDEEP

    98304:YHs+3pzhKjT6ocqacT3h1UJDiQdzAKv6u94DS/xo7bS0L73nPl17ghShHYquXPW:YM+3ZhKHNclczQkUzAMne25GSgtBgiHG

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://tacitglibbr.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://tacitglibbr.biz/api

https://immureprech.biz/api

https://deafeninggeh.biz/api

https://wrathful-jammy.cyou/api

https://awake-weaves.cyou/api

https://sordid-snaked.cyou/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe
    "C:\Users\Admin\AppData\Local\Temp\0a7428f3f91be66d8d3243fc5b29a4176da5b9541cd61245d431457299c84b47.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6x27.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6x27.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1u83S5.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1u83S5.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4592
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:832
          • C:\Users\Admin\AppData\Local\Temp\1014405001\6cb49cba8b.exe
            "C:\Users\Admin\AppData\Local\Temp\1014405001\6cb49cba8b.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4748
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1956
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3192
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2700
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1476
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4812
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4296
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                7⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:4932
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2000 -prefMapHandle 1992 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {77e7e59d-a4e1-43ee-b689-b36184765478} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" gpu
                  8⤵
                    PID:5028
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e002da81-b3c5-47db-865f-81fbdef67cc5} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" socket
                    8⤵
                      PID:2544
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3556 -childID 1 -isForBrowser -prefsHandle 3532 -prefMapHandle 3112 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75035bb5-a613-4752-9b2f-341a82986d79} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" tab
                      8⤵
                        PID:2944
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2912 -childID 2 -isForBrowser -prefsHandle 3448 -prefMapHandle 3780 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8da7bfd3-0a22-4089-833e-48c4ffbdae25} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" tab
                        8⤵
                          PID:4160
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4656 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4684 -prefMapHandle 4680 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {36709886-1c12-45fb-89c3-50784e45c66f} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" utility
                          8⤵
                          • Checks processor information in registry
                          PID:5968
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5308 -childID 3 -isForBrowser -prefsHandle 5300 -prefMapHandle 5280 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f259fb7c-7505-4b20-9343-33a26d5b0901} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" tab
                          8⤵
                            PID:6824
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 4 -isForBrowser -prefsHandle 5448 -prefMapHandle 5452 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9278f4c-ec98-4309-b5f5-f2c814c46dcf} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" tab
                            8⤵
                              PID:6836
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5632 -childID 5 -isForBrowser -prefsHandle 5640 -prefMapHandle 5644 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a1c7c870-2747-4e68-9af1-69533363ea61} 4932 "\\.\pipe\gecko-crash-server-pipe.4932" tab
                              8⤵
                                PID:6848
                        • C:\Users\Admin\AppData\Local\Temp\1014406001\48b3c3eca4.exe
                          "C:\Users\Admin\AppData\Local\Temp\1014406001\48b3c3eca4.exe"
                          5⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2332
                        • C:\Users\Admin\AppData\Local\Temp\1014407001\37b26a93b1.exe
                          "C:\Users\Admin\AppData\Local\Temp\1014407001\37b26a93b1.exe"
                          5⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • System Location Discovery: System Language Discovery
                          PID:1564
                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2e1328.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2e1328.exe
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1260
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3J69Q.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3J69Q.exe
                    2⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3216
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:6768
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2468

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json

                  Filesize

                  19KB

                  MD5

                  b7dfd04f42a39d1a43d6f2d29b95612f

                  SHA1

                  679a4cad2a6b301c7de091ef4a6382f55e7cbfaf

                  SHA256

                  3454c5181688a1fbc97d3372df45a07be14d944f6a35baa7841e5baef7dfef09

                  SHA512

                  4ede27cbee141b7747ee8118834c71c944b3f5e00ee866b8b880c7af79a92da73bb2d0e060f4c429c63a4752360f0d09234604e920b89cf02afde1067d6585d9

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                  Filesize

                  13KB

                  MD5

                  66592a7568c5d87caa1d9e695e6bd60a

                  SHA1

                  ac23779366722e5f4d6ca0dbf7362e6cedd05ef2

                  SHA256

                  d47e07c1c153d27d8392086ac2c8796b3705119a8445b66d4cfa83c2a80ee55f

                  SHA512

                  7f39b5c72e8557569ff274c2d1cce49226b6a29a2b52d9c4db125d781fabe3187fc588a530933e317f551f3f567518efd81f52ff1b18ddb96ad28b3c23dc0bb9

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                  Filesize

                  15KB

                  MD5

                  96c542dec016d9ec1ecc4dddfcbaac66

                  SHA1

                  6199f7648bb744efa58acf7b96fee85d938389e4

                  SHA256

                  7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                  SHA512

                  cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                • C:\Users\Admin\AppData\Local\Temp\1014405001\6cb49cba8b.exe

                  Filesize

                  943KB

                  MD5

                  4853be4f2bb74b706effcc60fc06446b

                  SHA1

                  405666e3bfc16348677d5fe2224d7bd8b739d94f

                  SHA256

                  1fff6fb9300916f4d128a5b2df8ca413f1d820660b8f61b54a203a9e0fd76372

                  SHA512

                  02ffabd11493e0aec0d62fe5f980cb91e587e9dafe36fbf7ed67733bf3f68757f2a09ad53af6d610ba1125b486ebcb695a719b2dfa30ecca0c2950c2735f8ccf

                • C:\Users\Admin\AppData\Local\Temp\1014406001\48b3c3eca4.exe

                  Filesize

                  1.7MB

                  MD5

                  98c5024a596c5c548d36bc33ae113a73

                  SHA1

                  b30aefb89057c1c6bab845df896777bc97230ae3

                  SHA256

                  63f607b4cd4804876dd817163529180a18a30245aefc92e1ea79eaea6348a121

                  SHA512

                  d6853305f9f26a09e98ad270498d57f52a604667984c754c3f7aab5d5f3270416e25e9c328981d63b2675c661da5f454c290cf291c932338593ae80f8e85fc9d

                • C:\Users\Admin\AppData\Local\Temp\1014407001\37b26a93b1.exe

                  Filesize

                  2.7MB

                  MD5

                  48d72055c656230bed2ebc5831008349

                  SHA1

                  158a1540a163a2e47eae9426e89b10febb86d7ec

                  SHA256

                  28bbe25cec4284374cd34fcb0bc1b203a5663de1383927640cc6c9ed40788634

                  SHA512

                  c72186e9deb21e811923f128da31c9053271826f9acdebe18c38d5730bb34eda9a9dc4cf0baf5926e071fb388272799a180c827c04a1b953523876dc7af04e3f

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3J69Q.exe

                  Filesize

                  1.7MB

                  MD5

                  0db86f415beec566f74ae32230607940

                  SHA1

                  59ad2e80445397031efa8cb4cf90488ca03e809e

                  SHA256

                  4f3f3cebaedafaca661c5852c61b1cc62377805ddb893891c795097cc4d90216

                  SHA512

                  b4f1fe2f7805091a7fd6611dede047f35fa403770f6351bf3cba4243a74d4539bd84cb687569b60c7a58b8664f549202b4009c75cc82392a5b16507c7f8dfaf8

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6x27.exe

                  Filesize

                  3.5MB

                  MD5

                  a00bf8c789c0077688fbdc4bad39ce3e

                  SHA1

                  604f468b6d065731aae511360cfcb16bc10258a2

                  SHA256

                  c5ba3e08e8b4c60113430fefc63b67149d1690a0c9f8dbe29cadf1bf49ce8ca1

                  SHA512

                  5b01c45b6a87366de516ab27257d4642c8a3372b69563e4cfbfd9e4b44bc53f79186bb6cc659c9b18a63dbabeca022718d4b23bd4bf365605eee7cdcc00d2b7b

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1u83S5.exe

                  Filesize

                  3.1MB

                  MD5

                  bfafb8154be49c061ea87bb8f1b1d2e3

                  SHA1

                  28aea3a6010fa9ed6587b9a3ec48399f7e2cd3e3

                  SHA256

                  06dd79ee8be1ee3c3e51c2499e84a9823cf51c0049d12383b1e333157d56d43a

                  SHA512

                  a6941502929f5f708191df88005e8734b07b0a34538ff030131edce34f7f2672ac586abd75855ac001d8a1e182e4d632f0516b687d74c78d950e77bbfb79e5f9

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2e1328.exe

                  Filesize

                  1.8MB

                  MD5

                  9c44476a000428e61f66dc47e2c5cc34

                  SHA1

                  e427c00e570aa70c5cb083e56e48a2b4b4990235

                  SHA256

                  9e48bf805ff254a4b2c920460a8ba4348a65132a574dd3702d15be9f5470080e

                  SHA512

                  c11e86955068a68c164ab2fcab24419d751a6c0948308104d8502c27d52aca33c8fad7f367d8c455a56d23ea8d316d83584625e41778e07c360d11ccf2652aa0

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                  Filesize

                  479KB

                  MD5

                  09372174e83dbbf696ee732fd2e875bb

                  SHA1

                  ba360186ba650a769f9303f48b7200fb5eaccee1

                  SHA256

                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                  SHA512

                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                  Filesize

                  13.8MB

                  MD5

                  0a8747a2ac9ac08ae9508f36c6d75692

                  SHA1

                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                  SHA256

                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                  SHA512

                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                  Filesize

                  6KB

                  MD5

                  4f49a3dd28583aad261ecf3c10fb8e5b

                  SHA1

                  eeca5f9cd8478780692b4ba69a97a5b4a574d895

                  SHA256

                  4cae986a54a04db30fbd1dc27cdd53b2acdfd5d1a48db20253f6f8e64327a19f

                  SHA512

                  903bbc5f2278873271e7c69ae34a1d49020f2f3481ac455a6efb71c5527a0911b3413a48a795b4839cb636d5967075680b5e9e4ccd05e472c1dc943ae8df158c

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  23KB

                  MD5

                  21d70081e42d6b3c775152aa21bf2066

                  SHA1

                  61c5c47ed3c4a8715646bf1207d809ffba86c318

                  SHA256

                  39f4b8ae896d291472e48bee38fbaa041ab678557083fe8ceb97e8d6a4f09134

                  SHA512

                  1a564f54701de7b803b733148d279f6b9757b103656e52e7378399f367a99c93c50ca3874ea5543df8e71a01e6f5c3adba5a034063e07b7530969093d9773efb

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  5KB

                  MD5

                  5dee675a41d7c64d6c8136bfda86be91

                  SHA1

                  273627cfe8f6a286022e99d8bc1bd02624c92725

                  SHA256

                  35b1fdf7b779b6c30f6733c38b7ea109b72259b8d813a6241635f7acc2a6e2f9

                  SHA512

                  fd70cf2fba93c67f82aed6a33e90a455491cc9e743069dfb50ab641955cc7edfaaed00191891802641e40a6914232030d4a643845e29df9989bd91e445bf2282

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  15KB

                  MD5

                  33d380cd5fea71865b84732a1fb93b72

                  SHA1

                  9d15724f379829c77f63128eb4b844f6535f3339

                  SHA256

                  90fdc4ff896d8f47cf2e5c4b53bdd0b4b8ceec29fd012c0f453a5253474917c1

                  SHA512

                  5ec2158f6615fcecd9ef016e122ac6820a84e62fca2cc4170e662af9fe12df2afafbe301f6463e801d7b85fd911342f6cfca76f3165ca1b2617374b6cf724a2b

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  15KB

                  MD5

                  418154a6b6882e8b2e6947ba78498cae

                  SHA1

                  66b52b3be8b386179cb04476180e23c0dc7438ee

                  SHA256

                  4d261b0b814223a49bf14940b720b2c715614ca63e2ef84d8bf47feed8fd5095

                  SHA512

                  af6eaca01d86d97a0588647e17feb9909cefec847176ea5acc978458fa04c2e5993bd1f6ce7ec8a8b61ac20224eadedca9d850f19cf7c455f11eb918d572fee6

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  15KB

                  MD5

                  b3e13f56b42b726961b62e4bf1266422

                  SHA1

                  075ad470034f5985fb202d70563e314467d39d42

                  SHA256

                  14af252103d30ab2030b3f6cb7e14dabe5934da8db5e434525d341bb8c18085b

                  SHA512

                  636017aad4f115f07782ea92cb28f1b72b88b2e32027980efe4f60c6a765da9eb2810750c8098e3decef0d00042d8f04b9b32aefc10d167a27c6bb4948837b55

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  5KB

                  MD5

                  719dae37f5db27f82e5903c163a85aaa

                  SHA1

                  7ba71441fcd7fe8c437b0bdd8132fd11e3a4fb84

                  SHA256

                  02e317ea0d87496e466d6395cdde1a0784c34279b71eedd30fd6cf25e369a116

                  SHA512

                  d52380df09252c1b3b38e877d6ddbc3303a9d98167fd54b9f3e2d08285f3514263d661a6338189f91f7c9bff6e0a1119e4f4ec1d443d6fdbe8a2dfe164c641c5

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  6KB

                  MD5

                  0e425af85aca6367508dc664b17ac7e7

                  SHA1

                  6bb98248146c8d38130c119d23da4f6f4fe8c588

                  SHA256

                  ba541a8cee8b4127b1d4f3525e538862464eb067540ee2ae625e1a778896d19b

                  SHA512

                  3da4442cf44386607be15a843104eb7a0f3690855612522e0a82ebac3265cf296983ff0c95060f3e1a03007a642bd8a3f628b1818598453a693f8ff440c2539c

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\26d19458-4908-4323-9821-46801e9573ca

                  Filesize

                  671B

                  MD5

                  69ada89391fc2d7d3dea69f25d003983

                  SHA1

                  6363832ec565d81152c3fe4f926e77ea49e21a99

                  SHA256

                  472c887493279ca8beb9b362cc38f8af97d531eea9d26095407a94b0dcc5d40f

                  SHA512

                  09177f0c9bcdc6706b66b9a60c29023e66747428fc27b4936b8054ea3c80940ba6e27c6c856209428a75ca20b7c798aa5ff68ac7c73846f74cb9a6cc37b1bafd

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\d1067e4d-7fc5-488d-850f-e3496d43c92b

                  Filesize

                  25KB

                  MD5

                  5750166f85e5c8f37437696c31f7aa0c

                  SHA1

                  3097b15dd34f37ac02f399c1df544adc62021a8f

                  SHA256

                  5bc7322c67b2ab40a4cbb9513cc996ec0439e7cc9026aa0fad1955a92ae92a30

                  SHA512

                  594075a92dd89ad0a1fb6d4540bd9f8bd7408b0f2499fff500dc33f87ee48cc3ac367ca9602b86612bf9965764a230113c1afabdf45616112c1eab968e29f214

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\db5faba4-8de7-403c-937e-d83e753562b5

                  Filesize

                  982B

                  MD5

                  a889bd7a77da9220b7a214d88a3df065

                  SHA1

                  7f9e9179990f55ac64071397e3aa73441b3d965f

                  SHA256

                  055a6350ff7f7adf76f1cb83d3f09427345e07ee593ba7cc616084969eae005a

                  SHA512

                  269ab6d03089c21aed41f7a002b60706e3b74f814b651e79afb9d303e1ae86091611e7f721b1eaf5d3518bd97b2a3f16700afb31e66ebf4f5cf0b9b8e1d15b31

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                  Filesize

                  1.1MB

                  MD5

                  842039753bf41fa5e11b3a1383061a87

                  SHA1

                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                  SHA256

                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                  SHA512

                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                  Filesize

                  116B

                  MD5

                  2a461e9eb87fd1955cea740a3444ee7a

                  SHA1

                  b10755914c713f5a4677494dbe8a686ed458c3c5

                  SHA256

                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                  SHA512

                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                  Filesize

                  372B

                  MD5

                  bf957ad58b55f64219ab3f793e374316

                  SHA1

                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                  SHA256

                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                  SHA512

                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                  Filesize

                  17.8MB

                  MD5

                  daf7ef3acccab478aaa7d6dc1c60f865

                  SHA1

                  f8246162b97ce4a945feced27b6ea114366ff2ad

                  SHA256

                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                  SHA512

                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                  Filesize

                  10KB

                  MD5

                  38b7b93056fb1ede00bec7677383bd7b

                  SHA1

                  c7e0e546e82398ed803e3ceda3597784c5534f1c

                  SHA256

                  b9a1c4f9bd9dc3ef042b0888f6977809a5a5239e24c2aa945b7b68606267cfcd

                  SHA512

                  f1ac20bedd28a53f27c25a7299b124f2798afc545fde3838ce04100c51877cf3d0330a8660d6397ed7590054abee798b8604f80db379aa74ad5f82eb78bdf733

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                  Filesize

                  11KB

                  MD5

                  bf6a09448edbfa72de23b6383b970f2c

                  SHA1

                  fdfdd94da76ceb089b66ccb5e08abca3c7cf218c

                  SHA256

                  3c470ac582be7333149419f26e7b2eef394f5c9b46cb63b180e6a28ce5d3a57e

                  SHA512

                  c535e896117246b00ce7cfbc859822312b9e024bd3672152b246af67598797303c1365fde713b9c9632603bbb421056186b25169120481c2a61fad91df5e6bd7

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                  Filesize

                  15KB

                  MD5

                  f53cc975993ca1bd367ffb907b4c1150

                  SHA1

                  0024de778cb6ac940de28db710103baab4efa41d

                  SHA256

                  1c515cb4566c7affee764042b4020244f461bd7439dc551e44ca9386d87bfe60

                  SHA512

                  12fb13458c0d4633182e4101c20564c9edf195219c93337dbd19a9c47a20032d844711ab80975b92e56dc2379dfa32aa4560e202502866e73a6b4c7828894d83

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                  Filesize

                  10KB

                  MD5

                  a5367cc4a339c51cbeb151c4385437fd

                  SHA1

                  f00c25812b525334ef70f271114dd5182a4117f6

                  SHA256

                  9a965a35e7a6c8062af1507e286b51f32b7ad24a7455071b7b1f562188dbddf2

                  SHA512

                  9c8894a0d169c9037fe0867031d041fc932990a681fbde62e74b5f88d127cd32dc5976826b1e71bd23a061ca5abc47726f8d7f172fa3ca0f1f131afcf366983b

                • memory/832-3243-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-849-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-3538-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-3560-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-1608-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-90-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-3541-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-3554-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-866-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-32-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-3553-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-78-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-3548-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-3546-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-3552-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/832-3547-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1260-56-0x0000000000790000-0x0000000000C25000-memory.dmp

                  Filesize

                  4.6MB

                • memory/1260-36-0x0000000000790000-0x0000000000C25000-memory.dmp

                  Filesize

                  4.6MB

                • memory/1564-861-0x0000000000140000-0x00000000003F2000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1564-858-0x0000000000140000-0x00000000003F2000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1564-788-0x0000000000140000-0x00000000003F2000-memory.dmp

                  Filesize

                  2.7MB

                • memory/2332-81-0x0000000000510000-0x0000000000B98000-memory.dmp

                  Filesize

                  6.5MB

                • memory/2332-79-0x0000000000510000-0x0000000000B98000-memory.dmp

                  Filesize

                  6.5MB

                • memory/2468-3551-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/3216-62-0x0000000000410000-0x0000000000A9E000-memory.dmp

                  Filesize

                  6.6MB

                • memory/3216-60-0x0000000000410000-0x0000000000A9E000-memory.dmp

                  Filesize

                  6.6MB

                • memory/4592-31-0x0000000000C81000-0x0000000000CE9000-memory.dmp

                  Filesize

                  416KB

                • memory/4592-30-0x0000000000C80000-0x0000000000F99000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4592-16-0x0000000000C81000-0x0000000000CE9000-memory.dmp

                  Filesize

                  416KB

                • memory/4592-17-0x0000000000C80000-0x0000000000F99000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4592-18-0x0000000000C80000-0x0000000000F99000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4592-15-0x00000000779A4000-0x00000000779A6000-memory.dmp

                  Filesize

                  8KB

                • memory/4592-13-0x0000000000C80000-0x0000000000F99000-memory.dmp

                  Filesize

                  3.1MB

                • memory/6768-2381-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB

                • memory/6768-2340-0x0000000000E00000-0x0000000001119000-memory.dmp

                  Filesize

                  3.1MB