Analysis

  • max time kernel
    300s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29-01-2024 10:54

General

  • Target

    http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg+yvTLU/w3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h+vnYsUwsYCEgRDnEQW8uBk8Oy8TbEIJjNmoA==

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 6 IoCs
  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg+yvTLU/w3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h+vnYsUwsYCEgRDnEQW8uBk8Oy8TbEIJjNmoA=="
    1⤵
      PID:2968
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5000
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • NTFS ADS
      PID:3784
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2184
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4656
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1312
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4088
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:1888
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4476
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\w3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h+vnYsUwsYCEgRDnEQW8uBk8Oy8TbEIJjNmoA=="
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4324
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\w3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h+vnYsUwsYCEgRDnEQW8uBk8Oy8TbEIJjNmoA==
          3⤵
          • Checks processor information in registry
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4532
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4532.0.288476653\806680109" -parentBuildID 20221007134813 -prefsHandle 1700 -prefMapHandle 1676 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef6812a6-b08f-4f2c-ae8f-b14bf1c21965} 4532 "\\.\pipe\gecko-crash-server-pipe.4532" 1780 190d8bc2258 gpu
            4⤵
              PID:4552
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4532.1.2136341484\627471262" -parentBuildID 20221007134813 -prefsHandle 2144 -prefMapHandle 2140 -prefsLen 21608 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8fdd72cf-5fa3-48de-9eb2-83e0bb7ffe9a} 4532 "\\.\pipe\gecko-crash-server-pipe.4532" 2156 190cdb7e858 socket
              4⤵
                PID:4844
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4532.2.1426634264\1206722953" -childID 1 -isForBrowser -prefsHandle 2684 -prefMapHandle 2676 -prefsLen 21646 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd732c7c-2629-430a-a95c-072100d84e9e} 4532 "\\.\pipe\gecko-crash-server-pipe.4532" 2712 190d8b5bf58 tab
                4⤵
                  PID:2928
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4532.3.1662848862\1454845602" -childID 2 -isForBrowser -prefsHandle 3432 -prefMapHandle 3416 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b49a732-13ef-4686-a902-8944b8d40568} 4532 "\\.\pipe\gecko-crash-server-pipe.4532" 3444 190cdb6e858 tab
                  4⤵
                    PID:1228
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4532.4.1345082873\1437731873" -childID 3 -isForBrowser -prefsHandle 4940 -prefMapHandle 4932 -prefsLen 26343 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f14c13e9-af06-41c8-986f-6b334e4f84df} 4532 "\\.\pipe\gecko-crash-server-pipe.4532" 4948 190cdb71958 tab
                    4⤵
                      PID:5592
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4532.5.1480550614\1449808037" -childID 4 -isForBrowser -prefsHandle 5080 -prefMapHandle 5084 -prefsLen 26343 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8cb6e4a-68f9-4b7a-8a1a-41c4b8926321} 4532 "\\.\pipe\gecko-crash-server-pipe.4532" 5068 190df654858 tab
                      4⤵
                        PID:5608
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4532.6.903877943\441474738" -childID 5 -isForBrowser -prefsHandle 5248 -prefMapHandle 5252 -prefsLen 26343 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {708ff319-9431-4c01-b58f-cd9162d34c09} 4532 "\\.\pipe\gecko-crash-server-pipe.4532" 5240 190df652a58 tab
                        4⤵
                          PID:5616
                  • C:\Windows\system32\OpenWith.exe
                    C:\Windows\system32\OpenWith.exe -Embedding
                    1⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:5948
                    • C:\Program Files\Microsoft Office\root\Office16\Winword.exe
                      "C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\w3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h+vnYsUwsYCEgRDnEQW8uBk8Oy8TbEIJjNmoA=="
                      2⤵
                      • Checks processor information in registry
                      • Enumerates system info in registry
                      • Suspicious behavior: AddClipboardFormatListener
                      PID:824
                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                    1⤵
                    • Drops file in Windows directory
                    • Modifies registry class
                    PID:796

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\JAXDZPUC\edgecompatviewlist[1].xml

                    Filesize

                    74KB

                    MD5

                    d4fc49dc14f63895d997fa4940f24378

                    SHA1

                    3efb1437a7c5e46034147cbbc8db017c69d02c31

                    SHA256

                    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                    SHA512

                    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\cache2\entries\77FB5EE92C576E2505C8C9FF2EC417D7727F401E

                    Filesize

                    13KB

                    MD5

                    e13a0cd5aeac48850b8e9d5c0bb7ac9d

                    SHA1

                    23bdaf740839d7ede7df4d6ce5d4e612b0bbd7e8

                    SHA256

                    24a835a784f72b8a087657ef2a9109e109d97fa5e71d68594827f04500124acb

                    SHA512

                    96cf032bde2751f8d570728e0598da95d91b879b4c848ad43a1458745241ac98fe57e48c16ef84b7fca0e90772c610befe8c03a13fcd7edff7cba18664dcdd03

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\TBPC5O3Y\suggestions[1].en-US

                    Filesize

                    17KB

                    MD5

                    5a34cb996293fde2cb7a4ac89587393a

                    SHA1

                    3c96c993500690d1a77873cd62bc639b3a10653f

                    SHA256

                    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                    SHA512

                    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5Q2TMSBU\w3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h+vnYsUwsYCEgRDnEQW8uBk8Oy8TbEIJjNmoA==[1]

                    Filesize

                    503B

                    MD5

                    1e11ccb1d1c32f541255781937333344

                    SHA1

                    da877bf9390bbf88da402b94347f29fa88b8af26

                    SHA256

                    248de82be9f2744484bcd4e0853583cefca5a739daf56778977ce99a6d1fc403

                    SHA512

                    ceff0a33bd284b5e2641ec4ff37bd54fe636745c777e10a89d11905788ac54f09a1ce13181f301cfacc28f4c18cd600eae2a5cee05b6ec9255312c6cc0b3259d

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    442KB

                    MD5

                    85430baed3398695717b0263807cf97c

                    SHA1

                    fffbee923cea216f50fce5d54219a188a5100f41

                    SHA256

                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                    SHA512

                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    943KB

                    MD5

                    b440afe87fbc05502ed737c3bcfee43d

                    SHA1

                    0d2c81d380d8bc039674650ab65885508145d53a

                    SHA256

                    7e370f0514bb9540f331300ac920fc53cd2d0276d2bd98917fcb4e6a0554af5a

                    SHA512

                    66d3da6932a4bf80f128c89c2dbb79c73180baad07e45de505f1e21e4421e5caf1f81b5afab9e4f3487d261ad084eca3754b68418dee2869ba7eda6eac8aed85

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms

                    Filesize

                    5KB

                    MD5

                    13e15dc527e58c5abaa5776db2557d9c

                    SHA1

                    b27ee44f9b5bf8d54dd535c872fa936df50df54a

                    SHA256

                    d3148ea160ca9e597ec1e6b94081bc225ff707401272b60bf9f0dd86fa823f1b

                    SHA512

                    2fd9c5cd586456fd790b497c10a80c6ae93d8cdf4bfef4f26307abb9934d7ac40356b2a5020b76758544d5cdcdb191e2a9975157d689e76ac4184a649db47632

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    2KB

                    MD5

                    83033053f25d02d8f93b8129c138c5c8

                    SHA1

                    e4b08ccd77ce5028ff2689ae4cf9c8089d674044

                    SHA256

                    90430538ac1f55a33e93384dc34419a0ad3903e9d790ba30f11e1531239885a9

                    SHA512

                    bd86750bf8c0a7fe07b280323d7937f4a0929dc3621b5fe1f677abe3d9b4b5383579bc3b1fa8d8ce34864703bf0057f4127038d7c052054baecc5c447eb66e74

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\datareporting\glean\pending_pings\18f6efc8-c5e6-452b-b0f0-7e5c4c9245ae

                    Filesize

                    746B

                    MD5

                    1df97b239f979468ee203816c0ae401a

                    SHA1

                    366ce83ce27df78484b559e9799212b2ae476ed9

                    SHA256

                    328dccd49f40ff61ac65faaa6ede3651433b26beab83907409635f722314e1d1

                    SHA512

                    3881e5a9c25be15ace45b1dca848a26e6f5465eb5206cf50b257b27dbd0b5d3bf3804300a8d517f2186aed6786db37d6ef4bf1d77126a63ac998e53ce0314cce

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\datareporting\glean\pending_pings\97188b85-9eac-47c5-b8f6-fa6d3ce9d2a3

                    Filesize

                    10KB

                    MD5

                    e0c1b8f354ed6d9c013fda05c9663a6c

                    SHA1

                    47efd63e729545cf5f398141752094293bff2e8e

                    SHA256

                    752959636f03ce7cbf94f1983ae3bead4d2984354a1c292c3a0011234229906f

                    SHA512

                    8c2589c7a0cd7ff4775b362838d7ceb8c76643fb051a732748e990b54a6a554fa0607382a54182003db2668abf7d486be72b982d6b1077a40f5e1ed5f5603375

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                    Filesize

                    997KB

                    MD5

                    fe3355639648c417e8307c6d051e3e37

                    SHA1

                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                    SHA256

                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                    SHA512

                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    3d33cdc0b3d281e67dd52e14435dd04f

                    SHA1

                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                    SHA256

                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                    SHA512

                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                    Filesize

                    479B

                    MD5

                    49ddb419d96dceb9069018535fb2e2fc

                    SHA1

                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                    SHA256

                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                    SHA512

                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                    Filesize

                    372B

                    MD5

                    8be33af717bb1b67fbd61c3f4b807e9e

                    SHA1

                    7cf17656d174d951957ff36810e874a134dd49e0

                    SHA256

                    e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                    SHA512

                    6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                    Filesize

                    1.0MB

                    MD5

                    9e9b1f8190fc482fadbe29f1b236ef67

                    SHA1

                    225e78781dd21f4e515f46a8ffa7663495be05c9

                    SHA256

                    97c77d09663db55629df2b14aa7ac63912a6f96e7f1b244a9e1b23751fd868de

                    SHA512

                    b0c17e3b5c24e7d235cb000b235ba8d881537998639fe288d9ff3e26ef4757b7200894ebfe22b075efe12d7a8bc5600b173a03918715f215391bc83840fdcf29

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                    Filesize

                    1KB

                    MD5

                    688bed3676d2104e7f17ae1cd2c59404

                    SHA1

                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                    SHA256

                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                    SHA512

                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                    Filesize

                    1KB

                    MD5

                    937326fead5fd401f6cca9118bd9ade9

                    SHA1

                    4526a57d4ae14ed29b37632c72aef3c408189d91

                    SHA256

                    68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                    SHA512

                    b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    0257699fd2476e0f86671777b2363138

                    SHA1

                    e995fcf8c2fdc223b309a4ff0fd634ed59866d5a

                    SHA256

                    00c94c124e3369a424a227abfb5d41b87055d39a69e6359cb80a34ac829ff904

                    SHA512

                    05e53be99298d841f4baaebef02b1011206dfc9677d2a801522288ff8684e2e7004e9b4dc1698fd8d89b99e203051a31536c4ade99928d8da7a0bc6eabadcddd

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    302e270ef82066127308fcc20cc23802

                    SHA1

                    d692d546fe959fa2d8db104b06cfe921a5f3976c

                    SHA256

                    f9db2ec27dbc8d652effdd9ab89007cd84cb60926544e97363796b99b99644d0

                    SHA512

                    7d593561828e6244d3287d3e702f5aa543ec4bd4d0100357260e9323ff8c49be4b8eeea96a0b174712e591a72e5f5530775bda47409802ce0c975405f631f103

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    95b700eb7c8673e885f1ffe7a7fdcf24

                    SHA1

                    5d4423aa8541535d8ad919b3233417007d9d74e0

                    SHA256

                    5b84efca6700ad2a78741dcf198ebe9d85cfa58ffd71027ca30367d0bc606b3c

                    SHA512

                    f6406fa24ec849998e11099c192c59795430130e8f99e40fce528d377a09166d8ceaa858469f98ec3b8913765d8b764d86fa865f481c42d37707f78e5e69af0b

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\sessionstore-backups\recovery.jsonlz4

                    Filesize

                    994B

                    MD5

                    ac449b371cf86c12f1116f5d14313fa4

                    SHA1

                    914c38e6e536eb83e2a8ae27e33fc66b24022ad0

                    SHA256

                    af52b591cf56534a4519442a7448a5cb57510293bf77936b2f4da8156c606a42

                    SHA512

                    3abb8a239858b3703abd9485c53892829efe6158d4283f84f8a8c8fc21970ac467df08a320a35e2ed504cee2cdd165a9a5c0ed45443869be3d2a10a1f9fb8ef5

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                    Filesize

                    184KB

                    MD5

                    2a47098d39a545749fd7b10c63c8fed3

                    SHA1

                    c6cd31b7e3d069981f96b7a3be0dc5daa1a64056

                    SHA256

                    9f6ee6840be48f8e55088a45c92056715fd34c021cfd5840757e4eec9138b2d4

                    SHA512

                    9ed035dfa7eca9b4f55f2c613d3d0fb2176f9353a87ce8dcb157ee503ca9782a49914516b724980c05819281528877f052b59f91fafc49538b4615da2754af4c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                    Filesize

                    2.4MB

                    MD5

                    d79d5a9be92cdf1cb9f248765a07dd2f

                    SHA1

                    a78baa7d59d8b4e952cef5cb7b3a9e8522bb7b4c

                    SHA256

                    d8ecaf547279e0b37fa6102c60bb1ac0f2148c6b77ec31f29012032f802fc3fa

                    SHA512

                    d88a091d927b4a03950525f541cd77bdfa9e9fcda7bc82884eee643a43588df6981721621b6f8e14e7ef585a3067ddef3e4aff48359ae0b6ef5c2e2a884b7944

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t1i6x1vq.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                    Filesize

                    1.3MB

                    MD5

                    96e791a0308e1abc9a04d086e0e9df60

                    SHA1

                    f931ea46dcca2fe1046af4fdf2e92e5063441c40

                    SHA256

                    e21922c2aa10b93986129b225906e6192610c540ba0976d2827fe16c945d442f

                    SHA512

                    7d8f6ad2820755a5be8a8e3d100f5cacdc55f2837d1fd4c89c48c8e5fb9bf42627ba0c2b192c9ede79df280d8e6645fe1300d35e5db1753395435d3fca010668

                  • memory/824-273-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-287-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-264-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-266-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-268-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-269-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-270-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-271-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-257-0x00007FFBF4BB0000-0x00007FFBF4BC0000-memory.dmp

                    Filesize

                    64KB

                  • memory/824-274-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-272-0x00007FFBF13C0000-0x00007FFBF13D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/824-275-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-276-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-277-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-278-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-279-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-281-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-282-0x00007FFC320E0000-0x00007FFC3218E000-memory.dmp

                    Filesize

                    696KB

                  • memory/824-284-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-261-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-289-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-290-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-291-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-292-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-280-0x00007FFBF13C0000-0x00007FFBF13D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/824-436-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-263-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-262-0x00007FFC34B20000-0x00007FFC34CFB000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/824-260-0x00007FFBF4BB0000-0x00007FFBF4BC0000-memory.dmp

                    Filesize

                    64KB

                  • memory/824-259-0x00007FFBF4BB0000-0x00007FFBF4BC0000-memory.dmp

                    Filesize

                    64KB

                  • memory/824-258-0x00007FFBF4BB0000-0x00007FFBF4BC0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1312-58-0x000001F6F9570000-0x000001F6F9572000-memory.dmp

                    Filesize

                    8KB

                  • memory/1312-56-0x000001F6F9550000-0x000001F6F9552000-memory.dmp

                    Filesize

                    8KB

                  • memory/1312-53-0x000001F6F9520000-0x000001F6F9522000-memory.dmp

                    Filesize

                    8KB

                  • memory/5000-0-0x00000156CE420000-0x00000156CE430000-memory.dmp

                    Filesize

                    64KB

                  • memory/5000-215-0x00000156D5610000-0x00000156D5611000-memory.dmp

                    Filesize

                    4KB

                  • memory/5000-216-0x00000156D5620000-0x00000156D5621000-memory.dmp

                    Filesize

                    4KB

                  • memory/5000-200-0x00000156D5800000-0x00000156D66C2000-memory.dmp

                    Filesize

                    14.8MB

                  • memory/5000-35-0x00000156CE5F0000-0x00000156CE5F2000-memory.dmp

                    Filesize

                    8KB

                  • memory/5000-16-0x00000156CE800000-0x00000156CE810000-memory.dmp

                    Filesize

                    64KB