Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 06:39

General

  • Target

    KiwiX(vira)/Inj.exe

  • Size

    37KB

  • MD5

    46575abc24c74bb039259908b0231c95

  • SHA1

    17dc60529ec69d46ce60ca45c6f6396e3462960c

  • SHA256

    443a8d301e9bcda70076375978a3d32a9a1c9552bf84aa9cbdd68635a07cdeda

  • SHA512

    89c234a4889817b665eaf61beb562b35a2bd269ed2d54dab6dc430cb3ab1a121e3a399046516050f442e25e35c4e14915ddf6aa983d4c1011b36749b5f8fb550

  • SSDEEP

    384:NA8syikT2zIuMXY1uyZD7jKuo3HCsmY3NrAF+rMRTyN/0L+EcoinblneHQM3epzp:+yY1lN7uuoSNY9rM+rMRa8NuBy8t

Malware Config

Signatures

  • Detect Umbral payload 2 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\KiwiX(vira)\Inj.exe
    "C:\Users\Admin\AppData\Local\Temp\KiwiX(vira)\Inj.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\KiwiX(vira)\Inj.exe" "Inj.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:1072
    • C:\Users\Admin\AppData\Local\Temp\tmpD6B9.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpD6B9.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3560
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1656
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpEA22.tmp.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile" /v "EnableFirewall" /t REG_DWORD /d 0 /f
        3⤵
          PID:2952
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile" /v "EnableFirewall" /t REG_DWORD /d 0 /f
          3⤵
            PID:4488
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile" /v "EnableFirewall" /t REG_DWORD /d 0 /f
            3⤵
              PID:4408
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile" /v "EnableFirewall" /t REG_DWORD /d 0 /f
              3⤵
                PID:4504
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile" /v "EnableFirewall" /t REG_DWORD /d 0 /f
                3⤵
                • Modifies firewall policy service
                PID:1988
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile" /v "EnableFirewall" /t REG_DWORD /d 0 /f
                3⤵
                • Modifies firewall policy service
                PID:116
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile" /v "EnableFirewall" /t REG_DWORD /d 0 /f
                3⤵
                • Modifies firewall policy service
                PID:1668
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PrivateProfile" /v "EnableFirewall" /t REG_DWORD /d 0 /f
                3⤵
                • Modifies firewall policy service
                PID:4696
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f
                3⤵
                  PID:3484
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t REG_DWORD /d "0" /f
                  3⤵
                    PID:2136
                  • C:\Windows\SysWOW64\reg.exe
                    reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t REG_SZ /d "Off" /f
                    3⤵
                      PID:4492
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t REG_SZ /d "Off" /f
                      3⤵
                        PID:3428
                      • C:\Windows\SysWOW64\reg.exe
                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "ShellSmartScreenLevel" /t REG_SZ /d "Warn" /f
                        3⤵
                          PID:4268
                        • C:\Windows\SysWOW64\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenPuaEnabled" /t REG_DWORD /d "0" /f
                          3⤵
                            PID:1376
                          • C:\Windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t REG_DWORD /d "0" /f
                            3⤵
                              PID:2288
                            • C:\Windows\SysWOW64\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t REG_DWORD /d "0" /f
                              3⤵
                                PID:3468
                              • C:\Windows\SysWOW64\reg.exe
                                reg add "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t REG_DWORD /d "0" /f
                                3⤵
                                • Modifies registry class
                                PID:2364
                              • C:\Windows\SysWOW64\reg.exe
                                reg add "HKCU\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t REG_DWORD /d "0" /f
                                3⤵
                                • Modifies registry class
                                PID:408
                              • C:\Windows\SysWOW64\reg.exe
                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t REG_DWORD /d "0" /f
                                3⤵
                                  PID:1900
                                • C:\Windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Edge" /v "PreventSmartScreenPromptOverride" /t REG_DWORD /d "0" /f
                                  3⤵
                                    PID:1384
                                  • C:\Windows\SysWOW64\reg.exe
                                    reg add "HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0" /v "2301" /t REG_DWORD /d "1" /f
                                    3⤵
                                      PID:3144
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControl" /t REG_SZ /d "Anywhere" /f
                                      3⤵
                                        PID:4924
                                      • C:\Windows\SysWOW64\reg.exe
                                        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControlEnabled" /t "REG_DWORD" /d "0" /f
                                        3⤵
                                          PID:3960
                                        • C:\Windows\SysWOW64\reg.exe
                                          reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d "0" /f
                                          3⤵
                                            PID:2140
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d "0" /f
                                            3⤵
                                              PID:2072
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp1589.tmp.bat" "
                                            2⤵
                                              PID:2992
                                              • C:\Windows\SysWOW64\reg.exe
                                                reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /f
                                                3⤵
                                                  PID:1508
                                                • C:\Windows\SysWOW64\reg.exe
                                                  reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v AllowFastServiceStartup /t REG_DWORD /d 0 /f
                                                  3⤵
                                                    PID:3408
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v ServiceKeepAlive /t REG_DWORD /d 0 /f
                                                    3⤵
                                                      PID:2292
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f
                                                      3⤵
                                                      • Modifies Windows Defender Real-time Protection settings
                                                      PID:1896
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableIOAVProtection /t REG_DWORD /d 1 /f
                                                      3⤵
                                                      • Modifies Windows Defender Real-time Protection settings
                                                      PID:1920
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f
                                                      3⤵
                                                      • Modifies Windows Defender Real-time Protection settings
                                                      PID:4796
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v DisableBlockAtFirstSeen /t REG_DWORD /d 1 /f
                                                      3⤵
                                                        PID:1816
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v LocalSettingOverrideSpynetReporting /t REG_DWORD /d 0 /f
                                                        3⤵
                                                          PID:4480
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SubmitSamplesConsent /t REG_DWORD /d 2 /f
                                                          3⤵
                                                            PID:3996
                                                        • C:\Users\Admin\AppData\Local\Temp\tmpCA05.tmp.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\tmpCA05.tmp.exe"
                                                          2⤵
                                                          • Executes dropped EXE
                                                          PID:6108
                                                          • C:\Windows\System32\Wbem\wmic.exe
                                                            "wmic.exe" csproduct get uuid
                                                            3⤵
                                                              PID:1980
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                          1⤵
                                                            PID:1376
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                              2⤵
                                                              • Checks processor information in registry
                                                              • Modifies registry class
                                                              • Suspicious use of FindShellTrayWindow
                                                              • Suspicious use of SendNotifyMessage
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:4004
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4004.0.1792776013\1622359914" -parentBuildID 20221007134813 -prefsHandle 1828 -prefMapHandle 1820 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {21d50f93-28b0-4628-8035-1196dc59a703} 4004 "\\.\pipe\gecko-crash-server-pipe.4004" 1920 1cd253ee558 gpu
                                                                3⤵
                                                                  PID:4816
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4004.1.1601983854\2091691333" -parentBuildID 20221007134813 -prefsHandle 2352 -prefMapHandle 2348 -prefsLen 20785 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff7a91e8-50db-4880-b73d-371e856ed225} 4004 "\\.\pipe\gecko-crash-server-pipe.4004" 2364 1cd18872558 socket
                                                                  3⤵
                                                                  • Checks processor information in registry
                                                                  PID:448
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4004.2.728552535\1524784844" -childID 1 -isForBrowser -prefsHandle 3076 -prefMapHandle 2932 -prefsLen 20888 -prefMapSize 233444 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0e239b9-50ab-47c4-91f0-48b78323879c} 4004 "\\.\pipe\gecko-crash-server-pipe.4004" 2936 1cd28ea0958 tab
                                                                  3⤵
                                                                    PID:3396
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4004.3.405895827\665053616" -childID 2 -isForBrowser -prefsHandle 3592 -prefMapHandle 3588 -prefsLen 26066 -prefMapSize 233444 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3cf529df-672e-4601-b684-a0defa29d2c1} 4004 "\\.\pipe\gecko-crash-server-pipe.4004" 3604 1cd272b2e58 tab
                                                                    3⤵
                                                                      PID:3284
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4004.4.608706253\99401341" -childID 3 -isForBrowser -prefsHandle 1696 -prefMapHandle 4160 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0bdf7c2-cc70-4f6d-bc37-b5a1912418cb} 4004 "\\.\pipe\gecko-crash-server-pipe.4004" 4484 1cd2ac63e58 tab
                                                                      3⤵
                                                                        PID:1596
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4004.5.952776191\1336162824" -childID 4 -isForBrowser -prefsHandle 5032 -prefMapHandle 5040 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ca3f4d4c-db65-4418-b836-d60b04141565} 4004 "\\.\pipe\gecko-crash-server-pipe.4004" 5048 1cd2afdb758 tab
                                                                        3⤵
                                                                          PID:5284
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4004.6.1356063075\399354290" -childID 5 -isForBrowser -prefsHandle 5192 -prefMapHandle 5196 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ac38b43-0050-47f6-bd58-5b7f4122e2db} 4004 "\\.\pipe\gecko-crash-server-pipe.4004" 5184 1cd2b1b3458 tab
                                                                          3⤵
                                                                            PID:5292
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4004.7.1090552646\2030221666" -childID 6 -isForBrowser -prefsHandle 5384 -prefMapHandle 5388 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1396 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd89675a-b56b-484b-87a3-30a7d114440a} 4004 "\\.\pipe\gecko-crash-server-pipe.4004" 5376 1cd2b1b4058 tab
                                                                            3⤵
                                                                              PID:5300

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\Local\Temp\tmp1589.tmp.bat

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          da7a6b5a32f5119c8311a4725e81b77c

                                                                          SHA1

                                                                          fdc111c412235594de36057c8afa328406350610

                                                                          SHA256

                                                                          29453a2e6fffe4d8bf35a6df96e6dd3d5b52108a441cde6d96fa03f61331058a

                                                                          SHA512

                                                                          23bc044f330d36049f9565a017ded1d63876ed291769f61a5860386744e4e7c29d2aaa3271ca46d87d1c9d9334bb28bdc1cff8de6211db1b1a642f3ee1761ad9

                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpD6B9.tmp.exe

                                                                          Filesize

                                                                          230KB

                                                                          MD5

                                                                          428a7c63eff6bc7ca12c5b424e393c5d

                                                                          SHA1

                                                                          ebf788ee78bcf18348375f0a68fcc22f08639938

                                                                          SHA256

                                                                          7748aab1e6ad0bab94f9a0e0c444302957fc5e345d207a10531ce34227ab8639

                                                                          SHA512

                                                                          c33e6d335dd18e56c9461d0acd983e96ec496bca1d7fa9523076535877e8cdd811179c7b792f4adbed25fde7ae04c46e5abc827f95a51a1a3b772de7f0988d0c

                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpEA22.tmp.bat

                                                                          Filesize

                                                                          5KB

                                                                          MD5

                                                                          f1819f3bfb0c79b8a9de7745b40c5531

                                                                          SHA1

                                                                          14957855101257989c970211c1c781a783c5bd2d

                                                                          SHA256

                                                                          8a49a3fa34dd6002c0525b610dfd8134ef18b1f194a2f5f8f90d7cfa45915946

                                                                          SHA512

                                                                          bac5ab8c40e0e88e714a6eeff78c57ac578b5d267c5e32c7244fb69c0ae35b09a69845d3226e4d747e40b8c48f5d8948609530228d93a30cc54a7b75adc10a7e

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\datareporting\glean\db\data.safe.bin

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          ea5338b5e6ccbe506730e7b6afc8c110

                                                                          SHA1

                                                                          a1d9be5c7dac852dd90e7ae91ddbdc47ac5a4566

                                                                          SHA256

                                                                          3f1967fa00cb20dccc49c16a41f4e39e4e242cf72a72bbec61225e8cd066d6f2

                                                                          SHA512

                                                                          b2d1ab8a68386129182902ff89b9e412d0739ce0dba7c96a1f68fb403647c3859ecdefd8cc336ac72748ed27d60ef543c618636d7b376d222d1c22a66fbd9ab9

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\datareporting\glean\pending_pings\7fb0c72a-d69b-4fa4-bc22-50c0c807ec35

                                                                          Filesize

                                                                          10KB

                                                                          MD5

                                                                          a4fbc3071ab7f80eceadde6b67e61325

                                                                          SHA1

                                                                          ddf394b5c27efaf635497ea82d87c754b27b0960

                                                                          SHA256

                                                                          0a1b48be110aa44e7ddfcb345bea895a3eeed5b31f0669b9763497054326cf6e

                                                                          SHA512

                                                                          6254cf6f69d67fafec60b6acbcd073e49ae1a2b2bbb8c1577e4e40252927404516fe6c35f395b91cbcba0f10ca1fd76d99e5374585ed525819dd41b1fc6f795f

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\datareporting\glean\pending_pings\f122b706-7bef-4d2f-b5bd-65a50c061003

                                                                          Filesize

                                                                          746B

                                                                          MD5

                                                                          fbd4d390bf281df87248fa9beb7470d3

                                                                          SHA1

                                                                          7a5da96ddef91bef5d041f7df3757d388f4e0bca

                                                                          SHA256

                                                                          b4d8c05f2e89051f13fd399a6abdfc62502e87d2a26430373dc93fb36406dde8

                                                                          SHA512

                                                                          dd9365d34fec05cb240d9d82a1cd596b62927c3b23f17e2ddc91eba36aa4e13003d7355d62135005397066a76ca80221b7aa637aba7846a6b3f261279cbb8692

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\prefs-1.js

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          d82a250c7e525ae3bc883ecc435f1438

                                                                          SHA1

                                                                          d079eedd924a720a7e97e424a6e0fc9db577310b

                                                                          SHA256

                                                                          b589c20b625e61ebd89941a60e371c5a3421e6cb9ec7c2f924925f74139c7d99

                                                                          SHA512

                                                                          f1481a38402cc663bb9ec1c0888f25b121bec2e134ba0cf25414739f9e42e7cb9adb4e227ec259f83c079fdd2bf451b6aad8c4ea74810e1eafad5b8a01b49dd1

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\prefs.js

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          f46f649ab92f23d4cd6d4210165585de

                                                                          SHA1

                                                                          48c516c59a4489b56ed0eb1197ed3951aa9883cb

                                                                          SHA256

                                                                          5d28e960a42fbcb8e2ebfda2013cf986d86d2e23599a7ce07744e632581df7ed

                                                                          SHA512

                                                                          821985559bc9c6213823f0ff03852011d2dcf941e859ac6d65aacbee605ac0538db726457811450a8c46aa90459c08b47c31598053c8dcab2e4ba0b048075b68

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\sessionstore-backups\recovery.jsonlz4

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          13abc6fd188ebf5662c086a24e6db986

                                                                          SHA1

                                                                          f4ecc0cbfde96afab018c85bdb11a278f71f1eba

                                                                          SHA256

                                                                          c8f2dbc34fdd2e2aea745e0f30f48ea015b783ea85d8bf15511097f5e685e801

                                                                          SHA512

                                                                          8899a7ed09a57116aa3bcf30998c0479bb7853ba6215303efab1580192f33a1241a018fe88eec5d0c1697936ce12908b3136803e30a32f34825d2698bef52598

                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\on1px6pk.default-release\sessionstore.jsonlz4

                                                                          Filesize

                                                                          891B

                                                                          MD5

                                                                          4487b4b4f0139128bb944ae747d8c164

                                                                          SHA1

                                                                          83ca9e7e8b7b96eb853f2e00afbb87027aca69b8

                                                                          SHA256

                                                                          2c300d273d1752d9a6eabef699b429772049d4733af6139b70c191361984e244

                                                                          SHA512

                                                                          193751f3e094decf2e9a61ffa85f8125cc2680332e9c9a41ab67de5128b6ebdada177d4961c094d75ba51d3d4f2d8a331702a683b964b72e7511084f330a059c

                                                                        • memory/3560-24-0x00007FF9166C0000-0x00007FF917181000-memory.dmp

                                                                          Filesize

                                                                          10.8MB

                                                                        • memory/3560-20-0x000001B2D25B0000-0x000001B2D25F0000-memory.dmp

                                                                          Filesize

                                                                          256KB

                                                                        • memory/3560-22-0x000001B2D42F0000-0x000001B2D4300000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/3560-21-0x00007FF9166C0000-0x00007FF917181000-memory.dmp

                                                                          Filesize

                                                                          10.8MB

                                                                        • memory/4496-6-0x0000000074CB0000-0x0000000075261000-memory.dmp

                                                                          Filesize

                                                                          5.7MB

                                                                        • memory/4496-8-0x0000000001740000-0x0000000001750000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/4496-7-0x0000000001740000-0x0000000001750000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/4496-0-0x0000000074CB0000-0x0000000075261000-memory.dmp

                                                                          Filesize

                                                                          5.7MB

                                                                        • memory/4496-5-0x0000000074CB0000-0x0000000075261000-memory.dmp

                                                                          Filesize

                                                                          5.7MB

                                                                        • memory/4496-4-0x0000000001740000-0x0000000001750000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/4496-2-0x0000000001740000-0x0000000001750000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/4496-1-0x0000000074CB0000-0x0000000075261000-memory.dmp

                                                                          Filesize

                                                                          5.7MB

                                                                        • memory/6108-136-0x00007FF9160F0000-0x00007FF916BB1000-memory.dmp

                                                                          Filesize

                                                                          10.8MB

                                                                        • memory/6108-143-0x00007FF9160F0000-0x00007FF916BB1000-memory.dmp

                                                                          Filesize

                                                                          10.8MB