Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 12:32

General

  • Target

    b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe

  • Size

    1.8MB

  • MD5

    3ffa502d38a0841f54f2bb96f34eda85

  • SHA1

    d152f8ac6b6c1ecb8f80b77f2182e6e42e43b731

  • SHA256

    b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d

  • SHA512

    5a4896936a85baab8e322618683ac72091d968253f2cab2227c7126365c07ae9ce3f19ab3f0a4f1d690773d7ad702b70da786f68e0c60058d2d59dc2f08a6dca

  • SSDEEP

    49152:jGgRd+om5zN3V9dOjDMxzZeCCWWDa+DhBsxVbeCee:jXRd+T71eTuaMe

Malware Config

Extracted

Family

amadey

Version

4.30

Botnet

4dd39d

C2

http://77.91.77.82

Attributes
  • install_dir

    ad40971b6b

  • install_file

    explorti.exe

  • strings_key

    a434973ad22def7137dbb5e059b7081e

  • url_paths

    /Hun4Ko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

sila

C2

http://85.28.47.31

Attributes
  • url_path

    /5499d72b3a3e55be.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe
    "C:\Users\Admin\AppData\Local\Temp\b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5080
    • C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3908
      • C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
        "C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"
        3⤵
        • Executes dropped EXE
        PID:4552
      • C:\Users\Admin\AppData\Local\Temp\1000021001\fa5175f8fd.exe
        "C:\Users\Admin\AppData\Local\Temp\1000021001\fa5175f8fd.exe"
        3⤵
        • Executes dropped EXE
        PID:1932
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 1304
          4⤵
          • Program crash
          PID:4816
      • C:\Users\Admin\AppData\Local\Temp\1000022001\6632518a5f.exe
        "C:\Users\Admin\AppData\Local\Temp\1000022001\6632518a5f.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1412
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3992
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2464
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1888 -prefsLen 25757 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b31e67b0-5a73-451e-bf9c-07670f19152b} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" gpu
              6⤵
                PID:776
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2368 -prefsLen 26677 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {24529d83-3e81-42ba-9c63-70754882d53c} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" socket
                6⤵
                  PID:2296
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2764 -childID 1 -isForBrowser -prefsHandle 2880 -prefMapHandle 2816 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {894157ba-ec66-43d5-8cd7-027494555831} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" tab
                  6⤵
                    PID:3092
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3908 -childID 2 -isForBrowser -prefsHandle 3904 -prefMapHandle 3900 -prefsLen 31167 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {06b7337a-3868-4a82-abf3-97856cfd9e84} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" tab
                    6⤵
                      PID:536
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4940 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4952 -prefMapHandle 4948 -prefsLen 31167 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8cd35d0a-4464-43bc-a3dd-67292dfbccd4} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5488
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5148 -childID 3 -isForBrowser -prefsHandle 5584 -prefMapHandle 5608 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab56332b-f0ee-4b75-8346-b56240cb341b} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" tab
                      6⤵
                        PID:3232
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4892 -childID 4 -isForBrowser -prefsHandle 5068 -prefMapHandle 5560 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7bf6b936-6e63-460a-9d27-4ac2d085edad} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" tab
                        6⤵
                          PID:940
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4892 -childID 5 -isForBrowser -prefsHandle 6004 -prefMapHandle 6000 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a38c39ca-06b6-4c8f-8c90-c728df013b1e} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" tab
                          6⤵
                            PID:3976
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1932 -ip 1932
                  1⤵
                    PID:3536
                  • C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
                    C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:636
                  • C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
                    C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4888
                  • C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
                    C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:452

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ehv06adt.default-release\activity-stream.discovery_stream.json

                    Filesize

                    18KB

                    MD5

                    4cdeca7b5067dfedf37485bfdf8a8375

                    SHA1

                    08190835506742ab660ee0120d085e4b62ea14f3

                    SHA256

                    cb0989f4a3400d4ece5158f777ef9d83f9a9210d4cfbb32534348c4fe5752b97

                    SHA512

                    adda92d9f9d7726f8eb108070d5975f018de1edfcf6487bf211570f20a5ff7d1a66693d91208c4b2e60981c0bdd317c4a8a8f8613e8f3926499592bea150084d

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ehv06adt.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D

                    Filesize

                    13KB

                    MD5

                    205755779938ba663749a19695571a6c

                    SHA1

                    760729ee41836e509eb05f4a8f6058042cec4192

                    SHA256

                    fce9fd04770471ca6928dbf2ce04e69e474216c5f6eb0ca65caa0327ff2d8b78

                    SHA512

                    1a2f76f6ae3906c80bb610dd77a48b5ad8543e6865144d45d0f38c1bd020a61a916a12b4f236d9b607587a7e911a830c94d28819cc3b3649730e227690eb654a

                  • C:\Users\Admin\AppData\Local\Temp\1000021001\fa5175f8fd.exe

                    Filesize

                    318KB

                    MD5

                    ad5a4fda39e5b6baab5f6fef2bee3730

                    SHA1

                    a6773b310fd651152ca73f8c6b3be5a38fc71cdd

                    SHA256

                    c2643566b7886f6c16bc19e6eb804a7791bc713ae18b27f0d7fca938ca8f6817

                    SHA512

                    47354b4cb02b0b7ea8afff6661881022a2bb2d8feb83c756ec87b75bc3ab8f5874ff3508b824de8a187518d9ae320467b8c3575fa7f2e7fea1c8011d44430973

                  • C:\Users\Admin\AppData\Local\Temp\1000022001\6632518a5f.exe

                    Filesize

                    1.2MB

                    MD5

                    2e22ffc35badd6a848a2ea4ecc37940d

                    SHA1

                    e1a1b25dabc27b3cf54f6f01382c211d57c54453

                    SHA256

                    512bb87747812fdd189fcc63fa6886866cb811fd0ae1a46ed52201886aeef902

                    SHA512

                    f7bcf3434fac88fa9b46c086de0b978c342a2870a7e032a180fb930785ac9e7bb2fcecb20df245e3decf1be986fe53868621e5922c45ea95e4d27e1aa8cabf41

                  • C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe

                    Filesize

                    1.8MB

                    MD5

                    3ffa502d38a0841f54f2bb96f34eda85

                    SHA1

                    d152f8ac6b6c1ecb8f80b77f2182e6e42e43b731

                    SHA256

                    b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d

                    SHA512

                    5a4896936a85baab8e322618683ac72091d968253f2cab2227c7126365c07ae9ce3f19ab3f0a4f1d690773d7ad702b70da786f68e0c60058d2d59dc2f08a6dca

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    479KB

                    MD5

                    09372174e83dbbf696ee732fd2e875bb

                    SHA1

                    ba360186ba650a769f9303f48b7200fb5eaccee1

                    SHA256

                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                    SHA512

                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    13.8MB

                    MD5

                    0a8747a2ac9ac08ae9508f36c6d75692

                    SHA1

                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                    SHA256

                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                    SHA512

                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\AlternateServices.bin

                    Filesize

                    10KB

                    MD5

                    8a9802f8d2920a4b937e940518ec743e

                    SHA1

                    7b682a393fca2710f47a9900e653f874722c7d89

                    SHA256

                    01eade833ac882dbde5b8942a1d044082198a5a72100e1a036578df5767a938b

                    SHA512

                    2a53145e7316fdd785697985f3024a929306f0292e90035cb71d06542b11ad5abda9e3416572135486f1e255fd1296f1e260dfe79b4e1d59b1f2006bbfa794f5

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    5KB

                    MD5

                    38cd8b9dd495623dd30245ba302be679

                    SHA1

                    a9cde6d9d3c81393fa45e6a0ed8a5130383e1c3d

                    SHA256

                    2d6971eecaa89cd658e25c74cae1b45c19acbbefe8f37227e59211895a815b8a

                    SHA512

                    b49602aa92599f8478a899a43cb726b95ad2bb8817d49f11258119a729e1537be59cd6868da86511a3a9c96177b9e04c72a775ea61b0e94094645d3fbea97e5c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    16KB

                    MD5

                    776e1b2b9fef191dba6e4119fed0b51b

                    SHA1

                    c898383ab86ca78683dd1a1798540b1af00b85be

                    SHA256

                    ef116269a91df85a529b335c682c932da02ce354ecb34cf408eb53672dfa2983

                    SHA512

                    732666f546ea4f2db9f4eadcd09bc1fe22c9de959f5d2004f58796b532627518faa33ec03f7467522589737af2968197499c339baba60e5e779b79cc68926c34

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    16KB

                    MD5

                    4be981a1df30bff0a24003dbfd33bb48

                    SHA1

                    b40f4d6e76fa8932dfc202376d3fee4bf97fcd24

                    SHA256

                    5423f40a6919cb9de2f86c4023a61394bd406920f7d77e4c8f9ba7f9c53f2e64

                    SHA512

                    d77d0c1d653e2be15d4171a2360592cb837bc2970cb16c5592ff27419584abe8f26d04bbd980bdbcff0aff6367fbb2e587d6e58a024792d27b56f4f9ba208e42

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    6KB

                    MD5

                    44af285ead795dda43c029887c990f6f

                    SHA1

                    4fa32a09750a905d2ab217e0ddeaf4765a940790

                    SHA256

                    21112eccf6cc249f25037c48fd2128e7091a81e584e4384b60cf78265091ca8e

                    SHA512

                    56ed287115da77465d50cca7ac5399719414857c76910c3021b12881aa18cc4781a5060f87479c6e5198e3bf89db7766bcb8980c0f369cda19e813000dad12b8

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\pending_pings\0779994a-88b1-4e56-8e49-07a4a6ba7cac

                    Filesize

                    671B

                    MD5

                    973e9c78143420586d06a2a1fd7c29d9

                    SHA1

                    ecc737b9df40e3a660d6005ceac14f3f53341372

                    SHA256

                    f23a4573ab8e2da5d1b7058f38050deca968414d225114397e93114871a43b78

                    SHA512

                    d4309ddccd9e01f5148211b4c6f94c3a7ed2438da97e14c5d1178dad3cd208d42b596a3f71c2dfe46d62732bb2b209f41a784ef6b7f3ced3d878e7b436a75ee8

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\pending_pings\3f4b8662-8f48-4674-845d-86b602196691

                    Filesize

                    982B

                    MD5

                    23908e4c897d151e6197e0d3605187ce

                    SHA1

                    66f28c6b7d12263cee95973ee59feab3378d03bd

                    SHA256

                    158fa6f105d6b186834c0c2d30fb8f04c01f21207ac96bd53b364d92baad0f5c

                    SHA512

                    2c6bfc21a79224327f0227cd126e9c679930e5c45b79ebd045a0d2a0f8919abbdd82a74aad501a5049fbc49391f5ba89f19215b4336e1d8ccc0296dc714f8b63

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\pending_pings\5422e990-2c0e-45bf-97f5-6ee36b0348b8

                    Filesize

                    25KB

                    MD5

                    a92dbb097c8065540ac024b939fc12fe

                    SHA1

                    dd9d5254ff1422dc65d716ebc4571fcda072f0aa

                    SHA256

                    2481c12d7c4c92d8b483ba0f1f2bb95f69ab9a105a6df3e34fbfd8b6fd6d1424

                    SHA512

                    f7cc0545f7b9b9bd3546068a459aeaa782207492dfa83471dec5aa87753bb70177fab29f15b162bc3726910fb6228bf5a87ecb4265b104fbe926714d338eaea9

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                    Filesize

                    1.1MB

                    MD5

                    842039753bf41fa5e11b3a1383061a87

                    SHA1

                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                    SHA256

                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                    SHA512

                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    2a461e9eb87fd1955cea740a3444ee7a

                    SHA1

                    b10755914c713f5a4677494dbe8a686ed458c3c5

                    SHA256

                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                    SHA512

                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                    Filesize

                    372B

                    MD5

                    bf957ad58b55f64219ab3f793e374316

                    SHA1

                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                    SHA256

                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                    SHA512

                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                    Filesize

                    17.8MB

                    MD5

                    daf7ef3acccab478aaa7d6dc1c60f865

                    SHA1

                    f8246162b97ce4a945feced27b6ea114366ff2ad

                    SHA256

                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                    SHA512

                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\prefs-1.js

                    Filesize

                    15KB

                    MD5

                    edf23fea9fb3a5e908b64c6840d25736

                    SHA1

                    50d79c9fb317b2f25eb430ea8b0e5d5a24e200b9

                    SHA256

                    f7915b1efb7fb3fbd9fc1a62788e019db7ba33ec8ade94c0412c87e466a4f415

                    SHA512

                    ff593fa00838c675b5ead61a7c169d1a2dbf92c7450a177078e9f62b3f3547217f80c6bdd3f75b82232c7ee42d4ff81d862fac66f4930fcc61fe32014dcd4b55

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\prefs-1.js

                    Filesize

                    15KB

                    MD5

                    96bbbf724a7e6300a4dddebe9930d61f

                    SHA1

                    27952baf0fc66092c1205a8d67afa71005a9b7b7

                    SHA256

                    b2d4911947092706d88f53651ef91ea1fae6aa33827acc5e7f7928b6051532bb

                    SHA512

                    8dc8927cb4534d118a9d5ee8a1b3cbaeba7b359b9fdb80b2fd867764b1d28a614070825e68cf6f9e9d15af3e80432519aa2f11e61aa117150bad5921f1fabf28

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\prefs.js

                    Filesize

                    11KB

                    MD5

                    b7005190abc0b64698575205b8be00f1

                    SHA1

                    462386904fcfc044326da98cb44c03936979991d

                    SHA256

                    a8c60914a8d0e3e6b6d70dc035db005ff568876a73e5a403ed254fdca98b6a72

                    SHA512

                    bcc22606e4bde88aad062b746a049c4a3aab13eaa00034eb3e2a725772842c542e8b2588c4df04d10119c8f46b2ff627ac1982317ec7b3edae814f02e9b0c360

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\prefs.js

                    Filesize

                    12KB

                    MD5

                    2efca972181b769023d54453d8196db9

                    SHA1

                    3d0ad3465bbf93c9f2cd8bf060cd820ecf67af04

                    SHA256

                    00f221d4557a7ea661e02d245653b6383c88d9097e30524a4ed6f1abbfce33bf

                    SHA512

                    091807a51dff13335d03201cc2023164e6f5be19a695022589b8eb2a95374ca4bf121390751f8755ed285b5b5ae4f9536604459a47c1795d756e9cd4ba892504

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\prefs.js

                    Filesize

                    8KB

                    MD5

                    0d7395536d0f8af713e41548c61acdab

                    SHA1

                    8dcda2e2eee40bb0f824c374cc3febf583128deb

                    SHA256

                    4f39ee6cc87077d36f65cd296d4e0cbe064d0d59bce89814f3ded3e486bd7333

                    SHA512

                    c78fa0808e8546f07606fdfccef30df5532e7ac12e5f3de5053ccbe6ef1e4b390f91da9b3fe3ae1af78db3bcbe516d37030a3d961d2c6ab6089ca7308558b0a7

                  • memory/452-2982-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/452-2983-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/636-376-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/636-391-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/1932-62-0x0000000000400000-0x0000000002469000-memory.dmp

                    Filesize

                    32.4MB

                  • memory/3908-406-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-2968-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-419-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-405-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-404-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-395-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-325-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-2984-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-2980-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-21-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-19-0x0000000000DE1000-0x0000000000E0F000-memory.dmp

                    Filesize

                    184KB

                  • memory/3908-20-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-2974-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-16-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-2973-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-646-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-2972-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-1229-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-1852-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-2674-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-2969-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4552-27-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/4552-26-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/4888-2807-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4888-2699-0x0000000000DE0000-0x000000000127C000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/5080-0-0x0000000000350000-0x00000000007EC000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/5080-3-0x0000000000350000-0x00000000007EC000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/5080-4-0x0000000000350000-0x00000000007EC000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/5080-18-0x0000000000350000-0x00000000007EC000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/5080-2-0x0000000000351000-0x000000000037F000-memory.dmp

                    Filesize

                    184KB

                  • memory/5080-1-0x00000000772B4000-0x00000000772B6000-memory.dmp

                    Filesize

                    8KB