Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-07-2024 16:15

General

  • Target

    1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838.exe

  • Size

    232KB

  • MD5

    60fabd1a2509b59831876d5e2aa71a6b

  • SHA1

    8b91f3c4f721cb04cc4974fc91056f397ae78faa

  • SHA256

    1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

  • SHA512

    3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

  • SSDEEP

    3072:BMhIBKH7j7DzQi7y5bvl4YAbdY9KWvwn7XHMzqEOf64CEEl64HBVdGXPKD:BMh5H7j5g54YZKXoxOuEEl64HZAi

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Renames multiple (3249) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 28 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838.exe
    "C:\Users\Admin\AppData\Local\Temp\1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838.exe"
    1⤵
    • Chimera
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Music\YOUR_FILES_ARE_ENCRYPTED.HTML"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4648
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4648 CREDAT:82945 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4916
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4364
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:1512
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2776
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4600
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4456
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:692
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4340
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4388
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4388.0.229443105\2015967010" -parentBuildID 20221007134813 -prefsHandle 1600 -prefMapHandle 1892 -prefsLen 18084 -prefMapSize 231738 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {91d136ea-b09f-4188-85c5-77ace2a398ab} 4388 "\\.\pipe\gecko-crash-server-pipe.4388" 1856 196f1d64458 socket
        3⤵
          PID:1756
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4388.1.1730784827\669215872" -parentBuildID 20221007134813 -prefsHandle 2172 -prefMapHandle 2168 -prefsLen 18635 -prefMapSize 231738 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b14de5b0-5b88-432b-b2f1-d69f00574337} 4388 "\\.\pipe\gecko-crash-server-pipe.4388" 1832 196f1d65058 gpu
          3⤵
            PID:856
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4388.2.191978716\1635074718" -childID 1 -isForBrowser -prefsHandle 3096 -prefMapHandle 3092 -prefsLen 19464 -prefMapSize 231738 -jsInitHandle 1216 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a3265fa-b9ff-4356-9b05-40abd20a8813} 4388 "\\.\pipe\gecko-crash-server-pipe.4388" 3108 196f4f84358 tab
            3⤵
              PID:4472
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4388.3.2024589217\1413990679" -childID 2 -isForBrowser -prefsHandle 3568 -prefMapHandle 3416 -prefsLen 19572 -prefMapSize 231738 -jsInitHandle 1216 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {aabee47a-2373-4021-bc4b-11799183ed11} 4388 "\\.\pipe\gecko-crash-server-pipe.4388" 3408 196f5995e58 tab
              3⤵
                PID:5184
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4388.4.1204830716\557935034" -parentBuildID 20221007134813 -prefsHandle 3948 -prefMapHandle 3944 -prefsLen 21588 -prefMapSize 231738 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e9c2e7e-af7f-4b6a-aafd-cd64412affa5} 4388 "\\.\pipe\gecko-crash-server-pipe.4388" 3896 196f5a48a58 rdd
                3⤵
                  PID:5512
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4388.5.1557535145\1887537632" -childID 3 -isForBrowser -prefsHandle 4736 -prefMapHandle 4732 -prefsLen 27853 -prefMapSize 231738 -jsInitHandle 1216 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd5624b0-43dc-4ffd-b461-fc3a554a5742} 4388 "\\.\pipe\gecko-crash-server-pipe.4388" 4812 196f921c258 tab
                  3⤵
                    PID:5820
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4388.6.1848781132\1802673482" -childID 4 -isForBrowser -prefsHandle 4748 -prefMapHandle 4744 -prefsLen 27853 -prefMapSize 231738 -jsInitHandle 1216 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0238e0bd-4346-4213-b70b-4f668db06a58} 4388 "\\.\pipe\gecko-crash-server-pipe.4388" 4828 196f921cb58 tab
                    3⤵
                      PID:5860
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4388.7.497426447\393083394" -childID 5 -isForBrowser -prefsHandle 5184 -prefMapHandle 4776 -prefsLen 27958 -prefMapSize 231738 -jsInitHandle 1216 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d14b1777-b34e-452a-87d9-213f83f7d5ff} 4388 "\\.\pipe\gecko-crash-server-pipe.4388" 1908 196f921ad58 tab
                      3⤵
                        PID:5944
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4388.8.409726981\2065934056" -childID 6 -isForBrowser -prefsHandle 5728 -prefMapHandle 5724 -prefsLen 28311 -prefMapSize 231738 -jsInitHandle 1216 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4699081a-446d-4aa2-89f9-76b668c6a65a} 4388 "\\.\pipe\gecko-crash-server-pipe.4388" 5736 196facc9058 tab
                        3⤵
                          PID:6100
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4388.9.1624372454\1186919998" -childID 7 -isForBrowser -prefsHandle 5924 -prefMapHandle 5744 -prefsLen 28311 -prefMapSize 231738 -jsInitHandle 1216 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {811f96a3-fea8-4511-a407-30382c28248b} 4388 "\\.\pipe\gecko-crash-server-pipe.4388" 5904 196f5fe4658 tab
                          3⤵
                            PID:5124
                      • C:\Windows\system32\AUDIODG.EXE
                        C:\Windows\system32\AUDIODG.EXE 0x40c
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2580

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Program Files\Java\jdk-1.8\jre\YOUR_FILES_ARE_ENCRYPTED.HTML

                        Filesize

                        4KB

                        MD5

                        dc53b04721b39802a04592f853538e64

                        SHA1

                        1899879709408836dbf540c18cfbe0de80b39805

                        SHA256

                        57eb1324be08bd7caf9056370b1885c44a4f535b2905a200b6cd5c1ce9135a3a

                        SHA512

                        d892670588fc07095e40a9b32f6ed17362c152f0ec7cacad032b81d756c7793e15d0fed81b3057d849f406e59c427fdf263dfff1ec5f7f4b06a786e7076da78b

                      • C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\update-config.json

                        Filesize

                        102B

                        MD5

                        7d1d7e1db5d8d862de24415d9ec9aca4

                        SHA1

                        f4cdc5511c299005e775dc602e611b9c67a97c78

                        SHA256

                        ffad3b0fb11fc38ea243bf3f73e27a6034860709b39bf251ef3eca53d4c3afda

                        SHA512

                        1688c6725a3607c7b80dfcd6a8bea787f31c21e3368b31cb84635b727675f426b969899a378bd960bd3f27866023163b5460e7c681ae1fcb62f7829b03456477

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                        Filesize

                        471B

                        MD5

                        754c60704e49a33416fa108cccfd927c

                        SHA1

                        876b19e48fa7f63fe12a23d0851b7ef0d8aff355

                        SHA256

                        78e56a40657af66000f8251104e476e1b54cd8264669e1af1b94a9eba7826632

                        SHA512

                        afbe95157ebde7af3f04819e5af5d83a1d4a8570fb1fde961867e47582adeb75f1c5fc4e22a6ff7e6132c9575c3e1fa33c7775b244950b67377905b15980f5e8

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                        Filesize

                        404B

                        MD5

                        b30fa1c01f7356209d91c1b1e0a20e35

                        SHA1

                        56f3bb996552d347ac8a29858789a3052553e1b9

                        SHA256

                        d56ed1df6c506cc5cb9075a78d92dc855ed790b222aff0f51a30bbc01c6d8a60

                        SHA512

                        94637a286cc3171b7cddf4a4d718db72c50ab4c9b3ddde9d9828bc591f4a563ef88246b458b5739641f5adfa28534f8b182b50a6c0e692799f66434f4a363c04

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\T28YHK6H\edgecompatviewlist[1].xml

                        Filesize

                        74KB

                        MD5

                        d4fc49dc14f63895d997fa4940f24378

                        SHA1

                        3efb1437a7c5e46034147cbbc8db017c69d02c31

                        SHA256

                        853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                        SHA512

                        cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\activity-stream.discovery_stream.json.tmp

                        Filesize

                        25KB

                        MD5

                        e4f1e50a13f9d1f863ae99825301ec19

                        SHA1

                        1f999d3d68743364fc54bbc4379bb48b8e6896f2

                        SHA256

                        78d3f1301ae478334e5ebe9f66e3ae0b9079f5db9bc38536fd812f9286c4cf8a

                        SHA512

                        c4f3a2b922f51c94069066e4856cfc05642f70be73b2981d6a31f401191197e3a77698cfece9ab6be4cbb44044c0413275b0c0ea69cb65da072cb5b51afeb155

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\cache2\doomed\18377

                        Filesize

                        51KB

                        MD5

                        ad90f2f0ce393b7f29c0831fdcf5a9d0

                        SHA1

                        ff7ebdb2c9f0bb9184b67e33e326830a182eb84a

                        SHA256

                        33f60dc2114a939b08658095a7dd87bfb6a1894b928b8edb4aa200d221ced2f0

                        SHA512

                        88ae82a6187398938dad9970e164ab9532a47c8c66b3316b3d79337b806915698712b171fa8eb93a2627ca4d7e683fed7716b18db88bff9c56f1301528a75a68

                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\0H4D9VJ9\favicon[1].ico

                        Filesize

                        6KB

                        MD5

                        72f13fa5f987ea923a68a818d38fb540

                        SHA1

                        f014620d35787fcfdef193c20bb383f5655b9e1e

                        SHA256

                        37127c1a29c164cdaa75ec72ae685094c2468fe0577f743cb1f307d23dd35ec1

                        SHA512

                        b66af0b6b95560c20584ed033547235d5188981a092131a7c1749926ba1ac208266193bd7fa8a3403a39eee23fcdd53580e9533803d7f52df5fb01d508e292b3

                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\UHOV4U59\suggestions[1].en-US

                        Filesize

                        17KB

                        MD5

                        5a34cb996293fde2cb7a4ac89587393a

                        SHA1

                        3c96c993500690d1a77873cd62bc639b3a10653f

                        SHA256

                        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                        SHA512

                        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                      • C:\Users\Admin\AppData\Local\Temp\~DFC5223E56708BE22F.TMP

                        Filesize

                        16KB

                        MD5

                        a808e1de4c717ee49ea97981d4d3ca12

                        SHA1

                        3762e421dd0212b341d028a804c6d37560031663

                        SHA256

                        931b294f9bd97fdaf4d8453773d9bfa20ae74b9405eedc4cc4657ba8bc4499f4

                        SHA512

                        fac5e5a4ec786227d4a8b1f25c3730f06ec71398ac68d763f44213904d5e6463e1d9c392fb341284325d8e11622ed2a762b68b1efb6f3fbe33eae2df7b5d5daf

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        1KB

                        MD5

                        0f60cc7927fe58645d36c54854f8eff3

                        SHA1

                        50de648d144b74000162cbdfbbe8e81851bd55e5

                        SHA256

                        4db2016bb60e6e0ca64dd783a58046d23bfdb5470d2c72e161f78db7c9f95420

                        SHA512

                        51033e8847121a33e0b0f4ca80ed88699e0bcd4ce0fc6c1083393204456d9c62e1fc92a35078c4b2609031129da1ace1455f8d4622ad69a162a35aa93e24e979

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        2KB

                        MD5

                        b7c53122dcc4b17de42162bea1ed1054

                        SHA1

                        22e50bea02524f7bd5ec1608f78ecd13d1419420

                        SHA256

                        e0a800243b23a994bfaaab5994fe8a95a1bd4c7416837ad495df8a53f8545699

                        SHA512

                        6b7cd023f8faaa84ef58ad10b7a23b82d246545ee11fe0fdd6b83916da410b2ad85ad093ff787205bb06f0bb7f1f6fe92b27f8789a84907afc7de0e021d87975

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\datareporting\glean\pending_pings\64b1d8f8-c8fa-4bc6-8a3a-b5ae97ccdca8

                        Filesize

                        656B

                        MD5

                        5ab96644d4695bd875862db47286cc23

                        SHA1

                        a6b1d6e90e732472821de9f496be998fe7cd4803

                        SHA256

                        ceaa6fa860d9ee619a9359d6469f071f2bb082a0a51a1bb415981edfe2a38793

                        SHA512

                        0a47a520898d39f80da2fcd8b8df8c6092f017d74956495db988a2082ef589cb96c27492c36aad3f7b9a4f4650a000d8dfc8a09f1532e0fed44106a47b13f097

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\datareporting\glean\pending_pings\b9218a09-c23c-4f49-9d61-21d0ca2dacef

                        Filesize

                        587B

                        MD5

                        fa73af1f79f8d6dcd063e994339f2f24

                        SHA1

                        728c91987b5ae836a029ec0b3da4b7f5abb941bd

                        SHA256

                        95b94011a18a9832a0d69c9713358454b92134f0a9e14ec64580e15813f140bf

                        SHA512

                        3c29d30f41bed67fbdd796b9087cc7cf39fb03a6f41777a5c729cef3e0f0d432a174d6bf33f93255816027674dec568ddd52d2e5a415d70d68f791f5bddadfa2

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\extensions.json.tmp

                        Filesize

                        36KB

                        MD5

                        4437c5a242a7dc538ec94393b7c6b190

                        SHA1

                        f72870ea2bd26cbec8a2bfaf711308b10e477b4c

                        SHA256

                        874f5cc75de8fbdabd3a4828b89d1eefe668ca42b4d37c8574475a6fdbfabd22

                        SHA512

                        fad07026a3e70d47f1ab7da9221af0eccae601d775ebe8ff8ee3964c60f13a2853d3f297502b5aa8c6c5e73b5382d40a59303bba946fd4bbe1f807e531121816

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\key4.db

                        Filesize

                        288KB

                        MD5

                        042adb35ceddd946f76b7fcd538fed33

                        SHA1

                        5c3b9118df279663be6b1d1b62eca43242196bb5

                        SHA256

                        fdb549ee0ce4d35fae4d766d102ef758d58d5693dd7544a7780f650dec384311

                        SHA512

                        7044368383908b6814dc64e939378c39767bf987f60a1692be79c1f351469519920d93a734dc2c15bd38237c2532ed0593ea56c474f668571418dbd1aa15b64a

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\prefs-1.js

                        Filesize

                        6KB

                        MD5

                        476466ed4e09a44060adbc45c31d4a81

                        SHA1

                        3641b2fa9da09af8a9bace3db31ab08e909dcd02

                        SHA256

                        39bcf607ef6fd2e7fa9bda9e0412af79d0842c5a51f4a723c68bf6da0d2e4db2

                        SHA512

                        82fa84b4e22012c8707769958ff3208b796cb0f2cf579e195bcbe0e83112ed7d24d5c68a962febd726839cd954f7a7f8d556534db1a80176f9c82f0971fdcfab

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\prefs-1.js

                        Filesize

                        6KB

                        MD5

                        8b7317c93efaba8c641785ea1788da61

                        SHA1

                        210ccba33a2515cc5c57f5bc874ab2fa93b6a77e

                        SHA256

                        b165bebe6970b0264c691c4a22284ebaa2ca52dc870175368df10c9cd4e1ecc8

                        SHA512

                        ba88c13e27d784a929c32df434b28548f9846c615915dc0f2ea016655a310308acc7e3ca84ba8b016e6e0de00a836624ae530358dc0fa58a5fda8c0a94c7d7a9

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\prefs-1.js

                        Filesize

                        6KB

                        MD5

                        7f93604c2b008c5617b8f0141e27e27b

                        SHA1

                        421d7d2d2252d59aa6910da93023848743ce90a8

                        SHA256

                        652a0614986b0c9243609e568609ac7bfbac596ac62764a94f8188b6a0287498

                        SHA512

                        0f84cb108f45fe693e2332c7cd3079689d2b84b28db819d66d59ff079d7c44aebf40ad06d143e17d979df94b1f053311eecf1982deb5ad0aa23a95ced3b30607

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\prefs.js

                        Filesize

                        1KB

                        MD5

                        671776145d91858572fca7877425d25f

                        SHA1

                        13fcda53d544ac35a5dc706ff4f6c928301ef184

                        SHA256

                        75ee99b30a9104b2784f405ae84eec8f5ab0b75a58df582d2a37a1daa2e6e336

                        SHA512

                        ab8b5c8312d3cad7400d17a6c8266cffdc33649bc7b5daff20b5deebfdd4da95c84926c579b447512b3a937a42a66a5ebe42f3aa08a108e8cfc5f722a5c9d8a3

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\search.json.mozlz4

                        Filesize

                        280B

                        MD5

                        41d220d4783f67d2b57beec20c135229

                        SHA1

                        6e97765e77920b6010fac2cb4abf1e3cea106541

                        SHA256

                        5d1881e74d76b95bad59439bb5c7676258a4ae6b6d853074e93b5247cf1715dc

                        SHA512

                        dc30ddc4c8cfe598de5e24bc88cebbe4256fbb21a0b1db6c2ec15311053e7d8be6a93a0bcfcfd8a02543f8b9cf9b15a5840154b272a2df71d59d7dfd80984ac0

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\sessionstore-backups\recovery.jsonlz4

                        Filesize

                        3KB

                        MD5

                        816bd59311a269a72a26afb275c64303

                        SHA1

                        1a41bd45e03b3981adf2e42fe0329e0ba449eadb

                        SHA256

                        8839d2f15830e11864f811e72b1178527d9c649cfee4c71de03d2e40618b76a6

                        SHA512

                        c78b87fe9a34b9ca821a64090376ea150befa4abf6326b179a5c0b7bf5e6ce5048e5bdf2898c4a25b4e791449dc1f6f68a0a0953e84f188f34ee36cd5190d921

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\sessionstore-backups\recovery.jsonlz4

                        Filesize

                        5KB

                        MD5

                        1eeaac69f92377d964fbad5ebafe2d4d

                        SHA1

                        0c2caeebe588dd8ee3d0f65e48a754cf3039e499

                        SHA256

                        a64a7bfe232303a3d386c07cffb2d13966aab3c4c0772384058b2f6806b2cd55

                        SHA512

                        2fcb47e3810e4030670ef4a334abd038af953cd2bdeb448bd6c2923a35be49bb7534a83e0ca7f1fe6ac16c6b9eeb1f3202080ee441511840207d720e9630efb8

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\storage\default\https+++mega.nz\cache\morgue\24\{804d857c-be1d-4ac4-a41e-5e02dcf53818}.final

                        Filesize

                        1KB

                        MD5

                        3efa9abd92666265dd81c4f4311a96f9

                        SHA1

                        41b6b716d67b93555e444cd453f3c6e3f8c9522c

                        SHA256

                        5066b1841e8877db31312ef3af86f9bc9234c95071119e025764f45241a4e2e7

                        SHA512

                        5961950f077501608a0f2975e7f69c483eeacc4eec4ac77fd650cc1131609501f87819f93ed23aa508a90426156abf038a859fac4112d2d4435bbb634027cd6c

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                        Filesize

                        48KB

                        MD5

                        08867453029a31354f07a9e1f3421ebf

                        SHA1

                        e986a9ba9de07a67153e031206302a84cce3b0fc

                        SHA256

                        b78e0d414f8a5e4413313dd6ef50f80c9ef409549aa5ae72812a7a373c7aa1e8

                        SHA512

                        5de7f62a2c94b24435b998c789824551320f41f03671338e2fb9220e728493455822476f4b1085c675eeda0a6df815e6bbc108408d7af112bda14ed60b6719b0

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                        Filesize

                        128KB

                        MD5

                        3e2049e6c7da1c3d0dbd5ab2a6bb23d0

                        SHA1

                        5cb135a312b73fce6160c18ac34415757cb7b1e9

                        SHA256

                        a58f63d6a337b81546bfe1f700c2b6851793b9d2d7a536f3270cb9bdb3110d9a

                        SHA512

                        e50890d4535cd20edf87f17cd82685a5805de0f0f77b9719265ebea76c054e566d67b1617d6af766ab75c49455b7a968410b2c3693e3582944b9c4050311c374

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t7xlbt2r.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                        Filesize

                        184KB

                        MD5

                        b7b0cb5202d4e903c4a9a98bbed0b7ba

                        SHA1

                        1ecb7dbee45d12071b5905172af34bb883c938a7

                        SHA256

                        26917eda2791e0076a42075cd5f95f637e0a4383806735180fef72c4ff1e4300

                        SHA512

                        d46924e29636290e96760b636952568d729594e3e01d225019004b6c8c570581f80dacfeda67d675d39424c8c3617a59bed5da3f88651159b68c4d1004f87506

                      • memory/2872-2-0x0000000073CC0000-0x0000000074270000-memory.dmp

                        Filesize

                        5.7MB

                      • memory/2872-8-0x0000000073CC0000-0x0000000074270000-memory.dmp

                        Filesize

                        5.7MB

                      • memory/2872-0-0x0000000073CC1000-0x0000000073CC2000-memory.dmp

                        Filesize

                        4KB

                      • memory/2872-9-0x0000000005330000-0x000000000534A000-memory.dmp

                        Filesize

                        104KB

                      • memory/2872-3-0x0000000010000000-0x0000000010010000-memory.dmp

                        Filesize

                        64KB

                      • memory/2872-1-0x0000000073CC0000-0x0000000074270000-memory.dmp

                        Filesize

                        5.7MB

                      • memory/2872-1213-0x0000000073CC0000-0x0000000074270000-memory.dmp

                        Filesize

                        5.7MB

                      • memory/4364-8018-0x00000247AA0B0000-0x00000247AA0B1000-memory.dmp

                        Filesize

                        4KB

                      • memory/4364-752-0x00000247A2A20000-0x00000247A2A22000-memory.dmp

                        Filesize

                        8KB

                      • memory/4364-8019-0x00000247AA0C0000-0x00000247AA0C1000-memory.dmp

                        Filesize

                        4KB

                      • memory/4364-733-0x00000247A3920000-0x00000247A3930000-memory.dmp

                        Filesize

                        64KB

                      • memory/4364-717-0x00000247A3820000-0x00000247A3830000-memory.dmp

                        Filesize

                        64KB

                      • memory/4456-1906-0x0000017CC18B0000-0x0000017CC18B2000-memory.dmp

                        Filesize

                        8KB

                      • memory/4456-1400-0x0000017CC2190000-0x0000017CC2192000-memory.dmp

                        Filesize

                        8KB

                      • memory/4456-1189-0x0000017CB0C00000-0x0000017CB0D00000-memory.dmp

                        Filesize

                        1024KB

                      • memory/4456-1908-0x0000017CC18D0000-0x0000017CC18D2000-memory.dmp

                        Filesize

                        8KB

                      • memory/4456-1208-0x0000017CC0E30000-0x0000017CC0E32000-memory.dmp

                        Filesize

                        8KB

                      • memory/4456-1404-0x0000017CC21B0000-0x0000017CC21B2000-memory.dmp

                        Filesize

                        8KB

                      • memory/4456-1398-0x0000017CC1BE0000-0x0000017CC1BE2000-memory.dmp

                        Filesize

                        8KB

                      • memory/4456-1206-0x0000017CC0D70000-0x0000017CC0D72000-memory.dmp

                        Filesize

                        8KB

                      • memory/4456-1396-0x0000017CC1BC0000-0x0000017CC1BC2000-memory.dmp

                        Filesize

                        8KB

                      • memory/4456-1224-0x0000017CC14E0000-0x0000017CC14E2000-memory.dmp

                        Filesize

                        8KB

                      • memory/4456-1226-0x0000017CC14F0000-0x0000017CC14F2000-memory.dmp

                        Filesize

                        8KB

                      • memory/4456-1230-0x0000017CC19F0000-0x0000017CC19F2000-memory.dmp

                        Filesize

                        8KB

                      • memory/4456-1222-0x0000017CC14C0000-0x0000017CC14C2000-memory.dmp

                        Filesize

                        8KB

                      • memory/4456-1203-0x0000017CC0D40000-0x0000017CC0D42000-memory.dmp

                        Filesize

                        8KB

                      • memory/4600-1018-0x000001C30D7C0000-0x000001C30D8C0000-memory.dmp

                        Filesize

                        1024KB