Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 16:25

General

  • Target

    SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe

  • Size

    1.8MB

  • MD5

    246a2188eb95e0eda77ad4891c4dc765

  • SHA1

    53401c4e4aaebcd6fa94c92798f346a0e023efd8

  • SHA256

    ea3b2c23df3162a6fa5c9d22d03f50db30542d7570ef769ded4ef106fb0255f4

  • SHA512

    8ec6d38687806a45a888ddf22614a5170b6e417594cd70f913280e3f7d8820c350925dd3c0d9167b26386dc8c67ec2191128ebc99e562ec64983393bd2872102

  • SSDEEP

    49152:xQzhheXO8GGTS6B1CCZ4cwjPXI7NwP+Vl0:xQnwOpG2ce0YKl0

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Extracted

Family

stealc

Botnet

sila

C2

http://85.28.47.31

Attributes
  • url_path

    /5499d72b3a3e55be.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Users\Admin\AppData\Local\Temp\1000016001\bc9a6e2130.exe
        "C:\Users\Admin\AppData\Local\Temp\1000016001\bc9a6e2130.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1284
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 1012
          4⤵
          • Program crash
          PID:4140
      • C:\Users\Admin\AppData\Local\Temp\1000017001\adaab0dc1d.exe
        "C:\Users\Admin\AppData\Local\Temp\1000017001\adaab0dc1d.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4360
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5000
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1952 -parentBuildID 20240401114208 -prefsHandle 1880 -prefMapHandle 1872 -prefsLen 25757 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb4ebf47-82ea-4e33-b210-ac0069a5ab9f} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" gpu
              6⤵
                PID:336
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2320 -parentBuildID 20240401114208 -prefsHandle 2308 -prefMapHandle 2304 -prefsLen 26677 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4803b35e-a56d-4927-ba45-ba8062f7ebfe} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" socket
                6⤵
                  PID:4688
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3208 -childID 1 -isForBrowser -prefsHandle 3232 -prefMapHandle 3256 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7afe4265-722f-428d-ade8-60515c16bae9} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" tab
                  6⤵
                    PID:2444
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4152 -childID 2 -isForBrowser -prefsHandle 4144 -prefMapHandle 4140 -prefsLen 31167 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {562bacdc-3670-4cbb-a723-3827b5a21a73} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" tab
                    6⤵
                      PID:1956
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4648 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 2792 -prefMapHandle 4624 -prefsLen 31167 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {99791b41-714d-4e5c-97f1-e364bdae40f9} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" utility
                      6⤵
                      • Checks processor information in registry
                      PID:4420
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5280 -childID 3 -isForBrowser -prefsHandle 5352 -prefMapHandle 3920 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c487b82e-c01f-4b24-8efb-630183b1c675} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" tab
                      6⤵
                        PID:3612
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5472 -childID 4 -isForBrowser -prefsHandle 5560 -prefMapHandle 5348 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f9911f44-1bc0-4026-ba98-036b6c292539} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" tab
                        6⤵
                          PID:4308
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5788 -childID 5 -isForBrowser -prefsHandle 5708 -prefMapHandle 5716 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {12e560d4-eaf9-4a8a-8095-580166411efb} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" tab
                          6⤵
                            PID:1280
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1284 -ip 1284
                  1⤵
                    PID:396
                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5760
                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3600

                  Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\activity-stream.discovery_stream.json

                          Filesize

                          24KB

                          MD5

                          ed8c88aaae80f58a644279cc86593fd4

                          SHA1

                          e21bf2a8db61b3d1f2073a82e19b11a004175381

                          SHA256

                          eecdf90d2abec1379b1a7b0d1068bf7d7321893c65d1fb6c49f3ddc25ab5c287

                          SHA512

                          d9295f87688b35ddddd4f788afb915e1c6c0cf58d095e354121cbaf441ad7a5cff62eaa5ec7d269c5194a5f3f5bc66f4275ed86276af1351d0cbd5e0f0390d2e

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D

                          Filesize

                          13KB

                          MD5

                          b60c45fc22874b872f791f737c2e33f1

                          SHA1

                          8e690b3c0b55728af9dd4ea37a3dcc429ae962fc

                          SHA256

                          c75a0630824784c926c40bf05d4a3266081ff10433ae1f073c1bd0d9243b88ca

                          SHA512

                          98ef7cab4dbde613470cf02c2121e0065e6c336c706c77544df5186d29cb1b87bd0e4e0592a141c8cf7cdc3d5a74c49e17932167b84ef001db8ef96c7c1f041c

                        • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                          Filesize

                          1.8MB

                          MD5

                          246a2188eb95e0eda77ad4891c4dc765

                          SHA1

                          53401c4e4aaebcd6fa94c92798f346a0e023efd8

                          SHA256

                          ea3b2c23df3162a6fa5c9d22d03f50db30542d7570ef769ded4ef106fb0255f4

                          SHA512

                          8ec6d38687806a45a888ddf22614a5170b6e417594cd70f913280e3f7d8820c350925dd3c0d9167b26386dc8c67ec2191128ebc99e562ec64983393bd2872102

                        • C:\Users\Admin\AppData\Local\Temp\1000016001\bc9a6e2130.exe

                          Filesize

                          245KB

                          MD5

                          8cd9f617f145c5a958d7e2a8b14747a2

                          SHA1

                          82b3d3dd82a8793db937ad6a9a7db2dcc207c6d1

                          SHA256

                          c945bc9c0ed048cc87a1e4398ab909d2522fa098d5159231d84946f4da4517df

                          SHA512

                          4643ae00549ebb0f82833d51b5314a002f79068a30ffc75f2eca908f7c04ae9d6063083ba174be2260255dc5ee2418f74c90035550403cd51b252b3d9a2af1e8

                        • C:\Users\Admin\AppData\Local\Temp\1000017001\adaab0dc1d.exe

                          Filesize

                          3.1MB

                          MD5

                          26a5431275d0b2aa34b78e1ab9a6c8b8

                          SHA1

                          8ce2d2733e466763c74f565c2a127ea3f9b33e35

                          SHA256

                          aa69329596cb4df132ad23654dcf9a6ae0100358d76664b9c08c174daf8ed3a8

                          SHA512

                          3e6ce681f1a8fd4dc309de3f810dec7b3dd259a4c865d2d28d7051266e08659d4d2b26c12a36cc42eff7e507e3925882ac50c9fc62086d00bd5b123ce05580bd

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          479KB

                          MD5

                          09372174e83dbbf696ee732fd2e875bb

                          SHA1

                          ba360186ba650a769f9303f48b7200fb5eaccee1

                          SHA256

                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                          SHA512

                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                          Filesize

                          13.8MB

                          MD5

                          0a8747a2ac9ac08ae9508f36c6d75692

                          SHA1

                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                          SHA256

                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                          SHA512

                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\AlternateServices.bin

                          Filesize

                          8KB

                          MD5

                          ff9a5517d2bc0d11578407f9c17dc7ee

                          SHA1

                          92533bc5dfd0ea335d9714b9f4d6b8a03cd48801

                          SHA256

                          d52e50f24f187fe49cb34ded981cf774bc0722509a3e8fefe21d2e8bd5886394

                          SHA512

                          4e17aa8ee9ae6514d417616875d4032ac8263ae9315c6e2d82aeb02cfd1f9db971d67a3b2f4edfa8c352fb29e5ab3552d2ce7400efd9849544ffa567dbba79d8

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\AlternateServices.bin

                          Filesize

                          15KB

                          MD5

                          732f8becb36a443d318b99c9257ce4a4

                          SHA1

                          e6abb695414d8b7019675cd8a7b82f9ce189641e

                          SHA256

                          fc3d003b9759abd7021bc00b2f94abb59adc5f55c1d3ea5e45e195e2895bad31

                          SHA512

                          e4eaba96583d349cc75de84c60e7c43551984832c39b64fbc608d774abd6822f094d035ae7403e27957b8c93aa975c348aff6568fb48a2d635bd77f72bc1c4e7

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          3KB

                          MD5

                          570f63ed3066db531c56a02e2655b14c

                          SHA1

                          4f2a92d11cfb4f63af9a34285f0bee7ebf4e728e

                          SHA256

                          70aa66dbcb620f31ef5fc8a731dbd943bc31b8b7cda533dcc3a414e34d1e2cf4

                          SHA512

                          5dd1b30166784b0460f482ee53d6db02f79973a6ce10f3a7009bf4fd72f41a8ce942b1981cd27454e07d374eb362d972e14bb24fe73de0fa87c89571672d49ad

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          5KB

                          MD5

                          ef517df51a1e3df092dfaaa9b7d1a61c

                          SHA1

                          4b1c81e7619373a1b6f911bcb25159cbc4b39799

                          SHA256

                          101eaec0453259781754476186790e8826d3bc7c68d38c6a3e4fd09cedb7ca89

                          SHA512

                          9e653fea2671287ae1a41745e307722cb18d9d0dc7d5f1aff2f7ba9c7bc2b1e24761dfd5a41e57c04086b715237d7faf22957c610f9f781a5cd2cef1177e4785

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          16KB

                          MD5

                          275279d2583ab22b8f5140e1dda490ab

                          SHA1

                          d8cd3d83bf6afd0e71acac8cc3b705050b8d56d4

                          SHA256

                          c559f0a79b16ed6e414f49ae63b29ccddf3d98d3e85b13508794359ad8e6d1b8

                          SHA512

                          2200bdc1504b2f6c282604dfaf3cc3332475f393cbd4b29333aedc62b455d702ee1356518262d22fc04f942a8a8551fcca2616662802dfee7cdb2d3f3b8e9660

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          16KB

                          MD5

                          faa0481dd33388980e39de58d82eb02e

                          SHA1

                          b7656135fca44b033614465e9224d576cde793db

                          SHA256

                          8761aeae4c27ab1417ccdb6916f53b7a219427bc1f4e448fabe01bc16f142af4

                          SHA512

                          8bddb26bb196cf7d059de886e2cbc1d281199478af9850a0a07721772f95571668bce40e1a9b38c5befcbfb925bf23db5ab612078eef139e22ad498d1d4a9c69

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\pending_pings\983bf036-060e-4400-b860-8d3f49774ba8

                          Filesize

                          982B

                          MD5

                          46eb8fe242dbcf5d4b740f44ede1feb0

                          SHA1

                          7978212f63fe36f564b3f79e11336ce7666442c0

                          SHA256

                          b6b0a104e27976c772f54ab7b452904d4811e003e7342395cdb65b5cfd1f004d

                          SHA512

                          3eadb6e0320948dad3eba2466dad93ff2d733ebfddccd8a61229516ad0f5a2f47a5479703c949d51e0ebb544c6b893d45fd10ee4e2dedc5229ea610bd80814cc

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\pending_pings\ad1ae03c-22a0-446e-8892-f5d5d7e321ac

                          Filesize

                          27KB

                          MD5

                          98bc889673e4a1e64b7395560fd4ba45

                          SHA1

                          d2e71455fa3c6ac1c5051320bf5a4fcfd063d6c9

                          SHA256

                          15a8c762745fde3903c14c019fa8bc9cfc2c0a7c979411b1066b11584642617b

                          SHA512

                          5451cdd24d8ce513bef778715ddef53df7c987881096efd9c2ad676c7bf4ed871eb527c5598ab23f4cea10d6886971e8740f67b99fba89b13c4bffb9b89b558c

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\pending_pings\f63380dd-2c5b-4f6f-99ec-5031949c767b

                          Filesize

                          671B

                          MD5

                          77c4f6b14ae6aac65086c8e05054bcd5

                          SHA1

                          6f70adb6998ef1333f7bb7a489ec6bf8daeadd0a

                          SHA256

                          074fc673ed120ab7a945de0d694693b4ac7c527c4c7658d4557a80293cb3e577

                          SHA512

                          29c6662df00d7bca410fbd815c11c2d20b2eacaebe3d82275f25d45f334e1a769ec7ca4e74ac2a05434595d1c5b88f7fbfba45432bbd6621b8f22a7a3f5ba1d1

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                          Filesize

                          1.1MB

                          MD5

                          842039753bf41fa5e11b3a1383061a87

                          SHA1

                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                          SHA256

                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                          SHA512

                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          2a461e9eb87fd1955cea740a3444ee7a

                          SHA1

                          b10755914c713f5a4677494dbe8a686ed458c3c5

                          SHA256

                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                          SHA512

                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                          Filesize

                          372B

                          MD5

                          bf957ad58b55f64219ab3f793e374316

                          SHA1

                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                          SHA256

                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                          SHA512

                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                          Filesize

                          17.8MB

                          MD5

                          daf7ef3acccab478aaa7d6dc1c60f865

                          SHA1

                          f8246162b97ce4a945feced27b6ea114366ff2ad

                          SHA256

                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                          SHA512

                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\prefs-1.js

                          Filesize

                          11KB

                          MD5

                          b97a1d54b5879dcac14eef69d91caa83

                          SHA1

                          4f052c153d1182652b0d86628fa04e90846b52b6

                          SHA256

                          cd679e227433264a986f1a6f00f356fcf723548bb53a00084d171ec12e7a287c

                          SHA512

                          b9c0dbe23ca2c51dcbc81bc2e34d41126831b00341ca025225b6fdab29285e50ae777d4b5bd5982703848b580fb9df1925d4871f12588ee3df27aa41fe6c201a

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\prefs-1.js

                          Filesize

                          12KB

                          MD5

                          d55a9550ee0b10cdf534f076bdc2f878

                          SHA1

                          c81f2050a30b94b95ed538f0720d4ff0190f3f8b

                          SHA256

                          a78fed522ec8c1d6816dd2534f63c2764390143ad918e22196b98a6d850f2598

                          SHA512

                          92e79148efdb81c73834422078704fb1f44a7931aa15f1aed66d55f60538b836040c18ab45c142e155777fa95a33ca8bbd5da2f8844ca58eb8b62a9ab9ec27ab

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\prefs-1.js

                          Filesize

                          16KB

                          MD5

                          bcd34f9ccf5cc603c511d4ecc3352b62

                          SHA1

                          232bb2e04d3880843ae058e8aae789637513778b

                          SHA256

                          4f5c8eda69f079b0d5ab51dbb8df23cee0c8ad8d8cc075f358ccdb1719c8d1d1

                          SHA512

                          2ae8fbba144886b1296df1ccac13f6f5149a087525a6ce416046a83c8ae719fcc02df7ee4ea372540d0ffbbf5ef4e7ab6240bdb07ed03372de49c482f6b11005

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\prefs.js

                          Filesize

                          8KB

                          MD5

                          8ed6284653b03a1cd9536cbb7c3606c5

                          SHA1

                          9a60daf142a5262f38f663e26f48badbfb828530

                          SHA256

                          de485f1f8a5685b865d2045608198438525a050c21b62d23b874834961446bd6

                          SHA512

                          2da78489aba4109e058c3f3352a06cb1d6ecd54588af0bca7005e50bb02a8bfaaf614be9564df6704e2b7bda818897afad84e5c3924bf6985734ab5f9a95f6d3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                          Filesize

                          1.6MB

                          MD5

                          1f2f694b2609c08d976db009e50bcec5

                          SHA1

                          87198aa5d649882e2a07f60f4be81dfeb9fa8581

                          SHA256

                          8cafb6a209e3852a6b89a640775dca1becd36087a0f0d5939f81068f69f8a853

                          SHA512

                          3535ab13036babbfd92fdd7273f60ba70b1a749b48394d42ec6b07b0437e84cd07caf237e18a905826918fa3d9752435a117a52de9fdc04e02bd840cb8b93b46

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                          Filesize

                          2.2MB

                          MD5

                          8233d64ce92711298dcab71276fa9e12

                          SHA1

                          cb2063b1d531ce8988d6d579b77c16899dea6729

                          SHA256

                          a65a9f74a8e5b94e8a5d208b03fb4e9cc25b4e94503545e79f0989f21a830f98

                          SHA512

                          46fe5e3d0c39c46704420f45c6c10517931a300750a98f437b430ee69d01d05e97b19c223dd4ab0f3a5d3449f9d4eab828ed7b4df518d92493969520b88e8cf9

                        • memory/1284-58-0x0000000000400000-0x0000000002456000-memory.dmp

                          Filesize

                          32.3MB

                        • memory/2780-2572-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-707-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-2603-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-429-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-434-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-2596-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-2594-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-438-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-2592-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-420-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-2590-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-2588-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-307-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-2583-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-22-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-21-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-20-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-19-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-17-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-2578-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-1578-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2780-421-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/3600-2586-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/3600-2587-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/4360-439-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-2581-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-2604-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-2107-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-428-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-2573-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-2602-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-405-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-56-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-2584-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-1096-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-2595-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-2593-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-2589-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-448-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4360-2591-0x0000000000A00000-0x00000000014E7000-memory.dmp

                          Filesize

                          10.9MB

                        • memory/4520-3-0x0000000000C50000-0x000000000110E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/4520-2-0x0000000000C51000-0x0000000000C7F000-memory.dmp

                          Filesize

                          184KB

                        • memory/4520-18-0x0000000000C50000-0x000000000110E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/4520-1-0x00000000777E4000-0x00000000777E6000-memory.dmp

                          Filesize

                          8KB

                        • memory/4520-0-0x0000000000C50000-0x000000000110E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/4520-5-0x0000000000C50000-0x000000000110E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5760-437-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5760-436-0x00000000007C0000-0x0000000000C7E000-memory.dmp

                          Filesize

                          4.7MB