Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 18:22

General

  • Target

    SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe

  • Size

    1.8MB

  • MD5

    678c2ac57cd26feb4f051c0b40b7b399

  • SHA1

    24082d08ae037812a37eb9b30dafeb2d017edd25

  • SHA256

    3c00cc8edc77abf01ae9b9b0e7e51a8bdac7f6c3a3b52ceed4caff7f4f5155ef

  • SHA512

    0f12533cdba516561d2a08d75107edc756d1c0910117aca98f9784763d1b2321cfec319407a63cbcea37f7e73a5f19ff11b8409e45db6394c7cdebbec778718d

  • SSDEEP

    24576:cJxq3Vw58eylog0GwbgAwINk5lQGC7bfTk6ht6RjBp/eroj0UbJ2OcYxHFch7AUD:cy658u/wH5i5TzhE3tJjZFchcV2J7nb

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Extracted

Family

stealc

Botnet

default

C2

http://185.215.113.24

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3104
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:808
      • C:\Users\Admin\AppData\Local\Temp\1000036001\1c152c9ee9.exe
        "C:\Users\Admin\AppData\Local\Temp\1000036001\1c152c9ee9.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3824
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:612
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2852
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2aba0bd3-ca1d-41fa-bc02-f5a57a0c7adc} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" gpu
              6⤵
                PID:888
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2412 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2b02a302-ee04-488c-a07c-fdc3343a10ad} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" socket
                6⤵
                  PID:1908
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2876 -childID 1 -isForBrowser -prefsHandle 2880 -prefMapHandle 3268 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4626fb9e-b3bc-40da-b733-4cf71413ea9f} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab
                  6⤵
                    PID:2296
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2768 -childID 2 -isForBrowser -prefsHandle 3672 -prefMapHandle 3668 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8ff5ea4a-4ffc-44cc-ba63-e6017741cb0f} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab
                    6⤵
                      PID:3148
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4468 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4460 -prefMapHandle 4456 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {74539753-8e34-4ed0-aba0-a81493069305} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5156
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5216 -childID 3 -isForBrowser -prefsHandle 5344 -prefMapHandle 5232 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {640ce656-d906-47e1-b0cf-1fd222a95795} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab
                      6⤵
                        PID:5744
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5204 -childID 4 -isForBrowser -prefsHandle 5472 -prefMapHandle 5476 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cdd7260-2544-47b6-a40a-fcd943829893} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab
                        6⤵
                          PID:5756
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 5 -isForBrowser -prefsHandle 5668 -prefMapHandle 5676 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53cabf15-a58e-4a4b-b43e-e02082494734} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab
                          6⤵
                            PID:5768
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6252 -childID 6 -isForBrowser -prefsHandle 6240 -prefMapHandle 6244 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {add2bb51-f0d5-4bf3-a7ee-60a83ec277a0} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab
                            6⤵
                              PID:4092
                      • C:\Users\Admin\1000037002\5a7747ff38.exe
                        "C:\Users\Admin\1000037002\5a7747ff38.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:3744
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 1388
                          4⤵
                          • Program crash
                          PID:4604
                      • C:\Users\Admin\AppData\Local\Temp\1000038001\ae704e1d33.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000038001\ae704e1d33.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:1800
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3744 -ip 3744
                    1⤵
                      PID:2948
                    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                      C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3076
                    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                      C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5492

                    Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\1000037002\5a7747ff38.exe

                            Filesize

                            2.5MB

                            MD5

                            9545551bcd4b4c9748e7d63a9a3debfd

                            SHA1

                            e3271e71d336203ef9620e1be008e841783874a6

                            SHA256

                            7f84d77bb8e7576c98a02d2bfe8022a4297084fa4d2d4a73fe15c08bbb0bf0b0

                            SHA512

                            82ad1bb091c5229626e0f78cf03b50aaf3e529a1f048c04c599d68a18788365bae39df2bbbbc793ac492df106db9fb80cd52a5f537a0f4b559c35533d6440d72

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\activity-stream.discovery_stream.json.tmp

                            Filesize

                            18KB

                            MD5

                            73eed7cf220224a4bdc1e59faa325c88

                            SHA1

                            fd3326c2f0453fb7a84e61ad5951db9545509fc3

                            SHA256

                            9dd91fd965086f68f9fdf4d7f3cb0f571d98c35c198da595f9e2e43997a8cbbe

                            SHA512

                            b79e149c06c994323ff323b53c5a0e69104cd457eb12740c45899c5122c17e026567b9c4eaaa81b7a4705bece74efc9e3fbe64254497cb9eb9f422d924a7bda8

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D

                            Filesize

                            13KB

                            MD5

                            d9ae2c0fdcc2dff4b0318a576aadcf67

                            SHA1

                            0c82904e420f833f1a587954bb55903009886c85

                            SHA256

                            bd43e83c59d94ff54496c0b3ae61e73010a8b056b726b6aef69b911497a1974f

                            SHA512

                            17a5149241107111133e46ceab9550ca4b34442408f1d0709d4a85ccbc823f6ef54dc358ee3ea948d033d311629093004b44f655ab617839c4092404f01bb9d7

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B

                            Filesize

                            13KB

                            MD5

                            546a9f190b525bda88d2f72c9ffdac45

                            SHA1

                            898c87713929d1bdc19a10ab4bac7824c1157dea

                            SHA256

                            ab2db91e522aba45b856f3b42ce90a7b9b22e9339cfa6771e169b3ffebc0ebb4

                            SHA512

                            66b2717458ee12a582cbb8c05172239f78ccc8eddde909e87b7365d9c0a43d88de45cb0e0f04f5dcf9b41df5a1bcb6925cf3add8ce08153b2b82b01f92e46604

                          • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                            Filesize

                            1.8MB

                            MD5

                            678c2ac57cd26feb4f051c0b40b7b399

                            SHA1

                            24082d08ae037812a37eb9b30dafeb2d017edd25

                            SHA256

                            3c00cc8edc77abf01ae9b9b0e7e51a8bdac7f6c3a3b52ceed4caff7f4f5155ef

                            SHA512

                            0f12533cdba516561d2a08d75107edc756d1c0910117aca98f9784763d1b2321cfec319407a63cbcea37f7e73a5f19ff11b8409e45db6394c7cdebbec778718d

                          • C:\Users\Admin\AppData\Local\Temp\1000036001\1c152c9ee9.exe

                            Filesize

                            3.1MB

                            MD5

                            9eeec7b34152da4427c8f6a669f2bbed

                            SHA1

                            ac7c62d2aca1785da5d0dec6efce2c43c7d91479

                            SHA256

                            cfcaf0be7b9049d3a39b5235a2985cfa7581b4fecf2f95cf58789a9a4f8b87df

                            SHA512

                            a81c76cd9610d4c5254282737d903964b5111431086de21a3bebe0905cc284d507d875ad9ddd2cebec56d2934bba096cdc0d18feddb8ca0111aecd689a0c6831

                          • C:\Users\Admin\AppData\Local\Temp\1000038001\ae704e1d33.exe

                            Filesize

                            187KB

                            MD5

                            59eefb04a8cb9a94d148464cd4324e93

                            SHA1

                            e1e550383c9de11d18bb6cb5b8d83f62f51340bb

                            SHA256

                            d9798bda5b0cd389f0b0f184ded085cded77a8652d96be4054789452b2a04ca5

                            SHA512

                            7e5ee340188a83055311e9dde5c6bad8798899447281c56b0e2741d247c540c3b936fc51ad795ef10ffc8a7a15f616aa46c747b33793e7ddceecdff310614e7d

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                            Filesize

                            479KB

                            MD5

                            09372174e83dbbf696ee732fd2e875bb

                            SHA1

                            ba360186ba650a769f9303f48b7200fb5eaccee1

                            SHA256

                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                            SHA512

                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                            Filesize

                            13.8MB

                            MD5

                            0a8747a2ac9ac08ae9508f36c6d75692

                            SHA1

                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                            SHA256

                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                            SHA512

                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\AlternateServices.bin

                            Filesize

                            16KB

                            MD5

                            1d491dbae8849800255b47dc5d2bca3c

                            SHA1

                            ba6a36258873659bb9de139a69e0651d9bd0dc00

                            SHA256

                            c2235e84626f4da73b4a68c1eb6099b64a7a5d5140ece2d299d537141566e168

                            SHA512

                            e92dabc4cc3cd03aa7b7243c38bcd694d41cadd77888ea6119456953b4c8bacdf9bd1be6b268bbb67283d36b3bbe7744f36e8f9918898650028482725e23b225

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\AlternateServices.bin

                            Filesize

                            7KB

                            MD5

                            a4f0f13b92736680a5a45127b0e44e1d

                            SHA1

                            6aa6fc4153be7c7e2f0f6056a438370e0027c602

                            SHA256

                            b772861230eb950370c3df0bb1f1d0c6a96d55ef4a2f7e2d99c5da40f32116a5

                            SHA512

                            6913201e5f6f0d85fbfb4ab12e28b84901df4f7e12a9d95839727f4bd1a42b4300efabad53acbed1bd6876bb36e2f848ffb737dfebc4ee0d85666c247e9795b2

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\AlternateServices.bin

                            Filesize

                            10KB

                            MD5

                            3bdeb06cbcd3e41e1428e67d8534f0b2

                            SHA1

                            d43fa7a33baddffe6e442c6a9718d8bf21614a57

                            SHA256

                            6afaf88723f22741ac44282c5ffbf07363926cc5fe94f9bb2398a4d95a9ab9a8

                            SHA512

                            6f6f65973d6b5ef72f2334871ffe919a439f14934d705f078d9e4493d95a1b26a683135ad1ad11af573d22fe331155a3963c30c9c7b589f469804ee03bcd7f30

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            ffa068179e1075604d1964891e626b24

                            SHA1

                            0210035c3ebf9c938e3ff32c67eb5244c15f4aaf

                            SHA256

                            55383fffd2180aa99f5642990e4b572333234900b296de239e73f47cb342134c

                            SHA512

                            16c24acd744bda1729618e531d6335e182b3a97bda70a68a92335fd01e98901f6a07f74cacbd3e912c23f58c8d9693dea2cb82d39445e9bc9b5be7cb01f53401

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            5KB

                            MD5

                            5d55188029bece6ea0c2d78228b489ff

                            SHA1

                            ae6ab44b36cc4ac41b8a969b529ff48f60c53ee4

                            SHA256

                            8193e79ba0aa5fe12bad8cfb7be067b6120f2ef0278c2773f5b6163adb177dc6

                            SHA512

                            d47565ba0378f724f4bf9d89f3fc89176a8cbdc0e9c35ba69cd4ba72d484ae8b2e0447ecc6e1b3529c860792cfe0bb4abd1997fe4ed9d93cfa4829ce9909e193

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            6KB

                            MD5

                            f4ede45f2660d905e45341b9cd6dbeab

                            SHA1

                            d6559fe8a266b1d61409d0d31a73830b892794c0

                            SHA256

                            02f49ca47962f722e5b64370d6083d993b8f5359bc8bc019685a69da504bbe2e

                            SHA512

                            ec3d3a667c8481f5ef0b693e9b8aad87c33bac4b2d5d6a74c58c008909b9a1c98bb5fa64aecd672fdb3b046798a489a4e36368b8a8c899b98a2a5a4062cc5da3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\pending_pings\7357f235-296a-4a1a-b069-1d9fb1a8d591

                            Filesize

                            982B

                            MD5

                            69e28067c78f38e2503377d03e53ab57

                            SHA1

                            a68a2427c74f5dc8d0c5fd420d82c7bbdd21b341

                            SHA256

                            af7a81c05e271a1f0640bcc98e52879fe491164911959dd58bd5928da14ae18c

                            SHA512

                            7cae8d50eb8247b61cdacd8cda453629b1ca1b4307d16d7c891de4cbaf70db2f40d4a7cb1a5567e71507c311e933f0db9ed5d753c51e89668d43a7bfe5d441cc

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\pending_pings\98b30b80-d9ae-45ea-bdcf-74a6ac9968d9

                            Filesize

                            27KB

                            MD5

                            935e140daad54cbdb42e0b8f9b5e4a52

                            SHA1

                            eb53bed22d494eaa642ec213cbcc008665a952f5

                            SHA256

                            1e86762986daf59c3ed18936fad8b0da9440c875fbc13a4fe2edacfdb8f6b2d2

                            SHA512

                            c9792c06716999ed99679a8b85e75959280746b7394db4ab4c8fd090d817375b0ffaf65549b8b883b6fc5f4db9d60678e3f535c01224d6d6bef6e4bff526fa36

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\pending_pings\ba2fdd72-8e61-4aab-bf70-f8633afd9efa

                            Filesize

                            671B

                            MD5

                            0c34b2d84e0c48ddd983500d56af3d51

                            SHA1

                            cac7f0e8c72193cda520f8cacb28d798abf5c706

                            SHA256

                            274576dddb15471cd66f01e7bd1e81bd7e85952212933c4002fcd0793a6642ab

                            SHA512

                            2c3578ecd6ee1688a4c1485fd978091d7457b40079ce63ca34255bce336fd79881ef2bb1d270207f0b9332e6eb9d38944552486a586c2ca0149706d5679b928f

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                            Filesize

                            1.1MB

                            MD5

                            842039753bf41fa5e11b3a1383061a87

                            SHA1

                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                            SHA256

                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                            SHA512

                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                            Filesize

                            116B

                            MD5

                            2a461e9eb87fd1955cea740a3444ee7a

                            SHA1

                            b10755914c713f5a4677494dbe8a686ed458c3c5

                            SHA256

                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                            SHA512

                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                            Filesize

                            372B

                            MD5

                            bf957ad58b55f64219ab3f793e374316

                            SHA1

                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                            SHA256

                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                            SHA512

                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                            Filesize

                            17.8MB

                            MD5

                            daf7ef3acccab478aaa7d6dc1c60f865

                            SHA1

                            f8246162b97ce4a945feced27b6ea114366ff2ad

                            SHA256

                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                            SHA512

                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\prefs-1.js

                            Filesize

                            12KB

                            MD5

                            5aad742e8f5368e728efb033e763224d

                            SHA1

                            ce35d227fa88ddcaf10471e899fa6b249ef6f459

                            SHA256

                            4db1715a7aa393f31b2235447361351fde690bb5e9f3a4f63f605fcbb6f5fde8

                            SHA512

                            899dfbeaf41808209e98d372bd1ee734da6044be32d4ce805fb8413d420c9b95afc384a7e9f17440c9839d20139da81db597e5349fbb729011265ed0b48b8781

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\prefs.js

                            Filesize

                            11KB

                            MD5

                            0a31e8c3ae22d6bb8cf8108d2a09ea20

                            SHA1

                            b3f5c1dbd0d4e06a32a4a60ef3e20cc64b4151e7

                            SHA256

                            4306cc81f86096e9370917ebe9e39281849fe5a31d05a79e9a2764ebb0c76bb4

                            SHA512

                            f63aafba9bf60185bf0b169a085c1f6e11f6ef56018f62dd15afd610fcbfc7befd0a5fed99acc9dcd9f7bb20d39f7b8f678bb27e1cbcdeb1fba11dedfd22b71a

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\prefs.js

                            Filesize

                            11KB

                            MD5

                            e83ad9d9ee12b8f368372f1be748874a

                            SHA1

                            98c7513814edb6ac301e1927686c2619813d4a3d

                            SHA256

                            e9f744a24d18495646c3c0c8daa38cafe23fdc397b9e89e35d97da28f216c1b6

                            SHA512

                            acd169c1626cefc6fb8e53826b3b53205a7bef50d08826c07661d159456fb21478d926527b7ecae1a69beacf488e35fb79955df8e1be9f9f216727a0bc3dd293

                          • memory/808-2558-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-17-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-411-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-2565-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-2560-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-424-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-425-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-434-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-810-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-2556-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-443-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-19-0x0000000000561000-0x000000000058F000-memory.dmp

                            Filesize

                            184KB

                          • memory/808-2552-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-20-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-21-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-2567-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-2544-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-2569-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-2417-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/808-2576-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/1800-83-0x00000000003C0000-0x0000000000603000-memory.dmp

                            Filesize

                            2.3MB

                          • memory/1800-73-0x00000000003C0000-0x0000000000603000-memory.dmp

                            Filesize

                            2.3MB

                          • memory/3076-1695-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/3076-1624-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/3104-3-0x0000000000F50000-0x000000000140F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/3104-1-0x0000000077A84000-0x0000000077A86000-memory.dmp

                            Filesize

                            8KB

                          • memory/3104-2-0x0000000000F51000-0x0000000000F7F000-memory.dmp

                            Filesize

                            184KB

                          • memory/3104-4-0x0000000000F50000-0x000000000140F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/3104-0-0x0000000000F50000-0x000000000140F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/3104-18-0x0000000000F50000-0x000000000140F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/3744-56-0x0000000000400000-0x0000000000FF6000-memory.dmp

                            Filesize

                            12.0MB

                          • memory/3744-417-0x0000000000400000-0x0000000000FF6000-memory.dmp

                            Filesize

                            12.0MB

                          • memory/3824-2559-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-2568-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-438-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-2557-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-435-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-1473-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-418-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-2577-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-2562-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-2543-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-2550-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-2566-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-40-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-2555-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-494-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/3824-2575-0x00000000005D0000-0x00000000010B1000-memory.dmp

                            Filesize

                            10.9MB

                          • memory/5492-2564-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/5492-2563-0x0000000000560000-0x0000000000A1F000-memory.dmp

                            Filesize

                            4.7MB