Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 09:01

General

  • Target

    98253e05db4faa3ad05aa1843e880710N.exe

  • Size

    1.8MB

  • MD5

    98253e05db4faa3ad05aa1843e880710

  • SHA1

    04a419c2d23b65775328cc8e897e5357ec1e5938

  • SHA256

    4358fd7c8502eb3007a60e97f42315dda81c8dda507e3e0913608bf643d6c9bd

  • SHA512

    9f8ece8a4fb78968fe066c98587ea5dc8632b3da901e3e01acd373930690dd456965889f6c62a060a31fb474938f33bf2ac435867f7e0ac67e0a8a01e66ff966

  • SSDEEP

    49152:kq13YiUJ+me6wlLB4cXZe2EmesjII2IdS8/YyjFy:kO3YPgDvl46guHjIpUD

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Extracted

Family

stealc

Botnet

default

C2

http://185.215.113.24

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 12 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 22 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\98253e05db4faa3ad05aa1843e880710N.exe
    "C:\Users\Admin\AppData\Local\Temp\98253e05db4faa3ad05aa1843e880710N.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Users\Admin\AppData\Local\Temp\1000036001\df277a496c.exe
        "C:\Users\Admin\AppData\Local\Temp\1000036001\df277a496c.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:872
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1516
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4920
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23602 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f07d6d98-271b-408a-8198-dbdf797176cc} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" gpu
              6⤵
                PID:3476
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24522 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2bccfd7d-11b3-40a1-98de-ae96a2aa4690} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" socket
                6⤵
                  PID:1720
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2884 -childID 1 -isForBrowser -prefsHandle 2880 -prefMapHandle 2900 -prefsLen 22590 -prefMapSize 244628 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {47c86435-34ed-4b56-8e55-73dfc204ee1e} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" tab
                  6⤵
                    PID:4540
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3748 -childID 2 -isForBrowser -prefsHandle 3132 -prefMapHandle 2776 -prefsLen 29012 -prefMapSize 244628 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {09a172dd-4206-4380-9a1b-66ba253aed88} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" tab
                    6⤵
                      PID:3548
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4608 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4600 -prefMapHandle 4596 -prefsLen 29012 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {16c1995b-0d46-4e27-99af-fb830df6d2a9} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5156
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5276 -childID 3 -isForBrowser -prefsHandle 5268 -prefMapHandle 5264 -prefsLen 26989 -prefMapSize 244628 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce43ebe9-2f16-4375-979d-ffb174eb40eb} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" tab
                      6⤵
                        PID:5692
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 4 -isForBrowser -prefsHandle 5420 -prefMapHandle 5424 -prefsLen 26989 -prefMapSize 244628 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b385ecb-eaa4-40d9-a3d5-836acd97bca1} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" tab
                        6⤵
                          PID:5712
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 5 -isForBrowser -prefsHandle 5608 -prefMapHandle 5612 -prefsLen 26989 -prefMapSize 244628 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e75555fc-39d8-467b-9750-a1ff8e2244db} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" tab
                          6⤵
                            PID:5724
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5904 -childID 6 -isForBrowser -prefsHandle 5936 -prefMapHandle 5448 -prefsLen 27039 -prefMapSize 244628 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {891d264e-75b6-49c0-92a6-fbb23a7f9c59} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" tab
                            6⤵
                              PID:2432
                      • C:\Users\Admin\1000037002\219f972a0e.exe
                        "C:\Users\Admin\1000037002\219f972a0e.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:3676
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 1400
                          4⤵
                          • Program crash
                          PID:5900
                      • C:\Users\Admin\AppData\Local\Temp\1000038001\cec07ac5f6.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000038001\cec07ac5f6.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:1832
                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3536
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3676 -ip 3676
                    1⤵
                      PID:5672
                    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                      C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:452

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\1000037002\219f972a0e.exe

                      Filesize

                      2.5MB

                      MD5

                      0a59357ee50c8272be24168abcd09fca

                      SHA1

                      2f35f3dedf5b11e595e2cb9cbc036859313c1a3b

                      SHA256

                      82ebec3391c43c860cf1950e342cee1b4a55f2540ba7cc2ca768bf570f1bf1c1

                      SHA512

                      fd3549eaa2b07b241f7bbe205802bec12d5b4c71187122092d56b5026cd24b4fc5702dedbb6edf4c6fe43841001f41c785b394027eba034483e503b7888fb17e

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\activity-stream.discovery_stream.json.tmp

                      Filesize

                      18KB

                      MD5

                      2087f0c31c8d4eb41235a64982710afd

                      SHA1

                      e23709adc50eeba25de28503e9ee0354cf903965

                      SHA256

                      1a900074baf6131fd476ed77983a636acb196521c42d8fcae94e15c303bda49a

                      SHA512

                      73603d101c89d21782613e174ad7267282ceff18ca7f2fbbbf651e6ef36e6334de3a13d9b20471ea2f235a5602a840479f9383809842e55f947f4430ca4c18d1

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B

                      Filesize

                      13KB

                      MD5

                      c65fabc82ec8f712875de4e1c73b4b1e

                      SHA1

                      32c6c2babd945442eb6f7913d2a58a694d1208c4

                      SHA256

                      29e848c70296e9823b1ed96dc9b35d456bbb68b3bb7613d5c4d2b6cec8a4ec25

                      SHA512

                      291595715db4763dc068cb2deef26f36e6757633d0832daa1f98999935761165b7fc99028e715e01eac0de7e53570bf47542df0ba405cac91b4f5d38eff3fbde

                    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                      Filesize

                      1.8MB

                      MD5

                      98253e05db4faa3ad05aa1843e880710

                      SHA1

                      04a419c2d23b65775328cc8e897e5357ec1e5938

                      SHA256

                      4358fd7c8502eb3007a60e97f42315dda81c8dda507e3e0913608bf643d6c9bd

                      SHA512

                      9f8ece8a4fb78968fe066c98587ea5dc8632b3da901e3e01acd373930690dd456965889f6c62a060a31fb474938f33bf2ac435867f7e0ac67e0a8a01e66ff966

                    • C:\Users\Admin\AppData\Local\Temp\1000036001\df277a496c.exe

                      Filesize

                      3.1MB

                      MD5

                      52b6dfc2bd72747d3504a704b0170b53

                      SHA1

                      15cde6ef0fc483b514860958901bb5d6bcf7fa2e

                      SHA256

                      ac30d1d7e808e943b739e88ea26512da2dc7322330ca52732c408bd07e327313

                      SHA512

                      8bae636e5777d13c547744c3bffd1221a9dd3d6d5a063adb33607190eaebca284be47f6af69576c1328846b22801fc8a8e3c8feb93a999bf55b963ec7d831aab

                    • C:\Users\Admin\AppData\Local\Temp\1000038001\cec07ac5f6.exe

                      Filesize

                      187KB

                      MD5

                      59eefb04a8cb9a94d148464cd4324e93

                      SHA1

                      e1e550383c9de11d18bb6cb5b8d83f62f51340bb

                      SHA256

                      d9798bda5b0cd389f0b0f184ded085cded77a8652d96be4054789452b2a04ca5

                      SHA512

                      7e5ee340188a83055311e9dde5c6bad8798899447281c56b0e2741d247c540c3b936fc51ad795ef10ffc8a7a15f616aa46c747b33793e7ddceecdff310614e7d

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                      Filesize

                      479KB

                      MD5

                      09372174e83dbbf696ee732fd2e875bb

                      SHA1

                      ba360186ba650a769f9303f48b7200fb5eaccee1

                      SHA256

                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                      SHA512

                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                      Filesize

                      13.8MB

                      MD5

                      0a8747a2ac9ac08ae9508f36c6d75692

                      SHA1

                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                      SHA256

                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                      SHA512

                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\AlternateServices.bin

                      Filesize

                      10KB

                      MD5

                      aa87bdd7d900e83642617a6f4ed304a9

                      SHA1

                      933e5dc75a44a8448c36eea0c3015f86ff173100

                      SHA256

                      7e6a5004af439b4b0947162fbceb5bb0608f6aab167775c789231daa7806ac0f

                      SHA512

                      7e1097dbf0ff5e6402f36adeedad7fff891811213ba0d3d569dbe32f243ba1a45519ad35e86d1f8522bc3db34daebcee73b074c053887965e66418521faf7d0a

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\AlternateServices.bin

                      Filesize

                      16KB

                      MD5

                      1566e9fc7c371a3f3cc7f2a522f4c9f7

                      SHA1

                      278509ab0ba30a8bc932a7d52cc2298578758fc5

                      SHA256

                      a6743262b5de492cfb4f7067baaa466c281bd7b0322704f2d4aef823ccdcda65

                      SHA512

                      2d45769b035a560aa952c9ad5d9b9576e5d771da58f071c4f3e26f76e6ef61347024197c12b68e4d02441b2a1c812d56a5d707a2deddead2d4129a6488853dfa

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      16KB

                      MD5

                      45c449f62641b0a98509cdd0b97e3b13

                      SHA1

                      0b82751184543ef2ecf308abea69650e817542bd

                      SHA256

                      4591a9396c264617e2bfed14c85cf8b95e9bb66719b4d7d0cf5cf9fc7ea95802

                      SHA512

                      967be3fe2d6f8b5cd2f23946d75760724e100ae08bdc3d3185cdf8a2cfc20acf83e202038c20c8b0c77af6eb9f4c818a85d9c3545f27176e9d0e13def89f0d1e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      5KB

                      MD5

                      8b6bd9896ff7da2455e4e1d2c92b9755

                      SHA1

                      c47c41cf5a8be202f881422cbafec8f88f8892e6

                      SHA256

                      f688de2016e4f2d5d9d876f3b2e88ae42447915e02cad73f038989d13aabd54a

                      SHA512

                      08ae72b40692b3510268f65a8aa1bdd235cd5013e52d275d76823c9da05f491cdc077d0dd673f648c72e9c5112c71f0bac72703356dc7515505536ee6ce6322f

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      6KB

                      MD5

                      00fb08eedd15965d458bcda17d874a0b

                      SHA1

                      29f4ff15a1c82c45fa003413ba7b0167fcdcc481

                      SHA256

                      bb53f17bdfdafed1adb80e9e2ae34414ebf6b065b08d5874dc092a8d37786616

                      SHA512

                      c5344df48a1d04ad853b922a9a1a4a0888ed785a0b1f82a5d4b90d5b5af1dbf045dabfecdd2bce9fe857be0fcee88d6ac3e23cb9811a0e15bf552dd7fe1fedcb

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\pending_pings\68237e32-3cdd-4777-8dbf-ed1f941a3cb5

                      Filesize

                      982B

                      MD5

                      87ca2fc1a29e6fb301be158f32e463c2

                      SHA1

                      b0c7bd1c049bff093caa2e0e6897a11c29e87a88

                      SHA256

                      310fc1877b298fbc7a81503adf36ecb330ce291dd2264ebaf8cf27fe4265bb9b

                      SHA512

                      93be53e61b59a2d2595d570a26bb551c30819cc1eb96708ab05e25861ea72289f0d884b3634ca795e992f3c5c2cfaef543740b5b5b30b7b8e03cdc03f05f7cf1

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\pending_pings\8f4f939f-fe5b-48c1-9628-3df5c2930166

                      Filesize

                      671B

                      MD5

                      0c76ce5677a77f872790bdee4177f3d5

                      SHA1

                      6ea5d190ed7b6f6842125f8d3fa5ba38f1b0d9b3

                      SHA256

                      20513d8d9fde7c3608f8f6acde4ffe9a38b249d132d9c03ca444d12488f8fa2f

                      SHA512

                      9d1d8671d9eeb657b09d9c55964cf40098f3407dfb45e4a28962ebf00383f2f5221ee886305ac9526f3226105b1ce5403901e4ac8db00b5fb5b00a8fe075495e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\pending_pings\c3fff346-1730-4709-b643-1b35632adf43

                      Filesize

                      28KB

                      MD5

                      5ad20f67b880e6e60cc0fcbe5db71d3c

                      SHA1

                      2c3d2cd137b42b260c22c73288e2f976d7157f32

                      SHA256

                      12e81dd1ec2916af60f55ed2e67e05694bf2556a5a855491de4b6857d43eb426

                      SHA512

                      be273833f0703a2d87a7bda32af65a76bc2f6d7875576c6e5b3b547105c493a95f66b4cfe113fe63016d7b2b1a9b0d14ec76630437bf5bb83db61b4b1bd7f248

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                      Filesize

                      1.1MB

                      MD5

                      842039753bf41fa5e11b3a1383061a87

                      SHA1

                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                      SHA256

                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                      SHA512

                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                      Filesize

                      116B

                      MD5

                      2a461e9eb87fd1955cea740a3444ee7a

                      SHA1

                      b10755914c713f5a4677494dbe8a686ed458c3c5

                      SHA256

                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                      SHA512

                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                      Filesize

                      372B

                      MD5

                      bf957ad58b55f64219ab3f793e374316

                      SHA1

                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                      SHA256

                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                      SHA512

                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                      Filesize

                      17.8MB

                      MD5

                      daf7ef3acccab478aaa7d6dc1c60f865

                      SHA1

                      f8246162b97ce4a945feced27b6ea114366ff2ad

                      SHA256

                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                      SHA512

                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\prefs-1.js

                      Filesize

                      11KB

                      MD5

                      b20914d57eaf020e69e2afb2d69c5f41

                      SHA1

                      d2038619b5808038f48ce7031f308cd259d66f32

                      SHA256

                      43e3f663cd68e9616c417fe61e93e24a2f98860d533e3087198654ef59e6af13

                      SHA512

                      8a39b4ddf9ed623198cf68b56b5aaeee9864cfaf2a0865c8b90caa22fce031b24bb72ecd3394b59b2a1cea4c6748f5f2f1c7ed2178876996d1ae7434ad24932b

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\prefs-1.js

                      Filesize

                      12KB

                      MD5

                      d06fe3aae80874f163143de79a608403

                      SHA1

                      ab6573868dd6ccf35655f00050a85fd703c4179e

                      SHA256

                      339668b735cd0b8a526c0a81c4e61d71298f7526717b6b6d5d9c005d376e6c68

                      SHA512

                      cbb108cc74d484b325914ccd2ba67ebde4bb1feb4c5d117b91082ba07c59bb0f9fb731ecabd68b791cb6e7444ea073077e0e5e37945db5414bef17f85afe5e30

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\prefs-1.js

                      Filesize

                      15KB

                      MD5

                      98e9d03525828f8f80522d38a7d36449

                      SHA1

                      71359cb879dd1d57af0a8a9985b0912c10642217

                      SHA256

                      083a6f4d63908e87f2802c795ee295374e02e4b6763ee9909b00e0a3521b939e

                      SHA512

                      fac566f6c69eb493b63f2dfdc7411d64d7337487e471772a967feda0802d70cf7d76a0c20658121cff9cdf9078768bd7e485b3ca14ee8fd00c2c28632268cf97

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\prefs.js

                      Filesize

                      11KB

                      MD5

                      e7c8476d83eba5285fb786ce252d083b

                      SHA1

                      c2a39d65fc9f2ff96df1c04b7c2f4b80f8b536f5

                      SHA256

                      4513cdfe13c3752484b31206bbc4dae0514b556077a0c25f3d0534b5119f372c

                      SHA512

                      8b2eb43495420b902de3fd02ed5777763620923065252087ca3e285b73c3d56cd2c955bc8c8afec624e01b994b33189d9fa3bcaf38dc09ce6fba3f982df255e8

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                      Filesize

                      1.5MB

                      MD5

                      dcbe09be4d423292158af4dc221509d5

                      SHA1

                      50855bd0030597e96209eaa88022487c28600886

                      SHA256

                      f6ec09f0c3532a9fa1289036e14522ba6a4433f1a9609f1220b28c31649d774b

                      SHA512

                      af84b10a9db91668d129f8870f0fa2016bb7d1383f8df20562dcd7a9d725df27ca676de2d479ba8a912dab25bd2337ac46943dbe1f530fe06ff3849833d723c6

                    • memory/452-2580-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/452-2578-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/872-491-0x0000000000C80000-0x000000000177A000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/872-527-0x0000000000C80000-0x000000000177A000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/872-470-0x0000000000C80000-0x000000000177A000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/872-2592-0x0000000000C80000-0x000000000177A000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/872-2590-0x0000000000C80000-0x000000000177A000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/872-2588-0x0000000000C80000-0x000000000177A000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/872-2584-0x0000000000C80000-0x000000000177A000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/872-40-0x0000000000C80000-0x000000000177A000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/872-831-0x0000000000C80000-0x000000000177A000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/872-1225-0x0000000000C80000-0x000000000177A000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/872-490-0x0000000000C80000-0x000000000177A000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/872-1489-0x0000000000C80000-0x000000000177A000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/872-1998-0x0000000000C80000-0x000000000177A000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/1832-489-0x0000000000E40000-0x0000000001083000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/1832-73-0x0000000000E40000-0x0000000001083000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/1880-0-0x0000000000210000-0x00000000006C7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1880-3-0x0000000000210000-0x00000000006C7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1880-17-0x0000000000210000-0x00000000006C7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1880-4-0x0000000000210000-0x00000000006C7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1880-2-0x0000000000211000-0x000000000023F000-memory.dmp

                      Filesize

                      184KB

                    • memory/1880-1-0x0000000077144000-0x0000000077146000-memory.dmp

                      Filesize

                      8KB

                    • memory/2904-1734-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-2577-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-20-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-19-0x0000000000221000-0x000000000024F000-memory.dmp

                      Filesize

                      184KB

                    • memory/2904-776-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-21-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-473-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-2591-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-2589-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-1011-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-18-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-482-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-420-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-498-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-1410-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-2587-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-471-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-483-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-22-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/3536-488-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/3536-487-0x0000000000220000-0x00000000006D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/3676-496-0x0000000000400000-0x0000000000FFE000-memory.dmp

                      Filesize

                      12.0MB

                    • memory/3676-497-0x0000000000400000-0x0000000000FFE000-memory.dmp

                      Filesize

                      12.0MB

                    • memory/3676-57-0x0000000000400000-0x0000000000FFE000-memory.dmp

                      Filesize

                      12.0MB

                    • memory/3676-997-0x0000000000400000-0x0000000000FFE000-memory.dmp

                      Filesize

                      12.0MB

                    • memory/3676-472-0x0000000000400000-0x0000000000FFE000-memory.dmp

                      Filesize

                      12.0MB

                    • memory/3676-876-0x0000000000400000-0x0000000000FFE000-memory.dmp

                      Filesize

                      12.0MB

                    • memory/3676-559-0x0000000000400000-0x0000000000FFE000-memory.dmp

                      Filesize

                      12.0MB