Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10-08-2024 01:20

General

  • Target

    5b5bf668ffd5c6c115b5246fdbfca8028a5e829131badd1fa3202422afe8c73e.exe

  • Size

    1.9MB

  • MD5

    aa4aab8298312c5c17ba324505bf20ba

  • SHA1

    ee67c0085a120b23f8340d8931743e2e218a2b78

  • SHA256

    5b5bf668ffd5c6c115b5246fdbfca8028a5e829131badd1fa3202422afe8c73e

  • SHA512

    ad1305ca5b5f652ceda23f74bd4d4fea4e5dec627fab9611e225a3ec48d172f873bfd10b975b20ace62b267da468e3e0832e4fe82d696ce3da6ae9aab454ac0a

  • SSDEEP

    24576:247AQ071P/0cnSWs9mYUtTZSuDSZEhlSyiDBb4h6nvJJssxBW1A49uPy4:29b7Z0cnnbYeSGOb4hasII0y

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Extracted

Family

stealc

Botnet

kora

C2

http://185.215.113.100

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b5bf668ffd5c6c115b5246fdbfca8028a5e829131badd1fa3202422afe8c73e.exe
    "C:\Users\Admin\AppData\Local\Temp\5b5bf668ffd5c6c115b5246fdbfca8028a5e829131badd1fa3202422afe8c73e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Users\Admin\AppData\Local\Temp\1000036001\0d0b19ef6c.exe
        "C:\Users\Admin\AppData\Local\Temp\1000036001\0d0b19ef6c.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2132
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1780
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1780.0.298953942\11504692" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {71b4ce57-c6f9-4692-ac0a-50e83ab7b047} 1780 "\\.\pipe\gecko-crash-server-pipe.1780" 1292 115f4758 gpu
              6⤵
                PID:1940
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1780.1.1603508381\1313537765" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {645451b6-79f4-4a6b-9f22-3db3b22ed9f3} 1780 "\\.\pipe\gecko-crash-server-pipe.1780" 1496 d73058 socket
                6⤵
                  PID:2124
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1780.2.256645692\1227314940" -childID 1 -isForBrowser -prefsHandle 2080 -prefMapHandle 2076 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {caa314ca-6b8b-4643-96de-2b6815577963} 1780 "\\.\pipe\gecko-crash-server-pipe.1780" 2092 1a1b1c58 tab
                  6⤵
                    PID:3040
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1780.3.1287703186\1461821430" -childID 2 -isForBrowser -prefsHandle 2888 -prefMapHandle 2884 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0671cb70-ff9b-4ae6-9e3b-e96c2aba01f3} 1780 "\\.\pipe\gecko-crash-server-pipe.1780" 2900 1d135b58 tab
                    6⤵
                      PID:2904
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1780.4.119348876\481499892" -childID 3 -isForBrowser -prefsHandle 3880 -prefMapHandle 3876 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {089a765a-db95-40fd-9d54-fe641e09bd0b} 1780 "\\.\pipe\gecko-crash-server-pipe.1780" 3892 20225858 tab
                      6⤵
                        PID:1596
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1780.5.385550365\1312503525" -childID 4 -isForBrowser -prefsHandle 4000 -prefMapHandle 4004 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1aca8502-2ae3-4f6a-b1c8-6ce6d903c7ee} 1780 "\\.\pipe\gecko-crash-server-pipe.1780" 3992 20225b58 tab
                        6⤵
                          PID:2356
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1780.6.1219054782\1378267719" -childID 5 -isForBrowser -prefsHandle 3832 -prefMapHandle 4164 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {226a34e7-44dd-4fe4-9788-cc1e96777ddf} 1780 "\\.\pipe\gecko-crash-server-pipe.1780" 4156 20228b58 tab
                          6⤵
                            PID:2856
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1780.7.112779100\736640328" -childID 6 -isForBrowser -prefsHandle 4384 -prefMapHandle 4380 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd8cc291-8de4-4a6f-bc20-99a5623642ac} 1780 "\\.\pipe\gecko-crash-server-pipe.1780" 4040 21864858 tab
                            6⤵
                              PID:1360
                      • C:\Users\Admin\1000037002\ecd1f3d2b0.exe
                        "C:\Users\Admin\1000037002\ecd1f3d2b0.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:2948
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:1476
                      • C:\Users\Admin\AppData\Local\Temp\1000038001\e02adaac6f.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000038001\e02adaac6f.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:2152

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\1000037002\ecd1f3d2b0.exe

                    Filesize

                    270KB

                    MD5

                    625055b4c1f6fb8bbee45e96534f3c3a

                    SHA1

                    1e024ae07ebb10edb7e2ae6dc69c6b597f84b2de

                    SHA256

                    c0e4e270579d7eba3deede367bf39813ef622948f872a3fc89f7468c53190f68

                    SHA512

                    28d6f4d6921c39577063e2de755ab1171b37268c8795226cd9a969072f70678f5dd027d5725cbe167072c74b3046334c6b613fd2c5bdd7a8b747e3760c7f6bd9

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\nndpnsl0.default-release\activity-stream.discovery_stream.json.tmp

                    Filesize

                    43KB

                    MD5

                    83b14a19cf1bfd1d29d943f0d10fa513

                    SHA1

                    f14a34c8feb5a41f9f408c813e9bf50c0d9c2280

                    SHA256

                    579346c5497153634a843b71a9d07d749f8f83d394f81180be7fffdd8edf981c

                    SHA512

                    a221ec5adf5fc1616813e7f73ffde8eaeb2b5efccc0995e2a354747f59aba86a49572f8eb9cf5d5112879368ab5726ab2ddf1a961170f89b7c8932e9dbd2725f

                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                    Filesize

                    1.9MB

                    MD5

                    aa4aab8298312c5c17ba324505bf20ba

                    SHA1

                    ee67c0085a120b23f8340d8931743e2e218a2b78

                    SHA256

                    5b5bf668ffd5c6c115b5246fdbfca8028a5e829131badd1fa3202422afe8c73e

                    SHA512

                    ad1305ca5b5f652ceda23f74bd4d4fea4e5dec627fab9611e225a3ec48d172f873bfd10b975b20ace62b267da468e3e0832e4fe82d696ce3da6ae9aab454ac0a

                  • C:\Users\Admin\AppData\Local\Temp\1000036001\0d0b19ef6c.exe

                    Filesize

                    3.1MB

                    MD5

                    1086df1c2ab84f65c1ed8628d86cae59

                    SHA1

                    5a3e33771c9a40b8fea44ab00dc24b9c3f8170b5

                    SHA256

                    af0bc8defbeed5db4a60916fae60161c9a2345bedea4df3c53a3a7d8858219a6

                    SHA512

                    ec51066c2cc58337077ae3e9aa678f44bb75efdeb9aef1f5f15e97d3f2955185cec8723fb110344a80ca03e9fa48a7a627cfc9d0e644632b1a09fd0d9b4a0812

                  • C:\Users\Admin\AppData\Local\Temp\1000038001\e02adaac6f.exe

                    Filesize

                    187KB

                    MD5

                    278ee1426274818874556aa18fd02e3a

                    SHA1

                    185a2761330024dec52134df2c8388c461451acb

                    SHA256

                    37257ddb1a6f309a6e9d147b5fc2551a9cae3a0e52b191b18d9465bfcb5c18eb

                    SHA512

                    07ec6759af5b9a00d8371b9fd9b723012dd0a1614cfcc7cd51975a004f69ffb90083735e9a871a2aa0e8d28799beac53a4748f55f4dd1e7495bc7388ebf4d6a0

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    442KB

                    MD5

                    85430baed3398695717b0263807cf97c

                    SHA1

                    fffbee923cea216f50fce5d54219a188a5100f41

                    SHA256

                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                    SHA512

                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    8.0MB

                    MD5

                    a01c5ecd6108350ae23d2cddf0e77c17

                    SHA1

                    c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                    SHA256

                    345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                    SHA512

                    b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    9KB

                    MD5

                    250e03e4e04466336e8669e7ff4961c3

                    SHA1

                    40f02517285c3aaa7f50b8bb5780d3c880f50a0a

                    SHA256

                    e5bfb45ddd5fe9061591ae3de9e5e101e7eea3bd5feb49e3447ec7c853dd2456

                    SHA512

                    83e98a26881a30f4a5e8789d4ecbe78b45182f723968647575c922822f8e78833ef468978d853cc9f8b890179184d3fb68bdfd64660ea4e4b249603ac032dc1e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\datareporting\glean\pending_pings\625632bd-4904-4db7-9978-5b37eeb7074e

                    Filesize

                    733B

                    MD5

                    724720281fd3cd6f27a2159ff53345dc

                    SHA1

                    52e6e73cfe931b26eaf7c43bb5097ed99949bc90

                    SHA256

                    a5d87c1cb7a0a75fbba8839d11119185394df4bb1e49ac4596225e8fc81bd9b6

                    SHA512

                    cc1f22273602342992f4f11a3a8939f53296768cfc51b53062139c771afd8ded4bcd7b7dac32ddd7779f93e0b8a78c9436cfff2fec9e70176d7f6ed146878b66

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                    Filesize

                    997KB

                    MD5

                    fe3355639648c417e8307c6d051e3e37

                    SHA1

                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                    SHA256

                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                    SHA512

                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    3d33cdc0b3d281e67dd52e14435dd04f

                    SHA1

                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                    SHA256

                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                    SHA512

                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                    Filesize

                    479B

                    MD5

                    49ddb419d96dceb9069018535fb2e2fc

                    SHA1

                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                    SHA256

                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                    SHA512

                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                    Filesize

                    372B

                    MD5

                    8be33af717bb1b67fbd61c3f4b807e9e

                    SHA1

                    7cf17656d174d951957ff36810e874a134dd49e0

                    SHA256

                    e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                    SHA512

                    6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                    Filesize

                    11.8MB

                    MD5

                    33bf7b0439480effb9fb212efce87b13

                    SHA1

                    cee50f2745edc6dc291887b6075ca64d716f495a

                    SHA256

                    8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                    SHA512

                    d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                    Filesize

                    1KB

                    MD5

                    688bed3676d2104e7f17ae1cd2c59404

                    SHA1

                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                    SHA256

                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                    SHA512

                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                    Filesize

                    1KB

                    MD5

                    937326fead5fd401f6cca9118bd9ade9

                    SHA1

                    4526a57d4ae14ed29b37632c72aef3c408189d91

                    SHA256

                    68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                    SHA512

                    b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    7cafc3003c8c9777563f722ba0d58c8e

                    SHA1

                    3e8ab7faa28852a57c0d89095d160f4141c8c008

                    SHA256

                    feccb1dd8b6ca5fdbad774633662512b0a8e7a9a2d967ad7d5698a0a2d30f6bf

                    SHA512

                    27373467c71036de05f5122bdfaceb691a812c375ccb7c5f5abdff4b4eb4a9ac4bbfb9e449207d0521539b528cd9b8dd3799744a69bbcdcc8681ccc4bd5f2c4a

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    8f320698efaed5997394a85916bdbafd

                    SHA1

                    cd95eaa47cd56ffe1ea2adca1880d72017466623

                    SHA256

                    367c8f4dd5c59004e22de5eab8758952307911fc0eaffc221d235761f05b63d5

                    SHA512

                    76c459b8b61abadcc32474c54cbb9cc210d3cb3ec334771f9a96b23ba11c207551900f6f06fcd4fc21e903c25aded91a9ab0e8e64f245fc6f95ac2379b8ac2bf

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\sessionstore-backups\recovery.jsonlz4

                    Filesize

                    4KB

                    MD5

                    75e30d1f846fa4ed0fc0e3196bb0f789

                    SHA1

                    1b84e916cc45b21565ad3f2ffed4535bcde65ced

                    SHA256

                    3dbefb367b81793dffba7216ecd3650bc5db56ac84bd025f778b12f206fad25b

                    SHA512

                    b41f08cc65443d3c58cd01732d83e8762063fbdf0ffa94c08b564993e305d9add6377eab09fa4eae8c88567ecf6e4e9eb21492b9ab92248cde1f561b176152f7

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nndpnsl0.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                    Filesize

                    208KB

                    MD5

                    375bcd9f7f8289e87d5ea75d37ab9184

                    SHA1

                    ebbe3bbe8f84fb443637692b9796c22d18a138bd

                    SHA256

                    22c4a6d029ff6a51a696290ea66d5df4f154090c7b21ae2e9fa2231e2d7cfa6a

                    SHA512

                    06c51cd727a9c7d602ad068c12a8db5ffbf3984a4d5ebe7824984ac25bb1a2165ccbcc633e8a5a47a25a4808340fec196cb6282ecd7987ac285010355da2c883

                  • memory/1476-65-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1476-67-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1476-71-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1476-69-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1476-66-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/1476-56-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1476-62-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1476-60-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/1476-58-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/2104-2-0x0000000001371000-0x000000000139F000-memory.dmp

                    Filesize

                    184KB

                  • memory/2104-9-0x0000000001370000-0x0000000001841000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2104-5-0x0000000001370000-0x0000000001841000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2104-3-0x0000000001370000-0x0000000001841000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2104-1-0x0000000077DB0000-0x0000000077DB2000-memory.dmp

                    Filesize

                    8KB

                  • memory/2104-16-0x0000000001370000-0x0000000001841000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2104-0-0x0000000001370000-0x0000000001841000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2152-89-0x0000000000C80000-0x0000000000EC3000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/2152-88-0x0000000000C80000-0x0000000000EC3000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/2168-221-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-343-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-358-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-356-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-349-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-347-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-237-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-345-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-219-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-340-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-338-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-37-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-328-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-321-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-318-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2168-304-0x0000000000E60000-0x0000000001947000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2468-168-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-19-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-341-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-342-0x0000000006160000-0x00000000063A3000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/2468-21-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-320-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-22-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-323-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-36-0x00000000066F0000-0x00000000071D7000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2468-330-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-18-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-339-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-220-0x00000000066F0000-0x00000000071D7000-memory.dmp

                    Filesize

                    10.9MB

                  • memory/2468-17-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-315-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-172-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-344-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-238-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-346-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-215-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-348-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-230-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-350-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-216-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2468-357-0x0000000001130000-0x0000000001601000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2948-53-0x0000000001140000-0x0000000001188000-memory.dmp

                    Filesize

                    288KB