Resubmissions

10/08/2024, 19:23

240810-x36khsybla 10

10/08/2024, 19:22

240810-x3gldsyaqh 10

08/08/2024, 23:17

240808-294fyssbrm 10

08/08/2024, 23:14

240808-27643asbpj 10

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 19:22

General

  • Target

    4ef195a33b677d3a8e73cc8064aa82359d8890d0524915efb5004831ffb76e59.exe

  • Size

    1.9MB

  • MD5

    a1b0ca396f43096338f29333cc380abc

  • SHA1

    767fcaa1e5f1bdd86581de48fb2e1a305e01748f

  • SHA256

    4ef195a33b677d3a8e73cc8064aa82359d8890d0524915efb5004831ffb76e59

  • SHA512

    e33a689307b7e40cd7d33a66b5e399dbd6d1144e740843cce1f7ebbd2f575eff8f37d30be253bb9eb8a4191ddcf76de7a6150aa4729c208523eb59fe1cf99542

  • SSDEEP

    24576:QogVPV5bgpQWm/iX3fKeHLT+ucP1E+9aQEURhofB5PwWJuMpc2Y4S9rSiHoYNWgb:X2PVYm/iHz+fl0Z5Pxpct4S9SiTW6QI

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Extracted

Family

stealc

Botnet

kora

C2

http://185.215.113.100

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 13 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ef195a33b677d3a8e73cc8064aa82359d8890d0524915efb5004831ffb76e59.exe
    "C:\Users\Admin\AppData\Local\Temp\4ef195a33b677d3a8e73cc8064aa82359d8890d0524915efb5004831ffb76e59.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Users\Admin\AppData\Local\Temp\1000036001\a2bd098170.exe
        "C:\Users\Admin\AppData\Local\Temp\1000036001\a2bd098170.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1792
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2480
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2452
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2452.0.1858018465\458210236" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {94b18fe5-e949-4b1e-aab4-5e570914bd7d} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" 1340 10ff7758 gpu
              6⤵
                PID:604
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2452.1.1234391495\931711199" -parentBuildID 20221007134813 -prefsHandle 1508 -prefMapHandle 1504 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a1d61fa-f840-4676-b039-8fe8d8770ca8} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" 1520 d74558 socket
                6⤵
                  PID:1652
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2452.2.1154125998\3343126" -childID 1 -isForBrowser -prefsHandle 2156 -prefMapHandle 2172 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3078774f-0142-409f-88ec-32718d25177a} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" 2148 1aad3858 tab
                  6⤵
                    PID:2816
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2452.3.1596374343\610690944" -childID 2 -isForBrowser -prefsHandle 2404 -prefMapHandle 2388 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3172c837-0311-4713-9cae-573a5606a3e0} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" 2504 d64558 tab
                    6⤵
                      PID:3000
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2452.4.266337300\1264686858" -childID 3 -isForBrowser -prefsHandle 3824 -prefMapHandle 3812 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a99e3c78-7f11-4153-907b-ec3ab752f30c} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" 3820 201ab258 tab
                      6⤵
                        PID:1100
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2452.5.1074778588\438698354" -childID 4 -isForBrowser -prefsHandle 3864 -prefMapHandle 3860 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {76b05778-6fd5-458f-a9fe-be140dcc8879} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" 3880 201ab858 tab
                        6⤵
                          PID:2900
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2452.6.1497634110\253704458" -childID 5 -isForBrowser -prefsHandle 4160 -prefMapHandle 4164 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6274294c-651f-4a98-b38e-4991a8a4a3d2} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" 4148 201abb58 tab
                          6⤵
                            PID:2044
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2452.7.1933939189\2041745181" -childID 6 -isForBrowser -prefsHandle 4368 -prefMapHandle 4360 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 900 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e805415a-4804-46b9-bc18-a487ec0f9794} 2452 "\\.\pipe\gecko-crash-server-pipe.2452" 4372 1b99ec58 tab
                            6⤵
                              PID:2040
                      • C:\Users\Admin\1000037002\d0deb7e4db.exe
                        "C:\Users\Admin\1000037002\d0deb7e4db.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:1148
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          4⤵
                            PID:1552
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            4⤵
                              PID:2400
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:2044
                          • C:\Users\Admin\AppData\Local\Temp\1000038001\250b0f6522.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000038001\250b0f6522.exe"
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:900

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\1000037002\d0deb7e4db.exe

                              Filesize

                              196KB

                              MD5

                              dc5d6bb91c6d13e9f79d8d0114d942b6

                              SHA1

                              83d330db82043050e94438e75b2e64129c2a016f

                              SHA256

                              8e39b4572c28819f56c15decf8aae951b9407457e656c0d1e22410a9d13292e0

                              SHA512

                              1451c7d3720c407b69334c5d0b112bed14b80a3997a7b21b13b75d935bb1188f7b82c70dcab046e1efbf9b95564745c751a844f9c41b2c1b486f5bff3df3c4d9

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\sexvjvzg.default-release\activity-stream.discovery_stream.json.tmp

                              Filesize

                              49KB

                              MD5

                              c9713e1fcedfec38778d07f3dbf17991

                              SHA1

                              4572138aa200c3d07c8ab6709a389ff884304dd3

                              SHA256

                              a80f21db92a4a5a9958d838795f7c12db3cdf9ac12cf6da85762dda18da1cd1d

                              SHA512

                              467b2196feacaedc4b3f794f4bbf8bc98801ff1165433d64c24542785f6dd43f9c3b56775433703935c6bd3834bf30cab896dd369b9f637bdf839a0d6715a4b5

                            • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                              Filesize

                              1.9MB

                              MD5

                              a1b0ca396f43096338f29333cc380abc

                              SHA1

                              767fcaa1e5f1bdd86581de48fb2e1a305e01748f

                              SHA256

                              4ef195a33b677d3a8e73cc8064aa82359d8890d0524915efb5004831ffb76e59

                              SHA512

                              e33a689307b7e40cd7d33a66b5e399dbd6d1144e740843cce1f7ebbd2f575eff8f37d30be253bb9eb8a4191ddcf76de7a6150aa4729c208523eb59fe1cf99542

                            • C:\Users\Admin\AppData\Local\Temp\1000036001\a2bd098170.exe

                              Filesize

                              3.0MB

                              MD5

                              653a76adf3d1e0bde0d00fbca159baca

                              SHA1

                              02d8326e9f61c91ac23ce9c090b77672ce90fd31

                              SHA256

                              1c9b8dfde42a33a7b45694001e1cddd15ab06aaada86ce86fc287cda333ac340

                              SHA512

                              23ea77b454e45cab63221918840d856bc84f51c084cc3d7a412bddc9cdabeed4d6cd74ec7540cac9874824efc7ddd77425b91c5dc5222ee6bea36b55db510e02

                            • C:\Users\Admin\AppData\Local\Temp\1000038001\250b0f6522.exe

                              Filesize

                              187KB

                              MD5

                              278ee1426274818874556aa18fd02e3a

                              SHA1

                              185a2761330024dec52134df2c8388c461451acb

                              SHA256

                              37257ddb1a6f309a6e9d147b5fc2551a9cae3a0e52b191b18d9465bfcb5c18eb

                              SHA512

                              07ec6759af5b9a00d8371b9fd9b723012dd0a1614cfcc7cd51975a004f69ffb90083735e9a871a2aa0e8d28799beac53a4748f55f4dd1e7495bc7388ebf4d6a0

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              442KB

                              MD5

                              85430baed3398695717b0263807cf97c

                              SHA1

                              fffbee923cea216f50fce5d54219a188a5100f41

                              SHA256

                              a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                              SHA512

                              06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                              Filesize

                              8.0MB

                              MD5

                              a01c5ecd6108350ae23d2cddf0e77c17

                              SHA1

                              c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                              SHA256

                              345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                              SHA512

                              b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\datareporting\glean\db\data.safe.bin

                              Filesize

                              2KB

                              MD5

                              4dcc2b88f44e25d4ae008f259bd7b134

                              SHA1

                              5c9f8389a9fc5718294c45ba1c98be9303f5f031

                              SHA256

                              e613f5b64c4b7203b2fe276742342a92cb7799bf55e414924e9d68769d5b3088

                              SHA512

                              9f409a103778dedb85bd3902e758737188890505d8e7da24f0c061623d541dfc90d3c985e2090bb0fa40ba8926d8115b4a35bccf9f924189c594548dd6790766

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\datareporting\glean\pending_pings\11448630-7d25-43d4-b171-b6c497e96578

                              Filesize

                              745B

                              MD5

                              fb4fe514aad1553a968991737daf6de6

                              SHA1

                              c47896cf3f93898b9abf5443ce60bf7bee2d1e5c

                              SHA256

                              998c390da98d9257f45b71cc333fa491d1775a27e594b63ed7e0d356656ca2ba

                              SHA512

                              0fc4734b03aeb3be37c8373cf31c60d0bb3aa6361ebcf86cade3657647e64f2886e73df4a1a3440fa26ea24356b3f9896759e569a945cc4aa8952a680144619c

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\datareporting\glean\pending_pings\2c855c81-64dc-4692-b682-142dac78db28

                              Filesize

                              11KB

                              MD5

                              8c0298c537b8dd05efe8a9602bc5a2a1

                              SHA1

                              b923b3ee1ca0e8b2b2d0fd64bb8c707860eee013

                              SHA256

                              6ac55b22553e15540a11292f659cbb0b78c03972f1a8c274bb3b5b46f5af6ef3

                              SHA512

                              02359f8ecf5315afb6fee2811ce43de18664b9d099e55d87f5d87dd9ebee23bf176d4ff918b90880559da8e28665074c3725bbcce3c0528623de49e81c7ab1ce

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                              Filesize

                              997KB

                              MD5

                              fe3355639648c417e8307c6d051e3e37

                              SHA1

                              f54602d4b4778da21bc97c7238fc66aa68c8ee34

                              SHA256

                              1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                              SHA512

                              8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              3d33cdc0b3d281e67dd52e14435dd04f

                              SHA1

                              4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                              SHA256

                              f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                              SHA512

                              a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                              Filesize

                              479B

                              MD5

                              49ddb419d96dceb9069018535fb2e2fc

                              SHA1

                              62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                              SHA256

                              2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                              SHA512

                              48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                              Filesize

                              372B

                              MD5

                              8be33af717bb1b67fbd61c3f4b807e9e

                              SHA1

                              7cf17656d174d951957ff36810e874a134dd49e0

                              SHA256

                              e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                              SHA512

                              6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                              Filesize

                              11.8MB

                              MD5

                              33bf7b0439480effb9fb212efce87b13

                              SHA1

                              cee50f2745edc6dc291887b6075ca64d716f495a

                              SHA256

                              8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                              SHA512

                              d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                              Filesize

                              1KB

                              MD5

                              688bed3676d2104e7f17ae1cd2c59404

                              SHA1

                              952b2cdf783ac72fcb98338723e9afd38d47ad8e

                              SHA256

                              33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                              SHA512

                              7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                              Filesize

                              1KB

                              MD5

                              937326fead5fd401f6cca9118bd9ade9

                              SHA1

                              4526a57d4ae14ed29b37632c72aef3c408189d91

                              SHA256

                              68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                              SHA512

                              b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\prefs-1.js

                              Filesize

                              6KB

                              MD5

                              260b5f3272acc77f7995d82275d563fa

                              SHA1

                              829c8d50fc5bae043eeaff2dde2544c46ff865f9

                              SHA256

                              36812a3455cbc83f5288d144878809326e71614301f5c3751c4cd6df9089e159

                              SHA512

                              ab837888186fbd5bf36ddbe0f3875c22fd4b8e5127682af1ea53d9fbc632361c93c3a1255074521dbbed925e87d2971b0f0f340fe50a7c5e8ff622dd3bc55e47

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\prefs-1.js

                              Filesize

                              7KB

                              MD5

                              3d242fd1f7de2177b602d24a5e71c269

                              SHA1

                              4547edd6ed8657a9f230f70c225fd543fc80742d

                              SHA256

                              7bce6978ffb5da519bc46867a058337d0aaafa3f9c901323e6ba539a5a8cd1fd

                              SHA512

                              eecdc58792057b957f054f261f89fbed2a599673a00ccd46cbeaae1502ae21c41d61c65a114df4cf07a4c6ead740ed898ec1f90619e8942eaccbd31f088c9aff

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\prefs-1.js

                              Filesize

                              6KB

                              MD5

                              b951e4b7ffd7196ca653034db9d7cc24

                              SHA1

                              4ebfa075eeb18350eb9f29da91f3cc95b255893e

                              SHA256

                              1ef58377e57460952d0d247ba7da02b00007cb089660d3c99374fbfe866cfbd2

                              SHA512

                              3cfa85b765297d80ed95760daea943b6a46c43fdfed3a2e08536f78042c4882cb607c2bb2bb237b4398c79b2cb4932b035a4ce17f32fd9829e85daf965e1b51b

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\sessionstore-backups\recovery.jsonlz4

                              Filesize

                              4KB

                              MD5

                              411d602de225e134c2e56bff714c7c9b

                              SHA1

                              698b85b0ef2ea6485a807882fd641caf4c7635d3

                              SHA256

                              995b51175d769090974ee0306d9387b9e29a5cb67c7a887953d1f758d1d6d91c

                              SHA512

                              135abafd2745a0cd4aa597f5632ba59f52f94dabbb1250f03b14a6b86557b56330ad07ec8885f9e8a9cdc86163bc88a3eab9437ced65687a0f6291a69f95e7ba

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\sessionstore-backups\recovery.jsonlz4

                              Filesize

                              4KB

                              MD5

                              27d0b96bec7a50b1f99f0caf09edaa1c

                              SHA1

                              5e73f4ab8aa7ee6df2bf6b91ef8843c75a30e286

                              SHA256

                              9de166f47c872949f5c5ac7396b6952e32e0a7555ce0cf0777f3cf81fc683650

                              SHA512

                              475421dae595e66bc15caddf3c24c28ab821b3e940b5c5197d7e9d38797d9e334228699aa7b07e685234c17950e3dde91cb0467bfef294641d1be1c9ce90186c

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                              Filesize

                              200KB

                              MD5

                              af3410c5427177a1026723bf22b5ff72

                              SHA1

                              d9db6752fd81530c7dee006ce437316583c42b5c

                              SHA256

                              62680fe7168ea72df513a25974aa34b5321efd7efdc566cb7645182d397b58d4

                              SHA512

                              0fe08689c0fadf7b836fbd9af323af2a5d907f1e13fdcd0eb48a93c23ccee8cbb4f92e2c05ed35ed4a727d36ce93257c0000edb7706a622d6c6c8ddda9ce89f8

                            • memory/900-93-0x0000000000980000-0x0000000000BC3000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/900-106-0x0000000000980000-0x0000000000BC3000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/1148-57-0x00000000009F0000-0x0000000000A28000-memory.dmp

                              Filesize

                              224KB

                            • memory/1148-72-0x0000000002400000-0x0000000004400000-memory.dmp

                              Filesize

                              32.0MB

                            • memory/1792-279-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/1792-391-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/1792-272-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/1792-368-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/1792-258-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/1792-41-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/1792-397-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/1792-257-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/1792-370-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/1792-395-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/1792-393-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/1792-377-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/1792-389-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/1792-387-0x0000000000D70000-0x000000000184B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/2044-70-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2044-75-0x0000000000400000-0x0000000000643000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/2044-64-0x0000000000400000-0x0000000000643000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/2044-68-0x0000000000400000-0x0000000000643000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/2044-66-0x0000000000400000-0x0000000000643000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/2044-73-0x0000000000400000-0x0000000000643000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/2044-60-0x0000000000400000-0x0000000000643000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/2044-62-0x0000000000400000-0x0000000000643000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/2044-71-0x0000000000400000-0x0000000000643000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/2140-0-0x00000000009F0000-0x0000000000EC3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2140-15-0x0000000007160000-0x0000000007633000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2140-1-0x0000000077540000-0x0000000077542000-memory.dmp

                              Filesize

                              8KB

                            • memory/2140-2-0x00000000009F1000-0x0000000000A1F000-memory.dmp

                              Filesize

                              184KB

                            • memory/2140-3-0x00000000009F0000-0x0000000000EC3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2140-14-0x00000000009F0000-0x0000000000EC3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2140-4-0x00000000009F0000-0x0000000000EC3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-369-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-385-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-18-0x0000000000DD1000-0x0000000000DFF000-memory.dmp

                              Filesize

                              184KB

                            • memory/2732-19-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-21-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-278-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-367-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-271-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-40-0x0000000006570000-0x000000000704B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/2732-256-0x0000000006570000-0x000000000704B000-memory.dmp

                              Filesize

                              10.9MB

                            • memory/2732-372-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-22-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-384-0x0000000006070000-0x00000000062B3000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/2732-17-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-241-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-388-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-23-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-390-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-24-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-392-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-25-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-394-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-26-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-396-0x0000000000DD0000-0x00000000012A3000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2732-92-0x0000000006070000-0x00000000062B3000-memory.dmp

                              Filesize

                              2.3MB