Analysis

  • max time kernel
    299s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-08-2024 05:06

General

  • Target

    a5bcb19eef5f5506fbd70b2e6ae31409d8e1affd86b2a002cdd09c262ee6bb08.exe

  • Size

    1.8MB

  • MD5

    f19c5b8c97857169bbfc5aea1e12d2fa

  • SHA1

    6895c85c50e0214bb4b144067edd829a70cc5dcd

  • SHA256

    a5bcb19eef5f5506fbd70b2e6ae31409d8e1affd86b2a002cdd09c262ee6bb08

  • SHA512

    e33440c55909fe053745c71220701663897eae4f4e57c1d80d02168cd93e15934643fba20cdd5455702c57f4c3474def52b72a13c65f51addb3a680deb21b0cb

  • SSDEEP

    49152:CsV1VaoB9emiCynu3qskp3n96gD1nCcqn6wXclixlffFNN:CsV1FeXKqD96glC/n6RqFNN

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Extracted

Family

stealc

Botnet

kora

C2

http://185.215.113.100

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5bcb19eef5f5506fbd70b2e6ae31409d8e1affd86b2a002cdd09c262ee6bb08.exe
    "C:\Users\Admin\AppData\Local\Temp\a5bcb19eef5f5506fbd70b2e6ae31409d8e1affd86b2a002cdd09c262ee6bb08.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3496
      • C:\Users\Admin\AppData\Local\Temp\1000036001\0647b321d4.exe
        "C:\Users\Admin\AppData\Local\Temp\1000036001\0647b321d4.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4592
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2252
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
              6⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1548
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1548.0.274293778\1692522620" -parentBuildID 20221007134813 -prefsHandle 1708 -prefMapHandle 1700 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9ad34339-c9a1-43b9-8a7e-626ab5aed5c9} 1548 "\\.\pipe\gecko-crash-server-pipe.1548" 1824 2ad242fcf58 gpu
                7⤵
                  PID:4368
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1548.1.1484808966\2062191419" -parentBuildID 20221007134813 -prefsHandle 2172 -prefMapHandle 2168 -prefsLen 21608 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9932ce18-28f1-4c0e-a8f3-7ec0c72430af} 1548 "\\.\pipe\gecko-crash-server-pipe.1548" 2200 2ad241ee558 socket
                  7⤵
                    PID:4820
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1548.2.1977859984\1048470301" -childID 1 -isForBrowser -prefsHandle 2808 -prefMapHandle 2928 -prefsLen 21646 -prefMapSize 233444 -jsInitHandle 1084 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {46bd7f40-1d1b-471b-9730-4b54eeccc72d} 1548 "\\.\pipe\gecko-crash-server-pipe.1548" 3036 2ad24257b58 tab
                    7⤵
                      PID:4928
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1548.3.2144126492\2091524018" -childID 2 -isForBrowser -prefsHandle 3560 -prefMapHandle 3556 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1084 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a802fdff-5ef4-4b8d-b50e-055a9260e09c} 1548 "\\.\pipe\gecko-crash-server-pipe.1548" 3568 2ad19370e58 tab
                      7⤵
                        PID:4204
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1548.4.2103145056\1612165216" -childID 3 -isForBrowser -prefsHandle 4876 -prefMapHandle 4832 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1084 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {81cea882-d1be-4bc6-9cb5-ea4b9f9fcc62} 1548 "\\.\pipe\gecko-crash-server-pipe.1548" 4888 2ad29f3e358 tab
                        7⤵
                          PID:2616
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1548.5.1876106620\1876906991" -childID 4 -isForBrowser -prefsHandle 5044 -prefMapHandle 5052 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1084 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ef0562e-bd6d-46cb-876c-183f504b97c0} 1548 "\\.\pipe\gecko-crash-server-pipe.1548" 4932 2ad2b6c6258 tab
                          7⤵
                            PID:356
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1548.6.1069174573\87113525" -childID 5 -isForBrowser -prefsHandle 5248 -prefMapHandle 5252 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1084 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2703623a-5d17-4f4d-82fa-dc63c4c30c28} 1548 "\\.\pipe\gecko-crash-server-pipe.1548" 5240 2ad2b6c9258 tab
                            7⤵
                              PID:1132
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1548.7.1996055712\1048342376" -childID 6 -isForBrowser -prefsHandle 5488 -prefMapHandle 3188 -prefsLen 26424 -prefMapSize 233444 -jsInitHandle 1084 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a310e41-a4b0-4eb0-a727-9655cee65946} 1548 "\\.\pipe\gecko-crash-server-pipe.1548" 5072 2ad19941b58 tab
                              7⤵
                                PID:2896
                      • C:\Users\Admin\1000037002\d196e303dc.exe
                        "C:\Users\Admin\1000037002\d196e303dc.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:712
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:4440
                      • C:\Users\Admin\AppData\Local\Temp\1000038001\0c3354ba85.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000038001\0c3354ba85.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:2616
                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3808
                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3516
                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4128
                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3908
                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3860

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\1000037002\d196e303dc.exe

                    Filesize

                    206KB

                    MD5

                    62c81eb8cd78dbcf5767f84caad6972e

                    SHA1

                    9a508e8724c1431394717ebd3c6dee2f9f21d082

                    SHA256

                    166a8fac98b553a4e3647cefc034fe826b753958c0be902d9483148edb001250

                    SHA512

                    2feaa6cb070e548790b01601fe13846cd7eb005e2f1b8441092f4f92a1e4cfea6c1bc84314f78ea023e10bec8e3d5712ca43336c090eed0073c7ed99ebbf5af5

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\037778A55E1B7E9BED3390289866D09402D6C913

                    Filesize

                    9KB

                    MD5

                    cbb9077d7df5ed6ec7809a5f95aff763

                    SHA1

                    886d7b50a03f4d39a37d3554243cff8d9102bae6

                    SHA256

                    e01adfb997cccc7e3b298837a8953ece35191f0542f1c03168e7c25a21a699e7

                    SHA512

                    a63e780c56be4e8f5c52bb280a5226ed8badc44f977a97a05200828063eae8a224990b481710dba91980b3000160ee8b61950d09f4860a7bb6a9b4df230b9dc8

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\254256B27E0C48CF9B80B695F0B3B8CA84610495

                    Filesize

                    9KB

                    MD5

                    3a3edd99c544c77cbc69aed1190697dc

                    SHA1

                    0d02866063543e94ac38ddb009c29b599c1f003f

                    SHA256

                    2d08db5fff328e78b5d5cb6c94a7f0fe1c87faa2548e4f249569a04f022507f0

                    SHA512

                    180f07c2b1195e6572b25ac20118e6c1c1bd707f681fcbfacbb8e3d6a172e9a3f5d41a155959c885b4f57989ad4ccad7a5f0f51276fe7bf16e5a95fd2d04ff62

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F

                    Filesize

                    15KB

                    MD5

                    9bf768d6483f2703e0f98067db6fd293

                    SHA1

                    1672d456507b925668820bcfd387923ae538497a

                    SHA256

                    ab12c6b3b8508a7d269c8f463274e138a2d42ad6c7b9296e0e44932e5289fd79

                    SHA512

                    36ca07802cbf469198a8f08bd74f137870045b43bc47d39067796cb3d5f7392ba6d9a25c46afcf0013c734d9f79cf3c5558c2e7ef544036b40f919d549aec62c

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\C72D4296C2EBC6FD41A9F780CD0C8F30F0FF937C

                    Filesize

                    13KB

                    MD5

                    5dc16a1a193f3b0a360fc42a94bfbbfb

                    SHA1

                    1e35501c660f7b46f30f4ebf8a8af5ae1b384fc0

                    SHA256

                    e436ebfa7beed3185e773ee78ae3548cece0a14c42ee191f8d35beda43799cc9

                    SHA512

                    f46f66b0474b776dd6d014ddc1345235e9a061930ea03614d4e914645b3905662d9e367170a30ae6ca5dc3f877440ab86bba53db0e7d73cf1c01f9d1071876bd

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B

                    Filesize

                    13KB

                    MD5

                    0d07344bb72477b3eda49156f7e2340f

                    SHA1

                    f93bfa66be77315f99e72c0fa34a1371fe2f93a6

                    SHA256

                    22b2efb6e486cedebe9ad2ed9a1e6d0676b8ff9fdde9ed1dee02038ed8cf5e5b

                    SHA512

                    c158defb6ca89b30aa59d971f26f981ea489de22ead2f66eb4815d645d98e418f72f1c4b9201bb6c081f75bfdd26fc6c32079fc6f7e8255b9a0c5ee8372d83da

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\F210D48319A1879FD1C5213FA010C613B99BA085

                    Filesize

                    11KB

                    MD5

                    022d820419bd24f738d93ec867ee9698

                    SHA1

                    570c6ab8ef26064da104be92533006ff0436f111

                    SHA256

                    0559db012ea3cde2eba4f98f6092e4a3c3f6cfd1f1f387f505e035f987030747

                    SHA512

                    9c758244ffe347f660e4a1192bad096d6408d405ce2898ddd2c045e091234ff4504f0f019728cc7340d4d309df79a0de550d599cdd7e015da3c768d465d49731

                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                    Filesize

                    1.8MB

                    MD5

                    f19c5b8c97857169bbfc5aea1e12d2fa

                    SHA1

                    6895c85c50e0214bb4b144067edd829a70cc5dcd

                    SHA256

                    a5bcb19eef5f5506fbd70b2e6ae31409d8e1affd86b2a002cdd09c262ee6bb08

                    SHA512

                    e33440c55909fe053745c71220701663897eae4f4e57c1d80d02168cd93e15934643fba20cdd5455702c57f4c3474def52b72a13c65f51addb3a680deb21b0cb

                  • C:\Users\Admin\AppData\Local\Temp\1000036001\0647b321d4.exe

                    Filesize

                    1.2MB

                    MD5

                    db946418424011c782182c76ab8c179f

                    SHA1

                    d640d54d341cf6341bd434c9015d23d22156612a

                    SHA256

                    bfdffea79fd6126c2256fab3f3b0421ec9b3a77a618fc406cd0f2e7d4a38f04e

                    SHA512

                    a73c645fe96ff6e49207326af35635998af343d2aa5ddd5e8b2bbd2bcded52869d588bb8c69eb220593d3152be99812e3462b1b09deea80adcac30bed9ed8956

                  • C:\Users\Admin\AppData\Local\Temp\1000038001\0c3354ba85.exe

                    Filesize

                    187KB

                    MD5

                    278ee1426274818874556aa18fd02e3a

                    SHA1

                    185a2761330024dec52134df2c8388c461451acb

                    SHA256

                    37257ddb1a6f309a6e9d147b5fc2551a9cae3a0e52b191b18d9465bfcb5c18eb

                    SHA512

                    07ec6759af5b9a00d8371b9fd9b723012dd0a1614cfcc7cd51975a004f69ffb90083735e9a871a2aa0e8d28799beac53a4748f55f4dd1e7495bc7388ebf4d6a0

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    442KB

                    MD5

                    85430baed3398695717b0263807cf97c

                    SHA1

                    fffbee923cea216f50fce5d54219a188a5100f41

                    SHA256

                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                    SHA512

                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    8.0MB

                    MD5

                    a01c5ecd6108350ae23d2cddf0e77c17

                    SHA1

                    c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                    SHA256

                    345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                    SHA512

                    b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms

                    Filesize

                    7KB

                    MD5

                    88ef70fae4eab74a3127819240f2a88f

                    SHA1

                    d8fb7bb05dd247d83706c68977c3a1ed8ad75a7a

                    SHA256

                    7873f1400a82fc84ae717bf687d5b3a770caee003b0fbe589dce0fb594cd2f71

                    SHA512

                    2f68c7a2e268ea57a7639912183d050cb12f4995643fe2cb8efebff96addbcf31dcb5fb16ed136711cedd4b603982b9d2be77577fdba46b8968ca6aa332a1024

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\bookmarkbackups\bookmarks-2024-08-12_11_MaaMR8mhAQTbCgvsLumwIQ==.jsonlz4

                    Filesize

                    945B

                    MD5

                    838d93fe7f64f4f752cc6aa88379ef54

                    SHA1

                    55f0a2bd40fd96e3a319f886a58891fd9d416c0b

                    SHA256

                    1b13e0ebb1dab164edd26588e55ea99c9909f18c56c9a3478937d96719d9a54d

                    SHA512

                    8a4fddabc8792bc2fdc4868e1873f415614c3dc08bbb50272b64fbab124b4516ab0e3be04f31cfb8e02e7b653bff231053208d1638dcf0372439dcec71d33f00

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\broadcast-listeners.json

                    Filesize

                    204B

                    MD5

                    72c95709e1a3b27919e13d28bbe8e8a2

                    SHA1

                    00892decbee63d627057730bfc0c6a4f13099ee4

                    SHA256

                    9cf589357fceea2f37cd1a925e5d33fd517a44d22a16c357f7fb5d4d187034aa

                    SHA512

                    613ca9dd2d12afe31fb2c4a8d9337eeecfb58dabaeaaba11404b9a736a4073dfd9b473ba27c1183d3cc91d5a9233a83dce5a135a81f755d978cea9e198209182

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    2KB

                    MD5

                    9c73288cf6eef4c8ec8ba15e073f73e2

                    SHA1

                    a614bfc509d200abc6b67846f1e76fc251ba1c99

                    SHA256

                    5b9c8937a3fc3341e9fff1c502a2fd0279d278e46fca1368f91983bf27dd3c64

                    SHA512

                    7740566aeb33487faa550f074ee0451675ab1ddb641e297b04464aadbb1848ece2db6ad2f1ddd2341975bffbda53e5a20572d95972168a39b71fd08208e4d918

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\45da6d76-6e53-45d0-aa47-4641d2ab975d

                    Filesize

                    11KB

                    MD5

                    f37969ba041536486405d18417e595e3

                    SHA1

                    e5cecea5d3ca051232f4a47d31fb1ca496ba4573

                    SHA256

                    209552e50a726e9453d073316876ed24c0ff8a04f47ab8ca368829541d20025a

                    SHA512

                    683dbe7dde97e24c479d1a0ef60311ab884a56ced3dd8e075a93fa5d0c9ba207e208f870f7018acc131766b9a6ccbd0e05aa31ece69e055075eb7b1e3448ac22

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\d3fe9c32-c113-4f48-a644-2be37c79872b

                    Filesize

                    746B

                    MD5

                    f130737059d3ebf435f35bf739f6879a

                    SHA1

                    f2d9ac75c9e4db04c9825c4d96ab0002d3a2cc4d

                    SHA256

                    1ea9112104bd2f01ef4434dccf6c410e99fa2f2dacec376abee80dde413dcb38

                    SHA512

                    8cb551401022cca9ec07b36002778d57833600ddf7a7319844489fff5b9c2fe57e9714ce2201d4a86e96018d0601275af1060ad593b1209436cddbe058969239

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                    Filesize

                    997KB

                    MD5

                    fe3355639648c417e8307c6d051e3e37

                    SHA1

                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                    SHA256

                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                    SHA512

                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    3d33cdc0b3d281e67dd52e14435dd04f

                    SHA1

                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                    SHA256

                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                    SHA512

                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                    Filesize

                    479B

                    MD5

                    49ddb419d96dceb9069018535fb2e2fc

                    SHA1

                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                    SHA256

                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                    SHA512

                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                    Filesize

                    372B

                    MD5

                    8be33af717bb1b67fbd61c3f4b807e9e

                    SHA1

                    7cf17656d174d951957ff36810e874a134dd49e0

                    SHA256

                    e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                    SHA512

                    6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                    Filesize

                    11.8MB

                    MD5

                    33bf7b0439480effb9fb212efce87b13

                    SHA1

                    cee50f2745edc6dc291887b6075ca64d716f495a

                    SHA256

                    8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                    SHA512

                    d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                    Filesize

                    1KB

                    MD5

                    688bed3676d2104e7f17ae1cd2c59404

                    SHA1

                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                    SHA256

                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                    SHA512

                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                    Filesize

                    1KB

                    MD5

                    937326fead5fd401f6cca9118bd9ade9

                    SHA1

                    4526a57d4ae14ed29b37632c72aef3c408189d91

                    SHA256

                    68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                    SHA512

                    b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    ee033682a9209215424fe759a6fd2ff3

                    SHA1

                    7d359bb8eca0816e815aeef8bdc17ef5e0422eb5

                    SHA256

                    2012c9151bc889cc1d3cff6f0a6b080f939107da858190f6a0449aee4453c662

                    SHA512

                    702c209483dc5c1872ca6612abfdf9fbc728351bbf55a61f0dee767f39f1ff703db5ca5328b08f74494678452d1cdef5067f54c8b894825bed1ee07cf094f0b5

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    c26a2a8dca0de173ade1fa04557f113e

                    SHA1

                    8f1565b204c47e424bb96df09f4646f231e996ac

                    SHA256

                    37b1ed81a0459e069107d0c06a4fac33755788f0766a3af1ea6549abd2f9a68d

                    SHA512

                    24302c0c1e5660de45f96c2f85b8788a7ae663bb33366a107a2609896c18a065d6ee666f42323108558eafee9ce6c45ca72388efc5922ccd11c3e1013ff1bfb8

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    f5cea2b4cd90c2711e47b3523bfad3e2

                    SHA1

                    0218e72ed8a2e644fc0436b6942933e54b16ad95

                    SHA256

                    b382d952047d2363845bbba5639b98da8c02be0abb3ece6f37adfdc8324ef805

                    SHA512

                    bcbf50c074cb6c24ddd0b45b81c33d11915f4ebba0c28c02f65b275153747854d8471f3cb5e1502428f27ef4061506dd7b47ecaa708a2987d1330b608ccc6128

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    31fd4ea298ef2d5e63e1aaa620eaa398

                    SHA1

                    48a52a665bb69c000f197930cae98c5abdee835a

                    SHA256

                    b56159ff50b87269fbf1e226473a5e39447e7746f935837c8e390945ebb734cb

                    SHA512

                    ac8c8a5c45fe85d4e090caa1125c6756288dec67eedca12c2ecca5299a2da0b6f0b460d4111bf42a18ddb3d42b1330266b6a516b3ab566089c07252f44024ade

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionCheckpoints.json

                    Filesize

                    90B

                    MD5

                    c4ab2ee59ca41b6d6a6ea911f35bdc00

                    SHA1

                    5942cd6505fc8a9daba403b082067e1cdefdfbc4

                    SHA256

                    00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                    SHA512

                    71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4

                    Filesize

                    4KB

                    MD5

                    73dd6c923f924fcd7f5a33352de0c554

                    SHA1

                    2cf50cd56819cae6b1d42138bf8c869739d30ee2

                    SHA256

                    f6168f3a9110dc9942c5e6c130d3cb718a6f6e3804137a880b6a75b1dd454daa

                    SHA512

                    202f9de9eeca9b809f89eb217f103b28a651d3290669144d77d7b661b78ba0ef8894f3873e6ec3b492e35d87873af34b3997a047eaf7696e3a2d3b476b68b4d0

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4

                    Filesize

                    4KB

                    MD5

                    1b6634af03eaf3c51c01ead40132ce98

                    SHA1

                    99383e9263ca513ac687c6d58baedfb66aa97675

                    SHA256

                    f8ffc16c62f777b7355f7885184f9997e4c41c809d41fa9c1308095d12a2635e

                    SHA512

                    5d35abed9962e3880884c89e9f542384716371e5a6bc9d060bbf6c7affb1cc084826a2211b15b3f516ce66cc997994d427675d20b66b4635d75d9e3a582a799b

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                    Filesize

                    184KB

                    MD5

                    69cc4ce68ce55e681c368d219f32a10d

                    SHA1

                    28afdfa7d331fbb72dd993ecefea313f2799b446

                    SHA256

                    d4e13af44e4664821cf15715fbb0038aa5d3f03e3b7a15a7efd4745d77a4b8d2

                    SHA512

                    4b1a2f353f0d8e1efbd9f1deafc551fdde86bed7d32662d025640b67c3a9e71e0c635a3fdab10196eb32ef5870fb58a6973c8920c7f42adbbd537ffb18c399df

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\targeting.snapshot.json

                    Filesize

                    3KB

                    MD5

                    432745bc7f52fd0abdfa516ac8b78c39

                    SHA1

                    86c82719777b50269b2052a641d21e2ff8f105c1

                    SHA256

                    3ecdb30146865539ee3215e95315363c93b63b5d02c90c915a4c841079f6b2d6

                    SHA512

                    e1cc7711c83be9433a529e3f9aefdd836305062201367f9e24e94d2dc207ded5c04b5fa8c14ce656d03cd0d1056b867f09e2ea03b2ec4c0446b44a50eae66e67

                  • memory/712-49-0x00000000001D0000-0x0000000000208000-memory.dmp

                    Filesize

                    224KB

                  • memory/2616-67-0x00000000010E0000-0x0000000001323000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/2616-66-0x00000000010E0000-0x0000000001323000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/2744-36-0x0000000000400000-0x000000000052D000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2744-34-0x0000000000400000-0x000000000052D000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2744-32-0x0000000000400000-0x000000000052D000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3496-305-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-347-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-208-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-197-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-194-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-189-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-435-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-425-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-419-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-310-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-312-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-317-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-318-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-319-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-321-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-418-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-417-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-325-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-326-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-332-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-334-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-335-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-341-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-406-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-405-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-344-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-345-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-214-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-348-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-349-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-14-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-351-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-15-0x0000000000AB1000-0x0000000000ADF000-memory.dmp

                    Filesize

                    184KB

                  • memory/3496-16-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3496-17-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3516-324-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3516-322-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3808-307-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3808-309-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3860-427-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3860-426-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-352-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/3908-353-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4128-343-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4128-342-0x0000000000AB0000-0x0000000000F4F000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4440-53-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/4440-51-0x0000000000400000-0x0000000000643000-memory.dmp

                    Filesize

                    2.3MB

                  • memory/4588-3-0x0000000001010000-0x00000000014AF000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4588-2-0x0000000001011000-0x000000000103F000-memory.dmp

                    Filesize

                    184KB

                  • memory/4588-4-0x0000000001010000-0x00000000014AF000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4588-13-0x0000000001010000-0x00000000014AF000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4588-1-0x00000000777B4000-0x00000000777B5000-memory.dmp

                    Filesize

                    4KB

                  • memory/4588-0-0x0000000001010000-0x00000000014AF000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4592-30-0x0000000000680000-0x00000000007B0000-memory.dmp

                    Filesize

                    1.2MB