Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-11-2024 23:33

General

  • Target

    SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe

  • Size

    3.1MB

  • MD5

    ed2775c75cf9a06d2084e52913c62203

  • SHA1

    c6f79f4cbdd1d6649ad124d5439142609400ae91

  • SHA256

    0fed91254f03a3bff84798b10a7adf64b664d35c3e1fe0cc66ffe57908210870

  • SHA512

    9d1787c1a4482a04cb994f84c203ad03b2efc1e7c6c10294fe16af636748d43d3a2381ce5aaf999dbf8569ee1d518eb29b63c333428615c8b68f03b0497fccda

  • SSDEEP

    24576:8Ua+YqELCacqH6OTGf89YgxIxGo1/vsG4TgIJrM9Mn71k8wmIOjwgobH4LJ6AxDG:hE7DFGfgux7dQJ4YFJt0f07UaxcSnnF

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://necklacedmny.store/api

https://founpiuer.store/api

https://navygenerayk.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2072
  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\1003508001\4460302fe3.exe
      "C:\Users\Admin\AppData\Local\Temp\1003508001\4460302fe3.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:872
    • C:\Users\Admin\AppData\Local\Temp\1003509001\2a3e84a2ec.exe
      "C:\Users\Admin\AppData\Local\Temp\1003509001\2a3e84a2ec.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:216
    • C:\Users\Admin\AppData\Local\Temp\1003510001\46af0964cf.exe
      "C:\Users\Admin\AppData\Local\Temp\1003510001\46af0964cf.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3504
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /IM firefox.exe /T
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4828
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /IM chrome.exe /T
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3472
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /IM msedge.exe /T
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4796
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /IM opera.exe /T
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3456
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /IM brave.exe /T
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1368
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4976
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
          4⤵
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2936
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0d5c63a-e605-410b-8d65-d60b24427b43} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" gpu
            5⤵
              PID:232
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {679022ac-c353-4401-84d9-4b1d49407c5b} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" socket
              5⤵
                PID:4372
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3188 -childID 1 -isForBrowser -prefsHandle 3200 -prefMapHandle 1708 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a43637d9-12a2-402e-b0ac-1df5ab36207e} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" tab
                5⤵
                  PID:4584
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3972 -childID 2 -isForBrowser -prefsHandle 3900 -prefMapHandle 3896 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75f54819-33aa-479d-9697-f35ecd7affd7} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" tab
                  5⤵
                    PID:2104
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4652 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4676 -prefMapHandle 4832 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a2b2bb2-656e-41d8-b4be-095b9bd08a14} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" utility
                    5⤵
                    • Checks processor information in registry
                    PID:5512
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5360 -childID 3 -isForBrowser -prefsHandle 5348 -prefMapHandle 5332 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a29e8c4c-4f66-4635-a34b-a5f66fe97388} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" tab
                    5⤵
                      PID:3284
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 4 -isForBrowser -prefsHandle 5556 -prefMapHandle 5532 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {150e678f-4ebc-4a08-b2ef-b4e84d0da98b} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" tab
                      5⤵
                        PID:420
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5784 -childID 5 -isForBrowser -prefsHandle 5708 -prefMapHandle 5712 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb4049ee-c369-4d5a-bd65-1d17fd4a549c} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" tab
                        5⤵
                          PID:1572
                  • C:\Users\Admin\AppData\Local\Temp\1003511001\f9e90f8dc3.exe
                    "C:\Users\Admin\AppData\Local\Temp\1003511001\f9e90f8dc3.exe"
                    2⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Windows security modification
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5460

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json

                  Filesize

                  19KB

                  MD5

                  238f078ebbde814a5538ac01dd5c45a1

                  SHA1

                  67a9363a2b3a72a6e36014a5700f64482c8141f7

                  SHA256

                  884b26be808911ec686b5b149a21cea99e0aea754b1cf58aaf3b4ea133f85660

                  SHA512

                  0ae1b3dc27f4d4cdfe90cc3f531a148d8a5b9f7f6b06a59f421be6e332fc5e819fe661494384d7ba5d5700c7d29849315cbb142374c6fcc5f74831accc4d4a02

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                  Filesize

                  13KB

                  MD5

                  4bebc7db5e0400d4994d5e358ede4d52

                  SHA1

                  471820e9a3438e4efe1dccff86f440636e419d16

                  SHA256

                  5470c3601abb3fb45ed809350a16fcc858a61f8cc0710bc65787a1b79fb94d4b

                  SHA512

                  75fea97dcbf284be1a0e37c68829ff4e75bd0130a44f45b8c3eedf3a449fd2461a79a4319f3fff79dd0733fa83502e33f25a4d23351b8bcbcdcad08a2c80c087

                • C:\Users\Admin\AppData\Local\Temp\1003508001\4460302fe3.exe

                  Filesize

                  2.8MB

                  MD5

                  250473f7cf820ae98790d9562e521869

                  SHA1

                  a75a5b09057517cd403ae6eead19e76ba57d986b

                  SHA256

                  09c99315f3c5cf598a4a9a2db049e17d32d3c8ebb6af4398786a75d50ff17527

                  SHA512

                  e881441474661e9af14f29e96046ba52d2a1d19f82c57f54bc4df9489c1a32da4d176e5a203ea427a034900db59e8d6b3bf1b8536d7174cbe80a9862ba6eaca0

                • C:\Users\Admin\AppData\Local\Temp\1003509001\2a3e84a2ec.exe

                  Filesize

                  2.1MB

                  MD5

                  e8c67e166d7639998d5900ffff8ebb67

                  SHA1

                  0314b649fdaccc8ebdd31fb276e294ff2cad5970

                  SHA256

                  bf16a4877794d068812cb2dd32756c731b5491d54b1eb3ee6da321f93ab69f4b

                  SHA512

                  5933b04f7a77e88cbe4dec22938ddf59983e263d598e7a6653d1297d51373f4071580a7fa789e814115dbfebe8f24cab35992d8112da917af0a519fec78f0abc

                • C:\Users\Admin\AppData\Local\Temp\1003510001\46af0964cf.exe

                  Filesize

                  898KB

                  MD5

                  6c9002d8dcf44d51a7f5c571579c5e40

                  SHA1

                  e6795239be3c06c64723c2804b5b21a04a2fbe01

                  SHA256

                  b48f43125a30149767095d1da821fe4e02207d04b4a34dc7c5aa59080dc9cd50

                  SHA512

                  30f0344f7f761ec0e30d9807f71feb92f645967fccaad26bfae2ad4ce3358ded944da46a4a950d6a5aaacab8f37d4b5440c4af4b8d96f95535c40a57730321c6

                • C:\Users\Admin\AppData\Local\Temp\1003511001\f9e90f8dc3.exe

                  Filesize

                  2.7MB

                  MD5

                  1993faa9adbc91e62bf152e3f9c6f29a

                  SHA1

                  2c95ab31fff9d414d9ef45126cc89530b44dd22a

                  SHA256

                  e5179cbb88ef53bbea998655b3aed68dd085c8a15fb514cf62a357761357c8f0

                  SHA512

                  c6055a8f74616cebdd177151c1473715544a71c33e50495dc4a1e11d68e252f49d966932ec6d52672c3c5f17fe3f0d1aeec9d33b9a75d6e87404fbdbceb85d01

                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                  Filesize

                  3.1MB

                  MD5

                  ed2775c75cf9a06d2084e52913c62203

                  SHA1

                  c6f79f4cbdd1d6649ad124d5439142609400ae91

                  SHA256

                  0fed91254f03a3bff84798b10a7adf64b664d35c3e1fe0cc66ffe57908210870

                  SHA512

                  9d1787c1a4482a04cb994f84c203ad03b2efc1e7c6c10294fe16af636748d43d3a2381ce5aaf999dbf8569ee1d518eb29b63c333428615c8b68f03b0497fccda

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                  Filesize

                  479KB

                  MD5

                  09372174e83dbbf696ee732fd2e875bb

                  SHA1

                  ba360186ba650a769f9303f48b7200fb5eaccee1

                  SHA256

                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                  SHA512

                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                  Filesize

                  13.8MB

                  MD5

                  0a8747a2ac9ac08ae9508f36c6d75692

                  SHA1

                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                  SHA256

                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                  SHA512

                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin

                  Filesize

                  10KB

                  MD5

                  b6ebf7d36932d2727930a76d953cd872

                  SHA1

                  4ad107eb8dfc93c3c43fdf748e49c818a58062eb

                  SHA256

                  2112df31a2300e8a2ce544a672932670ded9f66c982d33210fd5c33428a751a8

                  SHA512

                  06ddd1fa6e59e89600e53522b3f3a74abdfc9b34609b8c8ad6c2b2317bc72348fc03194c2c010354e3be7b7eb38e556b1668bb36581319c19460b0f872f52a5e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  6KB

                  MD5

                  d5f52eb0c7904df4aa0fa06dca927ecf

                  SHA1

                  def4a81a5439680c609ada288ebae89a8eaa5620

                  SHA256

                  fa98af5653793ce43ca7e9f93c1cb89fdbf777a62fca03329bd77f72a27c7cad

                  SHA512

                  076bad438ecf9241764e885c71d8b9bdd3fd57397f239272f667a4e5a3358fd487827356111bdb332f64f203b838a507ae5364707cfa5cb806d84bac38258726

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  15KB

                  MD5

                  e8f76c67d9f6510b267bd48384b84eed

                  SHA1

                  4f141e351ae716e40ace578dd250d4ba092dad05

                  SHA256

                  3a3db25d99b56eed0fab25e6c0263e52dbe6e8016901e9862f47851f546baffc

                  SHA512

                  655cd82f9c840193da6b6d034e0533bf4b1d44b57ce826339130501fb3ef444d45fcef958507d295a4c7afc138d75bf41ef5387ff6b3830b11129b285b34a3aa

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  5KB

                  MD5

                  9a30dab6fbf6696c0ca26f58d3a63e4f

                  SHA1

                  b45e2d2d5890eec1b6fec17523f215908ee4b35b

                  SHA256

                  31254f8ae3575ae0b53e9c28539543d03fa92c3536a7f6b79463ea8315611828

                  SHA512

                  68984db5c9c0c7a944de5e874fc876dac4a0a04a4dade605ea332fda4eea3c7f2f61f14740dd278f3e1e7c6e98d682cfca46140e0b1c841e7b08adc4319897cd

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  15KB

                  MD5

                  c363ce9f823e7f4a9b4eafcc71db13b8

                  SHA1

                  3cbbc3e5a5c96923fdc433e6b34cdabae9e94cb7

                  SHA256

                  911f0abe95aabd7433f38fcec0c6fd3b30c32d4a321e940d8ffc6d54b48f75d3

                  SHA512

                  841d8be2959ca86dd58303631a279bf082706a939dc0abe36f323beae95212aa577c99c9efabd9fc24223b78aaaf124bce345e2175e2d473a62f78815980e8ab

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\04cef49d-39ed-441a-8c41-e2158d173b54

                  Filesize

                  982B

                  MD5

                  eeff5373cccf8d850790e97172fe622b

                  SHA1

                  0ea47ac74e35982d5a416aecd5d52c48d3d40777

                  SHA256

                  1a329eb2a3193b74fdaec5bcce913bdfb4bec41cb8bd907fe9dba09b2c53d70f

                  SHA512

                  6456fcaf58819eab6ff164614a859d963f48896651c631d68bd5a4235b325c9abc71cbcd7a84ce9c35c38bc0f644b6b3b6f9fab86fb91f6dce4c3ea53473b566

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\1555b3f1-a304-4ac8-86d9-a2f2799b3679

                  Filesize

                  24KB

                  MD5

                  fe1a81c224d65c6dede560efa23fd4a4

                  SHA1

                  5072b10b79b630cbf2576579ec93c13bce19a26b

                  SHA256

                  8d09f519c1ca3fb70f2cd8cc381b2a1d1116773ada3613449091ff57287803a7

                  SHA512

                  c61a953cfdbf210f97f1b7597d048016848436d6b09313b7a5ade7b5ef02b8d1452687eca1f6d7f23bb8813311c22f905fed3a201cfcd084feb1ad57b49aa0ec

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\b2dddcac-f28f-40d8-b440-28039699265b

                  Filesize

                  671B

                  MD5

                  15161fef9db3c7b0e5faf16362012479

                  SHA1

                  31fc47826907759f24680a04fcfbb4d1c3027720

                  SHA256

                  69fd19eb82c3711e92fd5dbf992ff69bfadf4aeb03a20f86640d96e4ddc6272a

                  SHA512

                  3a479bd9ddf7f20f7f283559465d581be7c97b8ebbb332f765dfbc8a5be470a0b8b2d837bf7dc00f1b06fef2723bf36219b230408205bd5d5d88991e49ca9df5

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                  Filesize

                  1.1MB

                  MD5

                  842039753bf41fa5e11b3a1383061a87

                  SHA1

                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                  SHA256

                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                  SHA512

                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                  Filesize

                  116B

                  MD5

                  2a461e9eb87fd1955cea740a3444ee7a

                  SHA1

                  b10755914c713f5a4677494dbe8a686ed458c3c5

                  SHA256

                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                  SHA512

                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                  Filesize

                  372B

                  MD5

                  bf957ad58b55f64219ab3f793e374316

                  SHA1

                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                  SHA256

                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                  SHA512

                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                  Filesize

                  17.8MB

                  MD5

                  daf7ef3acccab478aaa7d6dc1c60f865

                  SHA1

                  f8246162b97ce4a945feced27b6ea114366ff2ad

                  SHA256

                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                  SHA512

                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs-1.js

                  Filesize

                  15KB

                  MD5

                  619b06bea287ff9d4bd5fd694ebe9f7d

                  SHA1

                  88870af92b1a7810281e262279d3b4178a7a6f4d

                  SHA256

                  bdec41c1a1b7937cb9d0686b4999706ffac1abd9d2ff20649a163796fb57ce9a

                  SHA512

                  4f44969eeba1483bd89a0f137c8ea0735dc1ae1f678edf0a4ccb6a5cb65fd8dab47408903cc38d5cc370df1187cdf5b93659081c4cae80bc20241a6abbd4cf48

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs.js

                  Filesize

                  11KB

                  MD5

                  375624bb65a157b8ecde81c78000b48a

                  SHA1

                  27f9537c8b09c14bb53ce43aafd326646a1ab4c9

                  SHA256

                  522515e37adbd492c20142f39828f1d326d637f97698cd052aaa4dc8453f5c85

                  SHA512

                  e00efea6c6daa7dc3a7f069199428290d493f21fe794691636757c4c177ddebb1f0876a2bbe2f4c520a4fecaa9ed46e914dc3d43bdbd77b2e29f1a0bdf856b94

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs.js

                  Filesize

                  10KB

                  MD5

                  c83b048120380940a5e263beb64932e3

                  SHA1

                  9ef30a7024eb8f74742c3d1bf395ca8e4129c584

                  SHA256

                  c0f8c5cb1595321fc91bd769131dca3ee2f95906dbc2007ce20dc006ed87fafc

                  SHA512

                  75eeb74a5df374bfdb8f71e38f4a2a2169bf22608236470146c1721d41bef48e46e769b891a1a9b9c9c8f50512ad60245e6348a5611286f82540fbea3476c9bc

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs.js

                  Filesize

                  12KB

                  MD5

                  56f82eb5c24d77af697dd036584e7730

                  SHA1

                  e4228b62f41533fff88b16a6c97aa5014b452baf

                  SHA256

                  e043a5f073e1cf968eb42f2f8dcf118b7975d735b19f8f74557b98a29f111526

                  SHA512

                  8c46e2d4b9322df427321cbb1d39ba0ff190b689896c5d94642b48899745a07ebd117834995cd18e167b179aac7baba3a78827ed8a8b87811eb0e405e9fdaa0f

                • memory/216-64-0x00000000000B0000-0x00000000007FF000-memory.dmp

                  Filesize

                  7.3MB

                • memory/216-65-0x00000000000B0000-0x00000000007FF000-memory.dmp

                  Filesize

                  7.3MB

                • memory/872-46-0x0000000000C70000-0x0000000000F74000-memory.dmp

                  Filesize

                  3.0MB

                • memory/872-43-0x0000000000C70000-0x0000000000F74000-memory.dmp

                  Filesize

                  3.0MB

                • memory/1972-421-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-3991-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-22-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-3995-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-47-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-45-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-17-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-3994-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-3993-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-3992-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-470-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-21-0x0000000000641000-0x00000000006A9000-memory.dmp

                  Filesize

                  416KB

                • memory/1972-3990-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-3985-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-495-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-26-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-3984-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-3981-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-27-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-2181-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1972-44-0x0000000000641000-0x00000000006A9000-memory.dmp

                  Filesize

                  416KB

                • memory/1972-48-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/2072-24-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/2072-23-0x0000000000640000-0x000000000095B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4112-1-0x00000000779E4000-0x00000000779E6000-memory.dmp

                  Filesize

                  8KB

                • memory/4112-2-0x0000000000471000-0x00000000004D9000-memory.dmp

                  Filesize

                  416KB

                • memory/4112-0-0x0000000000470000-0x000000000078B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4112-3-0x0000000000470000-0x000000000078B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4112-4-0x0000000000470000-0x000000000078B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4112-19-0x0000000000471000-0x00000000004D9000-memory.dmp

                  Filesize

                  416KB

                • memory/4112-16-0x0000000000470000-0x000000000078B000-memory.dmp

                  Filesize

                  3.1MB

                • memory/5460-475-0x0000000000EC0000-0x0000000001184000-memory.dmp

                  Filesize

                  2.8MB

                • memory/5460-472-0x0000000000EC0000-0x0000000001184000-memory.dmp

                  Filesize

                  2.8MB

                • memory/5460-452-0x0000000000EC0000-0x0000000001184000-memory.dmp

                  Filesize

                  2.8MB

                • memory/5460-451-0x0000000000EC0000-0x0000000001184000-memory.dmp

                  Filesize

                  2.8MB

                • memory/5460-450-0x0000000000EC0000-0x0000000001184000-memory.dmp

                  Filesize

                  2.8MB