Analysis

  • max time kernel
    142s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-11-2024 01:20

General

  • Target

    file.exe

  • Size

    3.1MB

  • MD5

    377b0bad7a7f2b18daaafd0c29158bd4

  • SHA1

    ed9a5c3e2c34871f64bbaa0dedfdd8482f21bb6e

  • SHA256

    97f29e138df5a6bacf5533fc5536c034efc49f6eba97a22bc52ac5aca89a69d9

  • SHA512

    405d1c84cd8524662f0bcb3eca2ded371b41887e243a6b473fd9acc46e77d17c451d484f05e9528c30db0fb4e342dcebb2139223e29fc37e4e29c8856ecf917f

  • SSDEEP

    49152:aOzSjDNxr0qN7zA7ij4y8xeC3NjEf4VzBrXBD3SSzxuIeeRON:md0qN7zA7ij4yUeC3s4lBw4S6ON

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://necklacedmny.store/api

https://founpiuer.store/api

https://navygenerayk.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Users\Admin\AppData\Local\Temp\1003524001\6fc20622ee.exe
        "C:\Users\Admin\AppData\Local\Temp\1003524001\6fc20622ee.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2192
      • C:\Users\Admin\AppData\Local\Temp\1003525001\3be1974aa4.exe
        "C:\Users\Admin\AppData\Local\Temp\1003525001\3be1974aa4.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1748
      • C:\Users\Admin\AppData\Local\Temp\1003526001\eb1a693e55.exe
        "C:\Users\Admin\AppData\Local\Temp\1003526001\eb1a693e55.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4852
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2172
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4876
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3796
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4456
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1336
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1352
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {510d2c11-0ad4-4b34-86dd-4311a37d537b} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" gpu
              6⤵
                PID:5036
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d72eb9e-0249-45d7-8a23-bac8303b166e} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" socket
                6⤵
                  PID:1784
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3408 -childID 1 -isForBrowser -prefsHandle 3372 -prefMapHandle 2908 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82de61fb-b1fa-4dd0-b9a7-2f221da2680d} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" tab
                  6⤵
                    PID:1020
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3980 -childID 2 -isForBrowser -prefsHandle 3972 -prefMapHandle 3968 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d884d5f-2b10-447b-b55c-31c17407bd25} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" tab
                    6⤵
                      PID:4148
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4860 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4856 -prefMapHandle 4852 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ddd5932-197b-47b6-b5fb-0fe153709fbb} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5424
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5448 -childID 3 -isForBrowser -prefsHandle 5440 -prefMapHandle 5408 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6aad40a-4b58-4f03-aa1b-fd284989e8b9} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" tab
                      6⤵
                        PID:5984
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5572 -childID 4 -isForBrowser -prefsHandle 5652 -prefMapHandle 5648 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8708cb91-4505-43b1-b57d-e15074657994} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" tab
                        6⤵
                          PID:6000
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5752 -childID 5 -isForBrowser -prefsHandle 5760 -prefMapHandle 5764 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cefc94bb-f3ec-4761-aad5-c5af8cb28e1c} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" tab
                          6⤵
                            PID:6012
                    • C:\Users\Admin\AppData\Local\Temp\1003527001\132b442a55.exe
                      "C:\Users\Admin\AppData\Local\Temp\1003527001\132b442a55.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1104
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5612
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1796

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json

                  Filesize

                  24KB

                  MD5

                  0958be31187cdf4e64cd8654734d9bb2

                  SHA1

                  c5718f7d43d9ed918de8b623543d4b78c315e175

                  SHA256

                  209768f0eff9e988f660b247e3ec87b6d20f3f7a083ffd86b757d3c94b71b4ea

                  SHA512

                  ceed57bb221c51c4d2d35abd18e12c6f005cd7d630d3e9fe413eb930dd79db4bf6cbb0181e588aff510bf0c4641e04639ecce5bd95f2c7b27991e2d4a82eced5

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                  Filesize

                  13KB

                  MD5

                  bbc0b4c2ef39cd4f07554a6ff75fa038

                  SHA1

                  885efbb98c0446ad760ebfdc0d5d7c7e4a78d892

                  SHA256

                  f66f9f4389fc53914e65fb4d4eccfba21693ede443c1cac51bb5171f98ceafa1

                  SHA512

                  4649f5439b2b7b7685db3ca9df1c604d3a953845c14ff66a002a8bf929621ac4a62b81c27e4661b92e176d9aade2f77c2e4800fabd5b47be2db42be913ba2a6b

                • C:\Users\Admin\AppData\Local\Temp\1003524001\6fc20622ee.exe

                  Filesize

                  2.8MB

                  MD5

                  0dfbe9409540e1b6f95913d562857f51

                  SHA1

                  025db6cd5089820520d657ae0854434747a8a3d1

                  SHA256

                  6b22d26911eb66569332d90e75f680c8247ecaa68c7e774a6890853120c584f3

                  SHA512

                  1d2e447e4a5c356680720adf73d1d4aa14bac505ab4e86066db86562b40fdd3f3cc72d0b9c6303ba4becaa8d00cab4f92d43a78e8c2bd502392cba1ff64b88a6

                • C:\Users\Admin\AppData\Local\Temp\1003525001\3be1974aa4.exe

                  Filesize

                  2.0MB

                  MD5

                  1149738b919e0ab60f39d1d13f28ed38

                  SHA1

                  0ac124e06a56d9eec96615026c96c5e8eb4564dc

                  SHA256

                  7beee0686c1fe27da85f72d6631dc483466916fba5737102b4e7e136acdf295b

                  SHA512

                  d646bac6e8944c82c1e1f25c3d6bb4804bc8ce3dae1ffcf70d73dfe0b030c9b3805e5ac6959c4819015aab85376f4bc782503138df8d0ce808b187d9e2e1d332

                • C:\Users\Admin\AppData\Local\Temp\1003526001\eb1a693e55.exe

                  Filesize

                  898KB

                  MD5

                  52b9f4d14b213ededa458cd8ba71bdb0

                  SHA1

                  ed2da581a4d1f10775320e026e908e148e6788d2

                  SHA256

                  eaae318be46a245eea165b0001297c9f1a082a3f520a9f20d883207161c07769

                  SHA512

                  040d0977caed826fd3bca2d305dc2d985e0298495883554b279085626f950dd3e89302617df34e8591f19be11c6d1a55e349c6d44d834e12540255b22c3e38f3

                • C:\Users\Admin\AppData\Local\Temp\1003527001\132b442a55.exe

                  Filesize

                  2.6MB

                  MD5

                  1d4231215484aa5c0b4143a05d213d35

                  SHA1

                  65a6c675a4d3967ace2444dc1563eb190d65bdc7

                  SHA256

                  b111e5e7d87cdfe8e5525fd5398ec5967d9c008b67a9e0a9b9203c0fd1fa3d5f

                  SHA512

                  771fcdb74bd431c6a2b15d79c605489d9cba9b16d4bd386e6ff51c1d47e7fbe72cc202afa1527cab391ceaddef4eaacff65aa0812a5dd4af90db96d91936b5d4

                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                  Filesize

                  3.1MB

                  MD5

                  377b0bad7a7f2b18daaafd0c29158bd4

                  SHA1

                  ed9a5c3e2c34871f64bbaa0dedfdd8482f21bb6e

                  SHA256

                  97f29e138df5a6bacf5533fc5536c034efc49f6eba97a22bc52ac5aca89a69d9

                  SHA512

                  405d1c84cd8524662f0bcb3eca2ded371b41887e243a6b473fd9acc46e77d17c451d484f05e9528c30db0fb4e342dcebb2139223e29fc37e4e29c8856ecf917f

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                  Filesize

                  479KB

                  MD5

                  09372174e83dbbf696ee732fd2e875bb

                  SHA1

                  ba360186ba650a769f9303f48b7200fb5eaccee1

                  SHA256

                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                  SHA512

                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                  Filesize

                  13.8MB

                  MD5

                  0a8747a2ac9ac08ae9508f36c6d75692

                  SHA1

                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                  SHA256

                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                  SHA512

                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                  Filesize

                  7KB

                  MD5

                  49d2388ed32d4b1f98245df47adc7858

                  SHA1

                  07d64dea650c9bd086ffdcb3f1e846dac36b288f

                  SHA256

                  a24bb39f4c3ff29561c644955640e22833f711afe5f89275f12079f1bce784c1

                  SHA512

                  787dc8736942c7887ab92398b3aa0b575cea86a17c48d2a192f5d0bf949386de99d13efc678692d99a4b5083923c665504be0e3820f89a247740dd1f57684eac

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                  Filesize

                  13KB

                  MD5

                  2e982f69ddca86d55b5ec4ae5973278b

                  SHA1

                  71cf0c1f5aebd6103849ae5cd1e859dce3143525

                  SHA256

                  27b2e9aa4705abf7dc720336f687cdb08a42e7125be810eb941b1de340da3c16

                  SHA512

                  537382bcdd5d618841105826d256dfb714556de68e2974f788a322dd4cd02526f3f2f7247c55ec155b74fc3b47ef7464edd081aed5e7d740980b46e6aa0cf4d0

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  21KB

                  MD5

                  b551ab05b390d365205c14fdc4760701

                  SHA1

                  b17d4979ae137e82d5e41aaa6b652f535ce0ecd1

                  SHA256

                  4644bcd8822adf6d22bf44449f1dbbeedddc4a167b27373d0a21624641bcc8c5

                  SHA512

                  081456e08803884a74d789bdce49e09294677b6fe80c0d30d13fde76ed8560a1c4f1cec49edcfd8a983c8c5f721058a582ae172ff8ca83bc91cd9f487a979318

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  22KB

                  MD5

                  512fc2742c7518e279ce8674489e59e0

                  SHA1

                  f7e621c473ad8ca203900af73edfae2d738f6848

                  SHA256

                  16d2116738932cb4ba18a05092ece048e1e9aca6593e2bda285361d0fad5c013

                  SHA512

                  86dd7a018188e0bd6d33d792f2d0b9002b78e3202f3f93b52befe719493dcf26675f016e81fdbbdd42ec3a4549a2e9fea3c96e07208c07ad83b0e5fe3799c74d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  22KB

                  MD5

                  83ab5c92635ea8a2e9f3a8f07d347eea

                  SHA1

                  edccc3658c57d405d39c78eb4e8ac340ba7e9377

                  SHA256

                  5d622b45b7944410d770dcfd3756e59bc3ae3272aa6e24d5ac4fd9e0ba748115

                  SHA512

                  3e89e2dda6dad876bf69fbd56eb59fe7a7f2faa0667eeacc55cc3bc74a9ecc3dac8c9b611e7b00b205f9a95ff09bef1f4f09f7ac221c04eb869fd9cb1962dc6e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  24KB

                  MD5

                  fd88e303b87e9e31fab92cde02b8d51c

                  SHA1

                  45b70aae7d79c529725eaae7fceaa9fafd5d5767

                  SHA256

                  1b3719553f36008325118fe0bdc217fe80f3b49e9140ac9ff5545dd165454a69

                  SHA512

                  377498ad11d046dc8c4696b7b01c8944fced537e9fe826e6bbb662da11bd22b454ddfb36c2733b4eb790248404c5dde6cee3531e8a992a878148a075e7d61199

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  24KB

                  MD5

                  9d27a38f8ed40263ad0d82b3986e29fb

                  SHA1

                  b758017e85e4c50eb12bdf79b2592b1ff725065c

                  SHA256

                  377c99b40c8149a587ff8b44901d4fe5f83c540b7f617357e315b281f6fcc647

                  SHA512

                  224d1ecba452c0cdcff07bdb522cbc56ae5926e3e520948483018f415f6202178ee4451998ad19ce36a175a9895c90570155eb0f348318a69c0c8eebfb66d720

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\0f79de19-e0d9-4d1d-984f-5ea13ec8958f

                  Filesize

                  982B

                  MD5

                  e9872e5bec99db4a08994a59b009ee59

                  SHA1

                  55d1ec7637765d943be56579fe69afa5f0e72f84

                  SHA256

                  131e58c2342092072dd743eae360a29836409c620ab920643a5ab59618cc1d0b

                  SHA512

                  b3aad794f5849f1c8138889dcf9bf4b25334e64f18ec1bf1f6e006bfcfb9a83d85edc6990168fbc31dc9630ea5a06eee7f18644a57555fefc61b3e4522c38e14

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\98a9df1f-41a5-468a-bd1d-9ed7c2552c82

                  Filesize

                  659B

                  MD5

                  f81cc94da857520ffd9952d75e5cd097

                  SHA1

                  7abd7fed466c3dbfd795341d45b45c39a0634d77

                  SHA256

                  dd84fd74ac429d29c9626dffdbd28539bfbb00dfd9a2ad2622b2fdd0c1655e6a

                  SHA512

                  64f8ab2cfa6f367a1a8f069848eba4e584407c92a9c50fdc82659ca86b8682fa175849f6893baad3fdd1dc88f88b1fd78b030ea647adc3ba1a7c76989213dd0c

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                  Filesize

                  1.1MB

                  MD5

                  842039753bf41fa5e11b3a1383061a87

                  SHA1

                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                  SHA256

                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                  SHA512

                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                  Filesize

                  116B

                  MD5

                  2a461e9eb87fd1955cea740a3444ee7a

                  SHA1

                  b10755914c713f5a4677494dbe8a686ed458c3c5

                  SHA256

                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                  SHA512

                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                  Filesize

                  372B

                  MD5

                  bf957ad58b55f64219ab3f793e374316

                  SHA1

                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                  SHA256

                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                  SHA512

                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                  Filesize

                  17.8MB

                  MD5

                  daf7ef3acccab478aaa7d6dc1c60f865

                  SHA1

                  f8246162b97ce4a945feced27b6ea114366ff2ad

                  SHA256

                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                  SHA512

                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                  Filesize

                  12KB

                  MD5

                  8d150f26f95b282be8059eb35539f243

                  SHA1

                  48efa56e17c7580edfb9ac48060f8e3ed6159c68

                  SHA256

                  6453c86d643c7aa41f7f17ed8e33304b638f15ee60fc88cfdb0e30b9759d34f8

                  SHA512

                  16830f106fb05bd28e0ca213a85b84ba006db3ee04b33729978daacd55c1fbb36bd2ad77fd73398ce90b2325172fdb55832f32ba3b3a17a5192cee86efbb21cc

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                  Filesize

                  15KB

                  MD5

                  f3f35c53fcac07bf19e21474f6639b1b

                  SHA1

                  e18623acbca1e11fd9625e36e78649f383be2b67

                  SHA256

                  9bbfe42a3fdab581c99e20c4f27a6865542727f641918bfdd15ae099233bd6f5

                  SHA512

                  2c8d056f70b14319878a7e9632c5cd100026f137da0df6983d869c53346adc7a92dbbc2ca02aab4bace41367e6ac437e0ad3c31111fb3f17015d2736ccd108bf

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                  Filesize

                  1.1MB

                  MD5

                  6760ebedcb0eb8a0f97e4ee9cd109b07

                  SHA1

                  3ca28c5c6dd735f8387d72a2f479e1a7a333c24a

                  SHA256

                  539c6cbb9f53c77a75396e045f2fa3671eafd651e6087fb498446a265881afa7

                  SHA512

                  f727dc5712c0160fe8ea0e7d6e9b200cb1ac30feb86b40f6741e54b4356536c25e60f0b8ce2166d445ad79bce2aa3a8a32b219f23941cfdc8ba475702e9118d3

                • memory/1104-404-0x0000000000DE0000-0x0000000001088000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1104-448-0x0000000000DE0000-0x0000000001088000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1104-445-0x0000000000DE0000-0x0000000001088000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1104-423-0x0000000000DE0000-0x0000000001088000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1104-422-0x0000000000DE0000-0x0000000001088000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1180-19-0x0000000000E11000-0x0000000000E79000-memory.dmp

                  Filesize

                  416KB

                • memory/1180-18-0x0000000000E10000-0x0000000001135000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1180-0-0x0000000000E10000-0x0000000001135000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1180-1-0x00000000779F4000-0x00000000779F6000-memory.dmp

                  Filesize

                  8KB

                • memory/1180-3-0x0000000000E10000-0x0000000001135000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1180-2-0x0000000000E11000-0x0000000000E79000-memory.dmp

                  Filesize

                  416KB

                • memory/1180-4-0x0000000000E10000-0x0000000001135000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-2923-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-2924-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-41-0x0000000000A01000-0x0000000000A69000-memory.dmp

                  Filesize

                  416KB

                • memory/1624-2944-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-449-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-42-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-46-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-17-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-2938-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-24-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-2937-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-2936-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-20-0x0000000000A01000-0x0000000000A69000-memory.dmp

                  Filesize

                  416KB

                • memory/1624-588-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-21-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-23-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-2933-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-2932-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-2930-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-425-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-1751-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1624-22-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1748-62-0x0000000000280000-0x00000000009BA000-memory.dmp

                  Filesize

                  7.2MB

                • memory/1748-64-0x0000000000280000-0x00000000009BA000-memory.dmp

                  Filesize

                  7.2MB

                • memory/1796-2935-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/2192-45-0x00000000000F0000-0x00000000003F4000-memory.dmp

                  Filesize

                  3.0MB

                • memory/2192-44-0x00000000000F0000-0x00000000003F4000-memory.dmp

                  Filesize

                  3.0MB

                • memory/2192-40-0x00000000000F0000-0x00000000003F4000-memory.dmp

                  Filesize

                  3.0MB

                • memory/2192-43-0x00000000000F1000-0x0000000000119000-memory.dmp

                  Filesize

                  160KB

                • memory/5612-1686-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB

                • memory/5612-1641-0x0000000000A00000-0x0000000000D25000-memory.dmp

                  Filesize

                  3.1MB