Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 18:12

General

  • Target

    41b79f79ef00c11cb34bad34697b984bcc7411a13dc3c276247abf07e5d607eb.exe

  • Size

    3.1MB

  • MD5

    23c7b9248f3dad496485fad4eaadd5ea

  • SHA1

    76ac41eb3213710941c32bd8a07fa2e6b7ecc826

  • SHA256

    41b79f79ef00c11cb34bad34697b984bcc7411a13dc3c276247abf07e5d607eb

  • SHA512

    eebaf1961274ea345d5fbff45f1453fb89dfbf9b15f9fcb3beb6f29a133af3e3d81a8428c022f57d5c922cebbd48842559fc788b37cc70e5219356472ca6ab38

  • SSDEEP

    49152:jmqDbVLbPxHuTnc4DTZDpGpEWFuWB0g7XWDh9VYwlMXY1oUATNp:qqDbVfPQTnc4DTMEWbjrWN9VYwWXEsp

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://founpiuer.store/api

https://navygenerayk.store/api

https://uppermixturyz.site/api

https://bringlanejk.site/api

https://honerstyzu.site/api

https://plaintifuf.site/api

https://moeventmynz.site/api

https://unityshootsz.site/api

https://monopuncdz.site/api

https://reinfomarbke.site/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\41b79f79ef00c11cb34bad34697b984bcc7411a13dc3c276247abf07e5d607eb.exe
    "C:\Users\Admin\AppData\Local\Temp\41b79f79ef00c11cb34bad34697b984bcc7411a13dc3c276247abf07e5d607eb.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4528
      • C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe
        "C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3816
        • C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe
          "C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe"
          4⤵
          • Executes dropped EXE
          PID:2020
        • C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe
          "C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:952
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3816 -s 252
          4⤵
          • Program crash
          PID:212
      • C:\Users\Admin\AppData\Local\Temp\1003914001\25d0073dbd.exe
        "C:\Users\Admin\AppData\Local\Temp\1003914001\25d0073dbd.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3396
      • C:\Users\Admin\AppData\Local\Temp\1003915001\8c5eee905b.exe
        "C:\Users\Admin\AppData\Local\Temp\1003915001\8c5eee905b.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4436
      • C:\Users\Admin\AppData\Local\Temp\1003916001\6c7a1e3a96.exe
        "C:\Users\Admin\AppData\Local\Temp\1003916001\6c7a1e3a96.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:884
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2480
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4388
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3624
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:976
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2972
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4532
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3848
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce53e880-08ca-4b0b-90a2-b51cf98043a8} 3848 "\\.\pipe\gecko-crash-server-pipe.3848" gpu
              6⤵
                PID:1620
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2448 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4cf3c68-6712-446f-8eb6-29fd3b1a1bc8} 3848 "\\.\pipe\gecko-crash-server-pipe.3848" socket
                6⤵
                  PID:3160
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3036 -childID 1 -isForBrowser -prefsHandle 3156 -prefMapHandle 3152 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {90649fbc-91f2-4787-8cfc-e5997085bb8d} 3848 "\\.\pipe\gecko-crash-server-pipe.3848" tab
                  6⤵
                    PID:1716
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3688 -childID 2 -isForBrowser -prefsHandle 3680 -prefMapHandle 3676 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {95c71bf7-b7bc-4a55-ad61-4b6ffc5df9d0} 3848 "\\.\pipe\gecko-crash-server-pipe.3848" tab
                    6⤵
                      PID:3424
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4724 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4752 -prefMapHandle 4672 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f5c0d39a-1609-4dad-b198-7276d70e7afe} 3848 "\\.\pipe\gecko-crash-server-pipe.3848" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5492
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5368 -childID 3 -isForBrowser -prefsHandle 5384 -prefMapHandle 5360 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {35c9fbf6-9586-42e8-9064-6b9773fc6c33} 3848 "\\.\pipe\gecko-crash-server-pipe.3848" tab
                      6⤵
                        PID:6052
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5516 -childID 4 -isForBrowser -prefsHandle 5524 -prefMapHandle 5528 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ecbeed0-7f59-438b-b203-7b13a7fcdde7} 3848 "\\.\pipe\gecko-crash-server-pipe.3848" tab
                        6⤵
                          PID:6064
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5820 -childID 5 -isForBrowser -prefsHandle 5812 -prefMapHandle 5808 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {85a42287-e1e9-4b70-a87c-1dbb73a4eea8} 3848 "\\.\pipe\gecko-crash-server-pipe.3848" tab
                          6⤵
                            PID:6084
                    • C:\Users\Admin\AppData\Local\Temp\1003917001\09084cb1ad.exe
                      "C:\Users\Admin\AppData\Local\Temp\1003917001\09084cb1ad.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5264
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3816 -ip 3816
                  1⤵
                    PID:548
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5776
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5016

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json

                    Filesize

                    18KB

                    MD5

                    93560fdb985e19a0fa6639a2c31253d2

                    SHA1

                    99910b5e19d28cebb5677838d08f01350d0ea140

                    SHA256

                    b2a7df049d5f835f4c5b326e07ab5b3a323ecef80d618f29ca011f609dd004cd

                    SHA512

                    042382fdfcd46812997decfe25129fed5b2d6ba52c322f64850b052ceb354468b5fe93d2987b1c3f111337ec1ef41e4aa4f4f7c0afbf04b36044d656c9db2f4b

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                    Filesize

                    13KB

                    MD5

                    a0fd9da9cd8a939720e0faf387919d70

                    SHA1

                    52c7e0d1918f26a4743c5175270f3ceb2b7cb6b9

                    SHA256

                    1327969b9a74de2a27c3d480ac53d297a5435ba8ab084c305e518e0dd172c958

                    SHA512

                    0605f4e4f5e83d8a7c8ea88af96dac83d74ee809f06afa104731df6049671cab13101c75a09a43fea440848118b18b736194b23450e09170d50b685dca6d603b

                  • C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe

                    Filesize

                    1.1MB

                    MD5

                    d1629f3c794978e4a261000d117014dc

                    SHA1

                    b688470e41b98c49a4710c2b20b458d3bb50ef83

                    SHA256

                    97b18507cb1ab250f8d1669ce402d79fdbaefb530cce505aa995c861d8ebd946

                    SHA512

                    1abbb3141e2c3fcbbe2828c9e90dcbce460ce622b972ec57a0fcc236cbf709e454031d5e0bdc15aab96e83de3bcc0c2d625b1a610f72eafe9c7d3c25d168e006

                  • C:\Users\Admin\AppData\Local\Temp\1003914001\25d0073dbd.exe

                    Filesize

                    2.9MB

                    MD5

                    94f7fd12c529bc5d28be7319b857e96b

                    SHA1

                    80406621106c9f98a1991449ca11c1318edcf1df

                    SHA256

                    2367242ede5c10e68fdb4a893d23a8257bbe5e78347e6e24676cbe36139e25ee

                    SHA512

                    0e79e876bca1dc042cb35d6d5233b7b683e7c9bee1a933740e41c75a89bd91e0f4ff2093cef82d6771a332ec03bc64833cb6169abac23ef047dc753ec0c1582f

                  • C:\Users\Admin\AppData\Local\Temp\1003915001\8c5eee905b.exe

                    Filesize

                    2.1MB

                    MD5

                    5c4e5d818a24cb9d69fc18ce0dbbd9be

                    SHA1

                    618a41b2cd9fcd1307a120f3cd78b86862b25d4c

                    SHA256

                    c2295f41e3e74394823ebc9f99265d4021de67f36e3c257600d610781e2f4ffb

                    SHA512

                    93dcc942a9adc63d7457106277e65d0c665c9215d47e266e3fa061ad3247e763747ae5fbe15e255995b674322a65635479eb0b6afd81e5db9f6fc997e96619a8

                  • C:\Users\Admin\AppData\Local\Temp\1003916001\6c7a1e3a96.exe

                    Filesize

                    898KB

                    MD5

                    12518b43b577eb06efd2228acd9242ed

                    SHA1

                    a3f3a15b4322935d70129433e85ee82fe55bf3fd

                    SHA256

                    9aa23f52e1217cdb6992c4ca1c7ffb1d79bab7d9112880de31c2c97fe424655a

                    SHA512

                    ab32e80eacc5b3402d304f55e8f620e5c13ed9adc7397414c1f53973219d3b88eb6850d98ff0de08e453353c1a1481e9562883f400d29fdf852d1372ea741f0d

                  • C:\Users\Admin\AppData\Local\Temp\1003917001\09084cb1ad.exe

                    Filesize

                    2.7MB

                    MD5

                    3e4b74b9abf11b36e842cf2562437021

                    SHA1

                    b10240f81d9b2250802f793bb44a41736130f5a0

                    SHA256

                    ab45978faf4521e697cadb7f266f73167d449819ebdab39a8e57fcee8a62174e

                    SHA512

                    99cc29d9da1126b4d9e432fc2729206772a1216f9f1b2def24f9e52bc888496eaec4f421acfb69eb3a14a729184b5cc20105f2f1f70eb2d078d125f9b9220fe6

                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                    Filesize

                    3.1MB

                    MD5

                    23c7b9248f3dad496485fad4eaadd5ea

                    SHA1

                    76ac41eb3213710941c32bd8a07fa2e6b7ecc826

                    SHA256

                    41b79f79ef00c11cb34bad34697b984bcc7411a13dc3c276247abf07e5d607eb

                    SHA512

                    eebaf1961274ea345d5fbff45f1453fb89dfbf9b15f9fcb3beb6f29a133af3e3d81a8428c022f57d5c922cebbd48842559fc788b37cc70e5219356472ca6ab38

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    479KB

                    MD5

                    09372174e83dbbf696ee732fd2e875bb

                    SHA1

                    ba360186ba650a769f9303f48b7200fb5eaccee1

                    SHA256

                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                    SHA512

                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    13.8MB

                    MD5

                    0a8747a2ac9ac08ae9508f36c6d75692

                    SHA1

                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                    SHA256

                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                    SHA512

                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                    Filesize

                    8KB

                    MD5

                    fe91fd787563cc4490daca75babc6dec

                    SHA1

                    bc9bee258fe493532e67c272b97a23a5a4785de7

                    SHA256

                    5fd88b1190378f5d9aae5fd3ec101b6e5066bd0fa56d7d02a49c6ee2a74dadd7

                    SHA512

                    3b53b3be55d513254b666d5a17cfed9e88d4073941bb0cdfbe3f63fcdd47f9439eb4422db4adf4dd929e8a211ef89f6194b89c0347a6876c908d5e2308b44438

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                    Filesize

                    17KB

                    MD5

                    d5a367b8afd6f078c129519b8dd29323

                    SHA1

                    649e8c23d887292d17ba2e825a6e1934bafb4af2

                    SHA256

                    7f1b85b040043cbf68e6d81a90990005acd2085b157671590b7ef5be0644210c

                    SHA512

                    358abea57c610919e338878421bcca62a15544a0fcd3ca234d1bd2befd62c0c62bca8a8b1e7dc8a9e5c95e06b94f3d9144c5327f63aa5138089c38f0d4484706

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    5KB

                    MD5

                    b34165ee3df08a7ceff1f6c96a09b05c

                    SHA1

                    6cefb4bb6e3b8bcf622895ec2bb1d94c4b918843

                    SHA256

                    a6f2702ef4b7490c6b13930ba8630a9b1faa7855657c1100725ede11eb97a96f

                    SHA512

                    2ecc538ffa45bcc83312236c3dc5654e5807941fe6975d366fcf96fd4d42efd03e3080237bddffdeb81f993ae933031c4713501f13c0cba39ba6d4fcbd5e5a68

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    14KB

                    MD5

                    3b7c6bdb0a3839dd9f8a416928536422

                    SHA1

                    1e6e3da92d9056197e31f55864f9d4a63c19f49c

                    SHA256

                    6238586f7c979274a67f463dbbc316d3d74d07d0657fd4c846dcb9aee4f46571

                    SHA512

                    c2291e2d3be08cd511f4880108a6910416223e2db65004675893249abf5bb90bd6fa78005adf91b41831df9cb9ddc4a44a9d5aae4d4f6c2e9afd9b1eecd4d634

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    15KB

                    MD5

                    a6100434e4a53eb0f9a40c60bf131f50

                    SHA1

                    798576a7af69eb58873462d86888defae9e7e18e

                    SHA256

                    a707a06f593378ef6aff41675815fc91bf971b0ec6a3824647f6193bcaa8b1ed

                    SHA512

                    da29ef759876728050577fc400a2bb7bd0cab1c0f50625444913a9076dbe63d60af36e7aa19a7e6b448c44ad23686d2334d7e8acc2898a1f6bdef9e8ded0cb1c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    15KB

                    MD5

                    f50e97ee19bc6fd1f4729c072f37ed20

                    SHA1

                    34a4fbae4741f973a780f7d41146e88924bdad74

                    SHA256

                    1271143d2078bdeab76739605416c8bf3d89b336e4b13cae6a416414d9cbf5a1

                    SHA512

                    5c9640e81a20f8844f16c9d12eaf9498d40e47021f0c1215ee1d05a9fb8864e9f327fca223613d561633dc55778219d40ba2c38543f9962393a6b8a13c2ab1cf

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\2aa20f88-3def-4c1b-9bc5-ced3471f0981

                    Filesize

                    982B

                    MD5

                    2e7d17549be4c33ecd79950d67a4baf9

                    SHA1

                    68d64828668b0cdb62e1889ddf5286ebf14cd2be

                    SHA256

                    8cc730136567c69d9de496cc913b8b0a4c502fd32e5118f60565059ee611121e

                    SHA512

                    65c1c1da8ed42f62c373d10c98a7047ed6922a2c8e3cd86d3e6803edd900bcc966c2029879a7b807b45d5508e643c6124b736be07466a0072beb0329c3ce5bdc

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\db3779c8-4f33-4cd8-b08c-c52e8f62b3fc

                    Filesize

                    671B

                    MD5

                    490505c9eee60ba03334cd5719d67ed3

                    SHA1

                    56998f481ea5c8a9d0bb73f056365829002b0cee

                    SHA256

                    ae29ff8c1a1bb31cae06fb6a7ab5d10af06ac182265997809f8fee72ee71bebf

                    SHA512

                    278fe5e5843a8138c57a99c7ee62a57cc35afa34ee676afceeded90e37c9aab11f927981a774fe918d36a7cda3e86f79872b65b7b8f7dba57731fecc1f7f52f9

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\f11bf284-a5e0-4459-a177-4bf21c449b0a

                    Filesize

                    28KB

                    MD5

                    e1aeff0e0ef3b56633650bcb94d126df

                    SHA1

                    d3c0c6f4254f84f42835bfa60b34ce4762b23c3a

                    SHA256

                    de96d11ea110338a18e1d4ccd0c33c22440d985cffdab8a59131bf5680869223

                    SHA512

                    87c87bd5ca4e14619a75b3a58e62b2e828c5c4252b40120186ac3c9ed9488511afcf292821857063e3c648d92288d3f08bdce243349218da5f47c11898152d6b

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                    Filesize

                    1.1MB

                    MD5

                    842039753bf41fa5e11b3a1383061a87

                    SHA1

                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                    SHA256

                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                    SHA512

                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    2a461e9eb87fd1955cea740a3444ee7a

                    SHA1

                    b10755914c713f5a4677494dbe8a686ed458c3c5

                    SHA256

                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                    SHA512

                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                    Filesize

                    372B

                    MD5

                    bf957ad58b55f64219ab3f793e374316

                    SHA1

                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                    SHA256

                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                    SHA512

                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                    Filesize

                    17.8MB

                    MD5

                    daf7ef3acccab478aaa7d6dc1c60f865

                    SHA1

                    f8246162b97ce4a945feced27b6ea114366ff2ad

                    SHA256

                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                    SHA512

                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                    Filesize

                    15KB

                    MD5

                    9208c5ccdd1a1649021dd2fbab148fbf

                    SHA1

                    5aa7b79a595557f4b16986f0aa580a5ec9949bc2

                    SHA256

                    b22bd62a1aea0eba60bb2d073153075e3c02350d508aca873541530f8799a9df

                    SHA512

                    5a8e75203c3c098050f4e064a03d1f1f48e522dd6a07fdc6b7e2ac0d0f5b34ffaeda0b9e76c741d053e216c99818cf36679111fd3546e18e51ce0e921ddbf434

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                    Filesize

                    10KB

                    MD5

                    9294398f59efb943a072d80b3e4a58e0

                    SHA1

                    dc1754314560a476dc88f27d68ba86230f8ebade

                    SHA256

                    176417047c27a155d11dc9c98cccdffc668e03f0d1cd075cfda33dbc1a7d3b34

                    SHA512

                    0ce8ca3de2a3d2b6b96cd1934f1b3d15ea6c2d06751f1b6ad7afe003d6f8427c6324b0b818e957c51e5138fcd744b7b837cb90b084a1c016d16df321f8d52175

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                    Filesize

                    11KB

                    MD5

                    c35bc36484e16d1b79d8ac7f27292144

                    SHA1

                    366d03a1e2a49e07beda29dcbdd1d860098f5822

                    SHA256

                    f099412b640b7f2297a5d08bb133b79ba84cc424830c4e212b0edb8e2adf924c

                    SHA512

                    9899d1e9e9884372e65cec3040f194a8feafa9bb671fa338cec5e5405912589374a4e99e6816a48bd6ba5dbce9e06aa103031cb001eecacf6038d98ff31f3eef

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                    Filesize

                    10KB

                    MD5

                    2da959eafc72373ae693787324da8653

                    SHA1

                    953dcaba16bdfc248366cdb6ee8421e6774dc15a

                    SHA256

                    9b4b25817f0b640a8a4fd7f7fd873c87ace6dd8aa9c1c4c9bb79a9b83e486ba0

                    SHA512

                    257c14395d73bfc99c5d95cc49c7968414b8e3c83058723dce0d55536e5a1ef3461698154c54ba4798b07cfb79bd4ce9bc4e0a80f80ab96fb3e6995bac71d53c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                    Filesize

                    9.6MB

                    MD5

                    1712d2910eb57863394c0c0f83c2a42a

                    SHA1

                    d5ff7fc3fd1d2449d0361bec8a5e706633c31b1d

                    SHA256

                    b3d9e41c8223e0133dbe80ef58566568013dc149cb528ffb187f00e4ef65978d

                    SHA512

                    f3cd878638e3953f3cc2154f0d5b6f81476924981f3fbafc88cdc3296eb0c8ae23958127f30a9fee821c8490ec92fadcf0797c149180ee1b6917beed5d64936e

                  • memory/952-64-0x0000000000400000-0x0000000000459000-memory.dmp

                    Filesize

                    356KB

                  • memory/952-62-0x0000000000400000-0x0000000000459000-memory.dmp

                    Filesize

                    356KB

                  • memory/1524-1-0x0000000077E14000-0x0000000077E16000-memory.dmp

                    Filesize

                    8KB

                  • memory/1524-0-0x0000000000FC0000-0x00000000012D6000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/1524-2-0x0000000000FC1000-0x0000000001029000-memory.dmp

                    Filesize

                    416KB

                  • memory/1524-3-0x0000000000FC0000-0x00000000012D6000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/1524-4-0x0000000000FC0000-0x00000000012D6000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/1524-17-0x0000000000FC0000-0x00000000012D6000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/1524-18-0x0000000000FC1000-0x0000000001029000-memory.dmp

                    Filesize

                    416KB

                  • memory/3396-57-0x0000000000A30000-0x0000000000D48000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/3396-60-0x0000000000A30000-0x0000000000D48000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4436-81-0x00000000004E0000-0x0000000000C16000-memory.dmp

                    Filesize

                    7.2MB

                  • memory/4436-80-0x00000000004E0000-0x0000000000C16000-memory.dmp

                    Filesize

                    7.2MB

                  • memory/4528-39-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-3369-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-496-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-3374-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-480-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-3375-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-16-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-3376-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-689-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-20-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-21-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-3368-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-3364-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-22-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-3371-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-38-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-112-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-40-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-58-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-56-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-1691-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/4528-2837-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/5016-3372-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/5016-3373-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/5264-466-0x0000000000A60000-0x0000000000D26000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/5264-491-0x0000000000A60000-0x0000000000D26000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/5264-488-0x0000000000A60000-0x0000000000D26000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/5264-468-0x0000000000A60000-0x0000000000D26000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/5264-467-0x0000000000A60000-0x0000000000D26000-memory.dmp

                    Filesize

                    2.8MB

                  • memory/5776-736-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/5776-697-0x0000000000E30000-0x0000000001146000-memory.dmp

                    Filesize

                    3.1MB