Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 01:42

General

  • Target

    file.exe

  • Size

    3.0MB

  • MD5

    0f7da6c048e4dbc41255caf9bc9556a0

  • SHA1

    7e006997fd3589179e09edb031d99bcbf0c1059d

  • SHA256

    ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe

  • SHA512

    51cba49a7325ff22dbc89cd478e1397d7abeab7667df514a89a857c3a12716b0227dbfb3c05ddc98f991aa4946efe6da9172fa4c22e920e27b9791eee2914d6c

  • SSDEEP

    49152:iToZmGOUyrXblt4wYEOZQnaKaSIR66eN/ql/:iTvvrXbltRNgQnaKt98

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://founpiuer.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe
        "C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4464
        • C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe
          "C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3744
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 252
          4⤵
          • Program crash
          PID:5108
      • C:\Users\Admin\AppData\Local\Temp\1003988001\84944931c3.exe
        "C:\Users\Admin\AppData\Local\Temp\1003988001\84944931c3.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5080
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 1500
          4⤵
          • Program crash
          PID:2976
      • C:\Users\Admin\AppData\Local\Temp\1003989001\8a1bf811fc.exe
        "C:\Users\Admin\AppData\Local\Temp\1003989001\8a1bf811fc.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2104
      • C:\Users\Admin\AppData\Local\Temp\1003990001\d5594c6bc4.exe
        "C:\Users\Admin\AppData\Local\Temp\1003990001\d5594c6bc4.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4944
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1388
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4640
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1644
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3940
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4300
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5056
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2104
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {716db8c8-ba51-42f2-9421-03b060943f08} 2104 "\\.\pipe\gecko-crash-server-pipe.2104" gpu
              6⤵
                PID:3484
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ed05213-9669-4eba-9bca-d4deab8de10a} 2104 "\\.\pipe\gecko-crash-server-pipe.2104" socket
                6⤵
                  PID:5080
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2904 -childID 1 -isForBrowser -prefsHandle 2896 -prefMapHandle 2892 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1320 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d73ac0b4-b2f4-4561-a7c5-4e8b83b0c8c1} 2104 "\\.\pipe\gecko-crash-server-pipe.2104" tab
                  6⤵
                    PID:4400
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3744 -childID 2 -isForBrowser -prefsHandle 3728 -prefMapHandle 3724 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1320 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f50b012d-817e-4525-9f01-d6796108c094} 2104 "\\.\pipe\gecko-crash-server-pipe.2104" tab
                    6⤵
                      PID:940
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4384 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4640 -prefMapHandle 4436 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff1cd5cb-c76e-494c-af87-1475cc39d2c1} 2104 "\\.\pipe\gecko-crash-server-pipe.2104" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5592
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -childID 3 -isForBrowser -prefsHandle 5420 -prefMapHandle 5456 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1320 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {652c8d94-f548-404e-aa54-f81497aa114a} 2104 "\\.\pipe\gecko-crash-server-pipe.2104" tab
                      6⤵
                        PID:5356
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5668 -childID 4 -isForBrowser -prefsHandle 5588 -prefMapHandle 5596 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1320 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {24d716b5-2a4a-4888-b06a-e15ae03da3b5} 2104 "\\.\pipe\gecko-crash-server-pipe.2104" tab
                        6⤵
                          PID:5300
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5872 -childID 5 -isForBrowser -prefsHandle 5420 -prefMapHandle 5588 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1320 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b5eed70-6a77-4529-8c06-aac6ff638fed} 2104 "\\.\pipe\gecko-crash-server-pipe.2104" tab
                          6⤵
                            PID:5228
                    • C:\Users\Admin\AppData\Local\Temp\1003991001\1d4a62ee27.exe
                      "C:\Users\Admin\AppData\Local\Temp\1003991001\1d4a62ee27.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2328
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5080 -ip 5080
                  1⤵
                    PID:1272
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5080 -ip 5080
                    1⤵
                      PID:4812
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2696
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4464 -ip 4464
                      1⤵
                        PID:3620
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:6084
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5560

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json.tmp

                        Filesize

                        24KB

                        MD5

                        15f3601764f7acab81b5d43ff9033c7e

                        SHA1

                        2c39d5477d31483d28f73c27e1c49428a4abcd84

                        SHA256

                        ef60e71f10f117a694a7e2a3be7d4d8a2b49a5efc0f5324ea3901f3ddbfa729b

                        SHA512

                        6b18844487ecff6d04ae79db98728f95db54366c3005345d39de438c4bad7c893d7735f678de3ccd6ae4586a64dd31567e654805699fad9bc283fe2ec5563eeb

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                        Filesize

                        13KB

                        MD5

                        0b66d86077f743886634054dd8794a4c

                        SHA1

                        8955cd2042f85a0bd9ee5898180637aa3ec4eb0f

                        SHA256

                        137f39a53b3fc53e57aa1a6d2e8f9936e0ac832028cc1076b90ff7a025a9abbb

                        SHA512

                        b2a44f41e4da990b6f331cb9761d86941fd37fc9653b1947c6fed8c70cb199e0ea6c69504ee8c39c62f44263133b0566231e614fa41b5e5d3d1102963eeb123e

                      • C:\Users\Admin\AppData\Local\Temp\1003895001\1123.exe

                        Filesize

                        1.1MB

                        MD5

                        d1629f3c794978e4a261000d117014dc

                        SHA1

                        b688470e41b98c49a4710c2b20b458d3bb50ef83

                        SHA256

                        97b18507cb1ab250f8d1669ce402d79fdbaefb530cce505aa995c861d8ebd946

                        SHA512

                        1abbb3141e2c3fcbbe2828c9e90dcbce460ce622b972ec57a0fcc236cbf709e454031d5e0bdc15aab96e83de3bcc0c2d625b1a610f72eafe9c7d3c25d168e006

                      • C:\Users\Admin\AppData\Local\Temp\1003988001\84944931c3.exe

                        Filesize

                        2.9MB

                        MD5

                        5f5c50bf4c446b27cd39d246c2c0cff1

                        SHA1

                        265fd87834f065a54a43b60dd19a9729c1d00db6

                        SHA256

                        2fbf7350015df86c082140d53d643764257809aa2c7ab4b891d738386eac04e9

                        SHA512

                        4d7edd48e9f79e4acbd18a95c4bda2326507faac9b2cdeaede3bf346056261573addbd1a0d9f55b0aa72209d62e95884ed4699a59ad2f86c01ac98a5cc11ec7b

                      • C:\Users\Admin\AppData\Local\Temp\1003989001\8a1bf811fc.exe

                        Filesize

                        2.1MB

                        MD5

                        7451a482de660b001df17c6bef776dc0

                        SHA1

                        e346631fab4d4ad4833d8ead0eaf7071c0346f9e

                        SHA256

                        75e0778aca3baa95da30a276d933e1fbcdba4a737edd2ff728d87001851dae39

                        SHA512

                        70fdf85efa3dd850a371350dbfa989ef8d47321ad56df8e1af144e39fc29a5ac74468c58feea21d764c42ca537c307ce012f91f67dbffb40b66a26095f779907

                      • C:\Users\Admin\AppData\Local\Temp\1003990001\d5594c6bc4.exe

                        Filesize

                        898KB

                        MD5

                        9b115bf4d4011015e00b3997587fbb86

                        SHA1

                        f9923d44a10b3883f229056861b5d61112c7cd4d

                        SHA256

                        c78cb74098375ca46f7b2ef17b469990fe38e3970efd00043bf11c6fc5899c73

                        SHA512

                        d7c774668d59fe172158807e2f968bead666c469f51056f850b8b62d010a15e83e5ce253b30cff26474d37dbc6d2afdde138a594f904682a2c5ae5e86b1b3c99

                      • C:\Users\Admin\AppData\Local\Temp\1003991001\1d4a62ee27.exe

                        Filesize

                        2.6MB

                        MD5

                        8e5640a17c14c2b2e39df7edf47dfc80

                        SHA1

                        e4bd1cf4379e33bcd2bab916186fbee650e93656

                        SHA256

                        5d2c47086a72c3aff69bcc2987ee2868118083021d1cf51c142a7b1a2bc3bd7e

                        SHA512

                        ebb8ab45b84a5aea0f39dd0b5934dfc333f7b4e47faeb7c4f3b72af8c69278f80a203a5f87dcb4aedc613f1f05fec8a3e89b3b51a6c8ad911d4a64ecd46d9af0

                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                        Filesize

                        3.0MB

                        MD5

                        0f7da6c048e4dbc41255caf9bc9556a0

                        SHA1

                        7e006997fd3589179e09edb031d99bcbf0c1059d

                        SHA256

                        ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe

                        SHA512

                        51cba49a7325ff22dbc89cd478e1397d7abeab7667df514a89a857c3a12716b0227dbfb3c05ddc98f991aa4946efe6da9172fa4c22e920e27b9791eee2914d6c

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                        Filesize

                        479KB

                        MD5

                        09372174e83dbbf696ee732fd2e875bb

                        SHA1

                        ba360186ba650a769f9303f48b7200fb5eaccee1

                        SHA256

                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                        SHA512

                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                        Filesize

                        13.8MB

                        MD5

                        0a8747a2ac9ac08ae9508f36c6d75692

                        SHA1

                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                        SHA256

                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                        SHA512

                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                        Filesize

                        18KB

                        MD5

                        6ececcab0ef20cf6543653e3ad580f04

                        SHA1

                        499926f23772faed20e07214e5625c8f0ada1a02

                        SHA256

                        6d83cdd7d6f6f44fb9837aaa14064827d0081b5e92fb1c6d32a9dc553ebcd74a

                        SHA512

                        292815af9ff435c550b5321c29961e834986fc3602fe59a19a334d7f6826bb17d32506dc581c9b6156e08ec84e9729d73ec78c21cc96ece02744215fdb4d5ae8

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin

                        Filesize

                        8KB

                        MD5

                        c9b363eeebf359e41167170c205fbad8

                        SHA1

                        7976de573b84497198140a85ec14e3d6ea3523de

                        SHA256

                        f3cd1fe8c1f165e092f669e2d3b88d472573ab1924e37fff57d7d5a53e611b53

                        SHA512

                        cf297da864f127fe64e3ab382ec2bab2acfa3fa0b3e3a6b151c39db517cf76bd3ef699bc630c47e33e293d2a537910b1e4ee7ecd050755b25c1eefa615325e2a

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        21KB

                        MD5

                        d0af5b9e5087d523e6fb2e95c47595ae

                        SHA1

                        3b985da13c34e1090b5efdd891b3560269654218

                        SHA256

                        aa95a80c11716c7506d89b00da59d79f078460068c03baad3bb7611d4d8ec106

                        SHA512

                        4043b2cad3a424244986e04e63ee7f7bdbfbf545c6ee05a58956a939f8180e88207c42bdd6b70bb464e1d769dae0b6a4a481a7263c526628e74ad77cfb7474c3

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        22KB

                        MD5

                        d9dee080a3ff4417e24eece6e36745a1

                        SHA1

                        346eae2a1b3c27a910628fe676704cee9054c656

                        SHA256

                        7db6005135c3ae51705606e8d64ef5ba986e54aee2f9b607909af5dfe968a133

                        SHA512

                        2227741d30e72418a856ed461631c37b426286b86a1033c282840fecfa2b1041ce9baed604d3708de6ec3f2d0a194a45cfcb60d2f1ef5572e0235ca8cda4351d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        25KB

                        MD5

                        c32d7bb7a55f5a8c741661daca492c06

                        SHA1

                        55bd6d0ae34b305c84f61d9118c367d4a5987734

                        SHA256

                        e0caa5ca0e71ec55e882510b11690591281e336dc71858ed67264af78248b776

                        SHA512

                        2969685d655dd5c3345c05956112164a480a47a97b7a78e2730155cf0408009508fa2700efc49f95acb90393d0ac74f4347a30114ab08504e1366029861d7163

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        21KB

                        MD5

                        ff6f12102401f24cceb9b99dfaf1e18f

                        SHA1

                        c40f1ec2ec57133a700ef99b8a0d5fe0176b97d9

                        SHA256

                        fdd69cc33ff92f44f6d9b0bc6d1ceed022a3ca59669f7d159384967278b13cc3

                        SHA512

                        786001919c883cc7f7ffb7ffcb169e79a6fc9ba4891093fb2a4eadbfdb1248eaeebe99e0c586a123d6842bca0a6ff86adc4c32e9c3524146f5da9b7fe7ddcff5

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\865f1695-d62c-4d10-9bf3-b96104071630

                        Filesize

                        659B

                        MD5

                        68b21a20bbb5fe4878407e8979bbd839

                        SHA1

                        17a200089c9e58474a6123887cff5f84a2799786

                        SHA256

                        a6e04da5677148320f5325d6bf18fa30269938c7429f4c1fcfbd8fdc31aedfc6

                        SHA512

                        de9a93720bec67800350d5131e2b94e0c6c700770cc694035766ab7612fd39109ffa5789dcb5956eacdbec74fb1f2817fbf61713b1d027be977dff350b95b88d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\9092bf2c-b8d6-4419-9b0d-1f32b5ed2fd4

                        Filesize

                        982B

                        MD5

                        2593e6e7ceb1e878d1a42d0b0ac1ebf1

                        SHA1

                        bde855ebc7b9ca1c087386daa66f7cc63c8f42d6

                        SHA256

                        523b930cab911025420fcb2e849259c010da7b58904f07fe8656bcda0fd1994f

                        SHA512

                        2cd6f3bca248099779ab48b5a1f5ebcf70e7e589037b6451808899ea109ee1f374192b5ac9a0633c595299f93abd42ad4aa25b5ffe61e69c58f1a76bc9082e11

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                        Filesize

                        1.1MB

                        MD5

                        842039753bf41fa5e11b3a1383061a87

                        SHA1

                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                        SHA256

                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                        SHA512

                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                        Filesize

                        116B

                        MD5

                        2a461e9eb87fd1955cea740a3444ee7a

                        SHA1

                        b10755914c713f5a4677494dbe8a686ed458c3c5

                        SHA256

                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                        SHA512

                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                        Filesize

                        372B

                        MD5

                        bf957ad58b55f64219ab3f793e374316

                        SHA1

                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                        SHA256

                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                        SHA512

                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                        Filesize

                        17.8MB

                        MD5

                        daf7ef3acccab478aaa7d6dc1c60f865

                        SHA1

                        f8246162b97ce4a945feced27b6ea114366ff2ad

                        SHA256

                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                        SHA512

                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                        Filesize

                        10KB

                        MD5

                        33b41ccaad062e115cbeb472ede750cc

                        SHA1

                        26cc41e3804878fc317bcac07164ae86d78b9c0b

                        SHA256

                        a06a6f792e8089c52039975029de6be546e688126e5379a87cc2e394da5825b1

                        SHA512

                        68d0f26df5eda0cfd5c78c44378ba90005d11b29fa9412de893f4a49794f49283a5ef9f8465efe2e0b9b3875638b7bec5bf23aede340125695a4af06f64bd1b9

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                        Filesize

                        11KB

                        MD5

                        d8dde7f03e5726fd61c7dc5a3d8255ff

                        SHA1

                        44ccd2d2ea0b534cb9ca4a0db0cb9f9c643d7ad1

                        SHA256

                        d2dc5fc3f41d8eae28f8139b860fd5a4df1c07c5fd04e6707abc0a020abb5c9b

                        SHA512

                        23c6df3c1d5b822ba0633927bc7de1de6c7937d07d8b039598c9021c558aa273dfcccf889356a7b48dc897224635b6590308ace9d4551b3ac556ddb1b17b5463

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs-1.js

                        Filesize

                        15KB

                        MD5

                        2d81e016507350baec9de52b490e957d

                        SHA1

                        e46dd539e8a6313a66b0458490ef3afb579ad090

                        SHA256

                        4e830a020a031d5087cf3db8df40be5b7642bbffa0a0503a6a1ff81b75066b0d

                        SHA512

                        2c4f0ce3af10600bf420691d7cc51bd798c4fb0788ccb4f1957a5c67fe78f1ca29d75b0051bb0a78b306276b74f2c9c5d111c8dce3c6022bf0dfc39660e1c78a

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                        Filesize

                        11KB

                        MD5

                        925dbf0f8a2b07f8cfaa4bffadc26a6d

                        SHA1

                        1b295b6f7784b0c581a7be76694cacab7004504b

                        SHA256

                        175dda38f41fdaceb6ac9a0a33dd971723b5d6a3cef152607d0836c7ba28010d

                        SHA512

                        59306925577de3fb1c9ca33e427d72e552306fd62f33cac2c10cedbbc47e0d2b5a7b07e3c93290ca713dc7ed840e04ffd87d4dc45d70027b2fbf63e99654ecdd

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\prefs.js

                        Filesize

                        10KB

                        MD5

                        0fed9eefdd8ceee9d1a60d9d9a0f6206

                        SHA1

                        f77dd7d50192e156e341f8c7883dc879d9c5226e

                        SHA256

                        092502da28ddd05ce98c6dbcf08c8ef5f5b4db94b1f1f38600205c310b018eb2

                        SHA512

                        3ff5ed6f4ff26aff37c1f61c7f537633679777982a63eaf86039f51b1919fc2a2883b1adafe02409d81f573930334eb7e93d2dd05ba13f49c0957043eb472be3

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                        Filesize

                        1.8MB

                        MD5

                        370d47911a900ddb51636b9c54a31497

                        SHA1

                        03e50d433fcf2283cdb60484e948d6353f6282d5

                        SHA256

                        17434a99abe09edc769b00ff9adb97cce319754556187550b2570af7ec16ec58

                        SHA512

                        feecddbb3e9efbfbdd092729f6714b3dcc44031076575336ecd8d457c8b113361b788b780263098634f1c50680e27199874e3c14e8b043c9d189f761045a2bd2

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                        Filesize

                        2.5MB

                        MD5

                        a4fd98b63ecf6166900c0f9cb84384c5

                        SHA1

                        4957f20f1b61f34fd7542c6926ab237bcdb0565e

                        SHA256

                        83bc5ff3a35ad18dd9d4ae22cf169cdffa53bcba9fdf38ea2a2dae003119f623

                        SHA512

                        bae185bcda8e0a11efef74da2709daeca39792643109fb368ff3cff9dd2cfa7031901e1707d500ad4eb28615af05fac5aa5cef1b0639f5cc95a274eed161375b

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                        Filesize

                        2.9MB

                        MD5

                        904b1857926e0cee9d6874619c5c60fa

                        SHA1

                        57ad675768e1dddb7ce4fd1bbefe49f9266b4ce0

                        SHA256

                        fe4556ccdc03b4e5340d477f8aea093aac0e3f37cbe0b721cde033f1d9ab711e

                        SHA512

                        4ad5edff304d190e1335d1e4e64bf192547334ba929fbe61722c99b366ffc57d5c4533eb0aec15c7ac2be63d4fda41d5cded72bd16b6066c34315bba4bf3e18f

                      • memory/1548-3-0x0000000001000000-0x000000000130F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1548-2-0x0000000001001000-0x0000000001069000-memory.dmp

                        Filesize

                        416KB

                      • memory/1548-4-0x0000000001000000-0x000000000130F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1548-0-0x0000000001000000-0x000000000130F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1548-15-0x0000000001000000-0x000000000130F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/1548-18-0x0000000001001000-0x0000000001069000-memory.dmp

                        Filesize

                        416KB

                      • memory/1548-1-0x0000000077A04000-0x0000000077A06000-memory.dmp

                        Filesize

                        8KB

                      • memory/2020-21-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-1921-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-19-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-3395-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-3391-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-3388-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-39-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-469-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-3387-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-2928-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-486-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-17-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-103-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-2380-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-55-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-20-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-37-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-1455-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-981-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-56-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-688-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2020-38-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2104-75-0x0000000000110000-0x000000000084D000-memory.dmp

                        Filesize

                        7.2MB

                      • memory/2104-73-0x0000000000110000-0x000000000084D000-memory.dmp

                        Filesize

                        7.2MB

                      • memory/2328-485-0x0000000000EA0000-0x000000000114C000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2328-323-0x0000000000EA0000-0x000000000114C000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2328-319-0x0000000000EA0000-0x000000000114C000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2328-130-0x0000000000EA0000-0x000000000114C000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2328-476-0x0000000000EA0000-0x000000000114C000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2696-79-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2696-102-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/3744-97-0x0000000000400000-0x0000000000459000-memory.dmp

                        Filesize

                        356KB

                      • memory/3744-99-0x0000000000400000-0x0000000000459000-memory.dmp

                        Filesize

                        356KB

                      • memory/5080-77-0x0000000000240000-0x0000000000558000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/5080-57-0x0000000000240000-0x0000000000558000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/5560-3393-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/5560-3394-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/6084-1757-0x0000000000F60000-0x000000000126F000-memory.dmp

                        Filesize

                        3.1MB