Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 05:48

General

  • Target

    file.exe

  • Size

    3.1MB

  • MD5

    112cf61b5fdf72b3996262baecbe9fef

  • SHA1

    eb1e4b94cc3e8f6dbe425473526154802d126e8e

  • SHA256

    23621d59cc4f6e323e95e9f17ad90e380b71964b28f4b669f1038289dc9f2131

  • SHA512

    a093ea6ad1134509c1650faa25372f5986751d36aca5fd558a5b5958e29bd449ef78ebdacba399d01ebd22466fff64948a225c8239a795fb3e8893bd3db60b94

  • SSDEEP

    49152:kO432MbH0Py+DUQDH2DJTd6P5Po4HxlRrd9MH:kOI2MbH06+Df7uJT6z7

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://founpiuer.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3152
      • C:\Users\Admin\AppData\Local\Temp\1004029001\25e9c12870.exe
        "C:\Users\Admin\AppData\Local\Temp\1004029001\25e9c12870.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1572
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 1504
          4⤵
          • Program crash
          PID:4460
      • C:\Users\Admin\AppData\Local\Temp\1004030001\728b4e9de0.exe
        "C:\Users\Admin\AppData\Local\Temp\1004030001\728b4e9de0.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4628
      • C:\Users\Admin\AppData\Local\Temp\1004031001\09fa72272d.exe
        "C:\Users\Admin\AppData\Local\Temp\1004031001\09fa72272d.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:832
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2972
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:700
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4004
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1900
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:2828
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4944
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d07b69c-3b92-409e-abe3-caf78407b753} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" gpu
                6⤵
                  PID:4932
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ecf24f6-f590-417f-8882-51aea8387333} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" socket
                  6⤵
                    PID:1532
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3008 -childID 1 -isForBrowser -prefsHandle 2988 -prefMapHandle 2984 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {05529e64-7e67-43b4-a410-0cd26da008c6} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" tab
                    6⤵
                      PID:4460
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3532 -childID 2 -isForBrowser -prefsHandle 3628 -prefMapHandle 3624 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {26cec10b-3a9c-47bf-b35d-ccfd79b353cc} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" tab
                      6⤵
                        PID:5004
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4564 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4796 -prefMapHandle 4792 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4837b022-3866-4233-9108-c5e8154e7ea5} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" utility
                        6⤵
                        • Checks processor information in registry
                        PID:4076
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5332 -childID 3 -isForBrowser -prefsHandle 5224 -prefMapHandle 5236 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b7b02155-5310-4dfc-9867-be3df5bc8335} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" tab
                        6⤵
                          PID:676
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5712 -childID 4 -isForBrowser -prefsHandle 5704 -prefMapHandle 5700 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef32ad06-606d-499f-8e41-7b4c5a739568} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" tab
                          6⤵
                            PID:3644
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5856 -childID 5 -isForBrowser -prefsHandle 5692 -prefMapHandle 5932 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f52962ff-ba63-45e0-b47e-e736253fff4e} 4944 "\\.\pipe\gecko-crash-server-pipe.4944" tab
                            6⤵
                              PID:3704
                      • C:\Users\Admin\AppData\Local\Temp\1004032001\262c7466e6.exe
                        "C:\Users\Admin\AppData\Local\Temp\1004032001\262c7466e6.exe"
                        3⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5780
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1572 -ip 1572
                    1⤵
                      PID:4944
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5760
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3528
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2776

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json

                      Filesize

                      24KB

                      MD5

                      53a4835df1f73a1211141cf0afa16e18

                      SHA1

                      a9463a7394ad68d8f8e14188b08b8ba185e0f682

                      SHA256

                      0739d177e27ebebda9b4dea6764c34fd521d8053441d87d42a6d2f9fe2b7f773

                      SHA512

                      15b6ed9d983d694ad57fb26a039315e262b664020d0ada5edc18f65dc925797579d14b3e8e448d01a5b71cacb39da077866bdcaab996f1664ab22ff5572112a0

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                      Filesize

                      13KB

                      MD5

                      ed9b946eda84193323d985715cfe9d39

                      SHA1

                      b896e31fc2f4140275179cf67c35f68d4a22095e

                      SHA256

                      b47bda0fbab56d607a7dee6e5680ff846cc1bc647ff607b43577abf3a10858c8

                      SHA512

                      579fb9a000ddc221f4002a1711755c82acba8e841e01f32de80e7124385f1a8d0f4d87f4fc8bf1ba3fa8c9e71c5dacb1dc667d35918128aa7cd524e02c603015

                    • C:\Users\Admin\AppData\Local\Temp\1004029001\25e9c12870.exe

                      Filesize

                      2.8MB

                      MD5

                      fa9cb3030ba1bc095ac7f84ece81159d

                      SHA1

                      178a344a4e41bb66d1441bc1a70f6444defe8c3c

                      SHA256

                      4e456175bc7e71209b47ba72449f2ec31719cbd9e64387b77d0f5d819747b68f

                      SHA512

                      5dc0888468ee7a4b92205eb2fec33fe39b9913d375ed358fa01e72d2161e4f43783aadcda79ce0eb577a86b2306dbb6c31b541dbd0dbaa4fc069cae439973894

                    • C:\Users\Admin\AppData\Local\Temp\1004030001\728b4e9de0.exe

                      Filesize

                      2.0MB

                      MD5

                      649b30a03ce978366e6c5189a1f3ce1c

                      SHA1

                      0815ec58e255ac4659fc5cc62438ef009955b6e9

                      SHA256

                      935236bed1b5f179782f75b32cf4a7e66fafba9b9e3b4be4bacd2f1ad2cef8ad

                      SHA512

                      7381db1186e171e294e3449f3478b43e2f96706565b4ebfb2e224441259388382d114d225147d44a7fd9036926e54ffdc7d905d163dc06dc4fd8ab98bb1b774b

                    • C:\Users\Admin\AppData\Local\Temp\1004031001\09fa72272d.exe

                      Filesize

                      898KB

                      MD5

                      8ca4b0a008e0bb5cb6530bfadacc876c

                      SHA1

                      b2c906d580a640acafe788265afb4ec6c8d50ddf

                      SHA256

                      4046e003425711a55d624a7a89eccbe7354ae09e580754f3b0444bb822e4964a

                      SHA512

                      0d77e6ce39a0ba185c64d28c92607ef37fd3842e7fd06b7ff2e7ee29a822eecc09c6f367a918f4ea73a69681394316258cfefe4f03736c8bd5ce86f28a4ef29e

                    • C:\Users\Admin\AppData\Local\Temp\1004032001\262c7466e6.exe

                      Filesize

                      2.7MB

                      MD5

                      5af3ca07cc3dbc6744663fbf0e653a8d

                      SHA1

                      7e0d1b266e3e1bd2f511d466ca5f00338e9b6332

                      SHA256

                      5862865799f158dce084650d09013e4070d89fdc3e3c01ddb6e6213124a76ef4

                      SHA512

                      5af1146bfc9b7f2b8b3cdd37d0b676b22c0ad3c9fb3eb88c9d60350ffebcda18fb1b5ccfae2616d235ff1e09ff5ea5e10c44919e71f84e131d2c2525808a974a

                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                      Filesize

                      3.1MB

                      MD5

                      112cf61b5fdf72b3996262baecbe9fef

                      SHA1

                      eb1e4b94cc3e8f6dbe425473526154802d126e8e

                      SHA256

                      23621d59cc4f6e323e95e9f17ad90e380b71964b28f4b669f1038289dc9f2131

                      SHA512

                      a093ea6ad1134509c1650faa25372f5986751d36aca5fd558a5b5958e29bd449ef78ebdacba399d01ebd22466fff64948a225c8239a795fb3e8893bd3db60b94

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                      Filesize

                      479KB

                      MD5

                      09372174e83dbbf696ee732fd2e875bb

                      SHA1

                      ba360186ba650a769f9303f48b7200fb5eaccee1

                      SHA256

                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                      SHA512

                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                      Filesize

                      13.8MB

                      MD5

                      0a8747a2ac9ac08ae9508f36c6d75692

                      SHA1

                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                      SHA256

                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                      SHA512

                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                      Filesize

                      18KB

                      MD5

                      e63091c049cab61d75d7ba67159657f1

                      SHA1

                      9da5449c38312b54534ae9d734c1d73bf8a84435

                      SHA256

                      5810075aaccd80b55806ccb1258b47056b003436700f730ca42ce41c54bd4aed

                      SHA512

                      a81f02b636f2ef4c7362a27c84b7b7ae2c27a1e31581de5cba2a0f3542db325315305c031dbd7aa223455efd6ed9e70db12ff11d47cf36b6983907daaa38c149

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                      Filesize

                      8KB

                      MD5

                      41408726a595ab75270eba8c82b6d5ce

                      SHA1

                      0a4dcdd1badb79ae8693bfe3c8f8f376398ba979

                      SHA256

                      4608ff7fa67e1ae85928bd9fee2ce1de0ce0da23bc6c565a7b5a83cf7e50394e

                      SHA512

                      7fca044967acfc288f6de4425bf113d24a3beb807719049cc1cb603f6c72a9fc45f7c9b846a727d21ea8b5a2b613186af9f95c3373d9797dc26b59c2a58b1825

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                      Filesize

                      13KB

                      MD5

                      b6d64f5f0c65d518e72163e316d02419

                      SHA1

                      4347853fd93e335e7ad022161f403a63cb70b86a

                      SHA256

                      1efaceaeed7d81e1caba94c3f0f4989c93c02576acf89f4adeb238fd7960ec4a

                      SHA512

                      82966d8a60bc01a4770779aa4272015ee39d48d7bb64b23a3f434a290e74df1d1f1c570013fb199f8fe57cf63e0dcb5554accee8207eb3f1ad93473a412f1242

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      5KB

                      MD5

                      7dcec51baf9025b88cf4737883d00072

                      SHA1

                      b519627b32394ef7b2a8f569336cb89168b2d0aa

                      SHA256

                      36f0ad437169c0eca82b4ee23b0b6ce54ca68de9af73b54d920d1fca2256b8ff

                      SHA512

                      24067570a9205f9a49cdc2d6df29e76fe412932e1b494a2452aaabdb8525cf417ba609da0f8d668c4651e762dceef745e87e6864317e36b647d0b11ae00b659b

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      15KB

                      MD5

                      919624f75191ef392adab39abb135693

                      SHA1

                      538d2a8d8a3f3f5d9d6850e2ed460ad96e3c87bd

                      SHA256

                      7a578b4a544dd4d7a1c867869338150ff0bdc4b908e94f64c3d20b2127b23c25

                      SHA512

                      2573f134d1adf3b7e1377525d7cf6f7f72b5ae50b7315d074447a1aa05c584ee9b95489044a8e272283a191d801f751d6406683adca6d05a02739d1418b15405

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\3d7af2da-9239-4b4c-8146-7c685cbe8332

                      Filesize

                      671B

                      MD5

                      7074e330f54d14d4c373f684572590bc

                      SHA1

                      279e6c5dbd72cbd1f04d290b29a2d9ebc7250f00

                      SHA256

                      a872f54f0d34e70913bb0056343133c415d6140a4a20579db36e6744ab9dede0

                      SHA512

                      612436943af573390c0ef14c22c391fb2bb936081e49beeb6dda5d6c50af845831b7235d193e9ef92a108ae6d87d5a6b718a730093e9b13429a1c4611f01725e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\42077910-6802-485b-861d-78e6a2c584bb

                      Filesize

                      982B

                      MD5

                      b3e6ffe60f2fbf6f7ef061d063795fb1

                      SHA1

                      225b6957b6d8c075b0d982f1192d3bbd41be3143

                      SHA256

                      5d8d5645693468d43434373db6c379e2e9166474a6b8506d0b3f64ab8949074b

                      SHA512

                      78b4b65cbde2868cc3ee8845f9df4f83b79cce9064ffcb2022804fc0c237546307100469b22657ba926cdd0aaaec0ab0d1b619aee76fd336dd83cbebd8c6cd87

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\ad00745d-8f33-414a-bfb5-3ada93216a23

                      Filesize

                      27KB

                      MD5

                      72f93bfdf5325f57acddb57941e0359f

                      SHA1

                      47f7f684db13c5a166f31d582449fd6dafdf4f1a

                      SHA256

                      5c547201437de4227f623755036542cc5d6657b672c8a162d6dc1fbe32f871fe

                      SHA512

                      e6b570f044db6d610295af57500c0b138460d009c3a5c120a38e09e4a1b775eb0d3033c7bfa0a92fe7e3dcc28a214894e8b36855b76e3c09e6f89305cc9b7bfd

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                      Filesize

                      1.1MB

                      MD5

                      842039753bf41fa5e11b3a1383061a87

                      SHA1

                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                      SHA256

                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                      SHA512

                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                      Filesize

                      116B

                      MD5

                      2a461e9eb87fd1955cea740a3444ee7a

                      SHA1

                      b10755914c713f5a4677494dbe8a686ed458c3c5

                      SHA256

                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                      SHA512

                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                      Filesize

                      372B

                      MD5

                      bf957ad58b55f64219ab3f793e374316

                      SHA1

                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                      SHA256

                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                      SHA512

                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                      Filesize

                      17.8MB

                      MD5

                      daf7ef3acccab478aaa7d6dc1c60f865

                      SHA1

                      f8246162b97ce4a945feced27b6ea114366ff2ad

                      SHA256

                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                      SHA512

                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                      Filesize

                      12KB

                      MD5

                      147211e77266ce74d61aa2b9b250386a

                      SHA1

                      06e502e3b7f3ea1f3c6d83a56a41b48e27dcf0c5

                      SHA256

                      16f9ac1ae6dc5990624e1dfc31554ffa394b31123bce7346dcb4a9394971f877

                      SHA512

                      6389060dcbde09dbcbd84d0afdfc814990cfb8e78aadc30d4d124fcebaa7f170acf83cabdce79b0ad732e3fa3adced14b8f096abf6cff971f76dd8aee1a77e82

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                      Filesize

                      15KB

                      MD5

                      214a959e2ecf051524631e49e2ae389b

                      SHA1

                      433f723673b2520e9f21d50f9eda4fed8b8e26e2

                      SHA256

                      01541878f9d184bdb6264b1e941e33ed6a4834002762b5cca3f1157ac01ce551

                      SHA512

                      4229fb7f20fa857f0887de9288e35dc38f42c0f263f1b1b750dd17db62f53da94395b1cc193fea406c6cc119ca8c50661a8b4c46209bb81028bd9f79b4070147

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                      Filesize

                      10KB

                      MD5

                      1ba2c3cf93679a8c39b9d9c0adb66759

                      SHA1

                      6cc1c54ef8a2670f303d04ec04ecf84ad9dfbef5

                      SHA256

                      a2dc7ab41484afe0d95e159fc0bf7221a800339127807f5f0ba407093609816d

                      SHA512

                      b77b5fdeca7182c8ceb733b918b5c064459269063b343e01feaccb16aa49ac5774c06317212d4071d32273673cb042e5c2a4e9e5b59bc19f5fa495649238e0c1

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                      Filesize

                      1.8MB

                      MD5

                      8bc44d242362cfc74c6b83e90434cd8f

                      SHA1

                      352c3ba43bf30dcb1116ec2d973aeb39d863b6af

                      SHA256

                      89c29a55b7588d67e648df2217d12dac3085449f36e1c312d5be13a4d97ea0d4

                      SHA512

                      620d7646b6e7e7c1bfb222690cc4ca735f5e43bda75e123dd1e4e604020c97de0482e671f9d6f8832480ca5d672754ea07ffb36a61e74e1a9cc07ede090697dd

                    • memory/1572-44-0x00000000007B1000-0x00000000007D9000-memory.dmp

                      Filesize

                      160KB

                    • memory/1572-65-0x00000000007B0000-0x0000000000AB8000-memory.dmp

                      Filesize

                      3.0MB

                    • memory/1572-42-0x0000000004F90000-0x0000000004F91000-memory.dmp

                      Filesize

                      4KB

                    • memory/1572-43-0x0000000004F80000-0x0000000004F81000-memory.dmp

                      Filesize

                      4KB

                    • memory/1572-40-0x00000000007B0000-0x0000000000AB8000-memory.dmp

                      Filesize

                      3.0MB

                    • memory/2764-17-0x0000000000E40000-0x000000000115B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2764-18-0x0000000000E41000-0x0000000000EA9000-memory.dmp

                      Filesize

                      416KB

                    • memory/2764-3-0x0000000000E40000-0x000000000115B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2764-2-0x0000000000E41000-0x0000000000EA9000-memory.dmp

                      Filesize

                      416KB

                    • memory/2764-0-0x0000000000E40000-0x000000000115B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2764-1-0x0000000077704000-0x0000000077706000-memory.dmp

                      Filesize

                      8KB

                    • memory/2764-4-0x0000000000E40000-0x000000000115B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2776-3290-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-667-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-22-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-23-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-3288-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-3282-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-3281-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-468-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-3280-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-3279-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-19-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-3278-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-21-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-3271-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-56-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-20-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-45-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-41-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-443-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-39-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-2290-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-2919-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3152-3264-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3528-3275-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3528-3277-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/4628-62-0x0000000000CE0000-0x0000000001408000-memory.dmp

                      Filesize

                      7.2MB

                    • memory/4628-63-0x0000000000CE0000-0x0000000001408000-memory.dmp

                      Filesize

                      7.2MB

                    • memory/5760-464-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/5760-463-0x0000000000B30000-0x0000000000E4B000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/5780-327-0x0000000000310000-0x00000000005D2000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/5780-396-0x0000000000310000-0x00000000005D2000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/5780-397-0x0000000000310000-0x00000000005D2000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/5780-467-0x0000000000310000-0x00000000005D2000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/5780-462-0x0000000000310000-0x00000000005D2000-memory.dmp

                      Filesize

                      2.8MB