Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 11:44

General

  • Target

    file.exe

  • Size

    3.1MB

  • MD5

    e35ed56f80a7af0634754dfecd4195ef

  • SHA1

    f6fea977c73c0eb49527c92ee98bde249ec6fc93

  • SHA256

    d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c

  • SHA512

    4a8296090a6d392512f60c26b9c0209079af8cd02daf951e7a079eb13eb687dbcf40b2a936564cb6ba999f5f959e174c756c120f1e172b7d59a517186f7db431

  • SSDEEP

    49152:7qBqsKm7aqtAChDwviQSLzaQvrVtzqy2S0tG8dBP4:7qkLmmq6ODwviQ2aQv5w93M2B

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://founpiuer.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Users\Admin\AppData\Local\Temp\1004053001\DLER214.exe
        "C:\Users\Admin\AppData\Local\Temp\1004053001\DLER214.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2532
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 1676
          4⤵
          • Program crash
          PID:3716
      • C:\Users\Admin\AppData\Local\Temp\1004090001\DLER214.exe
        "C:\Users\Admin\AppData\Local\Temp\1004090001\DLER214.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 1676
          4⤵
          • Program crash
          PID:1840
      • C:\Users\Admin\AppData\Local\Temp\1004091001\9ed9ea3006.exe
        "C:\Users\Admin\AppData\Local\Temp\1004091001\9ed9ea3006.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4760
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 1468
          4⤵
          • Program crash
          PID:3900
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 1488
          4⤵
          • Program crash
          PID:2328
      • C:\Users\Admin\AppData\Local\Temp\1004092001\cdd01f9bb2.exe
        "C:\Users\Admin\AppData\Local\Temp\1004092001\cdd01f9bb2.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1976
      • C:\Users\Admin\AppData\Local\Temp\1004093001\3ca9f1c87e.exe
        "C:\Users\Admin\AppData\Local\Temp\1004093001\3ca9f1c87e.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2340
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:964
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4612
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4676
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3860
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1212
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5008
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4260
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {14839c50-4d45-423d-99b9-18241d2cdcab} 4260 "\\.\pipe\gecko-crash-server-pipe.4260" gpu
              6⤵
                PID:4620
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2e720f1-0c42-4052-acb2-8bdfee70fe7f} 4260 "\\.\pipe\gecko-crash-server-pipe.4260" socket
                6⤵
                  PID:4728
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3048 -childID 1 -isForBrowser -prefsHandle 2928 -prefMapHandle 2920 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {78ae9ea6-7914-42e7-a0db-fe4dd1d5b417} 4260 "\\.\pipe\gecko-crash-server-pipe.4260" tab
                  6⤵
                    PID:4616
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3928 -childID 2 -isForBrowser -prefsHandle 1240 -prefMapHandle 2600 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7f9745d-4d68-4a67-b685-df0a1bcd8993} 4260 "\\.\pipe\gecko-crash-server-pipe.4260" tab
                    6⤵
                      PID:3900
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4532 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4564 -prefMapHandle 4556 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {287b49a9-a367-448a-a8f5-88be239fb65f} 4260 "\\.\pipe\gecko-crash-server-pipe.4260" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5188
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5756 -childID 3 -isForBrowser -prefsHandle 5760 -prefMapHandle 5764 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a8c3e6f-7e2b-4090-98a1-4d0e31550ac9} 4260 "\\.\pipe\gecko-crash-server-pipe.4260" tab
                      6⤵
                        PID:4080
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5916 -childID 4 -isForBrowser -prefsHandle 5872 -prefMapHandle 5744 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e23bbe31-b9aa-4ce6-ae6b-9eac928b0e3a} 4260 "\\.\pipe\gecko-crash-server-pipe.4260" tab
                        6⤵
                          PID:2008
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6156 -childID 5 -isForBrowser -prefsHandle 5916 -prefMapHandle 5900 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b575bb16-8f7c-4385-af31-7ed8345a9fbd} 4260 "\\.\pipe\gecko-crash-server-pipe.4260" tab
                          6⤵
                            PID:4060
                    • C:\Users\Admin\AppData\Local\Temp\1004094001\805ee1b275.exe
                      "C:\Users\Admin\AppData\Local\Temp\1004094001\805ee1b275.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4420
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2532 -ip 2532
                  1⤵
                    PID:1388
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1004
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3840 -ip 3840
                    1⤵
                      PID:4548
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4760 -ip 4760
                      1⤵
                        PID:2544
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4760 -ip 4760
                        1⤵
                          PID:2064
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:6048

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json

                          Filesize

                          21KB

                          MD5

                          39d5c61817a8c7d1c85d09211e7eae1a

                          SHA1

                          94f50850a6b2f3d2eeba22d3a896b42e183cbc1d

                          SHA256

                          558fdb5717bb1ce2de2b20f5363eec10976b0db963e65da8a20c486ba45d9364

                          SHA512

                          f782fedf42780539edaaeab6ae518137e90aa109a721533444645194d5978ba50d7d3babcfa25780ee181ab00bce260a1c1f897e5d055b59bc57e679e57af9ea

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                          Filesize

                          13KB

                          MD5

                          f3880ed11fdc8fe1c23ee39ec1a223a5

                          SHA1

                          b6ded1e9d32ef9693c25a1d120cd9b3150f6371e

                          SHA256

                          03705cd6f709391eb3ffd198806d00dc8109776daf8ea2e1d099b3a8f0a6f443

                          SHA512

                          7baf32a8c3d7fd1f08010da9630f071800e29401dea8f19c0bfdb419c2ff4d2c91318454709a0624d317caf9160fca51ad19daf41906643d18f47af8a9413cf4

                        • C:\Users\Admin\AppData\Local\Temp\1004053001\DLER214.exe

                          Filesize

                          16KB

                          MD5

                          54ec587044fdff4bfd0029946041a109

                          SHA1

                          242cc5fdd5c75a02776f1f5e526cc42cf138b313

                          SHA256

                          e666b2644c35f564041ad18c5125f1677255f05421ad18785aed42bfb3ac5adf

                          SHA512

                          6e2c9f3b3850c021b0db78af02f37e6fe1b32bd046ba5767b0499f2c4af11586e167c80235258b5536bcfece567a18f2e2eca6a107e60d5efb62a65175049046

                        • C:\Users\Admin\AppData\Local\Temp\1004091001\9ed9ea3006.exe

                          Filesize

                          3.0MB

                          MD5

                          c4aece08b50819dbb642d0e4478c0921

                          SHA1

                          a79e8c4f6c1c880e0d8bf95d3e4618e5e1b9bc2d

                          SHA256

                          6163126132b59b1178d2a9eb5dd0228694cb573bf6f96f54c2f04168f467d62f

                          SHA512

                          77b6a94f4fe388a38ae4ae3ab67520a15ab4640328ffa80c22246708c7d0e08b784be7fc93112d21a77721b7f3761d948b2f32102a050fc39280d87be59c0f8c

                        • C:\Users\Admin\AppData\Local\Temp\1004092001\cdd01f9bb2.exe

                          Filesize

                          2.0MB

                          MD5

                          633f9512e18ffeee9daf308fc33c080c

                          SHA1

                          2b18defa7720c46b847a3e81c67296fe5b4e3efd

                          SHA256

                          63d5dae30a2008d6a858e421ed4716c83b4aa8677c56d804e1ef96086ecff920

                          SHA512

                          247e92acf56bcd8dfdaa6816cdb565efaf9e02d2a5b71cfeae700168390fd6bad0fb27dde7371a6baf51bb4398222941f1c9e75c2bad2b9d115fd301919aa5a4

                        • C:\Users\Admin\AppData\Local\Temp\1004093001\3ca9f1c87e.exe

                          Filesize

                          898KB

                          MD5

                          6e818c89174827e4a5c36de1216f081e

                          SHA1

                          bfac04adc78b44a8efc1619baa46d5cc36d485f1

                          SHA256

                          8238429796bbdab49f921d92fd1b071c62700bec068ed440cc1b9ab2348a0897

                          SHA512

                          7b19b16c2a9e88d26bc76fda789515774cb84a57117f58f0c325414a2e5245aa7f517c2424314bfbcd3d83725b0ea963309d48000d3f43a59d9ea0e5e14485b1

                        • C:\Users\Admin\AppData\Local\Temp\1004094001\805ee1b275.exe

                          Filesize

                          2.7MB

                          MD5

                          50567a2990018c5890d1abb622c5051f

                          SHA1

                          2507d8b3fa3b09134162ca262d08d31c2a9a453c

                          SHA256

                          f3069d8eba64f1512f1e560a09a3274aec35ccb0af74b55500c255322fa4c7d1

                          SHA512

                          42475c1f1aa64999fe4ba8c293c48196dc0705066f7f009f0efcc41cb488dd6a9034366efedc01e48620ef9e3fa934c06b9d0100cd549d63a3d22f0f15a2604d

                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                          Filesize

                          3.1MB

                          MD5

                          e35ed56f80a7af0634754dfecd4195ef

                          SHA1

                          f6fea977c73c0eb49527c92ee98bde249ec6fc93

                          SHA256

                          d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c

                          SHA512

                          4a8296090a6d392512f60c26b9c0209079af8cd02daf951e7a079eb13eb687dbcf40b2a936564cb6ba999f5f959e174c756c120f1e172b7d59a517186f7db431

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          479KB

                          MD5

                          09372174e83dbbf696ee732fd2e875bb

                          SHA1

                          ba360186ba650a769f9303f48b7200fb5eaccee1

                          SHA256

                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                          SHA512

                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                          Filesize

                          13.8MB

                          MD5

                          0a8747a2ac9ac08ae9508f36c6d75692

                          SHA1

                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                          SHA256

                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                          SHA512

                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                          Filesize

                          7KB

                          MD5

                          bef61daf2477bb3410ed19b1267c0376

                          SHA1

                          e779adece209773ca3d59501fd7afd9c91da8880

                          SHA256

                          269dd55702a95f2e8ca386b6a867558021a1bb2e4e59cc26d06f79cdea018c1a

                          SHA512

                          c486b6bc8ffba019ac74dda9f5ba8baafd0cc61d8d9e5396bdab5467ee2f7e2fd88c951ab08e3712522c16e95223d57ec50e577e85b830dd7176b162b28f0b21

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                          Filesize

                          13KB

                          MD5

                          b27d89aa59f977436643b1f02b6ee6df

                          SHA1

                          60728d15a33ed9b198dbd393d04d85c0e4993f84

                          SHA256

                          08e43bf2e3ceb4ede634310d0d60462fbc3f3bb5c155aecbe80777c7ce5e51d8

                          SHA512

                          aa7776002f196390dd4261590890992374e8fd5b48ba2bfb74c9ad9b9ad184e6f4885317a269bcc8e0496a8f70a13f5c1d38c991aab3192086ea55265143e32e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          3161642ce408a966828b94f957236eb2

                          SHA1

                          3275e9336e360ffed3ea51ca117ab505cc8f782a

                          SHA256

                          f986a2987985e10b233e79f8f17b05a6ad4fd8e5bec7b37111c525589e9d6af1

                          SHA512

                          2511217a5cf82effd3cdb77529fd27fc0e26e05001ab4d08242d940816c450dcbd0df358887a52f18ad137f1e4cce288087a235a68025710b0e3fecb10e8f6c4

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          8e97311146490d32d34a1b2b85f00c6f

                          SHA1

                          e02026b1c6d551e255b14167f8be9e58d296545e

                          SHA256

                          e20b12c90b056c36ef8981fe8b82f7b5f311bda8d8f05fbe142a49085890dc81

                          SHA512

                          f370e3c50ecd47e77f9490760497f8c3f95179f99fc02404829ac312847b15aa9a21ccf81af844355f258178c937742a071231d6ae448f173406f98cbbb0f922

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          5KB

                          MD5

                          f00a985e93ae06ebbaeaa574602598a2

                          SHA1

                          bffbf44cb1e717566a956bb14917f7d8238553f7

                          SHA256

                          ba39d640510be31746aed30ab7ba3ae91a5392c8386c4f6d45f0e4bb28a9306c

                          SHA512

                          c3bafd28eecfb45b486ca163e3f4c7bafeb2e9b0927979b1bd6c88c8c5d138ba7761039848a29b98909a543590be30f19e14c5c7ed25fd0eff19df068ac7dbe1

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\17dbfd6d-42db-436f-9422-5611ae22292d

                          Filesize

                          26KB

                          MD5

                          e5f6ffc6c24c698dcaa4a220d62871bb

                          SHA1

                          0a08a882405ae56cc5d4c122060d34a0d8b2d71d

                          SHA256

                          8a5bcd8f211e4075617c4d37fecc16af57e8732d7e6bcf506ae53f2cad74e2ae

                          SHA512

                          c058afa59c7cbfc8a01038107c823f64b28bfd4b5487dfb6fe4d181461a06a4e619c6369a3704bd4cb63ac23bfac2abea0e46cdbdf4e7f3cec698e6b7556e835

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\7297c1bc-c2b8-4101-917c-fa05a6ad358c

                          Filesize

                          982B

                          MD5

                          885ad0359a4b38dd554999ecef6e619b

                          SHA1

                          ac7548c532435764bb68d0111c4f77a315099bdf

                          SHA256

                          26925f8eb4db282d03a60393defa1e22d8116fb41789b5940ef8c07f88935006

                          SHA512

                          b7f32f42ad859fd536c985d4f7dffe91dc6ded8d8cf4d6d0c1ec568df5e26060150bc89cc824611e7b55581531e79f4a92a83691b9dba357745fa8e21aa1558b

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\cc4e673d-37a7-4eb2-9417-e0f4ddc08974

                          Filesize

                          671B

                          MD5

                          a7a8d1673d87a71aeaba083b1ef15df6

                          SHA1

                          b829a4802e2977b5288e1952d59e7bb358415c71

                          SHA256

                          f34a037e0869d3c489ef3113e05c50b5cfc74ef892efab34a39a4e74eeccef4a

                          SHA512

                          018444857aafac52574cbeabab8ebef4f62fd93ac116eaec2d7fabaa9bc1add2ea0b28b1bd3a3d42ad116b950dbdb3dac97e0192b6995f1acb4d1579e2720521

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                          Filesize

                          1.1MB

                          MD5

                          842039753bf41fa5e11b3a1383061a87

                          SHA1

                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                          SHA256

                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                          SHA512

                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          2a461e9eb87fd1955cea740a3444ee7a

                          SHA1

                          b10755914c713f5a4677494dbe8a686ed458c3c5

                          SHA256

                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                          SHA512

                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                          Filesize

                          372B

                          MD5

                          bf957ad58b55f64219ab3f793e374316

                          SHA1

                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                          SHA256

                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                          SHA512

                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                          Filesize

                          17.8MB

                          MD5

                          daf7ef3acccab478aaa7d6dc1c60f865

                          SHA1

                          f8246162b97ce4a945feced27b6ea114366ff2ad

                          SHA256

                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                          SHA512

                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                          Filesize

                          10KB

                          MD5

                          49f94feb4fe42da0e7b981009ad5f481

                          SHA1

                          dc96a8aadfd96abf3a7e9b0a1dfdce87dc906864

                          SHA256

                          248a191a9e4a4c242ee7a0bf4baa5e5e510818b7aae84111bf268fae522dcec6

                          SHA512

                          0e6aaa8c60701f20711dfa2a03a43756e38d9671d1257ff4814fae6a0b17ff612fff1905143d2d387ff8e8814a04a53d0d3af8d823c136d94059b8d5928d960f

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                          Filesize

                          11KB

                          MD5

                          d6c5dc46445bb9d4ade5aa15d7a84a3f

                          SHA1

                          1b1ec171abf3d9b87d9acacc91ea9b9f2709a775

                          SHA256

                          246183b0b780d977d1ec13038f7f7f6afcb7b2bcb1d7457330916b6d158aebc3

                          SHA512

                          2cadfea53a9b661b3491dc6510453e1df0ba695032e29cd6a0088e83327731202d5e8873195d6b034f129772a93db8a4deb7a88456c93be510ab9e0fc6ac915d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                          Filesize

                          15KB

                          MD5

                          274fc9c485f345d144d32fbfb7de1b63

                          SHA1

                          800773c907b1177863677abe561f9f34d2343573

                          SHA256

                          1e86c2b2d6d8f4f893cb31c2ea0ae9f0316b2e95c6f581740295ff164e22375e

                          SHA512

                          c7baf2af85e159903d3f50429f6f52e8d2640784eda37e6c7b84c0b737d7b2198d954f837a80cb887b11db771a64ff957207899cfd06ae6f2b698f72cc239fbc

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                          Filesize

                          10KB

                          MD5

                          82c047926039f7d1f21d0f308cf73a4e

                          SHA1

                          719dd922fa84c9053338d0cd4443cd22fdb11d6f

                          SHA256

                          b20e918a84ca5811a13db10122347d84f7fc8e3609463a75eb0d935830b0ca0e

                          SHA512

                          b423ab3e0403a6271b7b554c07bf77e40140238c3521916b05d8215671e69c8660326c19e3824a092fb79307a53dc7042e7c64121465a7751dfa7327c9b52aa8

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                          Filesize

                          1.8MB

                          MD5

                          c835777dbe48827f00631e869222925b

                          SHA1

                          dcc925382391ded9fc1d95fb74af0474cdccdf92

                          SHA256

                          2089571f052079d21d0bb2ae85fa1d10579ec2e7b162fb1b817384813b2dd38f

                          SHA512

                          476ca72c1e0c10053c915f33ec723182d093cd68c232154c48e7575988b9a6e8cd48d51f8e5ea329b6c74e83c941d8920780fd066421c0545cffe3502a096647

                        • memory/1004-54-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/1004-55-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/1976-109-0x0000000000760000-0x0000000000E74000-memory.dmp

                          Filesize

                          7.1MB

                        • memory/1976-108-0x0000000000760000-0x0000000000E74000-memory.dmp

                          Filesize

                          7.1MB

                        • memory/2500-520-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-43-0x0000000000E51000-0x0000000000EB9000-memory.dmp

                          Filesize

                          416KB

                        • memory/2500-76-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-57-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-3013-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-56-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-130-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-52-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-2384-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-51-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-50-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-867-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-16-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-49-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-48-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-47-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-20-0x0000000000E51000-0x0000000000EB9000-memory.dmp

                          Filesize

                          416KB

                        • memory/2500-21-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-44-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-22-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-23-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-24-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2500-532-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/2532-45-0x000000007357E000-0x000000007357F000-memory.dmp

                          Filesize

                          4KB

                        • memory/2532-46-0x00000000003A0000-0x00000000003AA000-memory.dmp

                          Filesize

                          40KB

                        • memory/4416-2-0x0000000000A81000-0x0000000000AE9000-memory.dmp

                          Filesize

                          416KB

                        • memory/4416-4-0x0000000000A80000-0x0000000000DAA000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/4416-1-0x0000000077964000-0x0000000077966000-memory.dmp

                          Filesize

                          8KB

                        • memory/4416-0-0x0000000000A80000-0x0000000000DAA000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/4416-3-0x0000000000A80000-0x0000000000DAA000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/4416-18-0x0000000000A80000-0x0000000000DAA000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/4416-19-0x0000000000A81000-0x0000000000AE9000-memory.dmp

                          Filesize

                          416KB

                        • memory/4420-525-0x00000000005B0000-0x000000000086C000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4420-358-0x00000000005B0000-0x000000000086C000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4420-522-0x00000000005B0000-0x000000000086C000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4420-359-0x00000000005B0000-0x000000000086C000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4420-156-0x00000000005B0000-0x000000000086C000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4760-92-0x0000000000F10000-0x0000000001219000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/4760-111-0x0000000000F10000-0x0000000001219000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/6048-538-0x0000000000E50000-0x000000000117A000-memory.dmp

                          Filesize

                          3.2MB