Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2024 10:11

General

  • Target

    e6c39f076c788f62af9ec270e0c38c2e9e07273477c3d780e445c2931a2677ca.exe

  • Size

    1.8MB

  • MD5

    a264ea11a035d04c5cd0b3780fec4ca6

  • SHA1

    827dabf94adfd9d1e7fa0f2e912cf503bff03883

  • SHA256

    e6c39f076c788f62af9ec270e0c38c2e9e07273477c3d780e445c2931a2677ca

  • SHA512

    d97e47c9edccfe74785fbd6dba4c8a9e2ca7d812f4f7d4f7e27fdc00d7c4bdc4976bf22766c1d11000d1564956bf20dbe59826b496f480ec39518831f40e38d5

  • SSDEEP

    24576:7iJA2I2DMX2uhK0yqufLLXnnSLitP/7QEEVhf0KzQ3IVTz1kulH7FTFAesqiNomG:6Al2DCVK0zsLzSLDJXTTz1DlHxW

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://peepburry828.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6c39f076c788f62af9ec270e0c38c2e9e07273477c3d780e445c2931a2677ca.exe
    "C:\Users\Admin\AppData\Local\Temp\e6c39f076c788f62af9ec270e0c38c2e9e07273477c3d780e445c2931a2677ca.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:228
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Users\Admin\AppData\Local\Temp\1007126001\41c5854735.exe
        "C:\Users\Admin\AppData\Local\Temp\1007126001\41c5854735.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:952
      • C:\Users\Admin\AppData\Local\Temp\1007127001\2b24e7c9c8.exe
        "C:\Users\Admin\AppData\Local\Temp\1007127001\2b24e7c9c8.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1260
      • C:\Users\Admin\AppData\Local\Temp\1007128001\b549be7607.exe
        "C:\Users\Admin\AppData\Local\Temp\1007128001\b549be7607.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1460
      • C:\Users\Admin\AppData\Local\Temp\1007129001\cc50bf54e7.exe
        "C:\Users\Admin\AppData\Local\Temp\1007129001\cc50bf54e7.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4012
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3108
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4112
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1476
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2680
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:5052
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4684
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3468
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a442e153-420f-43fa-aa1d-44cd90066a60} 3468 "\\.\pipe\gecko-crash-server-pipe.3468" gpu
              6⤵
                PID:3960
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e298208-c922-424a-9844-c519187a7b07} 3468 "\\.\pipe\gecko-crash-server-pipe.3468" socket
                6⤵
                  PID:2616
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3160 -childID 1 -isForBrowser -prefsHandle 3228 -prefMapHandle 2984 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3f3fa4d-4bf3-47a7-86e9-52cbdc9a3f4b} 3468 "\\.\pipe\gecko-crash-server-pipe.3468" tab
                  6⤵
                    PID:3812
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3848 -childID 2 -isForBrowser -prefsHandle 3776 -prefMapHandle 3548 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0f3006e-454a-4301-9fd2-f98c43c5c071} 3468 "\\.\pipe\gecko-crash-server-pipe.3468" tab
                    6⤵
                      PID:456
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4484 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4452 -prefMapHandle 3856 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d82d1420-a415-49c8-8994-a9f81e856955} 3468 "\\.\pipe\gecko-crash-server-pipe.3468" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5512
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2656 -childID 3 -isForBrowser -prefsHandle 5676 -prefMapHandle 4340 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67d630bf-c40a-43f4-8b29-3e3dac26a5ba} 3468 "\\.\pipe\gecko-crash-server-pipe.3468" tab
                      6⤵
                        PID:5160
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5804 -childID 4 -isForBrowser -prefsHandle 5812 -prefMapHandle 5816 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9a86170-cf5d-4691-8611-627d17e12753} 3468 "\\.\pipe\gecko-crash-server-pipe.3468" tab
                        6⤵
                          PID:5172
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6120 -childID 5 -isForBrowser -prefsHandle 6116 -prefMapHandle 6112 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b0930f1-b297-4fae-a97d-e84307405ec9} 3468 "\\.\pipe\gecko-crash-server-pipe.3468" tab
                          6⤵
                            PID:5204
                    • C:\Users\Admin\AppData\Local\Temp\1007130001\c7e4e8b5da.exe
                      "C:\Users\Admin\AppData\Local\Temp\1007130001\c7e4e8b5da.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3636
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:6088
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2776

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json

                  Filesize

                  19KB

                  MD5

                  7b05da336389a129f7a4bb943df70351

                  SHA1

                  42f16e196e3aa7547f0c84acb174911aa8f27ddf

                  SHA256

                  e3d9dc394120bfd1f7c8379f78535422d67a86aaae63113bc45854fb8c3a5f21

                  SHA512

                  f9817f8f94ac09dbbbf876136627a93ac1ddffd3ac2eae22df10a52eed5920d08f08168b888cdb7a09817f55477fcfd176a7e51fbd547a9d9e50c45f51d076dc

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                  Filesize

                  13KB

                  MD5

                  79633f6d4691335b3e579c8fe52c981f

                  SHA1

                  1b354d827c389d92d38375f72a1699ac232d87df

                  SHA256

                  2bb1302a863b9324350f2cc016b43a472def12bd8c3e0f4c32cfabd92bef424f

                  SHA512

                  ab503c36093dbaede35a332a91875b7b79f94c22546a187ea5a44ae3933741c282c21d1188d65cf5200aa61aa4c39c56ce5c7b5564f2422eb1eec617e9b47be8

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308

                  Filesize

                  9KB

                  MD5

                  5b8c27e8503e82d841793ce8d080edf1

                  SHA1

                  50c1302a8f03d47b3bcf36ead18f01ef65daab0f

                  SHA256

                  de3d6d76d85ab18a887246cf14f2e40417a6c3929e7220a55507301b2c701bdc

                  SHA512

                  fba931b039b6cd990672e96766a267c50f7ae6f44bce26b93f6b11a4931092aa193e4fb89b4c57686ddb7241cb0cc70f54446a72bb7af85864f450683024f42f

                • C:\Users\Admin\AppData\Local\Temp\1007126001\41c5854735.exe

                  Filesize

                  4.2MB

                  MD5

                  ecbc8e5795841534da310554cf558564

                  SHA1

                  4f5c4a459c679a613083fb8ebeaf6b72a62099c4

                  SHA256

                  4ba3a14b8848a345ee40fe5e6c9a08a3bf7ecfaff176350082871a35a90973ea

                  SHA512

                  4f74e57b352d9e64ea7abacf59a44159640a5607dd405ecf70dfe1fc71701d70d696d08e2c58846528b6e2e7931b4edb6b12467fd22c54c38b7fb060ffe2685c

                • C:\Users\Admin\AppData\Local\Temp\1007127001\2b24e7c9c8.exe

                  Filesize

                  1.8MB

                  MD5

                  539a6e0890a24806ac70a908e4fbd5b1

                  SHA1

                  a1cfc7f7a70925430d9f1ce6f389ae6a27167581

                  SHA256

                  7ed8eb54e99ddb1054b83b9733dc5f43428f6831d381d3b17323fb384afbef54

                  SHA512

                  f9dc56a71ffa9745698e325f95fe16428b35a1bceb5837ae59c7493885d714219fc59c0c1271a55ee14baf2066c761ddcdc9e32bed413cbd75b2852ec72c3a46

                • C:\Users\Admin\AppData\Local\Temp\1007128001\b549be7607.exe

                  Filesize

                  1.7MB

                  MD5

                  f692c576c881c1e7b724c856492a8571

                  SHA1

                  d55883ea3b1132e7cfda8ec920684147aec82153

                  SHA256

                  d3a54c09db421afd6d234719c04e2c73321adf1166536b0abcd9db8c1c3c186f

                  SHA512

                  c8c13c4af65bf432c03d5b7139c80f842f074676c181b990d1f8b8509dfff5e2c61ce858574e1cd2545bb2146ef96646c53e06f749e38b766a907e3c28aa3e8c

                • C:\Users\Admin\AppData\Local\Temp\1007129001\cc50bf54e7.exe

                  Filesize

                  900KB

                  MD5

                  1e7de73350a1f7a3708d00f81c371fcb

                  SHA1

                  5e70ba0d71983a0cda9d847be8f92dc43c21263e

                  SHA256

                  86f4bcfb18b0ed992744e95eea8277c892f7b7b584ca1fb8200da13ba95ebd9a

                  SHA512

                  ad16bcdacb34eec32b8771e99628a62aeeea5c8d25653f17933cf9ee39e8d6010a4570f3083238906829b96fdc0ab8d2cd14857dc7f0f655dbd460bdce6848a7

                • C:\Users\Admin\AppData\Local\Temp\1007130001\c7e4e8b5da.exe

                  Filesize

                  2.6MB

                  MD5

                  a1c8734e579b90d090d86be32a68ae20

                  SHA1

                  b209865b6423dfc6561b8d04ec27c5cc20f9744a

                  SHA256

                  29d491f420c000fe76468e7129ceffb1328551c10896a7fa43fd05b343b95072

                  SHA512

                  1b7c241054d55936e8902ec3e3eef0fd18d57781c8ba40e9ced8c7d69b06b64260d2ea1cf0cb64bc2c005fdbf9ee03506024b98be56856fa5df74f224487b541

                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                  Filesize

                  1.8MB

                  MD5

                  a264ea11a035d04c5cd0b3780fec4ca6

                  SHA1

                  827dabf94adfd9d1e7fa0f2e912cf503bff03883

                  SHA256

                  e6c39f076c788f62af9ec270e0c38c2e9e07273477c3d780e445c2931a2677ca

                  SHA512

                  d97e47c9edccfe74785fbd6dba4c8a9e2ca7d812f4f7d4f7e27fdc00d7c4bdc4976bf22766c1d11000d1564956bf20dbe59826b496f480ec39518831f40e38d5

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                  Filesize

                  479KB

                  MD5

                  09372174e83dbbf696ee732fd2e875bb

                  SHA1

                  ba360186ba650a769f9303f48b7200fb5eaccee1

                  SHA256

                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                  SHA512

                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                  Filesize

                  13.8MB

                  MD5

                  0a8747a2ac9ac08ae9508f36c6d75692

                  SHA1

                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                  SHA256

                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                  SHA512

                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                  Filesize

                  6KB

                  MD5

                  98c2312eb50cc7bc70128c09304176aa

                  SHA1

                  1bd62646f44ecbf53fcdfe054a21c017ccdebd92

                  SHA256

                  ff03e1c9e6a21a67cae3916e0cfd0ac7e472e614282affcc9f12a8f0315bd127

                  SHA512

                  34aa06363b1adf79c334c923104e1db0a6b651d0030f7a9449aa4bdec7025e50e66b291bc2867399c1e21be71f9b038b67c0abbf2373dd476e00f992db68e014

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                  Filesize

                  8KB

                  MD5

                  ea2cf5f805417ea617d5087091c22dfe

                  SHA1

                  555d3551fd52bbb7866627f4cba14c6d41115a51

                  SHA256

                  39a063acee9c2b289dcadd81368141c290639607a3a342d02aa6f5f7de17fe13

                  SHA512

                  2956c1844704e43f3528f2a6cca2b816d3e32cf564e4893958e5b5b7bc9d656f44267ae9ea143cb6437b8da827f05ba5423eb008f1dd99c72129af5d018880e7

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  5KB

                  MD5

                  31d3d3dd1ccf667913d4375138af3fd4

                  SHA1

                  f037b9a809a67683a691260c8cb9fcdf0f4c377e

                  SHA256

                  f39b305d842b7400e98e45593b4266238178df95e5981f7d97352599665e5f6c

                  SHA512

                  90d538cef09693d52d68df650cf3c1badb95f9c515e666aa8d316af89f092b47c48b9e72ec12bb6523629d60d424e51692ab7d34bad7a55e60475363d2e998a8

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  6KB

                  MD5

                  5b2bc61fb4ecd30082076545ae32b43b

                  SHA1

                  54bf0c620a21b718bed6b1e17a501fe0e0dba552

                  SHA256

                  8750216ab33a9ab7cc1a667a849c74ac22df5c5fe9217e65f1c78987067c1cc1

                  SHA512

                  1a6a6db58b0b771028ebe356e5fe0e3de9c67dcf239f5a47254cb2d8d7637f623c9f272ab32db590a47da03010e6b4249a795fbaf0354c3fc580a0e2be906704

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  15KB

                  MD5

                  50cd7e9cdba6608566dc29754c90b3a3

                  SHA1

                  abd2458fdb3678351538cc5a0b261533fb642bd9

                  SHA256

                  118f01813a6e1cab4940ab744cd0c0fa992bcabf34a7f2e7955971b9e4a13665

                  SHA512

                  c9dad044606a7e2d254387c6137be3b07d7a24adad4fd9365368a845dabadc4a5bbb65ee82582dd19ddbfe7046442f90e69473e97c6c121d661f511d5df05c21

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  15KB

                  MD5

                  6ad658bbcdfad13880ab3cc10249aef0

                  SHA1

                  35398d90035a82597a6b19ea292dda2ec544d3ea

                  SHA256

                  ae64ea86084c454def8f7772d00679a5f4728597c546a2e0716f0da8172787a7

                  SHA512

                  953713dc6ab55ab6de02d9f794cd8512f3e963acaeb18eb731de869d4b259b59f4eb7f4461565f88150b4a78c21676d4daed4d6f11b512da9c9528684c2dc654

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\2d4d16df-ed5f-4c4f-99cc-364cd3d599b0

                  Filesize

                  671B

                  MD5

                  2a5283ac49f007620852ea88727fa80b

                  SHA1

                  b9ce9a361a52b72854ed7a055a0f04bac319e8a1

                  SHA256

                  73964cc6ef0bad11434f8aea72bcb126f366726996125f488a30d9cd04238e45

                  SHA512

                  dd3b397072550b181b430eb365cc2f835463e8e72483f847abba045bfb05d70042ca53142a46d6ba125f307972c8469f999db18202d799d45a00e17d82cd73c8

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\9f0cc35d-8973-4c53-a9b2-aedf9fd1e59f

                  Filesize

                  25KB

                  MD5

                  f321dd9877ae80e8c690091d9d166fda

                  SHA1

                  88a5b7b0403b947196f813b81be7cd22e8ad9c5a

                  SHA256

                  ab435bb8d79154e6e89ad7304426b19f571e36aa189a6a821c3ce0bc74938b16

                  SHA512

                  8ffbda9b006b114a74e407e856c2f1dd3b19c0d87e3d69d7f22adbe49a92fb7bc14b19c28c2e4684534baa23b1da89cf78c9fd446f7903e42917eaad233ca973

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\c4406622-b31e-48cb-8669-8528f7d0707f

                  Filesize

                  982B

                  MD5

                  d6379b8444ac9a4f4d9ab567f9909b4f

                  SHA1

                  47d74849e689aefc36b361910bc1e43fbb72f3e6

                  SHA256

                  b6383574d3c24381a6ea0f79ef39e545b5bbccc11776a4424e9075b805ee3f31

                  SHA512

                  b16a6444ce62efa546ac81141b78cc6b8f5a0e9193abbf78eed759ef901ceae3fc591e7ceab497a461ae340c41b1187afd010425de54c7e89691268324b02216

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                  Filesize

                  1.1MB

                  MD5

                  842039753bf41fa5e11b3a1383061a87

                  SHA1

                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                  SHA256

                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                  SHA512

                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                  Filesize

                  116B

                  MD5

                  2a461e9eb87fd1955cea740a3444ee7a

                  SHA1

                  b10755914c713f5a4677494dbe8a686ed458c3c5

                  SHA256

                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                  SHA512

                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                  Filesize

                  372B

                  MD5

                  bf957ad58b55f64219ab3f793e374316

                  SHA1

                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                  SHA256

                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                  SHA512

                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                  Filesize

                  17.8MB

                  MD5

                  daf7ef3acccab478aaa7d6dc1c60f865

                  SHA1

                  f8246162b97ce4a945feced27b6ea114366ff2ad

                  SHA256

                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                  SHA512

                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                  Filesize

                  11KB

                  MD5

                  ef71c9c5f32b374cab4349d5bf396dfc

                  SHA1

                  6c269b1012c6720647d2af04db5bbfa697c352c6

                  SHA256

                  66ee1142c5fddfe6c1c3fc8e31eb075379121eed3a6d0d3d2e55fd9b7fc3e23a

                  SHA512

                  d0255b24d638d9c3aac2c9648a28c4777b02eed50f0e209040811583d16e8e20aac94de18b858c3c1503daae811ae621550220c51ee5451a56d0ddb9768ddcbd

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                  Filesize

                  16KB

                  MD5

                  4b7603f2c7fe96d23abe3644f6b19bf7

                  SHA1

                  d92de593aa569f60d21b6b176a56928586f3dce2

                  SHA256

                  27caf00e320a7ec1b3d868f647a6a033826de210b8fe2b66d6bc3469fcefbbfb

                  SHA512

                  740728baffff107ff1404137e46efe3edbdcd0d2d153f0fc40943f1dc84bef0abef445923e03969ba9a0a04e9620e9bffaee159909419248c0145a12c2a6fda8

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                  Filesize

                  10KB

                  MD5

                  bff8973f134590951c1b151d2688336c

                  SHA1

                  1d64ac4f8b3984ec8b4690011f8b2e34b85bee53

                  SHA256

                  1100d680739c5f555f6cb9920ea9cd4d9a0b1e7d916364a681239607a593bf6e

                  SHA512

                  0079bc4990afcfa06348db6f996b678c97d82f401f940b15b179a2c98ddfb387609bd99a56b89117f73cce314c067d2e818e5177e0888659083aea29048223fe

                • memory/228-1-0x00000000778B4000-0x00000000778B6000-memory.dmp

                  Filesize

                  8KB

                • memory/228-17-0x0000000000EC0000-0x000000000137E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/228-4-0x0000000000EC0000-0x000000000137E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/228-3-0x0000000000EC0000-0x000000000137E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/228-2-0x0000000000EC1000-0x0000000000EEF000-memory.dmp

                  Filesize

                  184KB

                • memory/228-0-0x0000000000EC0000-0x000000000137E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/952-38-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-40-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-2989-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-2998-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-2996-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-2991-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-75-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-100-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-2979-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-3002-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-493-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-2984-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-3000-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-2102-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-506-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-99-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-41-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/952-806-0x0000000000800000-0x00000000013A8000-memory.dmp

                  Filesize

                  11.7MB

                • memory/1260-79-0x0000000000400000-0x00000000008A5000-memory.dmp

                  Filesize

                  4.6MB

                • memory/1260-59-0x0000000000400000-0x00000000008A5000-memory.dmp

                  Filesize

                  4.6MB

                • memory/1460-76-0x0000000000E40000-0x00000000014ED000-memory.dmp

                  Filesize

                  6.7MB

                • memory/1460-78-0x0000000000E40000-0x00000000014ED000-memory.dmp

                  Filesize

                  6.7MB

                • memory/2240-20-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-2985-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-21-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-18-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-22-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-39-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-3003-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-101-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-979-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-508-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-3001-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-2315-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-2999-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-2980-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-494-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-19-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-43-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-2990-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-2997-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-2993-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2240-42-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2776-2995-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2776-2994-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/3636-406-0x0000000000D70000-0x000000000101A000-memory.dmp

                  Filesize

                  2.7MB

                • memory/3636-391-0x0000000000D70000-0x000000000101A000-memory.dmp

                  Filesize

                  2.7MB

                • memory/3636-496-0x0000000000D70000-0x000000000101A000-memory.dmp

                  Filesize

                  2.7MB

                • memory/3636-329-0x0000000000D70000-0x000000000101A000-memory.dmp

                  Filesize

                  2.7MB

                • memory/3636-505-0x0000000000D70000-0x000000000101A000-memory.dmp

                  Filesize

                  2.7MB

                • memory/6088-509-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB

                • memory/6088-515-0x0000000000A60000-0x0000000000F1E000-memory.dmp

                  Filesize

                  4.7MB