Analysis

  • max time kernel
    145s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 03:22

General

  • Target

    c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe

  • Size

    1.8MB

  • MD5

    946e0d79b6edda9e5ab8153aa408d19d

  • SHA1

    a21e757593cbb76bf2577e005d49cc1ac4a3e2f9

  • SHA256

    c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645

  • SHA512

    480286484c5365bd62040c1f5aec39707c82d6e84fc9c8e9f7d7fc6c55c9f0fbbb92b83bc2a3dc1731d32525488a4ce468bdf0b4c0dcf067caf8154f4760b293

  • SSDEEP

    49152:eMgDvfXfXaSDycRZQmCBFWpWlzlioNECaKvgz:fgD/a+x5diwopaKvgz

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe
    "C:\Users\Admin\AppData\Local\Temp\c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4008
      • C:\Users\Admin\AppData\Local\Temp\1007564001\00ce09bf00.exe
        "C:\Users\Admin\AppData\Local\Temp\1007564001\00ce09bf00.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4056
      • C:\Users\Admin\AppData\Local\Temp\1007565001\40ffe7e804.exe
        "C:\Users\Admin\AppData\Local\Temp\1007565001\40ffe7e804.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4580
      • C:\Users\Admin\AppData\Local\Temp\1007566001\b262ab70e9.exe
        "C:\Users\Admin\AppData\Local\Temp\1007566001\b262ab70e9.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4276
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1628
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1656
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2252
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:752
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1652
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2040
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4776
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4bd9da19-b830-447d-8a2a-0d21f6c8f88b} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" gpu
              6⤵
                PID:868
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2428 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f8705b3-38be-4635-b54c-1749b59bc9a3} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" socket
                6⤵
                  PID:4504
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3216 -childID 1 -isForBrowser -prefsHandle 3080 -prefMapHandle 3224 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fda4f62f-a9ab-4bec-af25-262cb1579deb} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab
                  6⤵
                    PID:4368
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3956 -childID 2 -isForBrowser -prefsHandle 4048 -prefMapHandle 4044 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29251eb1-6b6f-48b9-8f19-eeb036845d65} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab
                    6⤵
                      PID:3980
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4832 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4824 -prefMapHandle 4840 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c5e94db-513d-486c-8145-a89fba244ac5} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5476
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5400 -childID 3 -isForBrowser -prefsHandle 5328 -prefMapHandle 5320 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccc75054-a449-4a5e-b56c-cf2bb3abf753} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab
                      6⤵
                        PID:2272
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5584 -childID 4 -isForBrowser -prefsHandle 5576 -prefMapHandle 5572 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {899022a1-7438-436c-8f1b-4caba3a33308} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab
                        6⤵
                          PID:2040
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4416 -childID 5 -isForBrowser -prefsHandle 5760 -prefMapHandle 5756 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a89de4e3-b328-4a82-a3f4-ddc42c70de4a} 4776 "\\.\pipe\gecko-crash-server-pipe.4776" tab
                          6⤵
                            PID:4076
                    • C:\Users\Admin\AppData\Local\Temp\1007567001\3bf365eebe.exe
                      "C:\Users\Admin\AppData\Local\Temp\1007567001\3bf365eebe.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5460
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4028
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4524
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5512

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json

                  Filesize

                  28KB

                  MD5

                  7adeb143eef2ca816478b20bbaf0dc0a

                  SHA1

                  2f70e2039ba175a7aee70d21b59a0228f1b7f5e7

                  SHA256

                  c75c9c4b219f4f6bc8b9326e71e08655949f2f143881258e9574e176adf7ce4c

                  SHA512

                  4af2552ff81747e8aae747940000f015cd15310edc404b2daaf470d4682b296eefc00259dc36e3291799a7ec11df5c58c2d21405df0d0d3778290797dc4e5473

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                  Filesize

                  13KB

                  MD5

                  0858c6a94d7759b59ee9b5ef765214bf

                  SHA1

                  ee76da296531165173bc6f4782c0a5c9525179e7

                  SHA256

                  f63dec88868e8898f2211fa294b87224903b362e47af4c66810279a119360f85

                  SHA512

                  b6ef43d3b5158dfe6ffa62f37f33e35459c1a4430215a5f1d3b9a1bf433a86d03e1d45486520feb7d25eb76e2f5d55d0a395310113035c1a096bfca7c2153d64

                • C:\Users\Admin\AppData\Local\Temp\1007564001\00ce09bf00.exe

                  Filesize

                  1.8MB

                  MD5

                  f3af22da807cf5c72595c605883ede37

                  SHA1

                  ce837c6fef442d5f397cf3b032a358b1b0eaf31d

                  SHA256

                  259341feaa61530a621669e04289d7800c332b31a3c3a9e9f70a1ed8e407641b

                  SHA512

                  58ce0a665a74c367c5389a378d81e8fe34f99e3b23b7745d128bb7894b73d757d0f67ef78942b498a682e7a1824a5f69b716a59f4a2cc1e3cba0fbe12dd3fc4d

                • C:\Users\Admin\AppData\Local\Temp\1007565001\40ffe7e804.exe

                  Filesize

                  1.7MB

                  MD5

                  71a545e3b2110df4ce7ccec9dc2a4f9a

                  SHA1

                  e3a2be77d404af85e1251918a9c8f01c5586ce49

                  SHA256

                  e45f5355f8b2bb64ba940220e643d632ea4469c2be61ca107d8af31709efb458

                  SHA512

                  249dd250472763c76934610e5838620e2e21b6c66ffc7d9de88a0d74600a63de79545db98dda43e8f07d5261bbdbd94bb6c5099a00f905f0ddc18a4ba7b11831

                • C:\Users\Admin\AppData\Local\Temp\1007566001\b262ab70e9.exe

                  Filesize

                  900KB

                  MD5

                  a659242a2961656ffef9f7a58e4901c1

                  SHA1

                  f00e59994ad40eeac38e4f26535a259c0d48ae2b

                  SHA256

                  960b3f024f7045d23c28149e4e935ee2bbc0aded4ae09a86f24928080e00caab

                  SHA512

                  3464a9248c45d12a38c288ae297c86e706ff57d1bd3aa1d37c5f5f91557ef785f51d8e118191b7f1cc05f31b8f20b238bd1911874c34533d463ba707b4beefba

                • C:\Users\Admin\AppData\Local\Temp\1007567001\3bf365eebe.exe

                  Filesize

                  2.7MB

                  MD5

                  4d8a4d824fe07691f48374a04428d3d0

                  SHA1

                  a8c0d0c6837b0886f357a02541b1cb11e7fbcf67

                  SHA256

                  4670a2971ce2acf600f4eb00541037cab93cfc57f61ee09af167c7e52f5aaa4c

                  SHA512

                  8d5ded542030fd4a836dd5971c52b14f571f81f8de69d202343e402fc1285fd4a9a276a45248d58efce87b8947b67c65c994caa222322996da81ff869edeb74d

                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                  Filesize

                  1.8MB

                  MD5

                  946e0d79b6edda9e5ab8153aa408d19d

                  SHA1

                  a21e757593cbb76bf2577e005d49cc1ac4a3e2f9

                  SHA256

                  c7b59dea2273e4ebd8fe978be25b382793dcfd9fda75a70b8e47729019102645

                  SHA512

                  480286484c5365bd62040c1f5aec39707c82d6e84fc9c8e9f7d7fc6c55c9f0fbbb92b83bc2a3dc1731d32525488a4ce468bdf0b4c0dcf067caf8154f4760b293

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                  Filesize

                  479KB

                  MD5

                  09372174e83dbbf696ee732fd2e875bb

                  SHA1

                  ba360186ba650a769f9303f48b7200fb5eaccee1

                  SHA256

                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                  SHA512

                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                  Filesize

                  13.8MB

                  MD5

                  0a8747a2ac9ac08ae9508f36c6d75692

                  SHA1

                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                  SHA256

                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                  SHA512

                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                  Filesize

                  10KB

                  MD5

                  b69b614c95c363bb15eb1caf5abe02b8

                  SHA1

                  5d98802192acfc29454cf5346a09580552ab1f77

                  SHA256

                  bde72dfa02fd95e110092ef185e1836eff020ed169fcddfe6bc0936890de7e83

                  SHA512

                  b87818efbe1a70ee9f97ae4fadc016eb37757619cf8c2c766f71eb78a0d188117a25ad874e4805a1f8878ccdeed844b1cd9fbde08ae3445100a94a0b0d12f910

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                  Filesize

                  18KB

                  MD5

                  6cd9531b3508e828202d1023868db4ea

                  SHA1

                  38439b8580e154d0fbcf138ff5c5431274189c70

                  SHA256

                  c6c6a5d7c6455c4e709891c722653984cd95886371de752664c36b2f30b6db44

                  SHA512

                  25618b33525f29ca1ce46d2013bd5a02aef30a0957bd6ac42890b03f4d6befb392092fa4e2c252867b342ca5ded3b8e3bcfeb0138127cb6000722fab395269b4

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                  Filesize

                  6KB

                  MD5

                  931ab2781279815963962de0df60a307

                  SHA1

                  8857b8ab03a637afaa5150d951f678c8478775b1

                  SHA256

                  f5f7af5662c5f48472b8949b1c92505757c0d3bf1d42ec6e117fb5780de58360

                  SHA512

                  ae21e00905fd6770ba09b66994fb9a63186691559ad88a86c4a9479e1893f51a348d28864410b1dc191e3d121a7b014e487fabfe7b4a5e7f1d8e95b61295f640

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  24KB

                  MD5

                  267173b329b78c4cdcae81063a371b6f

                  SHA1

                  4a9627cf9415c787219f4601b0f160ab13372d9e

                  SHA256

                  1db0e427bc238db844055bb63145c7ca531e381a0498b21c57cf9319baa4eb5e

                  SHA512

                  abceda49bd666f70f6c39010f2177d0d33f047218d563cba516bbc6ece60c1df62e0c641d56bfde16f52b17f0fa4773cb25c88752754979d97db4762af60b5a5

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  25KB

                  MD5

                  fc484f85299270089865b71ffec48305

                  SHA1

                  b72faeafc9a0ef1647072b32a1e89d10bea67e30

                  SHA256

                  75f3b305db1bd1b402baf5de372a1cada46470c3dd0ed8358a8bb81691fdd88f

                  SHA512

                  37b8dd170526c98b35ae3d1ccddf4e9eb9f5b4504cc0b126c53e45d434060ad31650047700160e5c6554e5c44033ffbffb77b44ae342d20dcf0498dbb9cb4ac7

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  25KB

                  MD5

                  d9010da9e49fc7f3a895e8822cfa71f5

                  SHA1

                  1d5a24ffc9d1cde2b29754cb60692442167cc68d

                  SHA256

                  b9b07426ef3ab47d8a2f3b9fd9f7ab31ed16942ef7c0062c06346fabacae73f1

                  SHA512

                  35411649a27a540c39e650332aa89ec9796fe82bd24cde103ea18e2d4b960404906220a5c2e4501f1a39e0318501680fad0564eaeb256e313eefcdf7a8675670

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  21KB

                  MD5

                  1a9ad5dc4d0effaf4b78acbaf8d85fa3

                  SHA1

                  80619896fbd016d5201b34f83d0e685cb4df1794

                  SHA256

                  0f271f350a232c5fa9398646d4defee27e7cf843aff8abc84a23d66b6b092bc4

                  SHA512

                  f8bfd236a5dddfeb9b0a990bb6c7eb507dfef5b96a5afe946d718e3ecff43bafef505953a3a28026ccbfcdbbda538e661f60aff15b75fc07c33d6768f0a1214c

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  22KB

                  MD5

                  d7f9df5bdd888e12c45cdeb3a940b2fa

                  SHA1

                  8fe0ca3e88a79ee36dab24d601d979cbf03a3e35

                  SHA256

                  c0828b02ab3ed1c597766a91c7f61e33bd91d65a24dd8c5fe469596708112a23

                  SHA512

                  831e26eea53d714b405c83da0b8a0211042c17717ce5cf2ae50ab48893e62b576b34bfd078598373efb3d5706e642c152230a605022db397f7097d50fe057d0d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  22KB

                  MD5

                  ad72d75f25abd992b7151c5857a27c69

                  SHA1

                  51f1a74a2e4d68a9470737f3aa61bc6208317d14

                  SHA256

                  6a4f7dc48db83e84c5477f4ec61fe6aeac505d3e7e96a96d423ec85ab787c829

                  SHA512

                  00fea2fc1bf320ee346fe45e1afbcb35e33feab06f40ec31e5deb45ea51a8ac4b2cacf28c5bddb8c619e6e48ed0e84fac90d1b1aaefa3d0fcca6f542194019ed

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\bbb2db3b-3cf1-4fb1-bb48-752d1ab09d68

                  Filesize

                  659B

                  MD5

                  8754ca9139403668de42769dc1a08e74

                  SHA1

                  28a66dee98810f7aa7f938fdb7f6665bd93ab1c7

                  SHA256

                  a8a37cc015ca68b9c18ca423b5b1910bba4747c6d43d0a29366762d66435eb93

                  SHA512

                  00c108214bb94050bf5651eac32cdae3dec3f8d74580b4f4fb25ef6554a72083a0a821372586696d2a6d7f23b3627bed3a25103f5690874041efc0b0506a673a

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\bdcb9038-3b60-45c3-8fd6-68758297c171

                  Filesize

                  982B

                  MD5

                  f0ae5d90a02e2a2cacc08105b805f656

                  SHA1

                  3c8897cc7dd9e752638744a098c6f45d93f91406

                  SHA256

                  41e27d2de2e8ad7e48fecb659b6671120647281266893b47d6b6834176ec2c36

                  SHA512

                  d901621b1f14b884ab4c332a6d3137b6926662674af224fab5637b12e2b7ee22102a1bbc56387caac7fb989d08a6863ca533773724579e6705f76c9982a7d681

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                  Filesize

                  1.1MB

                  MD5

                  842039753bf41fa5e11b3a1383061a87

                  SHA1

                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                  SHA256

                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                  SHA512

                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                  Filesize

                  116B

                  MD5

                  2a461e9eb87fd1955cea740a3444ee7a

                  SHA1

                  b10755914c713f5a4677494dbe8a686ed458c3c5

                  SHA256

                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                  SHA512

                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                  Filesize

                  372B

                  MD5

                  bf957ad58b55f64219ab3f793e374316

                  SHA1

                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                  SHA256

                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                  SHA512

                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                  Filesize

                  17.8MB

                  MD5

                  daf7ef3acccab478aaa7d6dc1c60f865

                  SHA1

                  f8246162b97ce4a945feced27b6ea114366ff2ad

                  SHA256

                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                  SHA512

                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                  Filesize

                  12KB

                  MD5

                  a45681c8ebc3123c7036225250494b4f

                  SHA1

                  6b9e8f4c083fffeafea532f2bcf816cf103f1226

                  SHA256

                  6331455b9980bed9cda769d13600b477ff64bb198c816adad065446158b69744

                  SHA512

                  896320ebd20eeda4f29cdc6bc1615a528d66116c94290e591136a9cd88513795b334a31e49d392c7841d61698ee3a00ce5ef0defa585e206a736ded17f014605

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                  Filesize

                  10KB

                  MD5

                  7ba219c464aa23913f890cef40bc514c

                  SHA1

                  53e38c74eda3888932b23e1e9be0137630419919

                  SHA256

                  1360a28d3878ca4f61440a9aec0a135a8e663d62394ead2faee7b4397ba7b0d0

                  SHA512

                  072edff499f0a23943907fa906d5c4f815e13e411c38af5150c70d4a9fd01e1cb7bf0772aa1d0a314d9f55d2198050b069380a6bc4dd70cd4b4f164da0861590

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                  Filesize

                  15KB

                  MD5

                  16372a2cd36f9f02d6936d10a309b873

                  SHA1

                  da2843c3cbda6c812009ee16743632ce648c8122

                  SHA256

                  ddacf1d4b225fbf7b5e9c1f3a6c6891de2d8d400e0b56579d8c9079d9ba64b1c

                  SHA512

                  7083d203127cbc2025bff0c3d1d7fb95900c476cbe711ef41043ca435aa3d82a15e5d8e244a778aff3c6dbb73151ea72530c1ecc9ebb9f2fdc4252d9929a0aae

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                  Filesize

                  10KB

                  MD5

                  64efd0e0cc464c794a01547fab2ea472

                  SHA1

                  2b63682f29c5f59e223e8a42437600ba47a13714

                  SHA256

                  03f7b5b23cd9d22e88967329d420776394950604d2001f1b96207dbd7c159006

                  SHA512

                  c84e71b16f07061234b161d7ac8b6e0dd909a0e4813b8019b02565efdddbd47c8911d48feb6a46a5d9623fa2b823c6c8f3abfc8044bd92399925b2a9b8257a49

                • memory/1648-0-0x0000000000610000-0x0000000000AB7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1648-18-0x0000000000610000-0x0000000000AB7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1648-5-0x0000000000610000-0x0000000000AB7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1648-3-0x0000000000610000-0x0000000000AB7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1648-2-0x0000000000611000-0x000000000063F000-memory.dmp

                  Filesize

                  184KB

                • memory/1648-1-0x00000000779D4000-0x00000000779D6000-memory.dmp

                  Filesize

                  8KB

                • memory/4008-41-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-3618-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-3632-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-3617-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-3385-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-454-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-16-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-3621-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-477-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-3620-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-61-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-3619-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-2964-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-3613-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-2561-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-19-0x0000000000E41000-0x0000000000E6F000-memory.dmp

                  Filesize

                  184KB

                • memory/4008-38-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-715-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-21-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4008-20-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4028-449-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4028-403-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4056-37-0x0000000000660000-0x0000000000B06000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4056-40-0x0000000000660000-0x0000000000B06000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4056-39-0x0000000000661000-0x0000000000687000-memory.dmp

                  Filesize

                  152KB

                • memory/4056-59-0x0000000000660000-0x0000000000B06000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4524-3611-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4524-3612-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4580-57-0x0000000000760000-0x0000000000DF5000-memory.dmp

                  Filesize

                  6.6MB

                • memory/4580-60-0x0000000000760000-0x0000000000DF5000-memory.dmp

                  Filesize

                  6.6MB

                • memory/5460-395-0x0000000000CF0000-0x0000000000FAE000-memory.dmp

                  Filesize

                  2.7MB

                • memory/5460-313-0x0000000000CF0000-0x0000000000FAE000-memory.dmp

                  Filesize

                  2.7MB

                • memory/5460-476-0x0000000000CF0000-0x0000000000FAE000-memory.dmp

                  Filesize

                  2.7MB

                • memory/5460-466-0x0000000000CF0000-0x0000000000FAE000-memory.dmp

                  Filesize

                  2.7MB

                • memory/5460-393-0x0000000000CF0000-0x0000000000FAE000-memory.dmp

                  Filesize

                  2.7MB

                • memory/5512-3628-0x0000000000E40000-0x00000000012E7000-memory.dmp

                  Filesize

                  4.7MB