Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2024, 16:15

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    9ee9fc91594ff0d745d83ae3ede6c725

  • SHA1

    27ca7f96db3ed74658fc89ca6d33db35c59d8a77

  • SHA256

    5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7

  • SHA512

    bf7d5e625fbe7adb3d1bbdc60d9263a8bb3cc000f6053033ae1ea786f7a657e5012f0f0946835b18622313e6b0f298b0e1e7aa29329f89a9f45ad440220fccef

  • SSDEEP

    49152:lkk2FX4poT387IR/vpA82dUSZ3nVZdUuHKSMuj:qk7ow7IRpd2djlV8Amu

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\Users\Admin\AppData\Local\Temp\1010998001\ef64a4296e.exe
        "C:\Users\Admin\AppData\Local\Temp\1010998001\ef64a4296e.exe"
        3⤵
        • Enumerates VirtualBox registry keys
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1856
      • C:\Users\Admin\AppData\Local\Temp\1010999001\4f38713877.exe
        "C:\Users\Admin\AppData\Local\Temp\1010999001\4f38713877.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3396
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3396 -s 1628
          4⤵
          • Program crash
          PID:876
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3396 -s 1644
          4⤵
          • Program crash
          PID:3328
      • C:\Users\Admin\AppData\Local\Temp\1011000001\97a77491a5.exe
        "C:\Users\Admin\AppData\Local\Temp\1011000001\97a77491a5.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1524
      • C:\Users\Admin\AppData\Local\Temp\1011001001\a12e960ff7.exe
        "C:\Users\Admin\AppData\Local\Temp\1011001001\a12e960ff7.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1556
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1692
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1948
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2312
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:452
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4584
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4332
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8a459427-ff84-4d01-88db-3157ef424fbd} 4332 "\\.\pipe\gecko-crash-server-pipe.4332" gpu
              6⤵
                PID:908
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59f4518b-a4a3-485f-9120-001b4abfcb8b} 4332 "\\.\pipe\gecko-crash-server-pipe.4332" socket
                6⤵
                  PID:4268
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3300 -childID 1 -isForBrowser -prefsHandle 3316 -prefMapHandle 3012 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6748d027-8ff5-4574-b0e5-2fae13cfb530} 4332 "\\.\pipe\gecko-crash-server-pipe.4332" tab
                  6⤵
                    PID:228
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3672 -childID 2 -isForBrowser -prefsHandle 3708 -prefMapHandle 3704 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5026d1a-ad6c-4028-ad76-20a59a874404} 4332 "\\.\pipe\gecko-crash-server-pipe.4332" tab
                    6⤵
                      PID:5052
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4796 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4784 -prefMapHandle 4776 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {47f73227-07bb-4570-aaf9-b58c27925ce8} 4332 "\\.\pipe\gecko-crash-server-pipe.4332" utility
                      6⤵
                      • Checks processor information in registry
                      PID:532
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5348 -childID 3 -isForBrowser -prefsHandle 5584 -prefMapHandle 5572 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c68db273-bdd2-45d2-9349-fd54799fec7f} 4332 "\\.\pipe\gecko-crash-server-pipe.4332" tab
                      6⤵
                        PID:1228
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5796 -childID 4 -isForBrowser -prefsHandle 5716 -prefMapHandle 5720 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e279f399-bc60-4640-a6c5-5fefbc15ba9a} 4332 "\\.\pipe\gecko-crash-server-pipe.4332" tab
                        6⤵
                          PID:4472
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5784 -childID 5 -isForBrowser -prefsHandle 5948 -prefMapHandle 5952 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0438dd12-c6c0-4030-ba67-29b7b8f726ba} 4332 "\\.\pipe\gecko-crash-server-pipe.4332" tab
                          6⤵
                            PID:2460
                    • C:\Users\Admin\AppData\Local\Temp\1011002001\ac325a80a0.exe
                      "C:\Users\Admin\AppData\Local\Temp\1011002001\ac325a80a0.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3936
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3396 -ip 3396
                  1⤵
                    PID:2188
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3396 -ip 3396
                    1⤵
                      PID:4820
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2932
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4540

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json

                      Filesize

                      19KB

                      MD5

                      19f9626a85de18123cc4f3015277699c

                      SHA1

                      1dd829f07d5cc58e57d1677f8b9a9f61d9c6e73b

                      SHA256

                      db3fe68b784a48531fd9ddc0df56a38bc7c6d796ab186b314eec430096085bd0

                      SHA512

                      e0753041ed0b12e106448fa771e243ac5223518ba8e8561110d740cde3daf875b398d53bb153c23b671018baa2a523f9cab6ab359de59cb68f5838092397f131

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                      Filesize

                      13KB

                      MD5

                      d88c90ea2771d4489632efb74765afc5

                      SHA1

                      8f384b7844d58b2a9dc3b602b46d63a1a3410150

                      SHA256

                      1b3c16b48596b5f41238daaccdda69c4ef32c7bc77bd13dc1928938d26f0a97b

                      SHA512

                      ce48a7a74d52e775d585b7352636dfa9d698760e58772fafc2f7b223a5b74e20c198acc1456a877e9ebe3f106cddfb2341c5ddb03f11f4136a4ae33dc6d87d0e

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                      Filesize

                      13KB

                      MD5

                      8da0aebce95356e20af837c4593f3de5

                      SHA1

                      ccc9b5b2666a10dc4e691b5436821eb67cd019cc

                      SHA256

                      3027cdfacd430606a68411ff9589e07732e88aaf2bafd8cff014da5aee8a9662

                      SHA512

                      266aaefe6d4acf9dd2ac1c9408cedb78c574bfd650d134c8f9589b4d8276c13df2f8f6d6229283edb0db541a2499feb264b28cbc16a8a40ff60cdaca9e4e31d2

                    • C:\Users\Admin\AppData\Local\Temp\1010998001\ef64a4296e.exe

                      Filesize

                      4.3MB

                      MD5

                      b4be5ad70bafb7fd8096c70ccc223689

                      SHA1

                      9a41ba755db441b9d762eac47268e29b087723c8

                      SHA256

                      2d71fd241e16c6cd912681e48288466fb61004cac77d6c3a86d8338034a69dd0

                      SHA512

                      f7666764eae7de42a3b929159fb96dbc9465ed9777c288e5b5c6b4b68ecf41b2da0806d295a7732e93baf37aa24e4a609a46cd52407af238e9cc83524c12b4e3

                    • C:\Users\Admin\AppData\Local\Temp\1010999001\4f38713877.exe

                      Filesize

                      1.8MB

                      MD5

                      fa502b1d8b3fd6084a8ac5607ae1a701

                      SHA1

                      da41f5746a8df16395ba38fa1ca010b3a58b7cb1

                      SHA256

                      dab3f816539604580361e0f1de4f391c6a643d472220c3c3565033a80afb9c20

                      SHA512

                      a9c721f4b966d1935fa54c2248fede74d665dbae873da50c87c64fa5ad19f598c623029e56764cfd6c45a331e907be87cd2a1ef47bfe78e2ae22465fea9c5502

                    • C:\Users\Admin\AppData\Local\Temp\1011000001\97a77491a5.exe

                      Filesize

                      1.7MB

                      MD5

                      f06a9313a2586312b79a17d7426b348d

                      SHA1

                      810536724fce4c6f706f7ef1d113de7a4f97e2c4

                      SHA256

                      4219b97fe661f55a1dbd0f3c71187a6809ec655bb042e0d0c10371dfdba8d8a6

                      SHA512

                      515f162e7856ae909fbbca4c622b914d7904bb11658097a2fae5500d80fb864eaa64298459d473816afea2291b9e57096891f6174254c174fc10fe279f247b1e

                    • C:\Users\Admin\AppData\Local\Temp\1011001001\a12e960ff7.exe

                      Filesize

                      900KB

                      MD5

                      52e7b98611794a903f22fb5e6d8b7082

                      SHA1

                      8c686ba7c52015f6fdd9c0af115a345fe4b754bd

                      SHA256

                      b1660980c049d293a668e1186f6f8d7a9d4436b9d3e9d10e084943c49269b024

                      SHA512

                      2dfcf2d2c74c669592e5ac993a4ffef54befd9e5039bcdddc3bf3b8ee056e861f84dfc38125bd4d4f7f7d7faf5ab0e2cefdc76d5ec13a607ed074b65f4d7e0bd

                    • C:\Users\Admin\AppData\Local\Temp\1011002001\ac325a80a0.exe

                      Filesize

                      2.6MB

                      MD5

                      742a2e1aa103d7931fb9222139bac2d5

                      SHA1

                      9fd653f171990ac664860de6779ea89dc375c840

                      SHA256

                      4bbf30f5144a256a7e80022d0fba5bbb5b73ea5fac2d135b22a3b72d403b24bf

                      SHA512

                      9ac8d6e36cbdb464d96c9773ec977114d09fec8ca06ad5bd4d636966ca060c3e61bd22324c6707e2b552fb0404af7d2238b8b4613cece0e2dc5cc30a88580bb9

                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                      Filesize

                      1.8MB

                      MD5

                      9ee9fc91594ff0d745d83ae3ede6c725

                      SHA1

                      27ca7f96db3ed74658fc89ca6d33db35c59d8a77

                      SHA256

                      5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7

                      SHA512

                      bf7d5e625fbe7adb3d1bbdc60d9263a8bb3cc000f6053033ae1ea786f7a657e5012f0f0946835b18622313e6b0f298b0e1e7aa29329f89a9f45ad440220fccef

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                      Filesize

                      479KB

                      MD5

                      09372174e83dbbf696ee732fd2e875bb

                      SHA1

                      ba360186ba650a769f9303f48b7200fb5eaccee1

                      SHA256

                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                      SHA512

                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                      Filesize

                      13.8MB

                      MD5

                      0a8747a2ac9ac08ae9508f36c6d75692

                      SHA1

                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                      SHA256

                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                      SHA512

                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin

                      Filesize

                      6KB

                      MD5

                      d1b9a641dbe32145e123e6289be0aeb0

                      SHA1

                      d3a32f8400f167794151938ab79ff93ca9b46cce

                      SHA256

                      93b87de6b63349bcb2118113844aab87c443233a7be3efee9a793c4d0c9d08bb

                      SHA512

                      0d2a27870c08f327b3e54acb4614de40e2c7be9d7ddd43f5695b426c4f5997a0e217ee291c6ed0450cfa9649b6e8a8607e3257e8755484b53f8faaca80c14837

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin

                      Filesize

                      8KB

                      MD5

                      93663b7b1bb88a8e358a177ff572130e

                      SHA1

                      a8867f626cc593bc73afc0eff5fb08e51075c932

                      SHA256

                      25fab8a50c493152155be9666be013e10ef9ec59397a8ffc8c6e837d62f51dd4

                      SHA512

                      c9fb91e0a18c4afce9fb288668bdcec37598a93245b6bdc225e773d8af57b7d0e4d42cf2344e82804f601490f60fb9f54dce8df22e0f1381a479b31be5ac29af

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      5KB

                      MD5

                      9524bd8247ee2d8201d31dc891977469

                      SHA1

                      55652b6c398bb9c162278d35be53afd829c6afa9

                      SHA256

                      ee09bf4ebed501746e92cd1d633ed9847e9d38f9be76931f55c69bb41ab33b1d

                      SHA512

                      483b7dcb66da22b8fcc014e692c8d911f91e7f646f16a9a6e0aaff165816dbeceeab9024d9f0506102248b542d3d308d6f78eedc91fc559e21b24535aa62ed2f

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      6KB

                      MD5

                      a2258921fda59584aaa412f31f6420c6

                      SHA1

                      884cf7db33c63f31f7d2fc0f8ce672c7e7a039af

                      SHA256

                      d368f3b71c6c60f7c0b5e0aa4681759e17a5e60b066ae639bda64ba17ef16bb5

                      SHA512

                      8f03bf95c2c7d5705614458d64c24234188cdbb02fa1636c98ece1d79fa1a9d0b10fe27231aad3c9968c9fd00ea839e928ee32b164f58e494bd1b2c2c245e47c

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      15KB

                      MD5

                      d4c98387aeaa08193e3d8540d014f238

                      SHA1

                      4539abacbe4ab20203f64f5fd94910cf2e92c867

                      SHA256

                      8d383285e2288f350489209af9958e86db1ca270454bb1fc0249857965120a61

                      SHA512

                      198b1c3a6512ade971f0040e9eef8f1695bb48ff417e234daa75db633fe513ac05058cc849a78d910cb3564b14dc3dc218077d21f4fb4143f6ac9fb58557e275

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      15KB

                      MD5

                      b46918888778da20606a16192a7286ec

                      SHA1

                      67437aae954cd3919947daab78178fae0ae229be

                      SHA256

                      fe4b5b32cc90cedd05e3eb19369857b52acafe058856aa333ac91bd67ccc6a6c

                      SHA512

                      5f43f8f68569f8f672597dfc97aa637448f74652195c63386709dc957acfb34733e50ec9fe93b8249ca1a40e45cf7b5c46b08bb60a900c7775342e1a6880121e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\404cfdf4-9e95-40e9-9dc1-f4a65ddb057a

                      Filesize

                      26KB

                      MD5

                      1a39cc701dbc93b8fff39097a78975bb

                      SHA1

                      05ce2165fa0a4403392d0acf954dca9983d3d14f

                      SHA256

                      272ba52f577d6e6a85b4aa9cedc5a87f87f744e6f78849d0d0d6cf6f1331074e

                      SHA512

                      3923390ffaad813e5106340731d6f47ae425fc059912ae11c6cc6c4992face758f240cf390e15e26b526eca819db59689f947c4e0694eceaa16f6d763afa8953

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\5c130764-a479-4fa1-a041-35cc5e0424e1

                      Filesize

                      671B

                      MD5

                      23c549f79bf58adf17bd8f42579b876a

                      SHA1

                      e76d629f2bad978c634d8f120bdd2f217b5bcf1c

                      SHA256

                      b3b84cb7e144f5db4f073834eac69a9ef1e806b46d733128b7cae418b96c4481

                      SHA512

                      66001dcac74d0dcf009e607603ccd4f7e3468fdd920ff6d19c8c533fb7936807c3722dcbac92bb0c6958b10bd03d61eb151d9757bbe4c62364afe685749e4294

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\8c484729-6cdd-4350-a6f8-ebcee2212b98

                      Filesize

                      982B

                      MD5

                      0146d44f07cd61140575a74dfe5c0451

                      SHA1

                      164ec49f8b8fcc5545b0a112522995764a793760

                      SHA256

                      42d8c9ed32b94f9a09ab076038fb0308527f8ea6d776bb6c429825ab9c917f76

                      SHA512

                      177d97857df0f360cb5764c0d0163f1c2237e51c4c92e4f080033c6c218bc3d338fa39f01f7fb99a7321b6d59f973bb97aa0f392c96b0d4168129bfc23071aef

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                      Filesize

                      1.1MB

                      MD5

                      842039753bf41fa5e11b3a1383061a87

                      SHA1

                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                      SHA256

                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                      SHA512

                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                      Filesize

                      116B

                      MD5

                      2a461e9eb87fd1955cea740a3444ee7a

                      SHA1

                      b10755914c713f5a4677494dbe8a686ed458c3c5

                      SHA256

                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                      SHA512

                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                      Filesize

                      372B

                      MD5

                      bf957ad58b55f64219ab3f793e374316

                      SHA1

                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                      SHA256

                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                      SHA512

                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                      Filesize

                      17.8MB

                      MD5

                      daf7ef3acccab478aaa7d6dc1c60f865

                      SHA1

                      f8246162b97ce4a945feced27b6ea114366ff2ad

                      SHA256

                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                      SHA512

                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs-1.js

                      Filesize

                      11KB

                      MD5

                      9977494c5fba21931aeb7da3f5704210

                      SHA1

                      fbcb859ce038add54c697bad574e69f31b75c8c7

                      SHA256

                      4019561f6dace9e554cc8d6355b8e37e1492407cb025187ff670f39677bb9dda

                      SHA512

                      3eb6021ce5674b16b73fa87d9bdc5721a1a836f10b4708f825cafeb74ed45340a0e2ce3f2cb9c63bde58bad4323ccbe6b53e32ba95f244a3808be288cc12c766

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs.js

                      Filesize

                      10KB

                      MD5

                      b4a9f325d0235a09ab9fa100696d4508

                      SHA1

                      60b5c40e5d4c9761adb3cfe30d784962df686048

                      SHA256

                      16d116296740d15dd325fc510ece9ab07acc5aecb54049858f6e5e289273fec8

                      SHA512

                      d0ce250e4073ec64100e74fa1f76806013f9609ae59da88113626711df2415289df58cc7f466d71f84f92612f1410cd3e7de330ec44d6eef2cac8081ba5e99d3

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs.js

                      Filesize

                      15KB

                      MD5

                      633aed58f632a9c972da9d4ab6d4042e

                      SHA1

                      e6693723484aa70f7c0fc544172676fe83832deb

                      SHA256

                      88be126978d3055bd10bc52fd093e6271b665791e8b2b04463f744cc9544026f

                      SHA512

                      b6f9c4b7b2488a4a50c721acbe796ab7eb74c09d0c5b1beefc19d5d0de76939e9596a41212a53ad9efecfe259a9e4cbb8b940e01734856ec3d621dd115ac16ed

                    • memory/1068-2794-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-3222-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-3226-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-40-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-39-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-3229-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-37-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-33-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-20-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-3227-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-19-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-18-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-3217-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-3214-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-485-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-96-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-58-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-833-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-3228-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1068-501-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1524-74-0x00000000006C0000-0x0000000000D51000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/1524-75-0x00000000006C0000-0x0000000000D51000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/1856-57-0x0000000000AA0000-0x000000000172D000-memory.dmp

                      Filesize

                      12.6MB

                    • memory/1856-38-0x0000000000AA0000-0x000000000172D000-memory.dmp

                      Filesize

                      12.6MB

                    • memory/2932-500-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2932-498-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/3132-3-0x00000000005F0000-0x0000000000AAF000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/3132-2-0x00000000005F1000-0x000000000061F000-memory.dmp

                      Filesize

                      184KB

                    • memory/3132-0-0x00000000005F0000-0x0000000000AAF000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/3132-17-0x00000000005F0000-0x0000000000AAF000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/3132-1-0x0000000077194000-0x0000000077196000-memory.dmp

                      Filesize

                      8KB

                    • memory/3132-4-0x00000000005F0000-0x0000000000AAF000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/3396-55-0x0000000000840000-0x0000000000CD8000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/3396-76-0x0000000000840000-0x0000000000CD8000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/3396-77-0x0000000000840000-0x0000000000CD8000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/3396-97-0x0000000000840000-0x0000000000CD8000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/3936-493-0x0000000000E40000-0x00000000010E0000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/3936-471-0x0000000000E40000-0x00000000010E0000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/3936-472-0x0000000000E40000-0x00000000010E0000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/3936-473-0x0000000000E40000-0x00000000010E0000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/3936-496-0x0000000000E40000-0x00000000010E0000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/4540-3224-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/4540-3225-0x00000000001E0000-0x000000000069F000-memory.dmp

                      Filesize

                      4.7MB