Analysis

  • max time kernel
    21s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2024 21:21

General

  • Target

    fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5N.exe

  • Size

    1.8MB

  • MD5

    ebf798251a9e386cfb6cffcf54542830

  • SHA1

    5da641a8ad380d88bd05208339832f4886401d5d

  • SHA256

    fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5

  • SHA512

    0a5a2e0075c44997f73c4784936b7407cec2624bbd57917c65b279104f55aa8e84d73fab29e481e8b6c12c67d23432ceff859b6e54bec5f0069d18866bafbcf0

  • SSDEEP

    24576:c6aKEeSuuI1l4wI3O0GH7OKDfm5GWJTph4VKXAiXecS6+gNpp9MHoFtlgs7o3/TT:TRKW4wmkSKLmrtCjiXtpKKg31

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5N.exe
    "C:\Users\Admin\AppData\Local\Temp\fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5N.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe
        "C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4296
      • C:\Users\Admin\AppData\Local\Temp\1012513001\8566d8640a.exe
        "C:\Users\Admin\AppData\Local\Temp\1012513001\8566d8640a.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1568
      • C:\Users\Admin\AppData\Local\Temp\1012514001\rhnew.exe
        "C:\Users\Admin\AppData\Local\Temp\1012514001\rhnew.exe"
        3⤵
          PID:3080
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 1528
            4⤵
            • Program crash
            PID:5676
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 1568
            4⤵
            • Program crash
            PID:2836
        • C:\Users\Admin\AppData\Local\Temp\1012515001\992bd13bed.exe
          "C:\Users\Admin\AppData\Local\Temp\1012515001\992bd13bed.exe"
          3⤵
            PID:5108
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 1528
              4⤵
              • Program crash
              PID:4904
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 1544
              4⤵
              • Program crash
              PID:2356
          • C:\Users\Admin\AppData\Local\Temp\1012516001\16c457ff40.exe
            "C:\Users\Admin\AppData\Local\Temp\1012516001\16c457ff40.exe"
            3⤵
              PID:1396
            • C:\Users\Admin\AppData\Local\Temp\1012517001\c1b70b5e58.exe
              "C:\Users\Admin\AppData\Local\Temp\1012517001\c1b70b5e58.exe"
              3⤵
                PID:2732
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM firefox.exe /T
                  4⤵
                  • Kills process with taskkill
                  PID:4240
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM chrome.exe /T
                  4⤵
                  • Kills process with taskkill
                  PID:820
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM msedge.exe /T
                  4⤵
                  • Kills process with taskkill
                  PID:5648
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM opera.exe /T
                  4⤵
                  • Kills process with taskkill
                  PID:5268
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM brave.exe /T
                  4⤵
                  • Kills process with taskkill
                  PID:5332
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                  4⤵
                    PID:1744
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                      5⤵
                        PID:6052
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1716 -prefMapHandle 1708 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d91ceb79-c931-48eb-ac82-ba5fc3c2290b} 6052 "\\.\pipe\gecko-crash-server-pipe.6052" gpu
                          6⤵
                            PID:4364
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {51900eb6-b826-4b8e-a1ff-76a6f535dafb} 6052 "\\.\pipe\gecko-crash-server-pipe.6052" socket
                            6⤵
                              PID:692
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3084 -childID 1 -isForBrowser -prefsHandle 3076 -prefMapHandle 3068 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {15a93ef2-9719-4efd-bc13-77230b8f399f} 6052 "\\.\pipe\gecko-crash-server-pipe.6052" tab
                              6⤵
                                PID:5976
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3300 -childID 2 -isForBrowser -prefsHandle 4056 -prefMapHandle 4052 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {06a1e4a6-fb79-48b7-a53a-fc22ac447196} 6052 "\\.\pipe\gecko-crash-server-pipe.6052" tab
                                6⤵
                                  PID:2200
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4472 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 1416 -prefMapHandle 4544 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f7acab9-1d2e-4e11-bf35-c30b429cd12b} 6052 "\\.\pipe\gecko-crash-server-pipe.6052" utility
                                  6⤵
                                    PID:5676
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2084 -parentBuildID 20240401114208 -prefsHandle 2156 -prefMapHandle 3368 -prefsLen 29144 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1095ef13-4514-4615-8658-2d44fb6f81b9} 6052 "\\.\pipe\gecko-crash-server-pipe.6052" gpu
                                    6⤵
                                      PID:5156
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3556 -childID 3 -isForBrowser -prefsHandle 2092 -prefMapHandle 3548 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d03fc065-2b99-42be-987a-cc5914453607} 6052 "\\.\pipe\gecko-crash-server-pipe.6052" tab
                                      6⤵
                                        PID:5444
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5092 -childID 4 -isForBrowser -prefsHandle 5056 -prefMapHandle 5064 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a6c9cf6f-baca-4d67-8731-c6a4761d4808} 6052 "\\.\pipe\gecko-crash-server-pipe.6052" tab
                                        6⤵
                                          PID:2756
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5168 -childID 5 -isForBrowser -prefsHandle 5160 -prefMapHandle 5156 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {95ad2b18-7f86-4593-9759-c8e84a351675} 6052 "\\.\pipe\gecko-crash-server-pipe.6052" tab
                                          6⤵
                                            PID:5776
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /F /IM firefox.exe /T
                                        4⤵
                                        • Kills process with taskkill
                                        PID:5860
                                    • C:\Users\Admin\AppData\Local\Temp\1012518001\033e79feb4.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1012518001\033e79feb4.exe"
                                      3⤵
                                        PID:5544
                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    1⤵
                                      PID:5260
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3080 -ip 3080
                                      1⤵
                                        PID:5388
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3080 -ip 3080
                                        1⤵
                                          PID:1380
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5108 -ip 5108
                                          1⤵
                                            PID:680
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 5108 -ip 5108
                                            1⤵
                                              PID:5672
                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                              1⤵
                                                PID:5260

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EFY08QA2\download[1].htm

                                                Filesize

                                                1B

                                                MD5

                                                cfcd208495d565ef66e7dff9f98764da

                                                SHA1

                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                SHA256

                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                SHA512

                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json.tmp

                                                Filesize

                                                19KB

                                                MD5

                                                f9de66e47bc69c797f1ce61d431bbf13

                                                SHA1

                                                22318ca8bfc8d78f1fd5d01040b955bb4c80bb28

                                                SHA256

                                                68f4f15b5041e467a59fb7245fb831e6a62d475a2311980212dd17bc67068300

                                                SHA512

                                                d26d1e5fa3c359039dd43632d7819d7784df8744e0e993427b27f7f2c33c5bec18edf3b586608d371ffa655b417df6a53af7105b37986d3d303e73f2deea7a64

                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                Filesize

                                                15KB

                                                MD5

                                                96c542dec016d9ec1ecc4dddfcbaac66

                                                SHA1

                                                6199f7648bb744efa58acf7b96fee85d938389e4

                                                SHA256

                                                7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                SHA512

                                                cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                              • C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe

                                                Filesize

                                                3.3MB

                                                MD5

                                                7823e902900881094372948957825fe1

                                                SHA1

                                                297a663f3b64fb9863164d10ac698bef03dd3a0f

                                                SHA256

                                                92d36e5fb3fdbf10ad10c7880c40013c2e21b8a49e20720137d2b4851681233f

                                                SHA512

                                                60d4ea35cfec5154cfa3cb767de7c839ca8b3987b27599ea218ec1c47f1d111a59f193cd3cfd1266ae384434ae653f1e0a297f7222a2592e529b2b4404dd6238

                                              • C:\Users\Admin\AppData\Local\Temp\1012513001\8566d8640a.exe

                                                Filesize

                                                1.9MB

                                                MD5

                                                99a31354f39549f085e6ffc213da9332

                                                SHA1

                                                35bc861303e0085349919376dc3ecd87f2c00264

                                                SHA256

                                                e8004da7a3c79934e0234cf767e38363368899050858a81dfd31b2010395d40c

                                                SHA512

                                                fb38c1e4126c9ced52b40977ba67eab30b698c481c3bb1107b45b656e02a20839d977d4f0ec0de384c6cc465c19870849cef219a7d0a109fa2b21aaa3a6de4b1

                                              • C:\Users\Admin\AppData\Local\Temp\1012514001\rhnew.exe

                                                Filesize

                                                1.8MB

                                                MD5

                                                90aa0042c2825073aac9d8cb97a3696d

                                                SHA1

                                                3bc907a5ddd6172fb9ce4b672feed48e3c2da961

                                                SHA256

                                                106d17aab9be8de992208dfce5f7fde982f0082d34dae389675ce1e19e168cae

                                                SHA512

                                                1547e0ef3dd94c4e05f430be114dadabaca8c29c589d9ca27d141e0eb3508d9b5557755cc0d081833b993397203b14d10248a947c92fcf0caf86416a07fc13f9

                                              • C:\Users\Admin\AppData\Local\Temp\1012515001\992bd13bed.exe

                                                Filesize

                                                1.7MB

                                                MD5

                                                3b0ee0f73b83c5fdec23ed05a9ce07f6

                                                SHA1

                                                95b1e81d4ff61b6b075751363b9df8892edc1185

                                                SHA256

                                                234acf55281350a35fc087395b98052b3e759ffc3dab816ae019c84b1c8818f1

                                                SHA512

                                                92a770454dfb5d12d560f664a4d3fd3d2b7913c0ca8ab72e8630681e6d7e1f3354ffa28195182593fd4f0b03a629bb2a82769f11035dfcb934fbf8f0fa7ea9a5

                                              • C:\Users\Admin\AppData\Local\Temp\1012516001\16c457ff40.exe

                                                Filesize

                                                4.9MB

                                                MD5

                                                e96aca70fff7cef90aeaecfd082dbaad

                                                SHA1

                                                c1a8c82f70d72dd66d1b4383f8728dc3e32f3a22

                                                SHA256

                                                49b75ffaa9e81188cd1cb9d09ec7e43912bf8dbf4c85e3e1ee061e18e7d89efb

                                                SHA512

                                                ae758571212f329544941a9c1cb9610c4c029acae2280bfdf466847daa024fd5c6d680f8663fafd75344cc6cba233876e1297b47da3cb68455d358f54841f242

                                              • C:\Users\Admin\AppData\Local\Temp\1012517001\c1b70b5e58.exe

                                                Filesize

                                                947KB

                                                MD5

                                                80255e2c49a8627a19583eeaad5b942a

                                                SHA1

                                                b60aeae02d417e020082077ea4cd8b99dd21416c

                                                SHA256

                                                243409ec8812d65caecda60ae06e6c2e96ff6facad4c547194360731b74bcaea

                                                SHA512

                                                90f927024866a4bb789f679e0a8ad93cb31bca2c4612919f6841116063f831bafbc31630b8d4ec02c1928f192b2434ceb006e871909c08b9bef31af8915c80e9

                                              • C:\Users\Admin\AppData\Local\Temp\1012518001\033e79feb4.exe

                                                Filesize

                                                2.7MB

                                                MD5

                                                0f54b179b09e3bd6d38e6394942a095b

                                                SHA1

                                                54ef51be1678cf3cf0d1ce142d2f8011ea04cd6e

                                                SHA256

                                                19120b2ecb7405fc7fa7afe0a806571148c00cea20160fe66598016ab5329338

                                                SHA512

                                                6ab103d8e4083973cea5fb7f43115abb925e45c5174ccdaa29747640c61e31e82abc8d8143b9a5d3167db017aad28611ec447f9c4f45b3362e87048c02cd2150

                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                Filesize

                                                1.8MB

                                                MD5

                                                ebf798251a9e386cfb6cffcf54542830

                                                SHA1

                                                5da641a8ad380d88bd05208339832f4886401d5d

                                                SHA256

                                                fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5

                                                SHA512

                                                0a5a2e0075c44997f73c4784936b7407cec2624bbd57917c65b279104f55aa8e84d73fab29e481e8b6c12c67d23432ceff859b6e54bec5f0069d18866bafbcf0

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                                Filesize

                                                7KB

                                                MD5

                                                4c2d2fc47bb8f72048dfea8e9c595bdf

                                                SHA1

                                                df9081f5f41160807609b2f96bedb86e8444e9de

                                                SHA256

                                                53a7fb12d5f70348faab2b25e642d1eaeb2f52fd1df2a04281a050b73ee19c60

                                                SHA512

                                                07bd207cc36b7871f7dcd46ae1b8c0f5743b0966f2e050aa99f8f88fd41d604d5e4e1e2b3550678075e8269378ca9b9624134e80456ecb95768a18648be591c1

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                                Filesize

                                                8KB

                                                MD5

                                                a4e15520a610a9343b826304645b2193

                                                SHA1

                                                0323cd7efac41745d390d9e76ff5588f3a4cfa2b

                                                SHA256

                                                1be0aa1130ba5ebd67dbac32edd92accc3448cf751830a122ee5c898dfed2e12

                                                SHA512

                                                0a058e53999d0afa1944bb74295ae0749d956440d814f042c9c2ecb1871f84e7b8e87f5ccdc3ebd71629b10a7577883fc7d321cc870e734b5f07388daa430562

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                                                Filesize

                                                10KB

                                                MD5

                                                a9194a639a786e4f4dafaabda02f5d54

                                                SHA1

                                                e7798a8843d46f0ebc37de8e007e5085bf72d8bc

                                                SHA256

                                                618aa36cca2aa092f3af5d5c2046aa7ffeed8acc06f4beba81b4e61ffc4278e2

                                                SHA512

                                                4abf4672ee2b3a6cbfc6f8d04e80e67e7667c624fc7ab3cdea744816bc8ad9fe29b135d7e663b0907407a3bef561c4b0795b2e50def958186b735e219d8ab649

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                Filesize

                                                5KB

                                                MD5

                                                66edeab1b5761a29a863ad3202f409bd

                                                SHA1

                                                894ab05cb31db6f073914d4008b2a9a16926140f

                                                SHA256

                                                4917089e5ace4019086f437cb6582f7d7c6f87dad02c5fe637c624de7798ef07

                                                SHA512

                                                fba1a8a35639f0bc5ed32cf885fdea6c9243735f1d0aaf560f8cf35b4ca6a5677c84c1f49ce49008c4b31f8f394f170f04613187ddfde421d85ec5afa3ea4cee

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                                                Filesize

                                                13KB

                                                MD5

                                                252dd9270e7f367a4267aeacae4911b1

                                                SHA1

                                                6bddeaff5ec6dbae569c5168fed8138a4f871a4a

                                                SHA256

                                                fc1eb4d8f0abcfdec836a634f1ee3cd3cca6ff85aa72b634b1b1e17ac71e31d5

                                                SHA512

                                                8ef82494c45c7e443f5f2658b2d073a819cb7b2c08d8ecc1409935a25b825c223c7a714a40589e7d640224ac5d373f2a2d739ab68d1d283d269ec1c4012a15e4

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\38b0c94e-2cab-4948-9fc8-505695bec12b

                                                Filesize

                                                982B

                                                MD5

                                                85dbeac2373d6f309b20e2139ec272e4

                                                SHA1

                                                cc99172629a6c7a6ecc07488e778cd0d327ffaa8

                                                SHA256

                                                4bed3a3681483276b5c66a33b9cb5fc1dd801a4dfcdd2cdc414e4e76ddeca5ca

                                                SHA512

                                                14a8922be14f8455ee51d9fd59f14f3a9727c261e4c0bc3e463496fb1eb23568c740f4bed1f4a305ee0327edee66dc6220d2155f3e4f12727732df626cca02e5

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\9773c528-92ec-45d1-9d5e-fbfbd89a5ee6

                                                Filesize

                                                671B

                                                MD5

                                                1b8f7ae62ccb6ac2a6bd798db91e3226

                                                SHA1

                                                7a8a8f6f8faa0b4886a8c22c4c13297f752e9eb1

                                                SHA256

                                                9ace8df59c52ef72df6be60ba9f4ce82a49f285089a429d44734abfd2a2d015a

                                                SHA512

                                                9d7397c191c0e79217486434ae8b229b49fb38c6c05275f28f8ed01c27d607638a9b31f4a88762124e28a0a9ab28677580698201d9194d329572e0ad3f0dd7ab

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\d70812d9-b236-48a8-9f2f-c8c5a8cda44b

                                                Filesize

                                                26KB

                                                MD5

                                                547d4534cbff16243f1c6ad7f4893049

                                                SHA1

                                                70a4d4ea55a4e8fbc4dc350350393cfea1d856e1

                                                SHA256

                                                21da1d062902698cb732fb62efa9b033094cb533a99e4d73ba1346e4a5ab8818

                                                SHA512

                                                dc7a3815625f6859b45f35462d386c3b4bb986012105677a8dc47140d728b10521be2fd739321754fd4ea9f1e03950d1299ecff03518044cd8051bb50548a4b4

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                                                Filesize

                                                10KB

                                                MD5

                                                f8d4292d2abceb94f60a089ff25b92da

                                                SHA1

                                                1dd0a737ae8c2a8968adbb197e279f9809892ca3

                                                SHA256

                                                f35a139fa08d26a12d18d3b454845cca5d613b0a627a3afa219614ac6086dfaf

                                                SHA512

                                                6ab322075bc77bcf9fb045226e2eff2d07fb9c03dd90123edb3a03be25da4348e370d9508466eab35ff2920cf8d7b702a064e8bccfef537b8658035b3a6f2acc

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                                                Filesize

                                                11KB

                                                MD5

                                                a5bfef0c6a33b3d2eec316ce16490673

                                                SHA1

                                                b7d1db3ddc4df9ef3fe9150028d298a67f36f597

                                                SHA256

                                                60b321377bc2b91365973d9220df9b5ea9a1d86acc98de643655034c4e55a060

                                                SHA512

                                                c8b5995107da8a8250669fe6a75f2dbd90470f21b136979184c15133eb7684f558b030fdf1c99b973ef8a16944d348cff896553dad6c5784ae14105c70334249

                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                                                Filesize

                                                11KB

                                                MD5

                                                9dad838ba7ceb302e424da4315f5f760

                                                SHA1

                                                84c1c202bf2b44d3f2ffad3b89d5af40f9ca160e

                                                SHA256

                                                5d7caa3a7e3a80ef1a4702f7086fe016ff7ed8356d7a46de3afd1f011bf35e62

                                                SHA512

                                                e7fd69060d71b2965de81bdae11779b3cc0527b591f881e33be25339289dc5d1ea15ba3e698b31eaba22cc121bbf4427cc1edf486ee3df022c2ff7b7f64fc712

                                              • memory/384-557-0x0000000000180000-0x0000000000647000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/384-1382-0x0000000000180000-0x0000000000647000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/384-19-0x0000000000180000-0x0000000000647000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/384-16-0x0000000000180000-0x0000000000647000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/384-20-0x0000000000180000-0x0000000000647000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/384-1018-0x0000000000180000-0x0000000000647000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/1396-14773-0x0000000000A20000-0x0000000000F16000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/1396-11655-0x0000000000A20000-0x0000000000F16000-memory.dmp

                                                Filesize

                                                5.0MB

                                              • memory/1568-5974-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                Filesize

                                                8.4MB

                                              • memory/1568-1489-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                                Filesize

                                                8.4MB

                                              • memory/2372-0-0x00000000001E0000-0x00000000006A7000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/2372-1-0x0000000077284000-0x0000000077286000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/2372-2-0x00000000001E1000-0x000000000020F000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/2372-3-0x00000000001E0000-0x00000000006A7000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/2372-5-0x00000000001E0000-0x00000000006A7000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/2372-18-0x00000000001E0000-0x00000000006A7000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/3080-25492-0x00000000004C0000-0x0000000000969000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/3080-3725-0x00000000004C0000-0x0000000000969000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/3080-7724-0x00000000004C0000-0x0000000000969000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/4296-49-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-87-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-51-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-55-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-103-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-57-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-59-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-61-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-63-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-65-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-67-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-69-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-4147-0x0000000072E9E000-0x0000000072E9F000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4296-71-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-73-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-39-0x0000000072E9E000-0x0000000072E9F000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4296-75-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-40-0x0000000000E70000-0x00000000011CE000-memory.dmp

                                                Filesize

                                                3.4MB

                                              • memory/4296-41-0x0000000005DB0000-0x0000000005F68000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-47-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-79-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-83-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-85-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-53-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-89-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-45-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-43-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-42-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-91-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-77-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-81-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-93-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-101-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-99-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-97-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4296-95-0x0000000005DB0000-0x0000000005F62000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/5108-25920-0x00000000002C0000-0x000000000073B000-memory.dmp

                                                Filesize

                                                4.5MB

                                              • memory/5108-10465-0x00000000002C0000-0x000000000073B000-memory.dmp

                                                Filesize

                                                4.5MB

                                              • memory/5108-6719-0x00000000002C0000-0x000000000073B000-memory.dmp

                                                Filesize

                                                4.5MB

                                              • memory/5260-28579-0x0000000000180000-0x0000000000647000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/5260-27497-0x0000000000180000-0x0000000000647000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/5260-10282-0x0000000000180000-0x0000000000647000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/5260-9236-0x0000000000180000-0x0000000000647000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/5544-21477-0x0000000000600000-0x00000000008BA000-memory.dmp

                                                Filesize

                                                2.7MB

                                              • memory/5544-20557-0x0000000000600000-0x00000000008BA000-memory.dmp

                                                Filesize

                                                2.7MB

                                              • memory/5544-17354-0x0000000000600000-0x00000000008BA000-memory.dmp

                                                Filesize

                                                2.7MB

                                              • memory/5544-17353-0x0000000000600000-0x00000000008BA000-memory.dmp

                                                Filesize

                                                2.7MB

                                              • memory/5544-16472-0x0000000000600000-0x00000000008BA000-memory.dmp

                                                Filesize

                                                2.7MB