Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 15:49

General

  • Target

    7f9c4f99669b5c05535075cc97e746e9df229b8177f56a0a9e989b861e8a2ef4.exe

  • Size

    3.1MB

  • MD5

    03bb6c45bf7f0ce8caa6c8ba6ca33509

  • SHA1

    f59d3d9d070984d3bd3e4bd7c903990b204ed554

  • SHA256

    7f9c4f99669b5c05535075cc97e746e9df229b8177f56a0a9e989b861e8a2ef4

  • SHA512

    0e99313226eb3df882a9372820532d71ebe95616f7290e4eb08256681af7bf8826c66cea34cd50f89b1dc34af145fa7803d036d64d58a45855e998982d4259be

  • SSDEEP

    49152:qmZuKkpYpaS4Zqf63VQkUfHZjTvfS1REpnlt+nzZWF5whsj1NbyE5Hd:qeg4Cqf63Vsf5jTvfeEntzohs5sE

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

xworm

Version

5.0

C2

45.200.148.155:5050

Mutex

i5ZVKLKJz2PVTovK

Attributes
  • Install_directory

    %AppData%

  • install_file

    SecurityHealthSystray.exe

aes.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 2 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 9 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f9c4f99669b5c05535075cc97e746e9df229b8177f56a0a9e989b861e8a2ef4.exe
    "C:\Users\Admin\AppData\Local\Temp\7f9c4f99669b5c05535075cc97e746e9df229b8177f56a0a9e989b861e8a2ef4.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe
        "C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3080
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 224
          4⤵
          • Program crash
          PID:3688
      • C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe
        "C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2328
        • C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe
          "C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4008
      • C:\Users\Admin\AppData\Local\Temp\1013458001\9Qk4n8B.exe
        "C:\Users\Admin\AppData\Local\Temp\1013458001\9Qk4n8B.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1052
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1013458001\9Qk4n8B.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2788
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '9Qk4n8B.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2704
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1656
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecurityHealthSystray.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2244
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:5288
      • C:\Users\Admin\AppData\Local\Temp\1013459001\adbe65767a.exe
        "C:\Users\Admin\AppData\Local\Temp\1013459001\adbe65767a.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5032
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 1504
          4⤵
          • Program crash
          PID:3988
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 1504
          4⤵
          • Program crash
          PID:4460
      • C:\Users\Admin\AppData\Local\Temp\1013460001\9433baff8d.exe
        "C:\Users\Admin\AppData\Local\Temp\1013460001\9433baff8d.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4052
      • C:\Users\Admin\AppData\Local\Temp\1013461001\8080f07721.exe
        "C:\Users\Admin\AppData\Local\Temp\1013461001\8080f07721.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:956
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:224
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4664
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3516
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4348
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4784
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3852
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1928
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1932 -parentBuildID 20240401114208 -prefsHandle 1848 -prefMapHandle 1840 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7cab1423-d592-46d3-a621-7c3fe54cf423} 1928 "\\.\pipe\gecko-crash-server-pipe.1928" gpu
              6⤵
                PID:3940
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {79f76868-b162-4791-8aa7-f9cf03d692df} 1928 "\\.\pipe\gecko-crash-server-pipe.1928" socket
                6⤵
                  PID:700
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3108 -childID 1 -isForBrowser -prefsHandle 3124 -prefMapHandle 3144 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 876 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8016eab7-cb69-42e0-bcbe-2f7de73a4959} 1928 "\\.\pipe\gecko-crash-server-pipe.1928" tab
                  6⤵
                    PID:4348
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3464 -childID 2 -isForBrowser -prefsHandle 3700 -prefMapHandle 3092 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 876 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7e07ca6-8182-43a0-934b-16d701f6ec12} 1928 "\\.\pipe\gecko-crash-server-pipe.1928" tab
                    6⤵
                      PID:3952
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4536 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4580 -prefMapHandle 4576 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f9c419cf-6578-4e1b-b701-4cdf132a1ea3} 1928 "\\.\pipe\gecko-crash-server-pipe.1928" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5716
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5100 -childID 3 -isForBrowser -prefsHandle 5092 -prefMapHandle 5088 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 876 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {66298f85-6664-4b34-8984-b3244fd97a4e} 1928 "\\.\pipe\gecko-crash-server-pipe.1928" tab
                      6⤵
                        PID:6140
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5236 -childID 4 -isForBrowser -prefsHandle 5244 -prefMapHandle 5248 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 876 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {deb865e5-c462-4c83-8812-f90d9225c98a} 1928 "\\.\pipe\gecko-crash-server-pipe.1928" tab
                        6⤵
                          PID:2980
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5528 -childID 5 -isForBrowser -prefsHandle 5452 -prefMapHandle 5456 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 876 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {df3773e9-d780-459c-aca6-6471cdabddfa} 1928 "\\.\pipe\gecko-crash-server-pipe.1928" tab
                          6⤵
                            PID:632
                    • C:\Users\Admin\AppData\Local\Temp\1013462001\6fe50512e8.exe
                      "C:\Users\Admin\AppData\Local\Temp\1013462001\6fe50512e8.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4340
                    • C:\Users\Admin\AppData\Local\Temp\1013463001\fbde09cecd.exe
                      "C:\Users\Admin\AppData\Local\Temp\1013463001\fbde09cecd.exe"
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5188
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 5188 -s 1456
                        4⤵
                        • Program crash
                        PID:2012
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5032 -ip 5032
                  1⤵
                    PID:4568
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5032 -ip 5032
                    1⤵
                      PID:1128
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3080 -ip 3080
                      1⤵
                        PID:2396
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5032 -ip 5032
                        1⤵
                          PID:2352
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1544
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 5188 -ip 5188
                          1⤵
                            PID:4244
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5544

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                            Filesize

                            2KB

                            MD5

                            968cb9309758126772781b83adb8a28f

                            SHA1

                            8da30e71accf186b2ba11da1797cf67f8f78b47c

                            SHA256

                            92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                            SHA512

                            4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W9QJOIKH\download[1].htm

                            Filesize

                            1B

                            MD5

                            cfcd208495d565ef66e7dff9f98764da

                            SHA1

                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                            SHA256

                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                            SHA512

                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            18KB

                            MD5

                            8c59f616c66db7de21d73de164ec7a91

                            SHA1

                            46517bbd676f6647cf51f6cb8a2ff98700488ba6

                            SHA256

                            84365a7937f2159e9bb67a2d23816649aca51df0a178e321e1d5734c58228d1d

                            SHA512

                            cc83f1dcb553729aef52355112348037bf83601e6aef8e26205e9dbac03c70f06afe7cf5dbb177235cd01a41b405eb2fe42faaf65b29d8e5474dcd211cdbc474

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            18KB

                            MD5

                            329db208fe87904b8385bbce571b2d9c

                            SHA1

                            5bacb7a921749620cab8e8ee69f19b32cb555b88

                            SHA256

                            55d53c7584d86133fa711e279f562d7d524840d052a46917b13d8a2b29ad4a51

                            SHA512

                            edc7f2d0d99ec635e3a608d08a6d002c2e9d06866dd6173bce329a61d0cbc2b8a623ebbf4aa5d6de44a22972c600d6f549425a138c3c2ffce67b13f6adc68e8d

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            18KB

                            MD5

                            9792fd168ba32bfd588a8296c5fe0ddb

                            SHA1

                            622209a4000542ebcd4461844f38406d2996c932

                            SHA256

                            6586367c68f56d2ed70812f1fce03e46d67069fb9da44f9a0318d628239a2f0f

                            SHA512

                            5f600a8f2c48bac85ecb60332a1d3b78d213a6c0023487c42675e95bcfb2e66b1a30776660d87d1315f730bb90fcf96c0404c8a95c878115d9d66cc4de51898f

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json

                            Filesize

                            19KB

                            MD5

                            da29b6057afda0441df0c9f53eb5daf4

                            SHA1

                            646ecd9a2cf1ae2dd100f70813465c5a5f643578

                            SHA256

                            71b58ee7f12acdce09426661286c5fcf36c32deebb5044f862a3b895c95e69f8

                            SHA512

                            f3fda7f5a21c58c86a0ba2db75ad86b921a4b40d787fc8bc1a3d2daef30d326c57cac94e23321747290a900be97854858a3b0ef1145baa1e6146e8945658766e

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                            Filesize

                            13KB

                            MD5

                            b15261a0ccec023ff355f3abc63c1b29

                            SHA1

                            47b092ff4e5b4b3fdccc8c62bf9ba953f4a9bd39

                            SHA256

                            75f13a937080b461c41b48ffa8c77b61ea7093970f5d188974d5efceee48349e

                            SHA512

                            e29914eb2c803a2d2f9bb1fcab37db4756de1d142a4202fb7a15b6895d607940699124950b2f9e6c21595a81dd58594a2d091439b484389bba262188a21e23b8

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                            Filesize

                            15KB

                            MD5

                            96c542dec016d9ec1ecc4dddfcbaac66

                            SHA1

                            6199f7648bb744efa58acf7b96fee85d938389e4

                            SHA256

                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                            SHA512

                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                          • C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe

                            Filesize

                            2.5MB

                            MD5

                            2a78ce9f3872f5e591d643459cabe476

                            SHA1

                            9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                            SHA256

                            21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                            SHA512

                            03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                          • C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe

                            Filesize

                            9.9MB

                            MD5

                            53306653e88891da35bdfc1330a2dafd

                            SHA1

                            0870df54ca24e32bf88ccf00d7dd0ada3a0ea096

                            SHA256

                            fc3471e819eafc1640b51c5c8d4bd36db60dc96d912769fa0dfd619f3ec6ff09

                            SHA512

                            930ff27fc7377eaf0097cc6430f2c5486336c398a7ae08fadbcb0af62490b96c0b9ec3d36455c04e5a79d2405fc0c6f1f6a44b0298f3b6ff46f2a6c591aa51ba

                          • C:\Users\Admin\AppData\Local\Temp\1013458001\9Qk4n8B.exe

                            Filesize

                            1.9MB

                            MD5

                            5d88053a8fa89daf50a22f3e7130b84f

                            SHA1

                            376315c3b18c6d410a615dcc18dff4529f44ef9b

                            SHA256

                            78d2025e6bfce4ee78142552e30d2eb07c9bb7901ec6407ab8ce5bba72c13074

                            SHA512

                            f60af0d664d5a13555c21891a02fab76d7c63d45b6497e8c7da1cad3cc89223d1578c9b0a394fd23bb650777eb8f295cb372519db0c22a7061c0a4a0872261eb

                          • C:\Users\Admin\AppData\Local\Temp\1013459001\adbe65767a.exe

                            Filesize

                            1.7MB

                            MD5

                            2e294f3db1a3b1f0624b69d47ba3456c

                            SHA1

                            082c1d3d3a7363b86db51d01e23959f72eaf740c

                            SHA256

                            03100a9686a78171ad87a164d17b5cf4defc92736db32352fc16bf60e5d731fc

                            SHA512

                            c60875c1825ec998996de35c52cff8b03c0b98631578c93bce026c9f580494fd2df216bbbe6db13832b67a4f0f21d045926041ce3865f87508c5bdd422e753e7

                          • C:\Users\Admin\AppData\Local\Temp\1013460001\9433baff8d.exe

                            Filesize

                            1.7MB

                            MD5

                            a7af58fe0da7ef19da6ad1ce8376597e

                            SHA1

                            891eb45d3c52f186cd2cfb03997b996c4535bf26

                            SHA256

                            b8b2986f268c6ba53ea30d750092c0a26e7fe8cdfb74a3ff3be9513ad05b716d

                            SHA512

                            7c0d7d30b7c6a013378ab2f744d45b218c5be00fc20bfc00cd983a13e60645e8dc311278c433d842151043408fb316a00c20cb655b13426dcd7e6acfdcbb25c5

                          • C:\Users\Admin\AppData\Local\Temp\1013461001\8080f07721.exe

                            Filesize

                            950KB

                            MD5

                            58d8b4340fa9ca05e2ecc82281f6ba30

                            SHA1

                            bf7fdb9954f4763c5bd0d6f45e5df9e2fa4326e5

                            SHA256

                            95cd445851e76e32539034fb5614d3bd2d04747479941dda234a0175e78dc2a4

                            SHA512

                            0d8c69ff14216d151151a935a3ff76679e219f551badb37fa441e189c7364a68e03cb4b65f8400238fddd48e862b004a7b7163043fb1a524feba30da3d8e74ff

                          • C:\Users\Admin\AppData\Local\Temp\1013462001\6fe50512e8.exe

                            Filesize

                            2.7MB

                            MD5

                            0c628411b34cd221d309d406683deca1

                            SHA1

                            5f8be3da5456806706c322c3c83aaa60c2d5f1f3

                            SHA256

                            0332638fac22e2222292b66defa0c78ac428d160e44802ca89cfe0b898f70620

                            SHA512

                            40c2c39c84d56d4cd3a0541fefb04738eab0e19e9aef3baa0f9ffff89b264cddd33fa056f9a23dfdf92c6dddb5dc6334dcead943d634143bbd0d2601b3332fb9

                          • C:\Users\Admin\AppData\Local\Temp\1013463001\fbde09cecd.exe

                            Filesize

                            1.9MB

                            MD5

                            e96cd9e1c8cbc927c9c445e155d5bd75

                            SHA1

                            6c8d7a80cb4635fda0f7b799ace942dcd10b3700

                            SHA256

                            9f1169888c4c2acd65e79928bb27a686204fa3b622b921a7ee56c7a735924eb6

                            SHA512

                            419cb0650a718f7356335745a64d441d8693c48181692bdfb22da508fa993e93772f5ee89ae5085e5ae3d04f28936b57e12e6704291be6acc45041744ba7f413

                          • C:\Users\Admin\AppData\Local\Temp\_MEI23282\VCRUNTIME140.dll

                            Filesize

                            94KB

                            MD5

                            a87575e7cf8967e481241f13940ee4f7

                            SHA1

                            879098b8a353a39e16c79e6479195d43ce98629e

                            SHA256

                            ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

                            SHA512

                            e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

                          • C:\Users\Admin\AppData\Local\Temp\_MEI23282\_bz2.pyd

                            Filesize

                            78KB

                            MD5

                            bcf0d58a4c415072dae95db0c5cc7db3

                            SHA1

                            8ce298b7729c3771391a0decd82ab4ae8028c057

                            SHA256

                            d7faf016ef85fdbb6636f74fc17afc245530b1676ec56fc2cc756fe41cd7bf5a

                            SHA512

                            c54d76e50f49249c4e80fc6ce03a5fdec0a79d2ff0880c2fc57d43227a1388869e8f7c3f133ef8760441964da0bf3fc23ef8d3c3e72ce1659d40e8912cb3e9bc

                          • C:\Users\Admin\AppData\Local\Temp\_MEI23282\_ctypes.pyd

                            Filesize

                            116KB

                            MD5

                            41a9708af86ae3ebc358e182f67b0fb2

                            SHA1

                            accab901e2746f7da03fab8301f81a737b6cc180

                            SHA256

                            0bd4ed11f2fb097f235b62eb26a00c0cb16815bbf90ab29f191af823a9fed8cf

                            SHA512

                            835f9aa33fdfbb096c31f8ac9a50db9fac35918fc78bce03dae55ea917f738a41f01aee4234a5a91ffa5bdbbd8e529399205592eb0cae3224552c35c098b7843

                          • C:\Users\Admin\AppData\Local\Temp\_MEI23282\_lzma.pyd

                            Filesize

                            150KB

                            MD5

                            ba3797d77b4b1f3b089a73c39277b343

                            SHA1

                            364a052731cfe40994c6fef4c51519f7546cd0b1

                            SHA256

                            f904b02720b6498634fc045e3cc2a21c04505c6be81626fe99bdb7c12cc26dc6

                            SHA512

                            5688ae25405ae8c5491898c678402c7a62ec966a8ec77891d9fd397805a5cfcf02d7ae8e2aa27377d65e6ce05b34a7ffdedf3942a091741af0d5bce41628bf7d

                          • C:\Users\Admin\AppData\Local\Temp\_MEI23282\_socket.pyd

                            Filesize

                            73KB

                            MD5

                            79c2ff05157ef4ba0a940d1c427c404e

                            SHA1

                            17da75d598deaa480cdd43e282398e860763297b

                            SHA256

                            f3e0e2f3e70ab142e7ce1a4d551c5623a3317fb398d359e3bd8e26d21847f707

                            SHA512

                            f91fc9c65818e74ddc08bbe1ccea49f5f60d6979bc27e1cdb2ef40c2c8a957bd3be7aea5036394abab52d51895290d245fd5c9f84cc3cc554597ae6f85c149e1

                          • C:\Users\Admin\AppData\Local\Temp\_MEI23282\base_library.zip

                            Filesize

                            812KB

                            MD5

                            ab6d3149a35e6baddf630cdcefe0dab5

                            SHA1

                            44cdb197e8e549a503f6cfcb867a83bf2214d01c

                            SHA256

                            1d91fa604893531393f83e03e68eb97d2c14c2d957ed33877d2b27b7c30ce059

                            SHA512

                            28a882e86d92d42ff983b68445cc90431c2b65b7ec3abbffb5585a9750d67b8b52a1361e20d4d80ca4a30b927fe543a2e9c9a65c1846e42a112b511ddc59545a

                          • C:\Users\Admin\AppData\Local\Temp\_MEI23282\libffi-7.dll

                            Filesize

                            32KB

                            MD5

                            eef7981412be8ea459064d3090f4b3aa

                            SHA1

                            c60da4830ce27afc234b3c3014c583f7f0a5a925

                            SHA256

                            f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                            SHA512

                            dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                          • C:\Users\Admin\AppData\Local\Temp\_MEI23282\pyexpat.pyd

                            Filesize

                            187KB

                            MD5

                            f3630fa0ca9cb85bfc865d00ef71f0aa

                            SHA1

                            f176fdb823417abeb54daed210cf0ba3b6e02769

                            SHA256

                            ac1dfb6cdeeadbc386dbd1afdda4d25ba5b9b43a47c97302830d95e2a7f2d056

                            SHA512

                            b8472a69000108d462940f4d2b5a611e00d630df1f8d6041be4f7b05a9fd9f8e8aa5de5fe880323569ac1b6857a09b7b9d27b3268d2a83a81007d94a8b8da0ff

                          • C:\Users\Admin\AppData\Local\Temp\_MEI23282\python310.dll

                            Filesize

                            4.2MB

                            MD5

                            c6c37b848273e2509a7b25abe8bf2410

                            SHA1

                            b27cfbd31336da1e9b1f90e8f649a27154411d03

                            SHA256

                            b7a7f3707beab109b66de3e340e3022dd83c3a18f444feb9e982c29cf23c29b8

                            SHA512

                            222ad791304963a4b8c1c6055e02c0c4c47fce2bb404bd4f89c022ff9706e29ca6fa36c72350fbf296c8a0e3e48e3756f969c003dd1eb056cd026efe0b7eba40

                          • C:\Users\Admin\AppData\Local\Temp\_MEI23282\select.pyd

                            Filesize

                            25KB

                            MD5

                            431464c4813ed60fbf15a8bf77b0e0ce

                            SHA1

                            9825f6a8898e38c7a7ddc6f0d4b017449fb54794

                            SHA256

                            1f56df23a36132f1e5be4484582c73081516bee67c25ef79beee01180c04c7f0

                            SHA512

                            53175384699a7bb3b93467065992753b73d8f3a09e95e301a1a0386c6a1224fa9ed8fa42c99c1ffbcfa6377b6129e3db96e23750e7f23b4130af77d14ac504a0

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ekbe13vx.qei.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                            Filesize

                            3.1MB

                            MD5

                            03bb6c45bf7f0ce8caa6c8ba6ca33509

                            SHA1

                            f59d3d9d070984d3bd3e4bd7c903990b204ed554

                            SHA256

                            7f9c4f99669b5c05535075cc97e746e9df229b8177f56a0a9e989b861e8a2ef4

                            SHA512

                            0e99313226eb3df882a9372820532d71ebe95616f7290e4eb08256681af7bf8826c66cea34cd50f89b1dc34af145fa7803d036d64d58a45855e998982d4259be

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                            Filesize

                            479KB

                            MD5

                            09372174e83dbbf696ee732fd2e875bb

                            SHA1

                            ba360186ba650a769f9303f48b7200fb5eaccee1

                            SHA256

                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                            SHA512

                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                            Filesize

                            13.8MB

                            MD5

                            0a8747a2ac9ac08ae9508f36c6d75692

                            SHA1

                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                            SHA256

                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                            SHA512

                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin

                            Filesize

                            6KB

                            MD5

                            3b8f7d58afdbc5f7772045d7ee424277

                            SHA1

                            7e90a78a6acaf17258dfae959ba1ceef9c0f969c

                            SHA256

                            8a6fe961aaf6c19148b4abfe038b1d6ce932c142f0cde74dd0f393615b1694ff

                            SHA512

                            4519ff791aaadb89650e29cfdb44ae1e612dec779f6c8d38fad194a93c32f4fb37560507184c4254f4627f0c41b5a34164b439764197282c9087fc5ac31fb4fa

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin

                            Filesize

                            8KB

                            MD5

                            3551af45b9bb79573179828a4424797e

                            SHA1

                            ca4952f1a135f2692c15aadf95f5eca59e0cd7fc

                            SHA256

                            87a9889287433aebebd27518305cccbf2b22fa270a8fa4026145c9f13d282d4b

                            SHA512

                            e211837e1e4fde7569b5230efb50a9d126ed8bbfed3d148bdcd926aef05d3ebaf11403075710e7e86a17ddc89d9125c15d3fdc8b12713e4430b022050baed2e6

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            5KB

                            MD5

                            7ca0bcbed68aae0cad2b6fd6721ffa65

                            SHA1

                            8ea401568068ce96677b7d77a194a8f771131076

                            SHA256

                            a8a92d74e8983125d5737112aaec002ca2b32725cf8531d4be4d2b4e6fcf73b5

                            SHA512

                            b41ac6db3b53673b48e1d0a0ff9a9ecd13a1a7ae01dc959f40fd457a33550d1e4286fc848b3d675df80b550cb2e199b8f774181616a387ecd88ca1f6e94a563b

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            6KB

                            MD5

                            afe6d50a155a24f5750e1cd27d0f5b66

                            SHA1

                            b4595adca3b085987463252f39a3c6adf15ad6c1

                            SHA256

                            1db7876f7f7e177e3be983ec444e3e919327e3844e10ee1e9f4739742cff4daf

                            SHA512

                            b34bf5aeb26b5eb198a159c63612ffeed821a1f99aac6bcc11eac0c16416dec42beaa32e4517f79722d6e5dbed80135f4335985378dc98a00005a29ab1c19580

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            5KB

                            MD5

                            d9a924b8b5d095b25c620dc521fae465

                            SHA1

                            d509176b1b4c59c3a659a93d90cd0589d6897f09

                            SHA256

                            5a93494c7a5e823710d86bcd4acd4be5587eef836bbe6b3fab22ce22a9e6dbad

                            SHA512

                            bcc76044f2998331046b093b66efc4df9e2cc9f91cc04892e8f29b720834a495db7796187b11106665c722980f9b9333c184bdc531f2ebb1d3b6ff0a153df4a1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            b52a66d506896f90848e4b5f357d7746

                            SHA1

                            d145de5ac368fc35fee25f20b30d1e6ddef21c5d

                            SHA256

                            a329a2281b64b4699b5b8bb815884a270ba2e38cebde8caffce90240bea20cee

                            SHA512

                            4207d356e2acb028a0e7a61f6e5f37a62eee9496d4bf566f80e2970767a61e292577bdcfa041cf6f68635eed8605d74b44f4aa3f2e620ee69ce5b02e90a521db

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            b3ccbf13d7da09a934729337e6264e09

                            SHA1

                            1c56c459a0cd08f45fe54a5af36714b38f57ad6d

                            SHA256

                            4f2e4ee97f265c64e1cee2a9b95182623b109f9e6fc4ce415cd95071223b9d01

                            SHA512

                            2dc632d7066d9d51a50c74c1c3b73c3a7a296ba3da4c20cc79fdca9f975d7045a4cb5feab00a41f7b31ae5f974c8e6f637a15b7194bf8d66f8c9e27423d78fe5

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\b4b7cce5-d26c-47e1-b97a-64811b858ca9

                            Filesize

                            27KB

                            MD5

                            81d06ddc073385ca11657c3fba72d95f

                            SHA1

                            70d3dbfa8c28a66bd25891e889b408ef74c81eda

                            SHA256

                            69a65b0b97cfd5c6050f3f5bcbc3c09f4099fea264eca5b54d13b257ef7f2703

                            SHA512

                            42015d5e0106923385e710019cdda449dd469c2540c21d749682a8119fb52701d0ac6b3c4ed0391d3e6ea76adb59dce37b4b58f0d08083deb60baa12bf1f7d2b

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\bae54bda-a455-451b-8d0c-183500aeb17a

                            Filesize

                            982B

                            MD5

                            c0afa21245bc30295cc22500a8874400

                            SHA1

                            9729c1e9c87640c07f37e974f447fadbbaabcb5d

                            SHA256

                            620902c7f9c7caf4656cc8e19199a49294e54916ede33d3b64763f2a9a02a663

                            SHA512

                            a2a338ddb0000a03299f7a0ee3b60346e1e2b4503d01e38732e9b04a9744dc897ee7c46d9aebbf991bc6d4a2e96d7395f6da458fa570e55f8c8402fd99fda0df

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\dcea70b5-8a7c-4ba3-b2dc-1bef51b7329e

                            Filesize

                            671B

                            MD5

                            e2589bb29626daaaa9bae780bc7805b9

                            SHA1

                            a28daa59880ef62a5cd96ea20bb13b0aa1deb2a7

                            SHA256

                            8610ddcd413dc51d49b5361bd8349c869e6afeefd1c7b2dcdf64fa0182e40b67

                            SHA512

                            c8bdbe083b36a70e169dba15fb86ad10b4695d74b1d0cd7d5bf4ba4654054bbc4ae30965546d25a17e5d01f5428e3a9ea9582591c3acd4d2d43cd4b774f8736c

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                            Filesize

                            1.1MB

                            MD5

                            842039753bf41fa5e11b3a1383061a87

                            SHA1

                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                            SHA256

                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                            SHA512

                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                            Filesize

                            116B

                            MD5

                            2a461e9eb87fd1955cea740a3444ee7a

                            SHA1

                            b10755914c713f5a4677494dbe8a686ed458c3c5

                            SHA256

                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                            SHA512

                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                            Filesize

                            372B

                            MD5

                            bf957ad58b55f64219ab3f793e374316

                            SHA1

                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                            SHA256

                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                            SHA512

                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                            Filesize

                            17.8MB

                            MD5

                            daf7ef3acccab478aaa7d6dc1c60f865

                            SHA1

                            f8246162b97ce4a945feced27b6ea114366ff2ad

                            SHA256

                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                            SHA512

                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs-1.js

                            Filesize

                            11KB

                            MD5

                            3c70c226efb4b49930dab76ba4f72738

                            SHA1

                            0d4c13264bd5e0dc18e5ea71ed98556f9d723295

                            SHA256

                            b0d166cd9718a021531eb41c752bf2cc423e95beed200e5a65b10edb7abf892b

                            SHA512

                            edca0130bcd9e63a62031f45aa1c71dec12d7944dfe50a471d56e60e8ef3407b5090ebc6804cffe36fbd931909be5c7da0af733d7e337b21d7476fbdd7180dd9

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs-1.js

                            Filesize

                            15KB

                            MD5

                            2baaaf448725cd9a1e003381adafa017

                            SHA1

                            c8b5e726dd8ec21da23fab532857ca31a2ab1938

                            SHA256

                            122ed79a4316165cf8fcee409167baf875803b44c2410d27b6334fb5518177d4

                            SHA512

                            fe3ae76554045d41c46fd73c72076e60748d77ddd992ed3938570736d2a87ee0c42939046660397b3722d401dbfac3fa8aa17de872c729f4406b62e8f0c88148

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs.js

                            Filesize

                            10KB

                            MD5

                            a198e1df09ca0599fe45c63da53c9f4e

                            SHA1

                            404deaee769c04a3405798e27d98d9730479a70a

                            SHA256

                            398ed8332585d48390660407c1c2ccebeb0c51ae4e42544ec408e7fb13b76dac

                            SHA512

                            0b12295b1839aa1f5a633ad436a5804647959d9c081ab6711130291e182588e368cba5355fd38dc179e1a8a0bec8d427e1721cf5325e71d8398f6fa9636220f8

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs.js

                            Filesize

                            10KB

                            MD5

                            86c3fd487961331e36dbdd3c40b18816

                            SHA1

                            8438bb3bc27787a09503264c1757a8279c27ae01

                            SHA256

                            408b925b982f33babea5c4372f5516d45f12d2714d2c2d2445d21846664d5b51

                            SHA512

                            f7cc8094bac1d2c189be4886cae6c895ac0c6c723c55b976094bda6e9b5c962ab916543a7d0145daec06a13463e6eb5f5c50647a0d2f1ccd31bc9e93f4e01fe6

                          • memory/972-811-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-190-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-780-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-1085-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-312-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-1993-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-48-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-47-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-46-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-45-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-2935-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-33-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-22-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-21-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-20-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-16-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-3113-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-3124-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-3127-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-3129-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-3131-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/972-3133-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/1052-773-0x0000000008F60000-0x0000000009504000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/1052-260-0x0000000000880000-0x0000000000D0C000-memory.dmp

                            Filesize

                            4.5MB

                          • memory/1052-774-0x0000000008E90000-0x0000000008F22000-memory.dmp

                            Filesize

                            584KB

                          • memory/1052-775-0x0000000008E70000-0x0000000008E7A000-memory.dmp

                            Filesize

                            40KB

                          • memory/1052-207-0x0000000007760000-0x00000000077C6000-memory.dmp

                            Filesize

                            408KB

                          • memory/1052-189-0x00000000076C0000-0x000000000775C000-memory.dmp

                            Filesize

                            624KB

                          • memory/1052-188-0x0000000000880000-0x0000000000D0C000-memory.dmp

                            Filesize

                            4.5MB

                          • memory/1052-187-0x0000000000880000-0x0000000000D0C000-memory.dmp

                            Filesize

                            4.5MB

                          • memory/1052-186-0x0000000000880000-0x0000000000D0C000-memory.dmp

                            Filesize

                            4.5MB

                          • memory/1544-329-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/1544-342-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/1656-341-0x0000000007240000-0x00000000072E3000-memory.dmp

                            Filesize

                            652KB

                          • memory/1656-343-0x0000000007510000-0x0000000007521000-memory.dmp

                            Filesize

                            68KB

                          • memory/1656-344-0x0000000007560000-0x0000000007574000-memory.dmp

                            Filesize

                            80KB

                          • memory/1656-330-0x000000006FC00000-0x000000006FC4C000-memory.dmp

                            Filesize

                            304KB

                          • memory/1656-325-0x0000000005B30000-0x0000000005E84000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/1656-327-0x0000000006000000-0x000000000604C000-memory.dmp

                            Filesize

                            304KB

                          • memory/2244-726-0x0000000007720000-0x0000000007734000-memory.dmp

                            Filesize

                            80KB

                          • memory/2244-695-0x00000000076F0000-0x0000000007701000-memory.dmp

                            Filesize

                            68KB

                          • memory/2244-369-0x0000000006740000-0x000000000678C000-memory.dmp

                            Filesize

                            304KB

                          • memory/2244-604-0x0000000070840000-0x000000007088C000-memory.dmp

                            Filesize

                            304KB

                          • memory/2244-614-0x00000000073D0000-0x0000000007473000-memory.dmp

                            Filesize

                            652KB

                          • memory/2324-2-0x0000000000361000-0x00000000003C9000-memory.dmp

                            Filesize

                            416KB

                          • memory/2324-19-0x0000000000361000-0x00000000003C9000-memory.dmp

                            Filesize

                            416KB

                          • memory/2324-18-0x0000000000360000-0x000000000068A000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/2324-4-0x0000000000360000-0x000000000068A000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/2324-3-0x0000000000360000-0x000000000068A000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/2324-1-0x00000000778C4000-0x00000000778C6000-memory.dmp

                            Filesize

                            8KB

                          • memory/2324-0-0x0000000000360000-0x000000000068A000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/2704-298-0x0000000006380000-0x00000000063CC000-memory.dmp

                            Filesize

                            304KB

                          • memory/2704-314-0x0000000007940000-0x0000000007954000-memory.dmp

                            Filesize

                            80KB

                          • memory/2704-313-0x0000000007860000-0x0000000007871000-memory.dmp

                            Filesize

                            68KB

                          • memory/2704-299-0x000000006FD50000-0x000000006FD9C000-memory.dmp

                            Filesize

                            304KB

                          • memory/2704-309-0x0000000007540000-0x00000000075E3000-memory.dmp

                            Filesize

                            652KB

                          • memory/2704-287-0x0000000005C90000-0x0000000005FE4000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/2788-241-0x000000006F4A0000-0x000000006F4EC000-memory.dmp

                            Filesize

                            304KB

                          • memory/2788-261-0x00000000072F0000-0x00000000072FE000-memory.dmp

                            Filesize

                            56KB

                          • memory/2788-252-0x0000000006F90000-0x0000000007033000-memory.dmp

                            Filesize

                            652KB

                          • memory/2788-264-0x00000000073E0000-0x00000000073E8000-memory.dmp

                            Filesize

                            32KB

                          • memory/2788-253-0x0000000007710000-0x0000000007D8A000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/2788-254-0x00000000070C0000-0x00000000070DA000-memory.dmp

                            Filesize

                            104KB

                          • memory/2788-256-0x0000000007130000-0x000000000713A000-memory.dmp

                            Filesize

                            40KB

                          • memory/2788-240-0x0000000006F20000-0x0000000006F52000-memory.dmp

                            Filesize

                            200KB

                          • memory/2788-263-0x0000000007400000-0x000000000741A000-memory.dmp

                            Filesize

                            104KB

                          • memory/2788-262-0x0000000007300000-0x0000000007314000-memory.dmp

                            Filesize

                            80KB

                          • memory/2788-251-0x0000000006F60000-0x0000000006F7E000-memory.dmp

                            Filesize

                            120KB

                          • memory/2788-258-0x0000000007340000-0x00000000073D6000-memory.dmp

                            Filesize

                            600KB

                          • memory/2788-259-0x00000000072C0000-0x00000000072D1000-memory.dmp

                            Filesize

                            68KB

                          • memory/2788-208-0x0000000002470000-0x00000000024A6000-memory.dmp

                            Filesize

                            216KB

                          • memory/2788-223-0x0000000005DB0000-0x0000000005DFC000-memory.dmp

                            Filesize

                            304KB

                          • memory/2788-222-0x0000000005D70000-0x0000000005D8E000-memory.dmp

                            Filesize

                            120KB

                          • memory/2788-221-0x00000000057D0000-0x0000000005B24000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/2788-211-0x00000000056F0000-0x0000000005756000-memory.dmp

                            Filesize

                            408KB

                          • memory/2788-210-0x0000000004FD0000-0x0000000004FF2000-memory.dmp

                            Filesize

                            136KB

                          • memory/2788-209-0x0000000005020000-0x0000000005648000-memory.dmp

                            Filesize

                            6.2MB

                          • memory/3080-152-0x0000000000800000-0x0000000000900000-memory.dmp

                            Filesize

                            1024KB

                          • memory/3080-44-0x0000000000800000-0x0000000000900000-memory.dmp

                            Filesize

                            1024KB

                          • memory/4052-239-0x0000000000850000-0x0000000000ED5000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4052-257-0x0000000000850000-0x0000000000ED5000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4340-805-0x0000000000AF0000-0x0000000000DAA000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/4340-579-0x0000000000AF0000-0x0000000000DAA000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/4340-580-0x0000000000AF0000-0x0000000000DAA000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/4340-383-0x0000000000AF0000-0x0000000000DAA000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/4340-794-0x0000000000AF0000-0x0000000000DAA000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/5032-206-0x0000000000A00000-0x0000000000E80000-memory.dmp

                            Filesize

                            4.5MB

                          • memory/5032-311-0x0000000000A00000-0x0000000000E80000-memory.dmp

                            Filesize

                            4.5MB

                          • memory/5188-808-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5188-807-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5188-2216-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5188-791-0x0000000010000000-0x000000001001C000-memory.dmp

                            Filesize

                            112KB

                          • memory/5188-967-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5188-768-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5188-1895-0x0000000000400000-0x0000000000C67000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/5544-3116-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/5544-3121-0x00000000002C0000-0x00000000005EA000-memory.dmp

                            Filesize

                            3.2MB