Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 13:32
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
604496f01be7b778d8a564c57677d644
-
SHA1
b3a7781e8a94cadb2450c4a3df11b4a2e94ef82c
-
SHA256
ad1e3f88d7d1c29836570f13b8b540dfdaca9434b9f47170b00cf54519c5edcc
-
SHA512
62b720afcefbf8ba96698d428859466dccd83e03440e06c2264557185ce415b18240dfaed46065cf2775d8f890f112ae2e5d88910b19166fa001c67e671426fc
-
SSDEEP
49152:UFUzI1/+kp2sID/l8KmuQQHur5j2IZxEmtyeeu:b8V+kksIp8X7QEKWeu
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
save
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
LiveTraffic
95.179.250.45:26212
Extracted
stealc
default2
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
stealc
default
http://91.202.233.158
-
url_path
/e96ea2db21fa9a1b.php
Extracted
redline
TG CLOUD @RLREBORN Admin @FATHEROFCARDERS
89.105.223.196:29862
Extracted
cryptbot
sevtvf17pt.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Signatures
-
Detects ZharkBot payload 2 IoCs
ZharkBot is a botnet written C++.
resource yara_rule behavioral2/memory/3060-938-0x0000000000400000-0x0000000000454000-memory.dmp zharkcore behavioral2/memory/3060-940-0x0000000000400000-0x0000000000454000-memory.dmp zharkcore -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/884-588-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral2/memory/3748-1003-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 5752 created 3524 5752 Waters.pif 56 PID 5752 created 3524 5752 Waters.pif 56 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e34c91c0d5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7025e32886.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5878b15517.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1a5d815cdf.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e34c91c0d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7025e32886.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e34c91c0d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5878b15517.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1a5d815cdf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7025e32886.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5878b15517.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1a5d815cdf.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 5878b15517.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Nework.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation splwow64.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Hkbsse.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Waters.pif Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation file.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url cmd.exe -
Executes dropped EXE 28 IoCs
pid Process 744 skotes.exe 1208 e34c91c0d5.exe 4308 7025e32886.exe 1904 c71420f51c.exe 4340 5878b15517.exe 1912 axplong.exe 3484 gold.exe 5564 axplong.exe 5560 skotes.exe 5144 Nework.exe 4688 Hkbsse.exe 5424 stealc_default2.exe 5808 needmoney.exe 4056 penis.exe 3896 acentric.exe 4980 svchost015.exe 6056 2.exe 5548 splwow64.exe 1872 crypted.exe 2964 Hkbsse.exe 624 axplong.exe 5964 skotes.exe 5640 1a5d815cdf.exe 5752 Waters.pif 6024 LummaC222222.exe 5616 JavvvUmar.exe 5540 66ed86be077bb_12.exe 4956 66f0297e9c3eb_15.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine e34c91c0d5.exe Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine 7025e32886.exe Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine 1a5d815cdf.exe Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine 5878b15517.exe Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
pid Process 5424 stealc_default2.exe 5424 stealc_default2.exe 6056 2.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e34c91c0d5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000002001\\e34c91c0d5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7025e32886.exe = "C:\\Users\\Admin\\1000015002\\7025e32886.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\splwow64.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000287001\\splwow64.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1a5d815cdf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000308001\\1a5d815cdf.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\acentric = "\"C:\\Users\\Admin\\Pictures\\Opportunistic Telegraph\\acentric.exe\" /update" acentric.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023446-98.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1712 tasklist.exe 5672 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 4104 file.exe 744 skotes.exe 1208 e34c91c0d5.exe 4308 7025e32886.exe 4340 5878b15517.exe 1912 axplong.exe 5560 skotes.exe 5564 axplong.exe 5964 skotes.exe 624 axplong.exe 5640 1a5d815cdf.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3484 set thread context of 884 3484 gold.exe 111 PID 5808 set thread context of 4980 5808 needmoney.exe 130 PID 6056 set thread context of 3060 6056 2.exe 133 PID 1872 set thread context of 3748 1872 crypted.exe 145 -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\ViewpictureKingdom splwow64.exe File opened for modification C:\Windows\BrandonBlind splwow64.exe File opened for modification C:\Windows\IpaqArthur splwow64.exe File created C:\Windows\Tasks\skotes.job file.exe File created C:\Windows\Tasks\axplong.job 5878b15517.exe File created C:\Windows\Tasks\Hkbsse.job Nework.exe File opened for modification C:\Windows\HardlyAircraft splwow64.exe -
pid Process 3752 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1156 3060 WerFault.exe 133 1472 4980 WerFault.exe 130 -
System Location Discovery: System Language Discovery 1 TTPs 41 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nework.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language needmoney.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acentric.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LummaC222222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e34c91c0d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a5d815cdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66f0297e9c3eb_15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7025e32886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5878b15517.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JavvvUmar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66ed86be077bb_12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language splwow64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language penis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c71420f51c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gold.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Waters.pif -
Checks processor information in registry 2 TTPs 36 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost015.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost015.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings firefox.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2128 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4104 file.exe 4104 file.exe 744 skotes.exe 744 skotes.exe 1208 e34c91c0d5.exe 1208 e34c91c0d5.exe 4308 7025e32886.exe 4308 7025e32886.exe 3752 powershell.exe 3752 powershell.exe 4340 5878b15517.exe 4340 5878b15517.exe 1912 axplong.exe 1912 axplong.exe 5560 skotes.exe 5560 skotes.exe 5564 axplong.exe 5564 axplong.exe 5424 stealc_default2.exe 5424 stealc_default2.exe 5424 stealc_default2.exe 5424 stealc_default2.exe 624 axplong.exe 624 axplong.exe 5964 skotes.exe 5964 skotes.exe 5640 1a5d815cdf.exe 5640 1a5d815cdf.exe 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif 5752 Waters.pif -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1904 c71420f51c.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 3752 powershell.exe Token: SeDebugPrivilege 3148 firefox.exe Token: SeDebugPrivilege 3148 firefox.exe Token: SeDebugPrivilege 4056 penis.exe Token: SeBackupPrivilege 4056 penis.exe Token: SeSecurityPrivilege 4056 penis.exe Token: SeSecurityPrivilege 4056 penis.exe Token: SeSecurityPrivilege 4056 penis.exe Token: SeSecurityPrivilege 4056 penis.exe Token: SeDebugPrivilege 1712 tasklist.exe Token: SeDebugPrivilege 5672 tasklist.exe Token: SeDebugPrivilege 5540 66ed86be077bb_12.exe Token: SeDebugPrivilege 3896 acentric.exe Token: SeDebugPrivilege 1476 firefox.exe Token: SeDebugPrivilege 1476 firefox.exe Token: SeDebugPrivilege 4956 66f0297e9c3eb_15.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4104 file.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 1904 c71420f51c.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 1904 c71420f51c.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe 1904 c71420f51c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4264 firefox.exe 3148 firefox.exe 1476 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4104 wrote to memory of 744 4104 file.exe 82 PID 4104 wrote to memory of 744 4104 file.exe 82 PID 4104 wrote to memory of 744 4104 file.exe 82 PID 744 wrote to memory of 1208 744 skotes.exe 83 PID 744 wrote to memory of 1208 744 skotes.exe 83 PID 744 wrote to memory of 1208 744 skotes.exe 83 PID 744 wrote to memory of 4308 744 skotes.exe 84 PID 744 wrote to memory of 4308 744 skotes.exe 84 PID 744 wrote to memory of 4308 744 skotes.exe 84 PID 744 wrote to memory of 3752 744 skotes.exe 85 PID 744 wrote to memory of 3752 744 skotes.exe 85 PID 744 wrote to memory of 3752 744 skotes.exe 85 PID 3752 wrote to memory of 4524 3752 powershell.exe 87 PID 3752 wrote to memory of 4524 3752 powershell.exe 87 PID 4524 wrote to memory of 4264 4524 firefox.exe 88 PID 4524 wrote to memory of 4264 4524 firefox.exe 88 PID 4524 wrote to memory of 4264 4524 firefox.exe 88 PID 4524 wrote to memory of 4264 4524 firefox.exe 88 PID 4524 wrote to memory of 4264 4524 firefox.exe 88 PID 4524 wrote to memory of 4264 4524 firefox.exe 88 PID 4524 wrote to memory of 4264 4524 firefox.exe 88 PID 4524 wrote to memory of 4264 4524 firefox.exe 88 PID 4524 wrote to memory of 4264 4524 firefox.exe 88 PID 4524 wrote to memory of 4264 4524 firefox.exe 88 PID 4524 wrote to memory of 4264 4524 firefox.exe 88 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 PID 4264 wrote to memory of 1340 4264 firefox.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\1000002001\e34c91c0d5.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\e34c91c0d5.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Users\Admin\1000015002\7025e32886.exe"C:\Users\Admin\1000015002\7025e32886.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\1000018042\blo.ps1"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk --disable-features=TranslateUI --disable-infobars --no-first-run --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd5⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk --disable-features=TranslateUI --disable-infobars --no-first-run --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1fbed95d-af0f-4d3a-9d89-c5cb961c6525} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" gpu7⤵PID:1340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2428 -parentBuildID 20240401114208 -prefsHandle 2400 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4dbb016b-0253-4876-832e-a4293ff84de2} 4264 "\\.\pipe\gecko-crash-server-pipe.4264" socket7⤵
- Checks processor information in registry
PID:2752
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4vnbccwa\4vnbccwa.cmdline"5⤵
- System Location Discovery: System Language Discovery
PID:3504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA77B.tmp" "c:\Users\Admin\AppData\Local\Temp\4vnbccwa\CSC84D2464B2E75494C915F9E4CDF343A13.TMP"6⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000019101\c71420f51c.exe"C:\Users\Admin\AppData\Local\Temp\1000019101\c71420f51c.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1904 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd5⤵PID:2304
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3148 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2012 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bbd1c9cd-f177-469a-a1f5-28a32a4a72fb} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" gpu7⤵PID:1412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b40636ff-fb4d-4cf5-aa4c-2f96f2508d09} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" socket7⤵PID:5004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2940 -childID 1 -isForBrowser -prefsHandle 2696 -prefMapHandle 3132 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a58295fa-bf0f-4ee3-bf92-4d48217f10be} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab7⤵PID:5096
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3808 -childID 2 -isForBrowser -prefsHandle 3800 -prefMapHandle 3796 -prefsLen 22693 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f36e676e-5c29-4ce6-af01-cd92fdf5af67} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab7⤵PID:1048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4332 -childID 3 -isForBrowser -prefsHandle 4324 -prefMapHandle 3820 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c83f57d-e0a7-4e41-a4ad-1f8d747cdcc9} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab7⤵PID:2872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5092 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 5088 -prefMapHandle 5084 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a652e19d-aff2-404e-ad28-0c66e63a5d9e} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" utility7⤵
- Checks processor information in registry
PID:3572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 4 -isForBrowser -prefsHandle 5472 -prefMapHandle 5344 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {489042a6-7924-450d-a05b-20ceec055e61} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab7⤵PID:4532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5704 -childID 5 -isForBrowser -prefsHandle 5624 -prefMapHandle 5632 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {902ba4e2-ed60-4057-9119-6ac49402b982} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab7⤵PID:1160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5812 -childID 6 -isForBrowser -prefsHandle 5892 -prefMapHandle 5888 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {451eeb53-2412-4436-bb55-e27bc9842d65} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab7⤵PID:5072
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd5⤵PID:2464
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd6⤵
- Checks processor information in registry
PID:3368
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd5⤵PID:5812
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1944 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 24648 -prefMapSize 244898 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d78fa540-7dac-464b-8b00-386e1b49a7e2} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" gpu7⤵PID:6008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2452 -prefMapHandle 2440 -prefsLen 25568 -prefMapSize 244898 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {12bfd9c8-beef-4ef8-be56-7d7fc58ed15c} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" socket7⤵PID:5188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2988 -childID 1 -isForBrowser -prefsHandle 3128 -prefMapHandle 3144 -prefsLen 23142 -prefMapSize 244898 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a1c4eaf-5fe6-4d2a-88aa-c18dd480e57b} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" tab7⤵PID:5648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4024 -childID 2 -isForBrowser -prefsHandle 3996 -prefMapHandle 3972 -prefsLen 30001 -prefMapSize 244898 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f961564-b713-4c38-a4c8-96543048a7fe} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" tab7⤵PID:3616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4696 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4608 -prefMapHandle 4664 -prefsLen 30001 -prefMapSize 244898 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3ea4a31a-a1e7-4e88-ac4a-df80303064fd} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" utility7⤵
- Checks processor information in registry
PID:2980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4960 -childID 3 -isForBrowser -prefsHandle 5004 -prefMapHandle 5000 -prefsLen 27434 -prefMapSize 244898 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0741c5f8-2749-4d8f-b3bd-e40e3e44a0a2} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" tab7⤵PID:3224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5128 -childID 4 -isForBrowser -prefsHandle 5136 -prefMapHandle 5140 -prefsLen 27434 -prefMapSize 244898 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {06efabe1-b24d-4409-beb2-417f7e47586b} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" tab7⤵PID:4376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5316 -childID 5 -isForBrowser -prefsHandle 5324 -prefMapHandle 5328 -prefsLen 27434 -prefMapSize 244898 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5a9278e-8bdd-424b-b3b8-8ea5a85cbb45} 1476 "\\.\pipe\gecko-crash-server-pipe.1476" tab7⤵PID:5020
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\5878b15517.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\5878b15517.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:884
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5144 -
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\1000063001\JavvvUmar.exe"C:\Users\Admin\AppData\Local\Temp\1000063001\JavvvUmar.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5424
-
-
C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5808 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exeC:\Users\Admin\AppData\Local\Temp\svchost015.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 12288⤵
- Program crash
PID:1472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe"C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe"C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"7⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 4128⤵
- Program crash
PID:1156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe"C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat7⤵
- System Location Discovery: System Language Discovery
PID:5700 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"8⤵
- System Location Discovery: System Language Discovery
PID:1952
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5672
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"8⤵
- System Location Discovery: System Language Discovery
PID:5680
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6076988⤵
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "MaskBathroomCompositionInjection" Participants8⤵
- System Location Discovery: System Language Discovery
PID:5852
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q8⤵
- System Location Discovery: System Language Discovery
PID:5896
-
-
C:\Users\Admin\AppData\Local\Temp\607698\Waters.pifWaters.pif Q8⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5752 -
C:\Users\Admin\AppData\Local\Temp\1000429001\66f0297e9c3eb_15.exe"C:\Users\Admin\AppData\Local\Temp\1000429001\66f0297e9c3eb_15.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:4472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:3748
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000308001\1a5d815cdf.exe"C:\Users\Admin\AppData\Local\Temp\1000308001\1a5d815cdf.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5640
-
-
C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe"C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6024
-
-
C:\Users\Admin\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe"C:\Users\Admin\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5540
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2128
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:5276
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5564
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3060 -ip 30601⤵PID:5168
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵
- Executes dropped EXE
PID:2964
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:624
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4980 -ip 49801⤵PID:1556
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD54354b2460c135f1687829aa804aeb511
SHA183fa0c91a0de816c0d0705d393fc11898314d6a6
SHA256080def497cd45198908b6ecba6e013087015c04d63e558e6761f82a2b3459845
SHA5125a96e3e35879c8fd0f266e755440b560c8780f1ccbcc7b0f86b1d7a554b4c5d98a453d851f3264e85f60d7116583c8939fa4e344270ef49cf5a8f36cdae1eb17
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
4KB
MD590019cfd00d043c3f6da5719cd344c62
SHA1034bd2d68f4ec66b227ab7d31d2135e28d75b131
SHA2561401c46006791e4d0fea52e9e98991df542eb0a24c50da4856f4ac1eda5cd4ec
SHA5127e00c5eade73a95225f71574b48d66e19241943f47732ed4d352440e6fcfc7c44b8cc4bdfeaa51b04f7bb16b3a4cc2005e1a4b71c578c4dd0399fabbe997b1f2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD511f9549c0e43d522d57d1982b0a0e800
SHA18dd6bfa4cfe52c2b80df7cc27200097756f41e17
SHA256a9ea289be899f4953f08d7cf1ac9aaad00b3c2b604d5882e4179801f2773fd6e
SHA512cba407e39a5ae8a0ef1d2ee8e0f71aee1a76437ae6622dd0330ab8f53286a69f1d6f1b5cf48616f21e5412cacdc799190ed1894151346afe04bf02bcdc30f8f0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\startupCache\startupCache.8.little
Filesize76KB
MD5957bfc0ff2a854461d455a734336d985
SHA16f92150422c8ccf770e057252da17abb1ddacd1b
SHA2567611725078a73b5dcceca074e69641086ce5e52cad01d2b3153c29635024c735
SHA5127dd74ccecf99d37126529d936578a89df44ac71862313a1d51bff9c498ac77d85479ea17cf512b061fc040aae85cb3ac13f941d432f069f5f98bd64d825f930e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lirn7gz7.default-release\startupCache\webext.sc.lz4
Filesize107KB
MD5cc4b28fdc91c598857b67e2353e5e5b4
SHA1f4024ae75f756e29b30cd781c56c1a8187d3c9bd
SHA256d01d8f5566518b99a8ec7e4841c4f45414f380e929dbe80c93f93b23e07d3184
SHA512c94d6585a6c133cf1a4a2de496d85bf32b48a952e2fc24879a151552bc72c7261a76f15b7aab6be6bafc62c59300532faa28fbf32ed0d9e86bf4225a602f9168
-
Filesize
1.8MB
MD5d512cd419c532fc7d6c3a5c6c4a303a3
SHA13ea05f000ad46070d41e449b3f1b7419144d98ff
SHA256d1dc3eca3c7794fee2ef250e63d99101aaae555751ab83eefa9f8952a7f2c7d9
SHA512c92c15990c12770d75310b8ee32181ce165348c898cb8665afd28be7e4224f0876ba7aab2667246e393c90ad3facab79fd03b4876d5b086d436d52188954c448
-
Filesize
312KB
MD5389881b424cf4d7ec66de13f01c7232a
SHA1d3bc5a793c1b8910e1ecc762b69b3866e4c5ba78
SHA2569d1211b3869ca43840b7da1677b257ad37521aab47719c6fcfe343121760b746
SHA5122b9517d5d9d972e8754a08863a29e3d3e3cfde58e20d433c85546c2298aad50ac8b069cafd5abb3c86e24263d662c6e1ea23c0745a2668dfd215ddbdfbd1ab96
-
Filesize
416KB
MD5f5d7b79ee6b6da6b50e536030bcc3b59
SHA1751b555a8eede96d55395290f60adc43b28ba5e2
SHA2562f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459
SHA512532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46
-
Filesize
900KB
MD55d8d57a3729cfbbaba4e3e60d6bef3d8
SHA15c1c7352807360845a264980c17fa5dccf4a0498
SHA256a11d5ba1eb5d8d3d5b6e29caf6c4fa6c3a74a28b66fcf29ab46891d2ff9747b3
SHA5127145ae65934de9d06b0a6813c4e542ed97cb7789beb28e34d492a732204bc312d2a0382e185875b8749911edde0dcbf22d83560f45e7399533ed3fe47425a8da
-
Filesize
1.8MB
MD56a6234ce6830b57e0f1fa2e728e7e8d1
SHA192d0e6aeba51aeb9d79196d06be442768f1a78c9
SHA256edc95e00991bbd33ceb4cb2cfd88aa714011ed69296ec62cc40c0be6c83450f3
SHA512926eca735e4b3eac6cd6f178ce98721d50fc4f3aa8fd9bf49332c9d58b14ceb12ffb0bb029fb1162f771b8ad76d6c35f58b2ab4f99b77d5c81a29a55a2e7c50f
-
Filesize
6.3MB
MD52426fa19f0c2cc5de92d6ef43337c2d1
SHA197b742a006365ad06a8d0933da8d72c51cca8e63
SHA2564d10776348522e720fd36f175f9f735039e4aa3ae9543886320cd75e45e77754
SHA512e6dfea55d923c4fa9a6e2e1d9dfa63ec1a5a4b34ce652dbed7b1442f92e628a18d7734128c735757665e07ceb4ca1fff891bea816925177462181242c6075690
-
Filesize
187KB
MD57a02aa17200aeac25a375f290a4b4c95
SHA17cc94ca64268a9a9451fb6b682be42374afc22fd
SHA256836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e
SHA512f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6
-
Filesize
4.1MB
MD57fa5c660d124162c405984d14042506f
SHA169f0dff06ff1911b97a2a0aa4ca9046b722c6b2f
SHA256fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2
SHA512d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c
-
Filesize
494KB
MD56760374f17416485fa941b354d3dd800
SHA1d88389ec19ac3e87bc743ba3f8b7c518601fdbf9
SHA2569dc31fbd03da881700908423eb50c6b0c42c87fec28e817449d3dd931802c9f5
SHA5126e4d2f17cb93fe831198c2eaa35bf030d6a06d620645d3e1452c6bd6e77e42baa9dc323fd60a2c5ae1d89124adde69972c489739d4bd73ba01b95b829a777eab
-
Filesize
454KB
MD537d198ad751d31a71acc9cb28ed0c64e
SHA18eb519b7a6df66d84c566605da9a0946717a921d
SHA2561ed4a8b4c74aab435ea5cd459d5ac961e5a8ca28924801bd84d336135f30efde
SHA51260923c0a8ce5fd397d49749ccee68ca3fe294d7323551ce9755410ac16bfff56a35bee3e6b9a67d57cdfcb43e4f164712f33cd255b76689174dcf4c475976c96
-
Filesize
673KB
MD5b859d1252109669c1a82b235aaf40932
SHA1b16ea90025a7d0fad9196aa09d1091244af37474
SHA256083d9bc8566b22e67b553f9e0b2f3bf6fe292220665dcc2fc10942cdc192125c
SHA5129c0006055afd089ef2acbb253628494dd8c29bab9d5333816be8404f875c85ac342df82ae339173f853d3ebdb2261e59841352f78f6b4bd3bff3d0d606f30655
-
Filesize
1.3MB
MD52b01c9b0c69f13da5ee7889a4b17c45e
SHA127f0c1ae0ddeddc9efac38bc473476b103fef043
SHA256d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29
SHA51223d4a0fc82b70cd2454a1be3d9b84b8ce7dd00ad7c3e8ad2b771b1b7cbca752c53feec5a3ac5a81d8384a9fc6583f63cc39f1ebe7de04d3d9b08be53641ec455
-
Filesize
314KB
MD5ff5afed0a8b802d74af1c1422c720446
SHA17135acfa641a873cb0c4c37afc49266bfeec91d8
SHA25617ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10
SHA51211724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac
-
Filesize
352KB
MD52f1d09f64218fffe7243a8b44345b27e
SHA172553e1b3a759c17f54e7b568f39b3f8f1b1cdbe
SHA2564a553c39728410eb0ebd5e530fc47ef1bdf4b11848a69889e8301974fc26cde2
SHA5125871e2925ca8375f3c3ce368c05eb67796e1fbec80649d3cc9c39b57ee33f46476d38d3ea8335e2f5518c79f27411a568209f9f6ef38a56650c7436bbaa3f909
-
Filesize
10.3MB
MD5489f9c4fc0afa8d1be37bc5e2f57833b
SHA1c2bac602a73c19b345b64e0b7cf2f837be307b61
SHA256d9dbfbc8294cbf6a32d43413ed328594ee058d7356c26eb5cd196f9f4867c078
SHA5127f43d972f58a025d09143c57351221fe7b10c1756a0c5578ac42698c21ea05986d4bbc0c7ff4be339c2d0930b505e4f4dda53c0800d84b059a21be938adb678e
-
Filesize
10.5MB
MD538ef48a2e156067f1770497335e92066
SHA1304bcccdfb486bf797d69f109f0b6fe64a94d945
SHA25688efb8b6990e916e7590c2bd3f734f390f7c3d7b517a5fdc1baba0a2f6fbd54c
SHA5127212757dc8bd59ce9e5d7e474b78324fae11b7a20dc1326fe34d2bdeff4a6b4e9e4471326656cc3db162feaec65ef0f0c96efb91f3ce9b3173f725195d4b7145
-
Filesize
38KB
MD59c20eb1a6841517cf1ff2e748dcd022e
SHA1f22be7eca7f904a8fbf7fec531cd9a05f77c6b84
SHA256cc17538dc330b6db078de99d50520da9807090fda729936c3268b00c6e8bcee1
SHA512021d48483d77c7d6c147ef928fe65c041940f9a015dcdf36bc279ffa1667c0a3df498b05602feeba288dfd58ff21ed9ec8f0517f0c118923ae3109701ee65592
-
Filesize
3KB
MD5eda96a316f7a1e0d4127049793f804c0
SHA1dc081b13e61b8ba353c2c58f4f7da371c09e090a
SHA256421b049b4e98080e1e199155590e2eb48738434295b041f4ef5dbcc84b163a19
SHA5121bef1b82f715c544bdd07e8e47ede3838e12f3a7323cede9137af836fec1db46d490eac92ff9de5cdf874c2fec1606ddd8ddeab20adff7fa0fb93f92f72d1a6d
-
Filesize
19KB
MD5b98d78c3abe777a5474a60e970a674ad
SHA1079e438485e46aff758e2dff4356fdd2c7575d78
SHA2562bc28afb291ece550a7cd2d0c5c060730eb1981d1cf122558d6971526c637eb4
SHA5126218413866237bc1f6eada6554658a00c9fc55402e104576b33a2e8d4adf0fd952d8cc8d1ae3a02ebcfa030115fc388fc1a6f23b9d372f808e11e1b551064e5d
-
Filesize
2KB
MD5f0e725addf4ec15a56aa0bde5bd8b2a7
SHA11f54a49195d3f7fd93c5fec06cc5904c57995147
SHA2567cbd6810cb4dd516eeb75df79d1db55f74471c11594333ac225f24bfc0fca7ca
SHA51200f14e435e0f8396f6c94fd5ace3f3645e87511b9e41e8c7c7caadb751ed826f60362ac007c80e9c3bd16f8f31b3a9107cbb39bf5c26d20a0ab5129e695f5269
-
Filesize
1KB
MD58fdc2272fa752f421575b787392deb1a
SHA15a9c12de469bb469dd4c3aa7fd55cefc8d136b66
SHA256c2893545d2b9cb5965d5a831dccb7b00c92dcad99b70dc92e685cd8d530219a5
SHA512389a05fb6ae54abb58ef433c61ef3a22302b04981d6f7e78057d29db39c6e195b7281a97bafb0d65eb804938f84dc8228312117b0e39937f2d47d59931d64992
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5604496f01be7b778d8a564c57677d644
SHA1b3a7781e8a94cadb2450c4a3df11b4a2e94ef82c
SHA256ad1e3f88d7d1c29836570f13b8b540dfdaca9434b9f47170b00cf54519c5edcc
SHA51262b720afcefbf8ba96698d428859466dccd83e03440e06c2264557185ce415b18240dfaed46065cf2775d8f890f112ae2e5d88910b19166fa001c67e671426fc
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-945322488-2060912225-3527527000-1000\76b53b3ec448f7ccdda2063b15d2bfc3_03d68389-5a68-4d9e-92ac-47b927e624dd
Filesize2KB
MD55a2d16dd1e02ccff3c4d2a01a19a056c
SHA1cfa86c2a91e4c8774533844ecb4343d6322f758d
SHA256679fb949612dca3ed5d2174badaab65abdf9fcec34c351cb209802ef676cb76a
SHA51201209954c3c36ce741770629f071c22c56b193ccff7c062873e58ead49e37efa23a8ac17c6392a893a9722ba0424446ccd10ccee9f781ca3298c683de17af1de
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\AlternateServices.bin
Filesize6KB
MD57df5fc8283fbc7ddc4ed6997603f8279
SHA11d43c7877f73aecd51079f15a471ddc0e90d93e9
SHA25676d68cf8f089a6a09c40ab9b953d8e803a225b0b8a47f89ca0233edd358ecdc6
SHA5129a0d35df656e4fb5a2167cfac0bc0215e92bb5fb243161ebeb3a839a80a9d9f1748485ac6ad7fdfea8b9be876f6267a31d74992d55b998f8b86329e5cf3c02ba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\broadcast-listeners.json
Filesize209B
MD597c3738563a9448365a735f5f29ed3d5
SHA115a81433236ca6e6ecc4e1c8d0fdb8523b265c57
SHA25663221253f5c30efa214c2cd2adcf51a9c9f9a2c05f119b00a51c9579825c2c24
SHA512ed98f42d5d02ab53a9e50f80b312bed4b5d05d053bec582cf9d619ef91251e86cf4f4d1123c645500fc1dc4673b49a8b7badd3f3a39f565ac643ca4fd0157ae6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD559c1c247dc0168525de24b85ca369df1
SHA1ae7366f87a74642e74ab3ee16c17a033fde35050
SHA256fd698e9632b17247674094f94caf9a7961c47aede59d897b631f3ffec566d39d
SHA512d5b6305b7eb3d3c924f289c175328e313d66b15a9fa8d1dbdaa4abcd9558ce3ce8b6fb1802338b2d3a8e790368fb466a69d70b478bdae8816b4f07db5bfa229e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp
Filesize11KB
MD5574bf0cd25488ce3d77affa117eea287
SHA1affe94d2561a1337405f11abc5f90083bb00d370
SHA25698745b860bd21f1ecaefd015c775e53ae32df8dada52f17fceedb33e9bd5adde
SHA512d03f45d6f1f8c7b0711859df937860738cbda53fd86028a5eed7b1a89618305ddea200541d0a8c04d1ad6abaf41a850ae2e44117b4870f72c42fee0669113519
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD51a6e9b54b4c0949debfe0738a1042ea2
SHA1a6554181794fcc41b1000d4b4174e09b1823591f
SHA2569fa36f914330d8edcd4d9e132791d57e8235932e889213e9cf495a4d6476dd8d
SHA512688e5fd5506c395b4705d43954d2a5f5d7a660a06590784488090d89197808aa04d53ae03bf745cdd2412c826e48b85f110a0fefbfc5c3f167add3c4c86e1eeb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD564f1a95dcf4b27c448822e34ea9757e5
SHA1744fbfe643b94febcdc12778430802f61da1274e
SHA2561b662ba534aff576cd7f4d1ee8130f57f75050f3c83d24cd2891ac1ebfd093c0
SHA512b9d430d91c4b05839e0155573ea440b87c61a513ebd120509491ea35a8c564ed0aa6201c3e56d4b745b5a9c7db30f175e040d5aa7d8ec72cddb5b9b4cf9bfa35
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD516cb7a515838f23fa05993de4066be67
SHA13444500ce3f291d66f2f8d95f1ddac1829b90bd5
SHA256b2e558da2056bcd5119541126d6edb5657b6bf06d09fad7eb2c6af1ac8fded1b
SHA5127000f2670dc82d96f26a859accc9baeee01e60a5c660a5d9915c29f7f140651753fd9bf59a58d4dc38497c4aff9dc53ecc0df04e6ca8f1519fd524c766ecb664
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5bbcf148c90ac55aad80fab7083594f72
SHA17173803aed9fd4528578e361ba73ad200f1e16b0
SHA2565ad58d111d2f0665717bad1e14bb7fc61a7572fe022803d3ddf7f1080761b7b9
SHA512fae813193cb9b54f88ff29ccd52eabe8840f706f6550e115f3214ffad799d4397827ac1edd2ea387b78886d6def8c2136ef824ae33fe1fc8fb677a58b54c486a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD538a0d22dd896782ece129ba0808701ea
SHA113e858f8a3abd6f1e3d04950cce8800320ccce57
SHA25693685ba0e224fde47e7ecd69247ba0b0db2316fbd43d118e6ee7ec19d25e8a64
SHA5123e74b9a0e83a9563ead8bcf66907c4e9d2cdbbf260ff9c034ac45836a6371e0ce039ff1c55471b9c24b8ae4a2b8bdf8d950198359029cfb73bc7594fd1a99de7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD598fab438160a3894e2e53c104c6b3c33
SHA196433d3a3c435daed4fb0099831ead5552bc081f
SHA256ae535ed34b8e762bbe02ac2d9f5348d24ddae8747f5ae924b9cbc239e5deb3b2
SHA512aba48eb20b5be4cb351a6e5dbee6c110b1d2ab5efe71ff1006adc8f3ccd8fca71e34b40df9ace786281b6d4652db1c025f2d43de33745178d8fbad64df56e3dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\db\data.safe.tmp
Filesize12KB
MD58648cfc6dc8fd373388caa6c00aed0eb
SHA174d05badf6834c24c7e14b4b0621521659fc8bee
SHA256423da4c1f9655a77fbb54b11b602bce1b9a4ec9941c238e396a8030d52b775ee
SHA512adaeac725c73a991516aa00f6f8b874207e072b399c0782d33a6c155ec6596abadcd7114dc880195c8c46b4b8584e09b5a9cf0a11dc15f5365ff21779b91c5c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\57ced4d6-ecb6-436f-b44b-62dab9ef1cc6
Filesize982B
MD5969259c6c76f9a8012f695972e75f9c3
SHA19dc7ace9205695e9326df8743035962367b13ce0
SHA25657af06ec9f51ba81fdb0997e7e6088806840c77ebd7552b022d834ab16d04fa1
SHA5124207970348d335cbd184f5b14e344cc9b155966abea2b5b1f3da57797730932cb3380fe4cc22c37a36484b8b4b46b7783953cd13a4d75e00c4da0f9a72354064
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\680df29d-76c1-424b-9ec8-a46be561a487
Filesize671B
MD506bece9d04cb6c2c6b54198646ebaf0a
SHA185f4185f414a66fbd00d18e219594e96a80b7980
SHA256a7e4f2d7b7f578902d8407b07a20c5fa89be4cba25e828559341d6b467c10bed
SHA512dc6c3e25e448303870e5f5679a1746e3bba96731970ed2afb2dd275ed4d2778e37bd81a1c3d934502321e118579f9eb1df1be140b2af569c72233734a973d219
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\6f9dd291-5c34-4202-bf43-472e6a0fedd2
Filesize982B
MD55d42fad1fb64471b7b53be1a876c2a26
SHA166479051d07c993391e721fc1276b0e47297ba77
SHA256af86259957972bba9da85c2ee2038ec7731014ff40741f7fc6c4d3ad653a7f2c
SHA51207b2a8e859b44953e9be9aa0b7ed380d07049069bffd71608fc2fc67a5f47b8f9fb385f5f029fa2437af09fbb28bc3a274b3a393f6d9ed5aa692dc6fd49ea000
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\795d1b25-0be6-4fc5-a14b-223df5c019ca
Filesize573B
MD541e0eda5b8c0511be2e603bfac8cf8cd
SHA1c4948f63c0fec0779b7bb5c9ecc5be460bfa5139
SHA256d650e0ef4678af531860fe4833cd8d8f135fe1cd9fdc29c8157bbd327767f67c
SHA512d602709472e2c8b984166f9f083eef520287aefc3aef051f472422d272806a2e5f57b31d6eebe6147a1bc8d25afbd85a7c9aedc9ad1acccffb028a628a0bf11e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\8a898add-b209-44cc-84b9-ce2b5ef4cd81
Filesize26KB
MD583d9c88b59bdb47fadf1a401a14159f2
SHA1dde811cdae5b7a50e38d99c2703810fb59f9fa45
SHA256307540a8d23fcd2805b517de0e953144794a9b3d437266a997ce9795d7c2f741
SHA5122f2bd38b401132cf48676c9f3f35555faa6a39f19926ced88665ab8b967663a371964fc4125202f433e3f22d1415e68d9be460f9aaa653a00f0c3131e7a8c205
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\9b4976c1-5f39-4293-8632-d79aff3ab63a
Filesize743B
MD562ac60f4991293e13b276ad472d2dce9
SHA14dcf8a9cbe20bfab92c20bb4abbdee07883dec7a
SHA256506b35d601c44a15b3a3b2cb04c9238a7908fb7864672cfc362760095b9756aa
SHA51243c7b62bf7e92db637dd7dc6593f8564ff1ad9c92383dbf172800e29b8a571c2c8a6907b8443b05cbfefe50b851c1063c2906755bc1599be9d344b08acf9d00a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\d04eb9ef-906f-4dbb-94b0-fe7ccff8763d
Filesize648B
MD5f02b4ea59fd63a44a12fbad64f2a35c8
SHA19c5fe064c2e863ce750bede1c9267c7e1aaef04a
SHA256450dcd94680a3a7240081103445136bc8d1acaeef813f082c8628344303c8130
SHA51257e34d619665d65dd5853aa67be34470b9902a295227288b3de0b1f4aece51531c4ae33ba707735a0e7e5fca095ec9b39e309f09517e08442a081ae6927b2071
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\datareporting\glean\pending_pings\ef9a364f-50ef-4779-94e0-6c297ddc6472
Filesize648B
MD580d8b12ac8ab353203727652f06b30fc
SHA117f91efb959d8268b37d90d76098f9a93ee599df
SHA256aced9a672ea541b06bc3fc3f3bf7a23daee0203d7ba89aa01f2822138f4a30dc
SHA512a72a7da2607bf38956ddf208a066a2d16dedd76875f474ee1b520dbc895283668d1ce539ca0ea9ca15f6f2906b5add1e181e73c2092568198eb1ad0e2f0d549a
-
Filesize
11KB
MD5f360f42d55bd4be945dd87c7b946319d
SHA1815960bc1221db704aa9e9ed0ace703ad206ace0
SHA2562f0644ca3dc6a2b4d5f6fa3f440cd5c3f3af785a52db8e7c0c087bf85c256b8e
SHA51295b00ac2c68bc2dfa29eb0c8633731ed6906afb44689c02f971c1caa51acec4b49c1c4c490c0f67635e620aa9c2630e973e4eeca9f7eb28afccba9440d837ff5
-
Filesize
11KB
MD586bc483f3bf3c87616e4558ffbcb62f0
SHA1f9d05fad75fcd779495f39ac4c0eab24512f8231
SHA256ef827e4443894063b7c6f4ddffd983f8b290896348eebc48b0a6d6c6a7fb78e2
SHA512cfbc511e46e794ab2d45ab4f5902cb11b4cd730e1fc8b4a49d3f51821fc37c385be86086af9f11cd38d6a35c9a3eb89480465c40f48d10a3fb2a4347b66bfbe4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionCheckpoints.json
Filesize204B
MD53e62554c9f218730ddf20915068266c9
SHA1b19fc85839713623f0d0206870f88d9173705523
SHA256c40d1a8460187b4e8f141f324e3a988805af7983606dd605ee2aef1cfc07e695
SHA51231c099d65dfbb1c2fa33a5f6dc2fd088599f9ac2ed093320dccedffe447772817ea6c7e4c99037a927a941fc8e0722b25f04e679a848d4de43c8d8d49d02cf1d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD55690e002e4390070c2ed1a013fd4f966
SHA17eb4eb6a9437bb79e0153b83adafad27fe542dac
SHA256828f829fbb55c26ae9a19ebf4a2abc8b474cacc113004d73b2c6093dd47ad0b8
SHA5127f5b441d44b68b9d78dcbb88d053c3ef80f60e8f16689ff4042fca2c6bf09e3ce2871620ce395507731629a39b5e4f1b0ea48d76a61d2dd2db7d614573f36e64
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lirn7gz7.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD51f11e192656380c647f5184b57a34004
SHA1d1cbcc64d1c1612ac331b3de5a97aff9109577f7
SHA2560ff13a2d3bf33c2618f7c44add520b0d9632d142fd43c0a0ff48a574dc669f46
SHA51273ca15b8661533776343b27fe3f428fd37ea11b3cf546f43b254622a02a3eff01ab0f338880e192572e3d2dc46e3d3e27941b75fa9afa0eba225271df4e0db31
-
Filesize
534KB
MD5a6da8d868dbd5c9fe6b505db0ee7eb71
SHA13dad32b3b3230ad6f44b82d1eb1749c67800c6f8
SHA2564ad69afb341c6d8021db1d9b0b7e56d14b020a0d70739e31f0b65861f3c4eb2c
SHA512132f54ac3116fd644c57840c893dae2128f571a784ceaa6dd78bafa3e05fc8f2a9d2458f1e1cf321b6cecc2423d3c57ff6d3c4b6b60f92a41b665105a3262dd0
-
Filesize
2KB
MD5df35b1229e045b7cfd9b9576c7af6a0a
SHA14d685fce7540a4ec10853b20987ca8831e5f184b
SHA2568168f2470bb7a27e3a09aaa7e8748b2150e4e96a76f6017214c8392d907ce2bc
SHA5128b8ebc2f658180edec34e20337491bd60829832110d1be28e08544afa2707b8b064933ac8662f524b88b4e0c79776df526e44a786ccc04388271ba9013c1dc55
-
Filesize
2KB
MD5353e9e2fa47d7a9c14a35cceac0360b3
SHA118c41db29a4c28597f096ba252868cb57186eff1
SHA256a402c8dac3b12da5d655c7b3dcd6483fa998dc33fb49c8fcf8ec0d63fc4bacbf
SHA51260a044bcdff9cdaf3ac7011e5ca6eca8ce4657db73a1d428008ea153f890e679dce2474917666290764545effb6215b4f4a836304c03ebf1e32da354b685c7ed
-
Filesize
580B
MD5d83df3d6161b621f56402401dddd6195
SHA14a658a72eae666d8e1431bec08cf8be55a4180c4
SHA256940b2536894a381f4eaeeda3289a969ef8c50e2c3988ffdee26b4fc70cc18f37
SHA512b7280b953c85e054387a6e5429aef3e607c6332621983cdfbd01277c40fb54af07a2badb0743270104a5d17c99eaa9438072abbda728f8104ea634642fff6a2d
-
Filesize
369B
MD5ff6789a2555c6195992b3b9a1a17307f
SHA172b7a0b118349bb259a315f2f96ef826fc80b9b3
SHA2560f00c20785d99b7e72ade48572420b1df7db11599a2c20df96851100afc8c084
SHA51272d2f6b5e1525cf9b16f6b8b815709e0c3a3d30d82552370587cf09b8ec018f43f133be486ba4871bf6a38ab02e1b06ec397ef0bff95fa9fc102887e9ea02dfb
-
Filesize
652B
MD58b938b16609d1cb690c1efb8b40251e4
SHA135659c48e7fbede09e04158c32532c61ecd000af
SHA2569859e896fd35a6fd4fd99956a0724e53885f5f810217b4f732cc83d46c54cc52
SHA512f0c52b9f8ec1fc94ff1141aed1bdd5e9ec6eff032bd4178c20202b6943c3b7b5715f31760a16e6887c78b27bf4ed63eb32e59249dc979360943f8e01dcfb7776