Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 08:11
Static task
static1
General
-
Target
37422e3845d657c42fdcac02e137ad3c64792852726c9f487e40c5f78fa5cc04.exe
-
Size
5.7MB
-
MD5
443adc0c9870c6b54c2cf1df12f3c882
-
SHA1
ae9c627e2b5a5f1acbf95a06c163df4543036aab
-
SHA256
37422e3845d657c42fdcac02e137ad3c64792852726c9f487e40c5f78fa5cc04
-
SHA512
f1c3c1cbeef9eef18c284fe6791ab078d7bf30abbbdd139d11de363332d5c26c3dc7f5931184a8c1e505c0667bb76b488e577310ab3e8da64d176215761c6391
-
SSDEEP
98304:2jf573IsspzkBADiy7GONFR0pkbZr+WFiYbaGwENK11TT:2jf573spzkBADiyiO10Ob9MxENK11v
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
Processes:
a0d82424e7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0d82424e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0d82424e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0d82424e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0d82424e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0d82424e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0d82424e7.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
Processes:
2X8806.exe3p81r.exe9859095309.exea0d82424e7.exeskotes.exeskotes.exe1p71G4.exeskotes.exe8edb42e548.exeb5b9ea1f1c.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2X8806.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3p81r.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9859095309.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a0d82424e7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1p71G4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8edb42e548.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b5b9ea1f1c.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 3704 chrome.exe 4736 chrome.exe 1920 chrome.exe 4428 chrome.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
8edb42e548.exeb5b9ea1f1c.exeskotes.exe2X8806.exea0d82424e7.exeskotes.exe9859095309.exe1p71G4.exe3p81r.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8edb42e548.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b5b9ea1f1c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2X8806.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a0d82424e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9859095309.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8edb42e548.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a0d82424e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1p71G4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2X8806.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3p81r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9859095309.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b5b9ea1f1c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1p71G4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3p81r.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
skotes.exe1p71G4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1p71G4.exe -
Executes dropped EXE 14 IoCs
Processes:
h6B58.exes0F39.exe1p71G4.exeskotes.exe2X8806.exe3p81r.exe8edb42e548.exe9859095309.exe5aa3ad42ec.exea0d82424e7.exe4B608j.exeb5b9ea1f1c.exeskotes.exeskotes.exepid process 976 h6B58.exe 876 s0F39.exe 2796 1p71G4.exe 5084 skotes.exe 5040 2X8806.exe 844 3p81r.exe 4832 8edb42e548.exe 2724 9859095309.exe 2668 5aa3ad42ec.exe 3860 a0d82424e7.exe 5448 4B608j.exe 5752 b5b9ea1f1c.exe 7052 skotes.exe 7260 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exe3p81r.exea0d82424e7.exeskotes.exeskotes.exe1p71G4.exe2X8806.exe8edb42e548.exe9859095309.exeb5b9ea1f1c.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 3p81r.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine a0d82424e7.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 1p71G4.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 2X8806.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 8edb42e548.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 9859095309.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine b5b9ea1f1c.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a0d82424e7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0d82424e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0d82424e7.exe -
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
skotes.exe37422e3845d657c42fdcac02e137ad3c64792852726c9f487e40c5f78fa5cc04.exeh6B58.exes0F39.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a0d82424e7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007362001\\a0d82424e7.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 37422e3845d657c42fdcac02e137ad3c64792852726c9f487e40c5f78fa5cc04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" h6B58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" s0F39.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8edb42e548.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007359001\\8edb42e548.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9859095309.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007360001\\9859095309.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5aa3ad42ec.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007361001\\5aa3ad42ec.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007361001\5aa3ad42ec.exe autoit_exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B608j.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
Processes:
1p71G4.exeskotes.exe2X8806.exe3p81r.exe8edb42e548.exe9859095309.exea0d82424e7.exeb5b9ea1f1c.exeskotes.exeskotes.exepid process 2796 1p71G4.exe 5084 skotes.exe 5040 2X8806.exe 844 3p81r.exe 4832 8edb42e548.exe 2724 9859095309.exe 3860 a0d82424e7.exe 5752 b5b9ea1f1c.exe 7052 skotes.exe 7260 skotes.exe -
Drops file in Program Files directory 2 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe -
Drops file in Windows directory 1 IoCs
Processes:
1p71G4.exedescription ioc process File created C:\Windows\Tasks\skotes.job 1p71G4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6552 844 WerFault.exe 3p81r.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
s0F39.exe4B608j.exeb5b9ea1f1c.exetaskkill.exea0d82424e7.exetaskkill.exe37422e3845d657c42fdcac02e137ad3c64792852726c9f487e40c5f78fa5cc04.exe1p71G4.exeskotes.exe2X8806.exe9859095309.exe5aa3ad42ec.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeh6B58.exe3p81r.exe8edb42e548.exetaskkill.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s0F39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4B608j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5b9ea1f1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0d82424e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37422e3845d657c42fdcac02e137ad3c64792852726c9f487e40c5f78fa5cc04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1p71G4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2X8806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9859095309.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5aa3ad42ec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h6B58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3p81r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8edb42e548.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exefirefox.exefirefox.exe3p81r.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3p81r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3p81r.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 10 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3284 taskkill.exe 1588 taskkill.exe 5504 taskkill.exe 5908 taskkill.exe 6064 taskkill.exe 3620 taskkill.exe 236 taskkill.exe 2512 taskkill.exe 5992 taskkill.exe 6132 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133764774856893137" chrome.exe -
Modifies registry class 2 IoCs
Processes:
firefox.exefirefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
1p71G4.exeskotes.exe2X8806.exe3p81r.exe8edb42e548.exe9859095309.exechrome.exe5aa3ad42ec.exea0d82424e7.exeb5b9ea1f1c.exe4B608j.exeskotes.exeskotes.exepid process 2796 1p71G4.exe 2796 1p71G4.exe 5084 skotes.exe 5084 skotes.exe 5040 2X8806.exe 5040 2X8806.exe 844 3p81r.exe 844 3p81r.exe 844 3p81r.exe 844 3p81r.exe 4832 8edb42e548.exe 4832 8edb42e548.exe 2724 9859095309.exe 2724 9859095309.exe 844 3p81r.exe 844 3p81r.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 3860 a0d82424e7.exe 3860 a0d82424e7.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 3860 a0d82424e7.exe 3860 a0d82424e7.exe 3860 a0d82424e7.exe 5752 b5b9ea1f1c.exe 5752 b5b9ea1f1c.exe 5448 4B608j.exe 5448 4B608j.exe 5448 4B608j.exe 5448 4B608j.exe 7052 skotes.exe 7052 skotes.exe 7260 skotes.exe 7260 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
chrome.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exea0d82424e7.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exedescription pid process Token: SeShutdownPrivilege 3704 chrome.exe Token: SeCreatePagefilePrivilege 3704 chrome.exe Token: SeShutdownPrivilege 3704 chrome.exe Token: SeCreatePagefilePrivilege 3704 chrome.exe Token: SeDebugPrivilege 3620 taskkill.exe Token: SeShutdownPrivilege 3704 chrome.exe Token: SeCreatePagefilePrivilege 3704 chrome.exe Token: SeShutdownPrivilege 3704 chrome.exe Token: SeCreatePagefilePrivilege 3704 chrome.exe Token: SeDebugPrivilege 236 taskkill.exe Token: SeDebugPrivilege 2512 taskkill.exe Token: SeDebugPrivilege 3284 taskkill.exe Token: SeDebugPrivilege 1588 taskkill.exe Token: SeDebugPrivilege 2180 firefox.exe Token: SeDebugPrivilege 2180 firefox.exe Token: SeDebugPrivilege 3860 a0d82424e7.exe Token: SeDebugPrivilege 5504 taskkill.exe Token: SeDebugPrivilege 5908 taskkill.exe Token: SeDebugPrivilege 5992 taskkill.exe Token: SeDebugPrivilege 6064 taskkill.exe Token: SeDebugPrivilege 6132 taskkill.exe Token: SeDebugPrivilege 6212 firefox.exe Token: SeDebugPrivilege 6212 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
1p71G4.exechrome.exe5aa3ad42ec.exefirefox.exe4B608j.exepid process 2796 1p71G4.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 3704 chrome.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 5448 4B608j.exe 5448 4B608j.exe 5448 4B608j.exe 5448 4B608j.exe 5448 4B608j.exe -
Suspicious use of SendNotifyMessage 63 IoCs
Processes:
5aa3ad42ec.exefirefox.exe4B608j.exefirefox.exepid process 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2180 firefox.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 2668 5aa3ad42ec.exe 5448 4B608j.exe 5448 4B608j.exe 5448 4B608j.exe 5448 4B608j.exe 5448 4B608j.exe 5448 4B608j.exe 5448 4B608j.exe 5448 4B608j.exe 5448 4B608j.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 6212 firefox.exe 5448 4B608j.exe 5448 4B608j.exe 5448 4B608j.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
firefox.exefirefox.exepid process 2180 firefox.exe 6212 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
37422e3845d657c42fdcac02e137ad3c64792852726c9f487e40c5f78fa5cc04.exeh6B58.exes0F39.exe1p71G4.exeskotes.exe3p81r.exechrome.exedescription pid process target process PID 4232 wrote to memory of 976 4232 37422e3845d657c42fdcac02e137ad3c64792852726c9f487e40c5f78fa5cc04.exe h6B58.exe PID 4232 wrote to memory of 976 4232 37422e3845d657c42fdcac02e137ad3c64792852726c9f487e40c5f78fa5cc04.exe h6B58.exe PID 4232 wrote to memory of 976 4232 37422e3845d657c42fdcac02e137ad3c64792852726c9f487e40c5f78fa5cc04.exe h6B58.exe PID 976 wrote to memory of 876 976 h6B58.exe s0F39.exe PID 976 wrote to memory of 876 976 h6B58.exe s0F39.exe PID 976 wrote to memory of 876 976 h6B58.exe s0F39.exe PID 876 wrote to memory of 2796 876 s0F39.exe 1p71G4.exe PID 876 wrote to memory of 2796 876 s0F39.exe 1p71G4.exe PID 876 wrote to memory of 2796 876 s0F39.exe 1p71G4.exe PID 2796 wrote to memory of 5084 2796 1p71G4.exe skotes.exe PID 2796 wrote to memory of 5084 2796 1p71G4.exe skotes.exe PID 2796 wrote to memory of 5084 2796 1p71G4.exe skotes.exe PID 876 wrote to memory of 5040 876 s0F39.exe 2X8806.exe PID 876 wrote to memory of 5040 876 s0F39.exe 2X8806.exe PID 876 wrote to memory of 5040 876 s0F39.exe 2X8806.exe PID 976 wrote to memory of 844 976 h6B58.exe 3p81r.exe PID 976 wrote to memory of 844 976 h6B58.exe 3p81r.exe PID 976 wrote to memory of 844 976 h6B58.exe 3p81r.exe PID 5084 wrote to memory of 4832 5084 skotes.exe 8edb42e548.exe PID 5084 wrote to memory of 4832 5084 skotes.exe 8edb42e548.exe PID 5084 wrote to memory of 4832 5084 skotes.exe 8edb42e548.exe PID 5084 wrote to memory of 2724 5084 skotes.exe 9859095309.exe PID 5084 wrote to memory of 2724 5084 skotes.exe 9859095309.exe PID 5084 wrote to memory of 2724 5084 skotes.exe 9859095309.exe PID 844 wrote to memory of 3704 844 3p81r.exe chrome.exe PID 844 wrote to memory of 3704 844 3p81r.exe chrome.exe PID 3704 wrote to memory of 4848 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 4848 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 404 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 1684 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 1684 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 4664 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 4664 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 4664 3704 chrome.exe chrome.exe PID 3704 wrote to memory of 4664 3704 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\37422e3845d657c42fdcac02e137ad3c64792852726c9f487e40c5f78fa5cc04.exe"C:\Users\Admin\AppData\Local\Temp\37422e3845d657c42fdcac02e137ad3c64792852726c9f487e40c5f78fa5cc04.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h6B58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h6B58.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s0F39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s0F39.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1p71G4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1p71G4.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\1007359001\8edb42e548.exe"C:\Users\Admin\AppData\Local\Temp\1007359001\8edb42e548.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\1007360001\9859095309.exe"C:\Users\Admin\AppData\Local\Temp\1007360001\9859095309.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\1007361001\5aa3ad42ec.exe"C:\Users\Admin\AppData\Local\Temp\1007361001\5aa3ad42ec.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2668 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:3688
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2180 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2068 -parentBuildID 20240401114208 -prefsHandle 1980 -prefMapHandle 1972 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2fe5620-62cf-4ce0-9af4-8e2e91aa9e28} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" gpu9⤵PID:2256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2488 -parentBuildID 20240401114208 -prefsHandle 2472 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b5761f0-e112-46f9-b5ab-68933694566c} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" socket9⤵PID:4356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3536 -childID 1 -isForBrowser -prefsHandle 3580 -prefMapHandle 3500 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ec996db-7756-4a74-9f31-79a5c8b80e03} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" tab9⤵PID:5068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4140 -childID 2 -isForBrowser -prefsHandle 1096 -prefMapHandle 2748 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c14c3dd2-2150-4882-80f5-6f7dbbe47cef} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" tab9⤵PID:4424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4556 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4788 -prefMapHandle 4780 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71b21fd3-9bec-4502-a98d-9d03670ce34b} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" utility9⤵
- Checks processor information in registry
PID:6372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5540 -childID 3 -isForBrowser -prefsHandle 5532 -prefMapHandle 5528 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65313be1-7cf3-4a97-aba7-a5a4e3f97fef} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" tab9⤵PID:7960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5672 -childID 4 -isForBrowser -prefsHandle 5676 -prefMapHandle 5680 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a96f7886-37a3-476c-9ccb-e15e6f9934f3} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" tab9⤵PID:8044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5884 -childID 5 -isForBrowser -prefsHandle 5840 -prefMapHandle 5656 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3182493-bb99-42ab-9b26-6f3f7e0d85a8} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" tab9⤵PID:8056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2064 -parentBuildID 20240401114208 -prefsHandle 2068 -prefMapHandle 3316 -prefsLen 29278 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c4cd2030-4bd4-4506-a650-3a858c9ba5a8} 2180 "\\.\pipe\gecko-crash-server-pipe.2180" gpu9⤵PID:5568
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007362001\a0d82424e7.exe"C:\Users\Admin\AppData\Local\Temp\1007362001\a0d82424e7.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\1007363001\b5b9ea1f1c.exe"C:\Users\Admin\AppData\Local\Temp\1007363001\b5b9ea1f1c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5752
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2X8806.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2X8806.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3p81r.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3p81r.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffd6557cc40,0x7ffd6557cc4c,0x7ffd6557cc585⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,17280969392428364970,9323515703722305304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:25⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,17280969392428364970,9323515703722305304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2404 /prefetch:35⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2204,i,17280969392428364970,9323515703722305304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2420 /prefetch:85⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,17280969392428364970,9323515703722305304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:15⤵
- Uses browser remote debugging
PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,17280969392428364970,9323515703722305304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:15⤵
- Uses browser remote debugging
PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3860,i,17280969392428364970,9323515703722305304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4600 /prefetch:15⤵
- Uses browser remote debugging
PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4728,i,17280969392428364970,9323515703722305304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4720 /prefetch:85⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4824,i,17280969392428364970,9323515703722305304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5072 /prefetch:85⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5088,i,17280969392428364970,9323515703722305304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5084 /prefetch:85⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5108,i,17280969392428364970,9323515703722305304,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4788 /prefetch:85⤵
- Drops file in Program Files directory
PID:5032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 844 -s 16044⤵
- Program crash
PID:6552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B608j.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B608j.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5448 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵PID:6200
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6212 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23737 -prefMapSize 244710 -appDir "C:\Program Files\Mozilla Firefox\browser" - {adb9495d-5f80-4232-ad3b-52ce56fd8a5b} 6212 "\\.\pipe\gecko-crash-server-pipe.6212" gpu5⤵PID:6400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24657 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {824bebb0-3bd1-4bba-aa41-28b72855eefc} 6212 "\\.\pipe\gecko-crash-server-pipe.6212" socket5⤵PID:6592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3232 -childID 1 -isForBrowser -prefsHandle 3360 -prefMapHandle 3056 -prefsLen 22652 -prefMapSize 244710 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ba8090b-6678-4d59-97f1-2b1fa3062e58} 6212 "\\.\pipe\gecko-crash-server-pipe.6212" tab5⤵PID:7192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4132 -childID 2 -isForBrowser -prefsHandle 4124 -prefMapHandle 4120 -prefsLen 29144 -prefMapSize 244710 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {34db1f02-be7b-49c2-a501-69396f51f895} 6212 "\\.\pipe\gecko-crash-server-pipe.6212" tab5⤵PID:7568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4780 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4772 -prefMapHandle 4768 -prefsLen 29144 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {283316e8-8d49-4740-8ec9-d97752da0549} 6212 "\\.\pipe\gecko-crash-server-pipe.6212" utility5⤵
- Checks processor information in registry
PID:4776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5136 -childID 3 -isForBrowser -prefsHandle 5144 -prefMapHandle 5148 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {688660d7-3fa1-404f-b55a-e8e01c9333a1} 6212 "\\.\pipe\gecko-crash-server-pipe.6212" tab5⤵PID:3752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5484 -childID 4 -isForBrowser -prefsHandle 5476 -prefMapHandle 5472 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {de279b48-1cb1-4293-b17c-d9af82208911} 6212 "\\.\pipe\gecko-crash-server-pipe.6212" tab5⤵PID:5736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5620 -childID 5 -isForBrowser -prefsHandle 5628 -prefMapHandle 5632 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 1224 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {78909c2d-30d2-41e9-9b55-f8d943cfc1f2} 6212 "\\.\pipe\gecko-crash-server-pipe.6212" tab5⤵PID:5932
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 844 -ip 8441⤵PID:5360
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7052
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7260
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5373f64cebde742aeb176c56ce7d2235b
SHA1da508e3abdd678bb6d9a832e920bbfd77cc03006
SHA25677555214ca956bec8020f00c01715e2df7573a3e95fded7d1697ec9d7902cbb5
SHA5123b5b8587251223e62f3edcb589c799eb79128732b4b2d2a44b8e3f8ed0c2c03fa25a362d23cda9a80765f800dd2b05294d731f9534d573d64af5398dee315021
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json.tmp
Filesize27KB
MD5e67e10869792c7ab6a08e6281b3e7f8e
SHA1dc403387e82719d1f4aff1763787ebcff40da9f0
SHA2564694eb605afb6e457f87edb811991aa76ffbfe6dfe95f4f40b9264be3637d109
SHA512e8463f4a3a8f5a7d5eb4d92ee955384ce3f7724c572ed3dc1fe12f442c2445fde85e9eb3d6c3f4f9a3d962986f26b0933edd79ab1b241eed76469fc3a51c9869
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\254256B27E0C48CF9B80B695F0B3B8CA84610495
Filesize9KB
MD5b6c1343706411f92376081193af51f10
SHA1af7c005d313beaad6866b8a5b267e334d86787fc
SHA2567e3a76bd13a0a7e180d673f7ca50c77b50bb8a9cf689fde2a07817e86c88dd51
SHA51227943680ec42f6dc9d8eedb1861c6f1c292162324b176411d9008e4ca5a1694568c9a7785c18928a0dbf0eafa1c71e67de293484c0c41080a15b58d135f5a4eb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\46D4A26FC546A00EAF10CD859BDC3E42852FBCFE
Filesize23KB
MD55eacb9d79c499f166dc7c67307bc9be2
SHA19e6c5afa6ccb0e66d8b21f3da2e6b96a973e0597
SHA25646cb6b197517198973cb7b7c900f1dbf841ab328b848e5698e406a32ae0aca4d
SHA512357e04f27d7e69885922e9cdfae2aa24efb3b937a1bfef31adbbb7a3b8e54a599846864d8d2185808487e7c86f569fc62441eb63117a02f05a0c74ca1475463e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\52017AE6A1F0D4D8790377AB5300FA12B25CA808
Filesize9KB
MD5957d42a8acee46aa9d51abba9a7efd5d
SHA104d05f1490a6741cf294f73d866eeee167bc485e
SHA2563a99ed6fc256f3ad17d0b086d036d85f25000e33a8d530b299513d81ef3481df
SHA512bb76cc4bde7a633f07b82948c0dee1dfc0698de715bec91339b4ff639317ea56172f12f510eaf3845906a2d8efa0b4dfe33950128423e7e2791e8f1cc7cdc44f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\605FA02F0CF36761FF51035847296B9BB827FA97
Filesize83KB
MD526f925393681b23babcd8fc387cd6580
SHA19e1ef166cecd10e555e7f1021efe871359b58aed
SHA2561ec7578e47f962ac657923c966d31967397e66d56f5303c6da7fa53310c06339
SHA5123630888004f7f7d3e7af7b4dd3dedf05e457288f32fe84059024ee760837ea6a92be9b9d39ae449f6e5dcc9709b575c9304e49c926a73b5e5b8976e9023e9e22
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\6A9401069D7CA26FCDC6674AD30D2A279D87FE98
Filesize23KB
MD52512c3e07234df0fefb82b8754c432a5
SHA190cb08bcbcd13158286e994ef4c173ec79ce8142
SHA2568b97d9fc43792935cfdf99bc1980c494760010a62ea6f10cb1dad6d6eaa0b9a1
SHA512bfd8b59ec48fa5b1e88149125bdf77b9b2d7ba436b8aa9c43f83d98b0a2528354af4b0fef3ed2f121ad30f8d2a06275674c3ad37a6e6fd96e2a03c02a5c30ece
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F
Filesize14KB
MD5aa86e8f0368245235431eca7db0e5359
SHA11ff3eebc5d40a80c42a31fbed7e633d18223f9bc
SHA2568fc5bc025bbee4bbde08b9d2b0486b3e0b181993cfcfc0d6d7c2e01aeaffed79
SHA5126b38431e9aa74206929ec80310cbf287e0fd7e51e9788461ea81fde16b1329c13ebe79c68a6a8e78367ae44cf34616e52803a82a0864e9d2b276d06295e26bcb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\7717837394551952245D6650F3059765C5D1E97A
Filesize8KB
MD5c37cbf2c860be7b5fa19e5a7652d926e
SHA15e6e90df591a933791880da93ae74c4ca7f63d8a
SHA256d9ba6aed55703b4cdb7c0d3cfb573597917a7fac1311994648430e3361b24bab
SHA5123bb2acbcab122729c550090b02aef990ae9d5d0bbd79e5b0c7c317b897a88a8f7d5d6ae3f12af461ece772fa88f87156af374344064d010519c169546bb64913
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\7F05CCA942E2DC38B929976BF1BAB183C61DA2CF
Filesize98B
MD5ad071d4905d83bfaa805b36b8d12a9d8
SHA14decbe7a7c344ef8cd5bbe3ecb29b65d7a24ab3d
SHA2560f3ae4660ce3141b31ff1ce32d93298ead34c139c214ef90daa69944e7ac47bd
SHA51293aae69fcc2f7fbb78ae37be1f8bf7691d3c3cab0a835f3e04016a4edc1bad1c473cfdb50af486548af2481044d92059c601423cf636ecbf76527d882656bd3e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\87DF30809CA66B67BB127FD7491F6665D97085BA
Filesize309B
MD59c657866dc04bf718bca45afaff04c1f
SHA182cebc1dd376b30e0e5e762f70c9f740d50bd059
SHA256a543482cdb4ec3616191510e76b2e815ab035d6fc33c83b23de4d429fb48b0bb
SHA5126edc30a0aa08d83f7dd598e8e6f89c3a828a99ce706d076b6dbf7aaf26e2449e4018db7978fa83a4e90386daa098d8bad6d329385f5deb6d274daa025428edf7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\A718AAB68EA013663CB3CDE897FFC95F29D15CB0
Filesize16KB
MD51d6b5ed4d64e70cbb4a8c7f3a00068e5
SHA119336dfb29a6a1af40fa65629e0daa8e5e07f556
SHA256fcf4eff608331800edc5e2d9b9adcccb3cc46a73391bcef4dbaad73178cc0099
SHA5120c75e4a0bf5d8b9a8390e33ef2cae703aa39d300b99b4b4b087fa4fc78409e05461146f674ab4134e0082cb894ad434ef9d3ce83b215eefa06475fbd78e6e21c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\AC2D05327860E5F2CE2254575CDA2C08AEBA0F59
Filesize8KB
MD50a8922ee501284c6c61981a7aa449337
SHA1d12236cbeaf2efd7b4ccea1b523d0a40c774cd09
SHA2568ec62969f47fd9a3938d5492113b25fd4cfc31e557f9933ca880a78d0b22d764
SHA512f0ecbeed909611cc7b9c30ece0b62c0810af65dcc30e01286a23d0ed89ae3599d85985554e7f30f618eb9920d5e0eea7f17e20347812aff1955cd0d1bd054ce1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
1.7MB
MD58dfd8eaae0a25d346fb3ef5a083a4f4e
SHA184004ef179f88b7a8ecd971728c495b9f0c88dae
SHA2562154b74f5f555aafda6ec664348b9a563d22c224173c904e329ff1417a39b0d9
SHA51230940a87c2fd2191035bcbfcc22aafc8c773bfadfdde2e075fb99a22fa9ee1a99fda39c079db83937306e5c536005ae1aceb3c79fb8b50ac248493b475c973a6
-
Filesize
1.7MB
MD55fc4e66712a94c81cd3329e8b397b481
SHA18bd9d0750a5a007e7c3a8ce4b99a7bc8b10455b7
SHA256ea69168bcfe17084b509a7c2bc460e0dfcfe481e82075c78fe29db3f81e47bd7
SHA512000f38bf41c1ada2a2316aa4f1ccad366b07c9c0b81a3a4aab772bef0607aa37f266cb399a5df8dc1ae161497d95f045d7d617f48d93e378ea425768f0735d44
-
Filesize
901KB
MD5a86207c82d09d9a430397d7904785f24
SHA1f2af488f98759b857390c0d18786873915c11671
SHA2566f77212bd99114ef8c8e6f0fa26605e29c4911d8cfce57cba55c23e6e03a5bdd
SHA51206315d755a601a70fbe18497cd8b1456fae80f436665a8f44ee0121378245c7bc5abff2b1de4f60668e3c36650e85fbadcb1192e1ba0c2c48091cde6be4e42bb
-
Filesize
2.7MB
MD5ac2487270efa68d400f82a40fdea98c7
SHA1088126b5b7ba3fb367dae80b0ebefa8d0c4f9f27
SHA25669e094cea726cdd56f9f45dcb02afd4a3b63847b57e4a5453f740475a0c42085
SHA512b28805f48e90c3aa8c59e3c8ecd0003681d0efec41ae5746e08615026918bf1b6e2e1d572a3b9000a83d3f95497f82876d023fd89c8412a5e42376100da513a6
-
Filesize
4.2MB
MD58a650e31804b47bd65f97f71897ecee4
SHA143698b9e15d9d2a198bbefca8d29c989a7af3b45
SHA2562a6e81a997ee42091e15bad50f499dac926a76f2b5ce407455e3e8c5ce741e2f
SHA5122fc486b852e177ce56232890f9697d43cacce4b3047083f256b202f014f153179d932ab2a00175234c8be7c6b875632f4800e916e8a3222582ce5d19a204aacb
-
Filesize
898KB
MD51a1ab06f44780f5c4410d5efe2ed98f9
SHA1499eff2fef209070e84753c0e40daede107104fe
SHA256171bae57acfbea610a08e065f9924d323b9374fcf7c4c4b58e81f3f6c587f1c7
SHA512142bee0832989c651b5b412c70e3b4c7d6f7e4c38eaeb7ed0ef9ce5666438760ee263499179d51fe7daacb4052a6d1124f466b5f307b19b6ca38eb6b2de355ac
-
Filesize
5.2MB
MD574d407aa85cbf4b301e36513d4fe0e51
SHA1b93e915ad38fe2e9e3af55e57d7f69b120837c6d
SHA256f140b3274729739fdc215ac775a35a70df135efc32630203a513ee9042063912
SHA512de6f73a51a0378131711a5ececa40f4530285db6797662cbec7e26b22b3526ad6b0be0e112b81ece6ce113c19dcd9c2bae156dc6cc9fdde234575b17ebdd88ff
-
Filesize
1.7MB
MD55dce87ea56a966f1e59b1be866d726fa
SHA120eff00bba0123b7e44f57131edfc8fda8382c6f
SHA2564c2eb948eecb946e02d795c759c9a597ee72707295ed433cc27b71f242ca24cd
SHA512f55e5aa415abfda050a3958b44d5916b4649274fa1a06fb443d30aa8fc57a1c394cdcadb3207eaa4b2781d24ad56d34c204171875fc33d58592d1f7da2d0b4a3
-
Filesize
3.4MB
MD55e0a728a735b05bb15c376cb5b072135
SHA163b5ce721417a4e8e70139b3b7dd54d4dd811db3
SHA25661679031c5025f3afd7dc239886c9edc5e9b06f168d5ece4cd963288624dfd98
SHA51214a40b1ab0258469e60601890ff2f019d1894b679bd1eb6c5d46fced067453ad02ac66f4b5c63f402de1c409cec73ac30a5f7c29de98b69ca94dc7e085cd5eac
-
Filesize
3.1MB
MD59c0c827b6abebfdfb1bf2fe9bcf7d939
SHA128eb4029dd6a9d19cb3f905758136fd88cac7d13
SHA2563216ca52d4ea7c82f879626f40e739552faf9f778cc927aa3a38d44db8de2371
SHA512b76335083e93b569961ca6ab69d3d522c507bc7b79e0eb5e3f24c3c9218758bc3aacea611b4b9eed83f36d74071eb790c713c5652e69e7066bad4fab982252f5
-
Filesize
3.0MB
MD5d99339140bc1061cb2403b20c7aa5491
SHA17040d17fbd18aa432d5fa28b0a25392985c25426
SHA2569c88b468e8edb17a274761341c23986a07f1a556b1ffff42dff5fd9728a8fd03
SHA512b2fe750fdbea48f78e3c4e98ef431d6beb6188343dd9c95b86e39c70b7fd301b1453cb583c336b6b15432548e61475065738e1bb3a3878d41154d37b958c3365
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3704_1510411371\4389e742-56cb-43b7-86b0-d6b8617c1fb6.tmp
Filesize132KB
MD5da75bb05d10acc967eecaac040d3d733
SHA195c08e067df713af8992db113f7e9aec84f17181
SHA25633ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2
SHA51256533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize18KB
MD57f599132b2e653c247186bbbf036e539
SHA187ba56eeabb5494c4053676521bb0c410f8471a1
SHA256c4160a4ceda00a1e0b70d156993d3199c06c0ed330e5eb68eeb3d4a370f942fb
SHA512fa1fdf7a4927e97ba55ff807ff6e67947dfd70d46c44189a3fdeefe8a06788a8064a82dc63b36d82165e320d4c7936c9d2e9015bb5e69bf1caa15ee95e68172f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize6KB
MD5102d33d5754acc2e5368b5eb7859bcf6
SHA12e0e80f6fe846e04fea11fcfd614eddcdb656793
SHA25600e4cac8cb433db7f2aee9888f778df55613ab3d6b08aaa2e98adca0452386a7
SHA5122a55bb958f42c834c91e925257ccac3cefc80022884beb42d9e65ff77f2a84f16f2e87d550eeea404d07621ce9684f986546709f780300501e3ed0da328cc560
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize10KB
MD566d2f2672bac3d8c90597ac7a51019c0
SHA185d45cca95fbd6800071ebe98dbbba3bba9c24e2
SHA25638e17ef2da0f6b2f061acdd671e4935862678aead6e4f803ab7e197f75b0f023
SHA5122f1bb6724e7ac08764c564c89d69cfef7944f3c91e171a317ea5c554f83198610f47ea4eab8678b4389ff290e5af09919d55d44d9ea33eb32db5986cea82dde6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize15KB
MD5891ee75e9f9c1b92eb74b9e6ddb66441
SHA15f402b3641d1ecc11fc475e5f4ad18f00e34ee2d
SHA25651747172204e4bf97fa413c9343453ed919c223411944bae8ace72cc17435000
SHA512179b45b09255e5f8596908b714f0fb6271694f5e21bb9b39dd30dda730e1efcf246fc4d17e744b3634e56d7c6f035ef5aafd920147fbc90d0412cde7c8a7282a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\SiteSecurityServiceState.bin
Filesize1KB
MD50c5c967d7a5b1ba7044bccfc873043cc
SHA17d980978ee3cf906b09f7b5902ca457b9b62a345
SHA256bc873ea290e0bf5f47b41a1f97a63c4e6123aef953e188f7410ab31c8de11b1e
SHA51211771429a140ce5414baa74fc9e23f5df961339a2c280a3fccba8242537131e7767e4c41fbe3cc875d7bc06c290bd27989b906ffabefb33deac46883c7b005a0
-
Filesize
224KB
MD57679a22929ced66f9634034cce6ae281
SHA10a3794f32bb00895c1113c687f0d9b1c94e80301
SHA2569814d28eceee78acbcbe555ca99f8c424f3f16875443a2cba30697ff24544925
SHA51285b633d78e62df963f2ab04920ddba7229a0d56a9647682b8100ba49001a5b63a76bc331b78b879e26353fcc98ec843745c0e42f3ecd9ed4b8801e3102b22ebe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\content-prefs.sqlite
Filesize256KB
MD5b41ed219e2c8dac47f2701562d092621
SHA190d507eae3ec943a121dbe5a080412e40470b54f
SHA256cfed019635a1e14f74ae78f2c03fb96b40ac3da37b67489bd98c144afc200f1f
SHA5125c6027ec701055efb3b6c055727af5ed261e8f1d5ba954e64e8a34e5c791679b1e4a6ef49896ab8089ec151fd758ba41efc7333611af42b851606a0544a9b947
-
Filesize
256KB
MD57b9e9c1f727478e2d4837ec87e4d4a0a
SHA1b6165be279333db6cb58285b53cc774f16899821
SHA256d8833b0d5dc3aa877e26e3b457ffd79f97ccab490621cf47a14b45f87986455e
SHA512beae15cb61b1b0c82e42da58445127fa79ce1614d3595a05479f62f256c4e18a9fd0e3fb9021ec41daaedb0acb685495fd6b7e55cb789e4405ddb0544e9d8310
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5eaebd744cf316e6aaf2ad5f050d826fe
SHA1e0dc8862eb132889fdadc2826d874e3b97c48176
SHA256428948a9b35014a3f32d7d9dade200196769b869298b816c1708afd7b4549ab3
SHA5124217d457114d923a94570ca89f7f2124327b995909b3fc150ce2c8b0d2fc0843cef13c27b485fd804043f2834549331976f6239c5808aa101d6f951a20f315ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5bec5a9e0b0c5833cfde433e5570a1dc6
SHA1df1ace67502c9b38740b8bce7eeb3ed8bc063eab
SHA2564234de51dfce2ac0504db2b2578282ce69c96548ff8a2329560b7a50f9c52a14
SHA512d480e906cf5e1cf44ab44d3a71206652d4a33d509882345deb1bb857f61b9690b1c315bac6fbf400faad1071a353f5501520da955bc685fa2cd8c356365514ce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5392bceea1c2f1d315ed3142b4c96e1bb
SHA180c11de9a0ee15727fbee608d9f2ebf0d7381c9e
SHA2562f8558dd4f95d7166abd2fd24fdcf9e77a6de2c2eae138efbbf6c1197409a728
SHA51213fcfdc59c1c7b43f81994e6982542029efb0ac80f327d4f59364fb95ccb738ee14aba56f6041916f12599415c4df112923d752c44158eb0657a0415d2a7b194
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD55c235e705798da2dc93c694eab2cfd18
SHA153a2234118f804d6592ea7591eb3739c6bfd0cc7
SHA2569b63cf9670976e973bc74e4fdc839396506be39a3dd21ad65cbe2ae737972546
SHA5125f4a953e4d736763e673511f6e74358ffdc98212f2a75ff0313294b2af6f9fbdab02df19284a3133a2b7d8c0b3a43793c90e393d4e10cb44dadd055e09fdc71b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD56b60d57d5da440cbcb3ccf79c57dc891
SHA1cacf665c13929a0b95251abd78b85bff5e79411b
SHA256b6ead7d47df6a043cf2cd4aadd74f964338d390a8d24bf33ccb6446fe7e2a15d
SHA51257481a092a4b2fd51134de717f106f99a498a572ab8847ffe159243b86b2b3b2ad76c27e31b6d975fac5d180d4a62e7375902a90f622205c6d02f6a2782a6bb4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD556769da270a6ddde2b9152e4c3cd870b
SHA1b0e81eb18706266872bdf7515b49d6437eb3b444
SHA2563ff8a339da9702cbc575b1c96fc482c3e0a0f0f37074bda98b33d460447d8548
SHA5124b382ab7c05b235d0b1afc7879d5d6ccdfc1f5630fe3d4c85d8b3dbf822a0ee626f6088c4d3e7b19f7f7dc1a5086c7a51681cdd156567496e115668229a11973
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5143bad7b91c56e8decf14278c65cac43
SHA1c0333bbbf7146254de7ff498d7fd305c37f0f4d7
SHA2565d5a87d0cd836e97a2db12e65a6adb81293cd44a9fc6c6041f4061bc6f340de6
SHA5120d888ef2a2e1bf2e6c49aac3cf0cb4103afff08372dd31e56b36ac4ea50115c61d2c89bf0727c67b5977859639a95eea777a24ec0910c86ad6b4ec9d6e98ac0c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5e951947818510a53c2cc13c6bcef2a28
SHA116a659ca333b75bd29e829c0191676424a6f6d22
SHA256a2d272abaf0c67b3fa079a70b981f86fcb06f3d36c42611b1e7fa23dbcfa7fc0
SHA5126bd25ad4a057f4b31dc6fa228ea6eabefcc20b21d616810bf1ec4c5b322b728965b524eef828de023dc3c0d918cb2429827a3351a50a908e85795ea6afa47719
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD554b77706240a4b80bef1041dafc31342
SHA1937e4eb300ac78e0474feb65fec3fca85dc6ce19
SHA25662e9675287c0a8596444ca262c703a6c13b3b3c06a2f5922480fa66fd5853943
SHA5122c926078439cb1b4f72883dceab3d34f033165fe70806cbe0a967e52243dd7976daae3670470313bd74ee265602a5ed6e2232153833cc3f40ccd4d822cd9739e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\events\events
Filesize104B
MD5defbf00981795a992d85fe5a8925f8af
SHA1796910412264ffafc35a3402f2fc1d24236a7752
SHA256db353ec3ecd2bb41dfbe5ed16f68c12da844ff82762b386c8899601d1f61031d
SHA512d01df9cab58abf22ff765736053f79f42e35153e6984c62a375eb4d184c52f233423bb759a52c8eed249a6625d5b984a575ca4d7bf3a0ed72fc447b547e4f20a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\events\pageload
Filesize378B
MD506762da4cdb347aa2d0cdab9c509a403
SHA140c762fcd263177f8aaede3270dcffa76474e701
SHA25601c3784c453b7ac4926b501c5ceb01a06d99a98d74cf95460cd5e82e1c94865e
SHA512942432811ada8477285105dead4c61de67dafbfb6a770a0bb5f3b40759586343dfa46a10d16278c61d60012eddcbc19f74443afdadde177d9fd302c16e3c12fd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\2ccc809e-db77-4756-850f-ed7034d2f170
Filesize671B
MD5109122a0d166aa175d7dc9d749e6e65e
SHA1d644089ec4972281e3ddb40c7a8e7fff5b1637a9
SHA256bd3c1d28e4272fd2fc7613dabd81ede702b0396a9294b4676ab1f6a80737cda3
SHA51281c2b40c50e437a81d66793677ee3cb6f40ecb7200fbc2408a0b4a4626f6c2acc1d6d4c0a21fd50640c3c92ea53b6a3fdfc12c34e1a170c526fe9a2a1a3cfeb4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\529b504a-7946-4294-8e77-9143a4b76d2a
Filesize661B
MD52525db43e4094c03f3a87eba58ea274b
SHA1281aecd6abe34a32aa2ca97feaac2af8bf9d19f0
SHA256cb8b028611c452de5df3d6bc5577f60ed966e54080af9ddeaf593b85ee25eea6
SHA5125e5d0e7c681154ef32b7e9d76d91631fc7c8cd68de1febede40fbb38ad4f1263c5f0dcd56e20778a1201ba5b87e851c9fab3a9748b95430bc6ff41d9dde64a4d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\5e4e2a2f-0ada-41eb-88f2-b1255e734df9
Filesize29KB
MD5252590599fdae60f6924237942a92da7
SHA1848648a68da536138a646c03604150e63ffe8ccd
SHA25648e8a27bbd148eaf3980c6df84d9ecbf3ec2f2473f2b7a3275a7956182c96df2
SHA512d8126cd4d41dcf797bae8c5421e2d66e9b43474b11485223cba1a7680b415ffb4d57ee52167828ac8be244d3be8c1fccfceef9f7c478dcba6bcd640ff2820c37
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\6b865d7b-d45f-4db2-90ab-7c359075e7b2
Filesize653B
MD591e8a25d16b8cc95e2d7596861670de4
SHA1f26bf695325fbc5d6edf4c8508e46e11e7967db7
SHA256f0f22d8cef2a32874fce2ba2d6b1532b3020a249a141043e1990b032977c055e
SHA512648300d99a8df0f174e41426c9657e508aafec879f3b585b174271463659d7cd68a085a5f11620b99bf4ece3c5c6a2dfb3257d68c06eb07daf203625176c9bee
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\c50f9e6b-88bf-4a18-95c3-f2d87d4f7d73
Filesize905B
MD5c4673d29d6cbb72ce91996fdae57d062
SHA1561223b8d1b0e119c57dd95fd3ab62541d081c45
SHA256eecdfc9e4b65141ea78d24a24565315d9a439c2331094ea77d8f488d15ce7568
SHA512d8b76e63db093dd4711e4c2e1bdd40e10e67a0ef8a7686bc6b812f8afbdd9bae5687f68606163276d6b74768e75a7f03808cf0fdf5b8ac7f2619f8a29ec324d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\c80270a2-c9e8-40d6-9d6a-40f6f2bdacb4
Filesize768B
MD53832aa219b6d266456d208baef4bd6f8
SHA1293be96141cea9b5e7770a0b6266b47da10a70e3
SHA2566fa001b707b2566a2dbd1a44f2ba1ece4bd0a3624b6b0cb793dd11fc68847959
SHA512f38eeb59b9dffa56bad39fb00a2de0a2cb6a9dbebc80aa9a4e17784f5b3df8973d9a79f11b0078096c608a148b81ef3eb8b8bbe542a6172637aa2df0fb9e7a4d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\f00f0f70-d4bb-4fb7-a58a-7b9de1d2dd37
Filesize982B
MD553f439ab55d0bd772dd1849c9a396587
SHA1e339abd3d6c66051a53d7fac0765295d9fa89e0a
SHA25665e0ad28963de764d7c6668fdd8654dee03e2757781dde32ed058d3eba47bea8
SHA512a73cc9d39eef914f2dd8ca5b607ae4d761f9fa01a9a3171090f54ff7a9c754da76e05f732c2b04067273521611742b89af99bc45aba079c04b29ec2c664787ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\favicons.sqlite-wal
Filesize160KB
MD51e688c5cba5f8d3566b7c3c03f749ac6
SHA117be033080ae69a3102cf301a32d39b32010de62
SHA2563d2c9e8bf1eabaa7583aa1966f2e3bc926bc0739913725a163f753e1079ffc21
SHA5128337ff759ae3aad491982e62730e380a9d68e1bd1bb3a4dd9daf3ca3821f96546b88ad27c0fdad15bdce512f21e482daa98ffdb42554e6ccb259e51ce387a12d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
96KB
MD5033a83b37d8d813d7b85b719b3cae82d
SHA16140525249d6be2a991945c9bd24c668a9837c7b
SHA2562c8bc0457c87bf0af10cc75d98445dc9dc63fbae9b82be2f23c31755c92e21bf
SHA512528a0b2562d00049d0df045817a1adccd8d1dc8e2642b370def059b1423c9e047d7119e85e329b1b83548fdda2ac4caa38899004daa371c4adabae7be83a0c32
-
Filesize
2.0MB
MD5f9d18e579fa633edb91ca43641057c8d
SHA1c69bb8a306d8709c70597e0427830835e7ca8750
SHA2562ba74595f48c4a1336fd2bf81274b128082daf5118961797cdd6da1d91a52222
SHA512adc47e4a1277c2df0079f079a6345e6228df482a17072836c8aeb29fc15a72d5eac62d0786327b44568637c196c787ae921ff6076428674b4fa51ebc6f30f3f5
-
Filesize
11KB
MD5835e7d47300dcd9c0d5aeb6ab46e4348
SHA17c2bb7052c169f3a2b1bae3240a32a68f9467193
SHA25669ac33682d074e2948132c93c79fe3a779907692c1dff8bea6179ff915cd7e2b
SHA51263140677f45c125561959f5c211a157d0ad4ef4cf4951d299eead022c748c578c4263b7fb8cb67eb75792876a64fa58cba76a3b867de4f0f2e24e4795ea54edf
-
Filesize
11KB
MD52efc44629dbd2aadd920cb2eac3bba48
SHA13a1aa4e5cc3904a5511c7cb5ab08983499666d22
SHA256d552b023223d511983c1608d02ab917897328fe57b59a6ae17d51656bbefd90a
SHA51208af51f9999d87b6064b62639a71f9cc536b1df0f5a9001596ec40b83248a64ea53d768c35b0bd6591572b86222d2f7dbc2d8d2b95b056badda98b3474f1e143
-
Filesize
11KB
MD58fd0a973a7dd7f33a50d77d2127cb311
SHA14c2852979c40e96cbccd9520e78e61a41ef1d726
SHA256fcaa2fd55413d2bcb4788f37c5fcec734c685f6f9e671a9e34dd4be800837fbe
SHA512807eb1eaba2e5cbbe3d60539a0e6a99410685b4455d1b186de1694af8ba5047e36db9f02c19424bd48f31aa995e2da0cfe7e22eb692a51947413ec3dfec02bad
-
Filesize
10KB
MD5e1c92eabaaf11d4ab322317d520cc3bc
SHA114ced88e11cd47020f01424bcf17f5c33a68fef2
SHA256585a5fad12b24ccabeb341a827007d697cda5ef187bed99847788b48db01bc66
SHA512d18be99c04a69a2c856a37c7bfcba296f7b437e9742126bd7613f643e11c629206cb6a1e04ce39fafe35633c094d17407dfd5b5e73506e020fed29dce7d35967
-
Filesize
64KB
MD576786a4c0dd19d88d6d3ed95a293bf2f
SHA1b0d6d676127a7694fc6e71ee57fcc2ffaa621ff7
SHA2561a2564c1ba20b8038d35c2319258d94dc15d97914dcf753b31c48b79940dfd31
SHA5128cd3298e2ebba763d3c80ac4b17e44af7eb63b46304967d0c6316d314baf8611c05f7b9979c2c5c329ac167aea0246e8c9f057ffbb272481c13fd5e4b4bcb2d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5b47e56bfae97be8d501feb74406c62c2
SHA1653efe9a32cd95f63c2e2b6579e045efb0993c45
SHA25629e061f443d446d7528349a2fdf506d51914342f043409e34f3c6f5dea9aa109
SHA5126f592e2dbffeddc33afe51333b4f0cd09c770d65d210cf1b5999910cf76ccea6bd526cbc1821f01691d3432efd3387a7c82b77870d989037953591e153c4cd34
-
Filesize
4KB
MD5ec5e1b7a89dd39a2aef55f9f149743f2
SHA1554bfde8b06776a72d63a362710369dded7572fe
SHA2561134e91b9c40a5c1063371117f90079b1aaf4b9bfb629fb6e452947fb9e8ebe0
SHA512f480fd92ae952ebe7958dc7b3fddf3cd51b4ad9605db1cacd4e05382b2f2d15e9e05db4684c0fd5d7c939578a9e1e503b5799198a10251380895095846976825
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize584KB
MD5e63a64d3291e78c3f865fa2a835988e6
SHA11f29fb82e2ddcb0d3d4aa7d6948f2ca84cc466ff
SHA256177eaee758f98e8d17585bba098de3ace051461202b290fe250b995e28a2f969
SHA512399690f035974022b5b856a29d2f182015952e6eec48baac9ed612d158cad777988aeb8950e1e84d61623c34e2a287630b7c9057ad4cd98efe9b5640aa91458d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e