Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 19:46
Static task
static1
General
-
Target
67e0828776fdda536c5f0ac3aaf8b1f40fddd96559ea53950dc6735cb185f509.exe
-
Size
5.7MB
-
MD5
bed173b115c843e70d1f3bdc3c6aa772
-
SHA1
b369900b8c6f9886cfed536643abfbcc818c1442
-
SHA256
67e0828776fdda536c5f0ac3aaf8b1f40fddd96559ea53950dc6735cb185f509
-
SHA512
2b0c635611583aa8e615ae30d23642f73067be6942f5afcf8f62a036fb6fe077ca7727066c5af21cb1913816b17ee83e3a6949806b8f52587a77e3ca23f4b605
-
SSDEEP
98304:2jf573IsspzkBADiy7GONFR0pkbZr+WFiYbaGwENK11Tx:2jf573spzkBADiyiO10Ob9MxENK11F
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral1/memory/1680-1671-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 52a33eec1f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 52a33eec1f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 52a33eec1f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 52a33eec1f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 52a33eec1f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 52a33eec1f.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2X8806.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 313c6aab34.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 52a33eec1f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1p71G4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 024fc02dc4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4a17d22a0a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3p81r.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2452 chrome.exe 4816 chrome.exe 6752 chrome.exe 5640 chrome.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2X8806.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 313c6aab34.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 024fc02dc4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 52a33eec1f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4a17d22a0a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 52a33eec1f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3p81r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2X8806.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3p81r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 313c6aab34.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 024fc02dc4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1p71G4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4a17d22a0a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1p71G4.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 4a17d22a0a.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1p71G4.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 18 IoCs
pid Process 2664 h6B58.exe 536 s0F39.exe 2828 1p71G4.exe 724 skotes.exe 2408 2X8806.exe 2072 3p81r.exe 3308 4B608j.exe 6736 skotes.exe 6720 IObit.exe 5412 313c6aab34.exe 5300 024fc02dc4.exe 5620 skotes.exe 5512 4739a6a114.exe 2628 52a33eec1f.exe 1680 4a17d22a0a.exe 4776 service123.exe 5172 skotes.exe 6092 service123.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2X8806.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 313c6aab34.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 024fc02dc4.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1p71G4.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3p81r.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 52a33eec1f.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4a17d22a0a.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 4776 service123.exe 6092 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 52a33eec1f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 52a33eec1f.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\313c6aab34.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007483001\\313c6aab34.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\024fc02dc4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007484001\\024fc02dc4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4739a6a114.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007485001\\4739a6a114.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\52a33eec1f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007486001\\52a33eec1f.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 67e0828776fdda536c5f0ac3aaf8b1f40fddd96559ea53950dc6735cb185f509.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" h6B58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" s0F39.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023c96-47.dat autoit_exe behavioral1/files/0x000b000000022dda-1032.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2828 1p71G4.exe 724 skotes.exe 2408 2X8806.exe 2072 3p81r.exe 6736 skotes.exe 5412 313c6aab34.exe 5300 024fc02dc4.exe 5620 skotes.exe 2628 52a33eec1f.exe 1680 4a17d22a0a.exe 5172 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1p71G4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 7164 1680 WerFault.exe 157 -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s0F39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1p71G4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52a33eec1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2X8806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3p81r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 313c6aab34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a17d22a0a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67e0828776fdda536c5f0ac3aaf8b1f40fddd96559ea53950dc6735cb185f509.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 024fc02dc4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4739a6a114.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h6B58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4B608j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4a17d22a0a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4a17d22a0a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 10 IoCs
pid Process 2812 taskkill.exe 2644 taskkill.exe 5984 taskkill.exe 3128 taskkill.exe 1240 taskkill.exe 3784 taskkill.exe 6932 taskkill.exe 3644 taskkill.exe 7024 taskkill.exe 6680 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2168 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2828 1p71G4.exe 2828 1p71G4.exe 724 skotes.exe 724 skotes.exe 2408 2X8806.exe 2408 2X8806.exe 2072 3p81r.exe 2072 3p81r.exe 3308 4B608j.exe 3308 4B608j.exe 3308 4B608j.exe 3308 4B608j.exe 6736 skotes.exe 6736 skotes.exe 5412 313c6aab34.exe 5412 313c6aab34.exe 5300 024fc02dc4.exe 5300 024fc02dc4.exe 5620 skotes.exe 5620 skotes.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 2628 52a33eec1f.exe 2628 52a33eec1f.exe 2628 52a33eec1f.exe 2628 52a33eec1f.exe 2628 52a33eec1f.exe 1680 4a17d22a0a.exe 1680 4a17d22a0a.exe 4816 chrome.exe 4816 chrome.exe 5172 skotes.exe 5172 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 3128 taskkill.exe Token: SeDebugPrivilege 2812 taskkill.exe Token: SeDebugPrivilege 3784 taskkill.exe Token: SeDebugPrivilege 1240 taskkill.exe Token: SeDebugPrivilege 2644 taskkill.exe Token: SeDebugPrivilege 1100 firefox.exe Token: SeDebugPrivilege 1100 firefox.exe Token: SeDebugPrivilege 5984 taskkill.exe Token: SeDebugPrivilege 6932 taskkill.exe Token: SeDebugPrivilege 3644 taskkill.exe Token: SeDebugPrivilege 7024 taskkill.exe Token: SeDebugPrivilege 6680 taskkill.exe Token: SeDebugPrivilege 4292 firefox.exe Token: SeDebugPrivilege 4292 firefox.exe Token: SeDebugPrivilege 2628 52a33eec1f.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2828 1p71G4.exe 3308 4B608j.exe 3308 4B608j.exe 3308 4B608j.exe 3308 4B608j.exe 3308 4B608j.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 3308 4B608j.exe 3308 4B608j.exe 3308 4B608j.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 4816 chrome.exe 4816 chrome.exe -
Suspicious use of SendNotifyMessage 59 IoCs
pid Process 3308 4B608j.exe 3308 4B608j.exe 3308 4B608j.exe 3308 4B608j.exe 3308 4B608j.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 3308 4B608j.exe 3308 4B608j.exe 3308 4B608j.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 4292 firefox.exe 5512 4739a6a114.exe 5512 4739a6a114.exe 5512 4739a6a114.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1100 firefox.exe 4292 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 440 wrote to memory of 2664 440 67e0828776fdda536c5f0ac3aaf8b1f40fddd96559ea53950dc6735cb185f509.exe 84 PID 440 wrote to memory of 2664 440 67e0828776fdda536c5f0ac3aaf8b1f40fddd96559ea53950dc6735cb185f509.exe 84 PID 440 wrote to memory of 2664 440 67e0828776fdda536c5f0ac3aaf8b1f40fddd96559ea53950dc6735cb185f509.exe 84 PID 2664 wrote to memory of 536 2664 h6B58.exe 86 PID 2664 wrote to memory of 536 2664 h6B58.exe 86 PID 2664 wrote to memory of 536 2664 h6B58.exe 86 PID 536 wrote to memory of 2828 536 s0F39.exe 88 PID 536 wrote to memory of 2828 536 s0F39.exe 88 PID 536 wrote to memory of 2828 536 s0F39.exe 88 PID 2828 wrote to memory of 724 2828 1p71G4.exe 89 PID 2828 wrote to memory of 724 2828 1p71G4.exe 89 PID 2828 wrote to memory of 724 2828 1p71G4.exe 89 PID 536 wrote to memory of 2408 536 s0F39.exe 90 PID 536 wrote to memory of 2408 536 s0F39.exe 90 PID 536 wrote to memory of 2408 536 s0F39.exe 90 PID 2664 wrote to memory of 2072 2664 h6B58.exe 96 PID 2664 wrote to memory of 2072 2664 h6B58.exe 96 PID 2664 wrote to memory of 2072 2664 h6B58.exe 96 PID 440 wrote to memory of 3308 440 67e0828776fdda536c5f0ac3aaf8b1f40fddd96559ea53950dc6735cb185f509.exe 97 PID 440 wrote to memory of 3308 440 67e0828776fdda536c5f0ac3aaf8b1f40fddd96559ea53950dc6735cb185f509.exe 97 PID 440 wrote to memory of 3308 440 67e0828776fdda536c5f0ac3aaf8b1f40fddd96559ea53950dc6735cb185f509.exe 97 PID 3308 wrote to memory of 3128 3308 4B608j.exe 98 PID 3308 wrote to memory of 3128 3308 4B608j.exe 98 PID 3308 wrote to memory of 3128 3308 4B608j.exe 98 PID 3308 wrote to memory of 2812 3308 4B608j.exe 102 PID 3308 wrote to memory of 2812 3308 4B608j.exe 102 PID 3308 wrote to memory of 2812 3308 4B608j.exe 102 PID 3308 wrote to memory of 3784 3308 4B608j.exe 104 PID 3308 wrote to memory of 3784 3308 4B608j.exe 104 PID 3308 wrote to memory of 3784 3308 4B608j.exe 104 PID 3308 wrote to memory of 1240 3308 4B608j.exe 106 PID 3308 wrote to memory of 1240 3308 4B608j.exe 106 PID 3308 wrote to memory of 1240 3308 4B608j.exe 106 PID 3308 wrote to memory of 2644 3308 4B608j.exe 108 PID 3308 wrote to memory of 2644 3308 4B608j.exe 108 PID 3308 wrote to memory of 2644 3308 4B608j.exe 108 PID 3308 wrote to memory of 4120 3308 4B608j.exe 110 PID 3308 wrote to memory of 4120 3308 4B608j.exe 110 PID 4120 wrote to memory of 1100 4120 firefox.exe 111 PID 4120 wrote to memory of 1100 4120 firefox.exe 111 PID 4120 wrote to memory of 1100 4120 firefox.exe 111 PID 4120 wrote to memory of 1100 4120 firefox.exe 111 PID 4120 wrote to memory of 1100 4120 firefox.exe 111 PID 4120 wrote to memory of 1100 4120 firefox.exe 111 PID 4120 wrote to memory of 1100 4120 firefox.exe 111 PID 4120 wrote to memory of 1100 4120 firefox.exe 111 PID 4120 wrote to memory of 1100 4120 firefox.exe 111 PID 4120 wrote to memory of 1100 4120 firefox.exe 111 PID 4120 wrote to memory of 1100 4120 firefox.exe 111 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 PID 1100 wrote to memory of 4604 1100 firefox.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\67e0828776fdda536c5f0ac3aaf8b1f40fddd96559ea53950dc6735cb185f509.exe"C:\Users\Admin\AppData\Local\Temp\67e0828776fdda536c5f0ac3aaf8b1f40fddd96559ea53950dc6735cb185f509.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h6B58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h6B58.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s0F39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s0F39.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1p71G4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1p71G4.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:724 -
C:\Users\Admin\AppData\Local\Temp\1007468001\IObit.exe"C:\Users\Admin\AppData\Local\Temp\1007468001\IObit.exe"6⤵
- Executes dropped EXE
PID:6720
-
-
C:\Users\Admin\AppData\Local\Temp\1007483001\313c6aab34.exe"C:\Users\Admin\AppData\Local\Temp\1007483001\313c6aab34.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5412
-
-
C:\Users\Admin\AppData\Local\Temp\1007484001\024fc02dc4.exe"C:\Users\Admin\AppData\Local\Temp\1007484001\024fc02dc4.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5300
-
-
C:\Users\Admin\AppData\Local\Temp\1007485001\4739a6a114.exe"C:\Users\Admin\AppData\Local\Temp\1007485001\4739a6a114.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5512 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:1084
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4292 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2056 -parentBuildID 20240401114208 -prefsHandle 1984 -prefMapHandle 1976 -prefsLen 24913 -prefMapSize 244938 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9397673-bf22-428e-851d-d4c094109ac4} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" gpu9⤵PID:6960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2492 -parentBuildID 20240401114208 -prefsHandle 2468 -prefMapHandle 2464 -prefsLen 25833 -prefMapSize 244938 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f68cfe1e-1bf5-4f9c-b190-bb52d9107b3d} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" socket9⤵PID:6280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3048 -childID 1 -isForBrowser -prefsHandle 3060 -prefMapHandle 3068 -prefsLen 23306 -prefMapSize 244938 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {213f0d2c-7005-497c-bb24-bab27561cffc} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" tab9⤵PID:6072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4192 -childID 2 -isForBrowser -prefsHandle 4204 -prefMapHandle 4200 -prefsLen 30266 -prefMapSize 244938 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a1060b2-1089-41ea-aae2-88c809a3f142} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" tab9⤵PID:5764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4844 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4828 -prefMapHandle 4808 -prefsLen 30320 -prefMapSize 244938 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5762c8c-279d-48f2-b7fb-19d6dcd91e45} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" utility9⤵
- Checks processor information in registry
PID:2900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4872 -childID 3 -isForBrowser -prefsHandle 4996 -prefMapHandle 5016 -prefsLen 27652 -prefMapSize 244938 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fdefcba5-0682-48f5-a8c4-d03d9a9726a4} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" tab9⤵PID:548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5268 -childID 4 -isForBrowser -prefsHandle 5188 -prefMapHandle 5192 -prefsLen 27652 -prefMapSize 244938 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {28edcd0f-ba61-4096-8962-f00103b4aac4} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" tab9⤵PID:4016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5288 -childID 5 -isForBrowser -prefsHandle 5408 -prefMapHandle 5268 -prefsLen 27652 -prefMapSize 244938 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2207669a-a412-4c83-999e-9db44f51f43f} 4292 "\\.\pipe\gecko-crash-server-pipe.4292" tab9⤵PID:3456
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007486001\52a33eec1f.exe"C:\Users\Admin\AppData\Local\Temp\1007486001\52a33eec1f.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\1007487001\4a17d22a0a.exe"C:\Users\Admin\AppData\Local\Temp\1007487001\4a17d22a0a.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4816 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffd856fcc40,0x7ffd856fcc4c,0x7ffd856fcc588⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,10154689882990575458,2954893086684826038,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:28⤵PID:5296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2080,i,10154689882990575458,2954893086684826038,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2092 /prefetch:38⤵PID:5588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2292,i,10154689882990575458,2954893086684826038,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2300 /prefetch:88⤵PID:5320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,10154689882990575458,2954893086684826038,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:18⤵
- Uses browser remote debugging
PID:6752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3292,i,10154689882990575458,2954893086684826038,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3452 /prefetch:18⤵
- Uses browser remote debugging
PID:5640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4296,i,10154689882990575458,2954893086684826038,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4576 /prefetch:18⤵
- Uses browser remote debugging
PID:2452
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4776
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 19247⤵
- Program crash
PID:7164
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2X8806.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2X8806.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3p81r.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3p81r.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B608j.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B608j.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2060 -parentBuildID 20240401114208 -prefsHandle 1972 -prefMapHandle 1964 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a61776a3-01ca-4a8c-8cc2-b59e35004e9c} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" gpu5⤵PID:4604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2492 -parentBuildID 20240401114208 -prefsHandle 2476 -prefMapHandle 2472 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {783692dc-ee2b-400b-a4ba-14e1412d958e} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" socket5⤵PID:1608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3064 -childID 1 -isForBrowser -prefsHandle 3056 -prefMapHandle 3052 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b785bce7-8693-4049-b78d-0ec472e95f52} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab5⤵PID:1736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3860 -childID 2 -isForBrowser -prefsHandle 3852 -prefMapHandle 3848 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {78649c53-5b13-4d5d-b3fd-deeedfffa4c3} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab5⤵PID:2244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4668 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4636 -prefMapHandle 2820 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {062b98b9-276c-4d7c-858e-0f116e53b4e7} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" utility5⤵
- Checks processor information in registry
PID:6636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5312 -childID 3 -isForBrowser -prefsHandle 5332 -prefMapHandle 5328 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {860eac79-bfe6-4cf8-ba12-5d5a5fa0b7a5} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab5⤵PID:624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4924 -childID 4 -isForBrowser -prefsHandle 5472 -prefMapHandle 5476 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0a8d36c6-ddea-4eb6-b54d-008939df6bec} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab5⤵PID:1688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5656 -childID 5 -isForBrowser -prefsHandle 5276 -prefMapHandle 5280 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {14a30e9c-27ce-454e-9680-ce5d3dc3ad60} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab5⤵PID:2632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3856 -parentBuildID 20240401114208 -prefsHandle 2288 -prefMapHandle 3392 -prefsLen 30779 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {781e6a70-68f9-4afe-9282-094be9173ed3} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" gpu5⤵PID:2844
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6736
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5620
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1680 -ip 16801⤵PID:6924
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5172
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6092
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5755db028ea25b8785066ecf706a14cbe
SHA1567d311c7f8fb12185e118b43eb4ba1d1105fe4b
SHA256860bf8b64725d4215cd2531f97ebff0efe83c80f6805c4ae20b3e327d1b273e9
SHA512147490ba4544022b57d8d380cd21c82553cd6f74912c9bc1c569fd41a14ed96b9689f000b05addf7a13159fdfba92e6cbfc1986e48f35914c42a21f0d91593c7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD57014ba5955e6577280c5cccc4bcfe158
SHA19e8c4f350d92bb8a3d3e605a117c37dc0c3db295
SHA256bcea9627e8d273c635258b6219ccdcf2f327329887dfc1b9141601337dc8cc15
SHA512be899824cc3ceb511e9a03512ebd2379fbc776902b9843284b0fbd77c34736300078303f185eec34d2c388d974a6a18a0431fb5b7e64254354832c43283af44c
-
Filesize
16KB
MD52dfcd70235dc8b86a15e46bba1c8758e
SHA1799960811f9ae91907e7d9c98cdd621b7c7b0272
SHA256f005bd40c3f212d11d3a692a6923d6be6ea82ab4938e8438f6013464b8c3a9b0
SHA512b0388cb2371d106a1eb114d5973260dbdd8472fa722520df7306e4860181494b14bb02dbab7cceca2f9250735a08523fdb14b0bb98cde017cc5b08f8bec8a276
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\254256B27E0C48CF9B80B695F0B3B8CA84610495
Filesize9KB
MD53f67b44b6acbb593cb94f43e7d10e28b
SHA1ee0b9a53cafd8154323a303495ebfee0c6ffc4f3
SHA256e05dfdbbe957ca58b0fc33629ccd84820b112112870bf0ea899a2ade413cb3d2
SHA512d9099863c34499f2aa0be08a438ed401feea47f3eaf0b402cefb467e64fe97b81e38eb06040b12c6976555e92dbdb28ab7e93a6a324a158f1a0e2350b9cda56d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\6A9401069D7CA26FCDC6674AD30D2A279D87FE98
Filesize23KB
MD59ee90540acb5004bb9e45c2ee05c2f9a
SHA14cefbb1b55d0c0fd080a8181682250309831fe05
SHA25612a11372411adcef14ac4db31bec17c6be79031ead1d872a17a76000c8c2edb1
SHA5126b41e9f7126253443983c4e61077f2b764751410eb9bcda886c9e5d24957b982d9cb9a2cabb508e620950d0a600f7cfeb62c23482373065d6745a23aa580ff40
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F
Filesize14KB
MD5eb53bce2835928fe689298b87d1c2ee7
SHA166b8f24b4c6688bdeeccb9a55f6a3c3002d4aa44
SHA256d40be841aaeaa2bfdf909f2a1d91ba8720e3b8fbe9afbd703baaa25ed4448b87
SHA5124fdd433ddaacd5440279b40a2c2f0aadca0a8850d75a70fb18b1c1315230d1f3b89e9a7ae3e81abf38ae3edc9159f4f60365a7f063549bb2a45368e50b682fb0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\7F05CCA942E2DC38B929976BF1BAB183C61DA2CF
Filesize98B
MD5f3eeac6b697efba88558c67584d338a0
SHA1a217f51bd75e439b2dd69b00a4d512b298c5eb9a
SHA25623ee43773818cee4c9b0b08d0cc6c3858912f3520fec6f458d1f537dc0210d56
SHA5126c01dab01afbe08b51cc584a595a1d941cb68072263551d79b0683facc3cd95d5f9ba5544d52832b266cfe119b5b73622af1cfc6b4115a6dd78f41fe43cdd5bf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\87DF30809CA66B67BB127FD7491F6665D97085BA
Filesize309B
MD5294e079cd351a10200d73b5d21f39657
SHA16fb9ba710eb3d0c347e6ffc8a74e609535283be2
SHA2564817b5c4f0f0934be1efc088b5459f4c6491b91aa6bdf4eee0bc4726f51235aa
SHA51292d0a6f6dc271ee7abb33163f62d809a0ff0b1f606f425faeaa4388dbcbd3a34877c29539e4f65758169fad30a1c2679deb3e02588605e38b7aa729d6cfd8a41
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\A718AAB68EA013663CB3CDE897FFC95F29D15CB0
Filesize16KB
MD5076f92aaff2c826f726fb33fbcc2e8ed
SHA113d40738f3b7f3b6d1a2153cf09414e7eacf50ff
SHA2566081f6c64b0463dbf1989e992bc2d5f82782884c021e819df22aeeb817eb358b
SHA512ae04926180a18b1bb580ee48fe8d70325b93062ae775c70a3534309b308dfd6479a48dbd8009af6a5fcd520fe11ca1553c228b589911babe23a6a0151f38ca72
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\BAD460F0376F117B72A3697DD50C54BF8BF84013
Filesize83KB
MD5cef937a4109894c86a6bc7c48f2049fe
SHA10f8d0b21039e53c56430558349a1af6ccc6cd465
SHA2564f9efa20496cda96942fe87db6fa053997f40c883d814ba3a95c78dd7ba98fb9
SHA5122e16021f007e0efa42e693288014660cf9d174193d63c68c2c60ea4985d602a38fd722c3a66c1bf8195f693861ef74742b38d1d51b2b6d4cdd9bfd1530c7091e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\startupCache\scriptCache-child.bin
Filesize469KB
MD515405b40b11396456243a08ab4c1f30d
SHA1eda1aaf4281a3f6ac05af57ae91e37f6faf3048f
SHA2562aa3c813af62320d33d79d971fe48ef775ff66a716658e428b043e2425e721b1
SHA512e7aadce7de8ac6ca2243cfba8ab242ee6b7e7590445c4d8bee16d39cbfc2b74f0095230ba2bf70db70eede4a3cf1be98372bf79c3bb0db2826608a5da4520618
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\startupCache\scriptCache.bin
Filesize8.9MB
MD58dba9589c4148d7beb05cd41e45cba33
SHA11f4c005cc57c3ddf257f49cf0402a8318438607c
SHA256a3f9fa20c1c22475fb73496680a979189dada8007969df4c38f8966765b97159
SHA512a170076f7f68bc37d4f7646613fe9f86a007d70c52ef221378f47f1f2252fbcec31eac7090cb9fa672d9a69d4eb90cb1cee3c51e6eb2a02e7d599f29547eef39
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\startupCache\urlCache.bin
Filesize2KB
MD5d31913b79c2d10f7a00c517d073c3eb5
SHA10577f8570eb4f690b65e7b1e49d0044952e0907f
SHA256c212b51280b56948afa4d407ca18295db5f998971384aab048086fee9b0c30fa
SHA51285cda0edc999434fdd635a1d7a43af5c65dc746d7a413ab1f2b1e548cec021e652fcf19bb9b7c09f9d3ff5b5c917a01eb3ff505b5a1ccc11a368866cbdba68d4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\startupCache\webext.sc.lz4
Filesize107KB
MD523e8ccf6b4d63822d54441b9b79ec4ee
SHA14b5aeb96db89a27453a5e761a9214cb52084eb89
SHA25611f2dc055448f08c7cd7b50496f93f098fac383f50dd632529e6d221946fe7b6
SHA5123c6d578528d90b2a9d4c5c52e5e08998a593abe81c206e0194c43448fbee2ae5e56380666479f15080fb776b31a8f388efdbf2e0e8d9026c39b8dba9479ac46f
-
Filesize
1.7MB
MD5888242c19537f0f114634d771ce4a9cd
SHA1e0e86e160c2c465c3c49b31cdfbbb67ecd5a9366
SHA2560ddd13cd233f81153d8d558297ba09317867797db7d87e7758a51e4131e587d6
SHA51208d552edae0404a8d25af25ac86cdce98d6e59a32d99fae4e0be5b8085e838aced0c1bd464fc5f6f4c41dc0c5160452d35760ebf0bf702eefcb0c6b7b5560199
-
Filesize
1.7MB
MD538a9ecc0994ecbddb16d6fb2d4a3e911
SHA1d4bd9f9c0b4dc11f8c4a2f5209ad4795fa4056d5
SHA25624f92db69d14575388d39cfbb065ff06b14fedc28fc9e1fedad851672ac6111f
SHA5123f9f7459007bb5af43c2dc11cf2d2b055572bb0b5dcd34d345eebe490a5a574d3d6fd76e822f308c1d7fa0766d29b5daa44b8ff9f622812497b55ce5948fcf0c
-
Filesize
901KB
MD5442e1bd5029d8a8ae5cf4ce12fc0169f
SHA1d80bb4ffcf8f4b99cb283ca0bdd2162d683b6713
SHA25684b64f4ec53292e435366265296829e7c62157ca5b857bdf1706da3b4bdec42e
SHA51286dd5ea3a56eaca5ea63fcc2cb9988e55c7add01c1937f0eefed2543468891ac4458f79aafce797e159f6b86ece5a5434ce3a2a53cc97823b96c98e6d8bf5ff2
-
Filesize
2.7MB
MD556c46875035c77ec87779905e74ca141
SHA15e094c6364c6e850304f55bd1fb199bdfd423adf
SHA25601ed32593b780544599ccdac3eb728d9839e509a83d93a8c84fd9da0c111560a
SHA5124f08eaca10d9ffcbe24c2a63436d3bdb1d76a513cad4bbb57ae7b4980efc6ed3b4c1abf0ffc76da235725776b3ee0c134281a350c721a586912511d9b9d763e1
-
Filesize
4.2MB
MD51b352e12943c9b113607e78cdf7f1e88
SHA12978dd75e9ad8aa608d41f430e2391ac94661cfe
SHA256e14efbaf799412719eebbbad024b9fe3fae5aa665e7b885cbc05466ee04f4c07
SHA5125265e205a86ac37348a7b09fef6b92355da07e9aa01ebd973f482eac0546b82350ae86cba6f629dec1b454b26c72df6256d1cf69fb1b0ab01930f734b575aa98
-
Filesize
898KB
MD51a1ab06f44780f5c4410d5efe2ed98f9
SHA1499eff2fef209070e84753c0e40daede107104fe
SHA256171bae57acfbea610a08e065f9924d323b9374fcf7c4c4b58e81f3f6c587f1c7
SHA512142bee0832989c651b5b412c70e3b4c7d6f7e4c38eaeb7ed0ef9ce5666438760ee263499179d51fe7daacb4052a6d1124f466b5f307b19b6ca38eb6b2de355ac
-
Filesize
5.2MB
MD574d407aa85cbf4b301e36513d4fe0e51
SHA1b93e915ad38fe2e9e3af55e57d7f69b120837c6d
SHA256f140b3274729739fdc215ac775a35a70df135efc32630203a513ee9042063912
SHA512de6f73a51a0378131711a5ececa40f4530285db6797662cbec7e26b22b3526ad6b0be0e112b81ece6ce113c19dcd9c2bae156dc6cc9fdde234575b17ebdd88ff
-
Filesize
1.7MB
MD55dce87ea56a966f1e59b1be866d726fa
SHA120eff00bba0123b7e44f57131edfc8fda8382c6f
SHA2564c2eb948eecb946e02d795c759c9a597ee72707295ed433cc27b71f242ca24cd
SHA512f55e5aa415abfda050a3958b44d5916b4649274fa1a06fb443d30aa8fc57a1c394cdcadb3207eaa4b2781d24ad56d34c204171875fc33d58592d1f7da2d0b4a3
-
Filesize
3.4MB
MD55e0a728a735b05bb15c376cb5b072135
SHA163b5ce721417a4e8e70139b3b7dd54d4dd811db3
SHA25661679031c5025f3afd7dc239886c9edc5e9b06f168d5ece4cd963288624dfd98
SHA51214a40b1ab0258469e60601890ff2f019d1894b679bd1eb6c5d46fced067453ad02ac66f4b5c63f402de1c409cec73ac30a5f7c29de98b69ca94dc7e085cd5eac
-
Filesize
3.1MB
MD59c0c827b6abebfdfb1bf2fe9bcf7d939
SHA128eb4029dd6a9d19cb3f905758136fd88cac7d13
SHA2563216ca52d4ea7c82f879626f40e739552faf9f778cc927aa3a38d44db8de2371
SHA512b76335083e93b569961ca6ab69d3d522c507bc7b79e0eb5e3f24c3c9218758bc3aacea611b4b9eed83f36d74071eb790c713c5652e69e7066bad4fab982252f5
-
Filesize
3.0MB
MD5d99339140bc1061cb2403b20c7aa5491
SHA17040d17fbd18aa432d5fa28b0a25392985c25426
SHA2569c88b468e8edb17a274761341c23986a07f1a556b1ffff42dff5fd9728a8fd03
SHA512b2fe750fdbea48f78e3c4e98ef431d6beb6188343dd9c95b86e39c70b7fd301b1453cb583c336b6b15432548e61475065738e1bb3a3878d41154d37b958c3365
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize18KB
MD504be170097994cb89ba6bccffb2c558a
SHA1bb7ecba98fec8514901c144950ae07b6a9be2804
SHA256ac0995d5bc4fb1a7ca83efe40cdf7c1340ef348ff91eb5d710ac0cdcb4dfecf4
SHA512911a0d22c29b212700a228db5cfc5953361936513e64b1faeaccfbaa0265e5017ad82c0fc180b8f2dff3ada34e5e5e9cf389d9c0d29a7a9135ef9bd5ae2891f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD587c9f444f1e67c380a82b89b5ac76511
SHA1147da8978574256f3995672e95211fbde342dc16
SHA2564b475d6474d1d67d3320246a55aea52b53c993f31cc3c0f3fcc2a22cfda97259
SHA5128eead46ec280b23940313e6555c5d06137d8a11f88620b4d3ccb319a5f2d54ab5dff96606379cf796b6642da63fe841f780c828d3faf46f78721c1ec0ae644ca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize13KB
MD52a7549470331d835e84c69f5bca377dd
SHA1885300a4d0a1b4734be53a7cd3696eabfe1687e1
SHA2561ac866250ad1d7f8fb967cd6d7afb06492342da69c96dbba788e4b0101dedf36
SHA5125ee50de7c82fecf0470c770b50e5f42dc62c32fe2f92ee55e09a55c982e6e36cfbeebd2b39ea8e8820d0f93ac93e3272cf0ed9b45b1007dd48b29cfac877aad7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize17KB
MD535bd8c5a302aba1281b536f74494d1d3
SHA16c49197cf9b3f51dd083aa88b211429def3fe2d5
SHA256161f2b04db6fe6158616e1e6b5aabf6cbe9e786d426065972b00298cfc1aad9a
SHA51253c6d19331323ee4bdb3f20e65e9d77914c95be7aaa040f43509f47926d03e4c6e98b9abac54cadc25a4cf427afc1c022f60117dc28e87e9edb739e8ac86f59c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\SiteSecurityServiceState.bin
Filesize1KB
MD5586230e8d1b7b3bc0fc2bc2f6a3fc57c
SHA154671e5bb1d05dee5cbe92d2e99874a87f6cd4f1
SHA256a496d64dc98ef34f71621193edea5bc9301f5459d3af387052637c1b2357e1e2
SHA512616cfad86651314fa9ee1a7da1cf7a0a092724d0c563c30cf5beb823679728d0543a15ae6e99b093d0b45fa503bbc416ad011bbb673fe480c66cf316ecc3e57c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\broadcast-listeners.json
Filesize209B
MD597c3738563a9448365a735f5f29ed3d5
SHA115a81433236ca6e6ecc4e1c8d0fdb8523b265c57
SHA25663221253f5c30efa214c2cd2adcf51a9c9f9a2c05f119b00a51c9579825c2c24
SHA512ed98f42d5d02ab53a9e50f80b312bed4b5d05d053bec582cf9d619ef91251e86cf4f4d1123c645500fc1dc4673b49a8b7badd3f3a39f565ac643ca4fd0157ae6
-
Filesize
224KB
MD55c4b7015a1a7db2d1fca7ab50ce82616
SHA18bb44a4f95a62baa2f9d99421b89b4e365e094b1
SHA25694625a63dd457ec4947c5695f67a70d4bdfbd00196cd7e53f46feb812307ec29
SHA51225a62ad58dece96d4f548e51f8d2c2d27fb5f4c25cd713e0776c65fd1159ba2aecbcf0a32013c843165414f80f0e600d25f45f3934b3bcc2a49db5fbce1d0bbe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\content-prefs.sqlite
Filesize256KB
MD5b41ed219e2c8dac47f2701562d092621
SHA190d507eae3ec943a121dbe5a080412e40470b54f
SHA256cfed019635a1e14f74ae78f2c03fb96b40ac3da37b67489bd98c144afc200f1f
SHA5125c6027ec701055efb3b6c055727af5ed261e8f1d5ba954e64e8a34e5c791679b1e4a6ef49896ab8089ec151fd758ba41efc7333611af42b851606a0544a9b947
-
Filesize
64KB
MD53ac7eed86e126f86b81e260d818e71b9
SHA1a650da36e70c8ed25ce392423a4c92b98017e08d
SHA256f6dbbf4f8c257076f6d2b6374e8ff8936a1a961cd61d828902a368e97cd9a76e
SHA51243b0ab861f64990ab1ede9535273917cac6e3aa457c6cc2d0169760908694ad6787f132257ff53e89a667f5a22fc7b525cd95d846c29e3cd5f3f7b873f336f04
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\crashes\store.json.mozlz4
Filesize66B
MD5a6338865eb252d0ef8fcf11fa9af3f0d
SHA1cecdd4c4dcae10c2ffc8eb938121b6231de48cd3
SHA256078648c042b9b08483ce246b7f01371072541a2e90d1beb0c8009a6118cbd965
SHA512d950227ac83f4e8246d73f9f35c19e88ce65d0ca5f1ef8ccbb02ed6efc66b1b7e683e2ba0200279d7ca4b49831fd8c3ceb0584265b10accff2611ec1ca8c0c6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD5a39bd6c6cbd9ef2c2b46afa08a50c5ce
SHA19246802c469a364f00a17043bd0415b32aec6445
SHA256bda8b13e3c6e1a1b47ef7330648c7f4e81c9edf9ea0a4cdce333b97dcec0143b
SHA512e868ad7743854618ded2995b76934b208233009c6384188a63124545b7e0336644fb098cb758510cf0ee1f299a6428d4df00413c2b2da8401fa1a4e6e1169e11
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD5868bafa56a4c7d2c91a1385f3854ee95
SHA12349cbb1aa0cc3849532afe68ae839ca16d393b3
SHA2566ccf3b51c772ebddeb0662d4255de321167802348f78466d3317296ad29cc9fb
SHA512f54c2a35df506c267e152ec242ffeee6d7927cb2f282abe9d0736a7fb2de24f8edcc2b95aff82d50b60b586dd68a1e4a087c77549956715f70c7117358a19529
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD51339e55e40183fdd24be20211bb7c17b
SHA16741c37d0d0c2403dcbe050aff32ec9771029ce2
SHA256835b415cbcfb4b8ed2b882ab462780dbb20b73b90d931599444a9e48d594e3f1
SHA512be98a33b01542dae76f8c272df7c3463d92f4036cf2e97e70906b42067559b5fe404f192895195e9a16f7a5be2121064a96d994aaeefcae95492286d4bad9856
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD582624e4d5cfb522867d985ff82d5ccb2
SHA14f8bdb5b0f244f86de4b4bbc7464d3d75e339b87
SHA25665ebeb90fe19eb8df202bdd9bdbd37b09d26fb8128f2346ae3cd5efc6f8ed584
SHA512c15fbfb1815632c4c80351895e2fcf93adf0517742c40bb758cdb0c3c06beef1cc69273fdec93000c271d58116d47374ec8bf8667d032e1067626f0a09982f58
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5e1a31feb3837e2c12bf28f4afed1d733
SHA1dc0126fe71629c58afd37a68b4de0d51e13133c4
SHA256407c6a93aff7deebda2ea33799f03bb2fa1063fe4fb90226f274dcf93f73aff1
SHA512e6e6c4c25df0031b36bd6ece6d31a6aa128dfc7e06c07d928902bd3ae556d7aa0aff9184e324a186619e79f3ae2d0bc50b3fe3c9fcb133e976d1ab65ec8ddca6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD574380ddd942ffcf3473d1e1bce16b48c
SHA11d6ed00377f3fcc30edb5e1b938b796da2855963
SHA256eba7a61f9e9efa89dc16e5caa251396bd04eab00de0c7a013e4fd8c5ba5af7c5
SHA512fdea13947caee5c74be1df92e18cf2cff5ff2af040ced8ddb700de089e217c32e120f178260e45a6dad1a88f6f83d57965d6540caca1a35fdb98b64dde615b8c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5843d27e10816e01af16229a1745b1ada
SHA12386e694d0c26b028da8848fe28d34d1e840449d
SHA2564ff2427d81b55a7f5ddb098d83dd8f15dd730bd4a7230c5323535d9a356131c3
SHA5122d64cb3fba6ff9d77b4e2b0d1a21ea13a9a945171b05d8d575c2826bc2c5c88f3dfe4019eb791f0d0cc9573622e73e84e6d88b84b995cea6e58e51e625d9eb6d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD51cae4844ecdf655775b8f4c702c980c8
SHA195cbaf94f87052913805991d699a20bfb031958b
SHA256360766a796a6c308314b5817d01209198732d22e7494b3dd9566468649d29dbc
SHA5123fff74576f39af84912e762832f5c82c5c51308f15dd0a715510ff8253fc7be65eeaa5b06ed0fae8757ba298875c3a4a845257f8dba4b4457e38515d28254b2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\events\events
Filesize438B
MD50cb40857b21508bb97e9c2c5729b35e8
SHA1aec76d0462af9f2e506e12b72d6f04300b137a8c
SHA2569d79bbee99e196bef573697e4f14c0c2c0dfe2d17a777d83e113e087aa198133
SHA51229f7279ba21d74360256848ce108162fcb47930eb7b5bd6a458d7c4011ca6ee0f5de82717cd62b6f55d4aabf092021c26052fac6470f5634aff6736b742e5c3a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\events\pageload
Filesize379B
MD5a0beeee270b9dbe3815ad63797a6d13c
SHA12669730f12070c7b26a63098d291966e1eea8646
SHA2569f7590e972a4122cfa98260d9d6b29e712ee317dafb2e5d27bdc6ec8d8422c22
SHA51276e15f0a91bdbe2ff824807bf79290c67df857f91d248a410ad54fd6a7593fee30b40bed9faf99ff9858d217acd3235ecaa8f73d617f23e688b4727a4964dab4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\040bca57-581e-4414-b395-ca27895ba718
Filesize661B
MD5b1b5b059de58a646c2bb9384fd26b54f
SHA153b19f3b2d2de6160a2530ce3593f0bf0fbfd282
SHA256ef3c97594eb49cc3558ba87c8eb6808e62e832ab047ee2d94ed1000a23c27184
SHA512886d059a8de01f6f922b1d82128c034ec45e008e2f1ed05bee41bfd3bd54ca760b6d1223ee853026cecf657f8ab93c36753fc5acde98a10d418ed1700b621a09
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\35be6f7c-2697-49df-aec8-6d2248cf9ed8
Filesize788B
MD5021bfbe651e24849dd759f957828ecd5
SHA1ed40a09cc5e7a4dd1388447004e5fc57928e1a75
SHA256f925f011a672ccbd22782fa2538e9e9d708aa1c4c5c94fe8f383551fd11f7252
SHA512add2688e8bc826598d8c4c92608d8c9d0b4069b93d8e6cd935c8f6d7ced14a05794305f13f47c82dcfc0fc19756748b1d9773c5cb51edb8139fdd0d748e09fa5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\6d1d2e32-2abc-432b-8dd6-d4998051438a
Filesize27KB
MD5450fd6a9611732814f5827fce167e563
SHA114b154a9426a9572c71d5f07d688c8cbf4047e39
SHA256c86446183318c53f832ea35ab448521764deb20b7e17d0ae98fefd7db6078dc8
SHA5120f91300e40eaec7cdd107a7f9f32207bc60b3a5e179139d36cd3d9ade7d4c00479d5a798749abc2010a1b4e3f1dece5f8bb1d2e64335a9dec44b7f26e7bc9c5a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\70f5b332-5a31-4caf-82f3-11fd99bf5e20
Filesize769B
MD57efd53498d20425e4b1b78ba6f70a5d2
SHA1e3a7b3eb0020e4d1cf436462b993a92b0baa808c
SHA2561d3cd83795048b7a22740cc60d938e950359dec07509ee3984b467131a301df8
SHA5124173469ed73a3be7e8bcf4699f7599250cf7e05cae6b6ee54b2426ee309df079f2526e248b7187ffdc5122b688b30f7abeb0ad7b2cde3a5de035c9099809e4e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\bf636b48-a6af-471a-89cb-624095fc46b0
Filesize982B
MD5fe8568125d550ac500c3485f2ce8f73b
SHA130123f3fa7774ae06443fa4a51a5e56bfce4dace
SHA256d1322d2f9942f89792d077b12ca8fe4cbb2d447017a7b791e5e828928138067c
SHA51214a9a52e3a34e9534e08c0ef41894dc83e825084b5d0bf4b074b038511cf216d15ec5dc90a21e35852e09f9985d5d74b95d8e723dc2a1d2d32d3b6e2a37bd649
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\c6a2b5e9-6173-4aa1-aa53-0b03072ef795
Filesize1KB
MD524f16b032f53d2837fe727bc1b1e1a60
SHA1c61479ec30287440522658a322e233e7462c19bc
SHA256baa1787658addd29d3a726c3ec51e0881fe0109085f922d88d0cdf290c89e65c
SHA512ff50d655388b8954ec359671768fd9841448650f165a7d195c22896b6c3468e6c37f33d5070886156a4a7a1fae168f028ca2b043ce803fe97fdd93abab3a9428
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\ca39b9b9-7e61-4d8d-8442-6b66bd49a871
Filesize671B
MD53ee4d3b7b09805c12be213a20b642394
SHA15f8b22989e293bfe4dd0cf203223ab470c8e2ffb
SHA256bbc89b6fcf149e3654f66e4f54bd0e7a78069792d13bd93dd5147c00b9fcc11c
SHA51236a63f0a95e047f75630dfe0a252087236b09fec1a5e86495c73950203abe4af01919a1407cf8277244ece7fdf02a204c83030a909bafa40ec304af1022a9248
-
Filesize
37KB
MD59a0590fa6ee660b86dbbdb2deb54920d
SHA132c47b7d58e639955e5297850ffba384b12b0b73
SHA256b36df2c6ffde672d2fe8068f52b883482ae7317d9b1686d4a55bc18be2cb87d9
SHA512f9ee2e5efc8c7192e72bf91a70a5dccf8fd4eed3d5c7e4940e1b72fa69c689477384c99b663ea9ccca6a1b69ddf14c2dd3898397bae9071fcd879f21d15d6ddc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\favicons.sqlite-wal
Filesize160KB
MD522147cd8424ac69cfcb369d2d321cfa2
SHA1bca69ac3f6dc52e3de1eb5de483bcf8bbe86ce57
SHA2564e09cd39d370a8fee0d30c458557b8b08b264e230c951529e46d09d6483f6790
SHA512aab0177ee8d9ecc1c1a43cc5a9178cb9a72035442fc652dd31784be196e6605dd3d4114a5bd817c350f644b49eb6b03f9087f7ee1385d7132b593849eddebe8a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp
Filesize1KB
MD536e5ee071a6f2f03c5d3889de80b0f0d
SHA1cf6e8ddb87660ef1ef84ae36f97548a2351ac604
SHA2566be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683
SHA51299b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e
-
Filesize
96KB
MD5654176969ebfe50d7fe1f9f5c2ccaf90
SHA169bab9e0a158579ff23928a49f82b4d0db6ea2ec
SHA256e67c770a4d222a93f065c6413cc9ee8fe3b289d4ace46cac4e8b453a6141a304
SHA512f520b5a14510ca97b6e07cc08ab1de5c4f9a1c79d7fae05f9db1111fcfd65479016a0d7ece8f4cec398aff03a918796433af2f2c1f84abde7bd60af135e2a89c
-
Filesize
2.1MB
MD50fa215d627f6b236ad30eb8fa1fa9b7f
SHA11a331e924b1a4d279abe56b3c58dd46915fb800e
SHA2562a651dbc7cd59f2b59c0a26e2b8dcb6159938229d1dbc91483af1906f40bbe7b
SHA51239bef8c71c1edce616dc9e907597811983966cfa661ea07aac21bf21a9aaaa197f6c8a64e34d8aa1626437d55b45aee915581c36c216b358db8938db6c8c6d85
-
Filesize
10KB
MD5debc7c05e7aa40fe34e831fad2ca0f48
SHA12ba98cacb0835293361d1b3b4c2cc855cb915a4a
SHA2565a7c4f614f252a0df863600b9b8dc0a505827debbf36b32d38f6b540b5cba3b2
SHA5123cb35a5271536ea6dd4506dcd7b564e1f75c195953eda4b69614fefe629930f5acfe74a46e66fcf0f4d429d32682f5b7bd91b72660498f5974e216bb03e7ae72
-
Filesize
11KB
MD515d7ba7a07c356a581397d0b425b9d51
SHA1f497603f7a8013a51ee7a89b871aa054391dfb33
SHA256c20fafcc8d7c9e83cf606823f9269d6e81e5966c119400c48e49b36b27271fbb
SHA512130c308c41837a111c06e9edbc21bcefa750297204f4acb16d22093dbdeba143f5959290e03767d7c2f1f94e5ccbb304d5b64602deae038bb49af617911429d1
-
Filesize
12KB
MD525e6c288a31bc3675f2226ae8e51b2f9
SHA19681ae4deee989120c44f33a489736488f9f4a9c
SHA256198a8c907daa215884760960743d1249811801a9f8927e68a4dadcd32bf1b6b7
SHA512bc73bc88d26c493ab682155c07292bf7fb4c3799305367ac204d3d014414abcc2f44f76f1667f01764a922816b4e43fd39e3d666d38cbb1a4f2cfa0816f50e6d
-
Filesize
12KB
MD5ef560f09be4d62dc999cc38f6a51d3a9
SHA180eef2daf65bce1e7a5606dac2f716d3d7f4820f
SHA256880a4616f0272476421dca92e1251ce08e71e42857426bd2a2bccfe2d27a98e5
SHA512d3b39d9466aac55d6089046b14e62fe8415f297125062a39ed7ed8ff4d0417baef618fa978db5b156a1dc9b2a5dd9008bafb173add2c79ef79e181d1a8b79566
-
Filesize
12KB
MD528d22fa65ac7c12357b234129374fd2f
SHA1385555795da35182a4db39bf1fa17a1c95c103fb
SHA2561ceb7ed9fb6ba4d36b9586c2e45cf89e3515e170a9112609914f2dc3564be398
SHA51201feec5de9c391b67c7999842099cb27ccd0d9f43ddaf086a575590fed7e68ce7cf4d29e1760380f93f020dfa6f68524295008f211450d916685cd8cc6a5da32
-
Filesize
64KB
MD576786a4c0dd19d88d6d3ed95a293bf2f
SHA1b0d6d676127a7694fc6e71ee57fcc2ffaa621ff7
SHA2561a2564c1ba20b8038d35c2319258d94dc15d97914dcf753b31c48b79940dfd31
SHA5128cd3298e2ebba763d3c80ac4b17e44af7eb63b46304967d0c6316d314baf8611c05f7b9979c2c5c329ac167aea0246e8c9f057ffbb272481c13fd5e4b4bcb2d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD514552325c80895151f485c2e6fa039ff
SHA133fab9c5ed9e4f91bd4e86d7dcf627217110017a
SHA256635767c619f42747ae42b4d9868489968fa0c11b684005d9d5b3950fc0937364
SHA5125d7766f88f3d6bc7e14681946021c23cc15311b967f0437179d895e832c4e716b017115bfb5fc55b5025046c541b5333df5e8a12410ebe852f7e87eb4766f5c3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD553b4ee953aee9a0011788bfa2fef2b1d
SHA1ae00c2b66e438a3ab3586a71b2def6f7bfad92b2
SHA256fa31b1ab2cc3e98290cde1fde36c698cdd11087a078583e443c7f8b9a79e8036
SHA512df29c7eb84ec098f03204c33c5dd5a7b921d1835b67529da53604c7dcea1f985bb1b39fbde0e1b4f68fd52390742c9116dc5a84c598b0c910a43a03005bebaa1
-
Filesize
4KB
MD5059b2ff6f7d80594a2c3ddf610eeb76c
SHA18a7709265c0067ac4371ebeb62b93fd2407f8a1e
SHA2561f15aa35b799dc7de17cb71291a4bc96a942048fa4f8ae43934ecfe5ff6c4a1b
SHA512e717c5dedb0d456fea52b70c4f7def798612bc64e3541fd444d53ccc2b1078a8bb100f3563bef7201353c01c600f66e891883931edbfdc7a748aad347ea7c911
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize568KB
MD50ebf03cf1f990e8e2bce41eb28ce36d7
SHA148387fa4a1e13100036a7dfdbc6701793a2afacb
SHA2561a97984f5f4792b16399b7b7b448403b8a36769b4186e430211fa5015333f76c
SHA51264fbf79778c58c670e864de8412f80b913df9c8aa17f8575d22132c1349238e7ee5816bfb58b3e11189c0cd10fb855e649e257dd218a6a1fc7972c520c68f352