Analysis
-
max time kernel
113s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 06:04
Static task
static1
General
-
Target
f26c372194f8ca169393a9e6e215905dc99d3c31681940c7dae9726ea053f8fa.exe
-
Size
5.7MB
-
MD5
e3fbc5d9d314258ccb5259339ec80552
-
SHA1
516296191a5e7d8ed405c805522a7ae846a59f51
-
SHA256
f26c372194f8ca169393a9e6e215905dc99d3c31681940c7dae9726ea053f8fa
-
SHA512
63691d27ab9a10c831ce8da06b02e340ff8d2ba2f2fbca4ba7ef7ed2115b475f43e9d3242e76ed0969c570a53616c8e0ecd603123c5b13fae9acb9fa698bdb95
-
SSDEEP
98304:kW0xYy5VdYnQQiAke9JQsArlQUS1EXaVFvh50rsp:xIdYnQQZkebQ7lQUn6pz
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://crib-endanger.sbs
https://faintbl0w.sbs
https://300snails.sbs
https://bored-light.sbs
https://3xc1aimbl0w.sbs
https://pull-trucker.sbs
https://fleez-inc.sbs
https://thicktoys.sbs
https://frogmen-smell.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 42ea973759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 42ea973759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 42ea973759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 42ea973759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 42ea973759.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 42ea973759.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF d310857788.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 9da3a09002.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1z99x6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f1822.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 42ea973759.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9da3a09002.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 991a679c62.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3J56t.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1dd8728f39.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d310857788.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5227c684d3.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3J56t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5227c684d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9da3a09002.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1z99x6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 991a679c62.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 42ea973759.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d310857788.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9da3a09002.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f1822.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f1822.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 991a679c62.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1dd8728f39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d310857788.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5227c684d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1z99x6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3J56t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1dd8728f39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 42ea973759.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 1z99x6.exe -
Executes dropped EXE 16 IoCs
pid Process 2148 X4l05.exe 4332 b5j79.exe 3352 1z99x6.exe 3148 skotes.exe 1816 2f1822.exe 3420 991a679c62.exe 1248 3J56t.exe 940 4L473M.exe 3012 1dd8728f39.exe 3020 skotes.exe 6928 0b220baa65.exe 6136 42ea973759.exe 2312 d310857788.exe 7120 5227c684d3.exe 6904 9da3a09002.exe 5460 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2f1822.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 991a679c62.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3J56t.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1dd8728f39.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 42ea973759.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine d310857788.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1z99x6.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 9da3a09002.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 5227c684d3.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 42ea973759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 42ea973759.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f26c372194f8ca169393a9e6e215905dc99d3c31681940c7dae9726ea053f8fa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" X4l05.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" b5j79.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\991a679c62.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010527001\\991a679c62.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1dd8728f39.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010528001\\1dd8728f39.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0b220baa65.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010529001\\0b220baa65.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\42ea973759.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010530001\\42ea973759.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023c65-64.dat autoit_exe behavioral1/files/0x0008000000023c7c-98.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 3352 1z99x6.exe 3148 skotes.exe 1816 2f1822.exe 3420 991a679c62.exe 1248 3J56t.exe 3012 1dd8728f39.exe 3020 skotes.exe 6136 42ea973759.exe 2312 d310857788.exe 7120 5227c684d3.exe 6904 9da3a09002.exe 5460 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1z99x6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2696 1816 WerFault.exe 87 2520 1816 WerFault.exe 87 2200 3420 WerFault.exe 102 456 7120 WerFault.exe 176 -
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42ea973759.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X4l05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1z99x6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3J56t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b220baa65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 991a679c62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9da3a09002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d310857788.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dd8728f39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5227c684d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5j79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4L473M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f26c372194f8ca169393a9e6e215905dc99d3c31681940c7dae9726ea053f8fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f1822.exe -
Checks processor information in registry 2 TTPs 28 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 20 IoCs
pid Process 7080 taskkill.exe 6700 taskkill.exe 2252 taskkill.exe 4704 taskkill.exe 4984 taskkill.exe 4064 taskkill.exe 5860 taskkill.exe 5936 taskkill.exe 6160 taskkill.exe 6252 taskkill.exe 5208 taskkill.exe 5792 taskkill.exe 3728 taskkill.exe 6012 taskkill.exe 1140 taskkill.exe 912 taskkill.exe 4876 taskkill.exe 6640 taskkill.exe 6760 taskkill.exe 6856 taskkill.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 3352 1z99x6.exe 3352 1z99x6.exe 3148 skotes.exe 3148 skotes.exe 1816 2f1822.exe 1816 2f1822.exe 3420 991a679c62.exe 3420 991a679c62.exe 1248 3J56t.exe 1248 3J56t.exe 3012 1dd8728f39.exe 3012 1dd8728f39.exe 940 4L473M.exe 940 4L473M.exe 3020 skotes.exe 3020 skotes.exe 940 4L473M.exe 940 4L473M.exe 6928 0b220baa65.exe 6928 0b220baa65.exe 6136 42ea973759.exe 6136 42ea973759.exe 940 4L473M.exe 940 4L473M.exe 6136 42ea973759.exe 6136 42ea973759.exe 6928 0b220baa65.exe 6928 0b220baa65.exe 2312 d310857788.exe 2312 d310857788.exe 2312 d310857788.exe 2312 d310857788.exe 2312 d310857788.exe 2312 d310857788.exe 2312 d310857788.exe 2312 d310857788.exe 2312 d310857788.exe 2312 d310857788.exe 940 4L473M.exe 940 4L473M.exe 6928 0b220baa65.exe 6928 0b220baa65.exe 7120 5227c684d3.exe 7120 5227c684d3.exe 6928 0b220baa65.exe 6928 0b220baa65.exe 6904 9da3a09002.exe 6904 9da3a09002.exe 6904 9da3a09002.exe 6904 9da3a09002.exe 6904 9da3a09002.exe 6904 9da3a09002.exe 6904 9da3a09002.exe 6904 9da3a09002.exe 6904 9da3a09002.exe 6904 9da3a09002.exe 5460 skotes.exe 5460 skotes.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 1140 taskkill.exe Token: SeDebugPrivilege 4064 taskkill.exe Token: SeDebugPrivilege 912 taskkill.exe Token: SeDebugPrivilege 4876 taskkill.exe Token: SeDebugPrivilege 3728 taskkill.exe Token: SeDebugPrivilege 1400 firefox.exe Token: SeDebugPrivilege 1400 firefox.exe Token: SeDebugPrivilege 7080 taskkill.exe Token: SeDebugPrivilege 5860 taskkill.exe Token: SeDebugPrivilege 5936 taskkill.exe Token: SeDebugPrivilege 6012 taskkill.exe Token: SeDebugPrivilege 6160 taskkill.exe Token: SeDebugPrivilege 6252 taskkill.exe Token: SeDebugPrivilege 6640 taskkill.exe Token: SeDebugPrivilege 6700 taskkill.exe Token: SeDebugPrivilege 6136 42ea973759.exe Token: SeDebugPrivilege 6760 taskkill.exe Token: SeDebugPrivilege 6856 taskkill.exe Token: SeDebugPrivilege 6900 firefox.exe Token: SeDebugPrivilege 6900 firefox.exe Token: SeDebugPrivilege 5208 taskkill.exe Token: SeDebugPrivilege 4704 taskkill.exe Token: SeDebugPrivilege 4984 taskkill.exe Token: SeDebugPrivilege 5792 taskkill.exe Token: SeDebugPrivilege 2252 taskkill.exe Token: SeDebugPrivilege 5896 firefox.exe Token: SeDebugPrivilege 5896 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3352 1z99x6.exe 940 4L473M.exe 940 4L473M.exe 940 4L473M.exe 940 4L473M.exe 940 4L473M.exe 940 4L473M.exe 940 4L473M.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 940 4L473M.exe 6928 0b220baa65.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 6900 firefox.exe 6900 firefox.exe 6900 firefox.exe 6900 firefox.exe 940 4L473M.exe 6928 0b220baa65.exe 6900 firefox.exe 6900 firefox.exe 6900 firefox.exe 6900 firefox.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 940 4L473M.exe 940 4L473M.exe 940 4L473M.exe 940 4L473M.exe 940 4L473M.exe 940 4L473M.exe 940 4L473M.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 1400 firefox.exe 940 4L473M.exe 6928 0b220baa65.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 940 4L473M.exe 6928 0b220baa65.exe 6900 firefox.exe 6900 firefox.exe 6900 firefox.exe 6900 firefox.exe 940 4L473M.exe 6928 0b220baa65.exe 6900 firefox.exe 6900 firefox.exe 6900 firefox.exe 6900 firefox.exe 6900 firefox.exe 6900 firefox.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1400 firefox.exe 6900 firefox.exe 5896 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 2148 3968 f26c372194f8ca169393a9e6e215905dc99d3c31681940c7dae9726ea053f8fa.exe 83 PID 3968 wrote to memory of 2148 3968 f26c372194f8ca169393a9e6e215905dc99d3c31681940c7dae9726ea053f8fa.exe 83 PID 3968 wrote to memory of 2148 3968 f26c372194f8ca169393a9e6e215905dc99d3c31681940c7dae9726ea053f8fa.exe 83 PID 2148 wrote to memory of 4332 2148 X4l05.exe 84 PID 2148 wrote to memory of 4332 2148 X4l05.exe 84 PID 2148 wrote to memory of 4332 2148 X4l05.exe 84 PID 4332 wrote to memory of 3352 4332 b5j79.exe 85 PID 4332 wrote to memory of 3352 4332 b5j79.exe 85 PID 4332 wrote to memory of 3352 4332 b5j79.exe 85 PID 3352 wrote to memory of 3148 3352 1z99x6.exe 86 PID 3352 wrote to memory of 3148 3352 1z99x6.exe 86 PID 3352 wrote to memory of 3148 3352 1z99x6.exe 86 PID 4332 wrote to memory of 1816 4332 b5j79.exe 87 PID 4332 wrote to memory of 1816 4332 b5j79.exe 87 PID 4332 wrote to memory of 1816 4332 b5j79.exe 87 PID 3148 wrote to memory of 3420 3148 skotes.exe 102 PID 3148 wrote to memory of 3420 3148 skotes.exe 102 PID 3148 wrote to memory of 3420 3148 skotes.exe 102 PID 2148 wrote to memory of 1248 2148 X4l05.exe 106 PID 2148 wrote to memory of 1248 2148 X4l05.exe 106 PID 2148 wrote to memory of 1248 2148 X4l05.exe 106 PID 3968 wrote to memory of 940 3968 f26c372194f8ca169393a9e6e215905dc99d3c31681940c7dae9726ea053f8fa.exe 107 PID 3968 wrote to memory of 940 3968 f26c372194f8ca169393a9e6e215905dc99d3c31681940c7dae9726ea053f8fa.exe 107 PID 3968 wrote to memory of 940 3968 f26c372194f8ca169393a9e6e215905dc99d3c31681940c7dae9726ea053f8fa.exe 107 PID 940 wrote to memory of 1140 940 4L473M.exe 108 PID 940 wrote to memory of 1140 940 4L473M.exe 108 PID 940 wrote to memory of 1140 940 4L473M.exe 108 PID 3148 wrote to memory of 3012 3148 skotes.exe 113 PID 3148 wrote to memory of 3012 3148 skotes.exe 113 PID 3148 wrote to memory of 3012 3148 skotes.exe 113 PID 940 wrote to memory of 4064 940 4L473M.exe 114 PID 940 wrote to memory of 4064 940 4L473M.exe 114 PID 940 wrote to memory of 4064 940 4L473M.exe 114 PID 940 wrote to memory of 912 940 4L473M.exe 116 PID 940 wrote to memory of 912 940 4L473M.exe 116 PID 940 wrote to memory of 912 940 4L473M.exe 116 PID 940 wrote to memory of 4876 940 4L473M.exe 118 PID 940 wrote to memory of 4876 940 4L473M.exe 118 PID 940 wrote to memory of 4876 940 4L473M.exe 118 PID 940 wrote to memory of 3728 940 4L473M.exe 120 PID 940 wrote to memory of 3728 940 4L473M.exe 120 PID 940 wrote to memory of 3728 940 4L473M.exe 120 PID 940 wrote to memory of 5060 940 4L473M.exe 122 PID 940 wrote to memory of 5060 940 4L473M.exe 122 PID 5060 wrote to memory of 1400 5060 firefox.exe 123 PID 5060 wrote to memory of 1400 5060 firefox.exe 123 PID 5060 wrote to memory of 1400 5060 firefox.exe 123 PID 5060 wrote to memory of 1400 5060 firefox.exe 123 PID 5060 wrote to memory of 1400 5060 firefox.exe 123 PID 5060 wrote to memory of 1400 5060 firefox.exe 123 PID 5060 wrote to memory of 1400 5060 firefox.exe 123 PID 5060 wrote to memory of 1400 5060 firefox.exe 123 PID 5060 wrote to memory of 1400 5060 firefox.exe 123 PID 5060 wrote to memory of 1400 5060 firefox.exe 123 PID 5060 wrote to memory of 1400 5060 firefox.exe 123 PID 1400 wrote to memory of 4328 1400 firefox.exe 124 PID 1400 wrote to memory of 4328 1400 firefox.exe 124 PID 1400 wrote to memory of 4328 1400 firefox.exe 124 PID 1400 wrote to memory of 4328 1400 firefox.exe 124 PID 1400 wrote to memory of 4328 1400 firefox.exe 124 PID 1400 wrote to memory of 4328 1400 firefox.exe 124 PID 1400 wrote to memory of 4328 1400 firefox.exe 124 PID 1400 wrote to memory of 4328 1400 firefox.exe 124 PID 1400 wrote to memory of 4328 1400 firefox.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f26c372194f8ca169393a9e6e215905dc99d3c31681940c7dae9726ea053f8fa.exe"C:\Users\Admin\AppData\Local\Temp\f26c372194f8ca169393a9e6e215905dc99d3c31681940c7dae9726ea053f8fa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\X4l05.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\X4l05.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5j79.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5j79.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1z99x6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1z99x6.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\1010527001\991a679c62.exe"C:\Users\Admin\AppData\Local\Temp\1010527001\991a679c62.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 9127⤵
- Program crash
PID:2200
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010528001\1dd8728f39.exe"C:\Users\Admin\AppData\Local\Temp\1010528001\1dd8728f39.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\1010529001\0b220baa65.exe"C:\Users\Admin\AppData\Local\Temp\1010529001\0b220baa65.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6928 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:6228
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
PID:6220 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2044 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244710 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e30ae2d-b4f9-489b-840e-0a1ac3081582} 6220 "\\.\pipe\gecko-crash-server-pipe.6220" gpu9⤵PID:6588
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:5888
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5896 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 27646 -prefMapSize 244710 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fae4c3da-95be-404f-ab0d-1ef3dc867f77} 5896 "\\.\pipe\gecko-crash-server-pipe.5896" gpu9⤵PID:6224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 28566 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8cc3f6d1-a2a5-48d7-bf9a-ac7bf31ef7a3} 5896 "\\.\pipe\gecko-crash-server-pipe.5896" socket9⤵PID:6468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2876 -childID 1 -isForBrowser -prefsHandle 3480 -prefMapHandle 3500 -prefsLen 22698 -prefMapSize 244710 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4f93b18-783c-45ad-a4d8-de7582ddc34f} 5896 "\\.\pipe\gecko-crash-server-pipe.5896" tab9⤵PID:6872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4060 -childID 2 -isForBrowser -prefsHandle 4052 -prefMapHandle 4048 -prefsLen 33053 -prefMapSize 244710 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e4d4ad3-583e-4eff-b83a-25e71682e68b} 5896 "\\.\pipe\gecko-crash-server-pipe.5896" tab9⤵PID:5148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4964 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4484 -prefMapHandle 4496 -prefsLen 33053 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67349a6c-7bc4-4957-a42f-c34b62dae8d5} 5896 "\\.\pipe\gecko-crash-server-pipe.5896" utility9⤵
- Checks processor information in registry
PID:3668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 3 -isForBrowser -prefsHandle 5344 -prefMapHandle 5340 -prefsLen 27044 -prefMapSize 244710 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {559cdc83-4877-4282-89c1-9dd6f3d41ded} 5896 "\\.\pipe\gecko-crash-server-pipe.5896" tab9⤵PID:4952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5576 -childID 4 -isForBrowser -prefsHandle 5500 -prefMapHandle 5504 -prefsLen 27044 -prefMapSize 244710 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a77788af-4d9b-4dde-8dde-507de6ec6e2d} 5896 "\\.\pipe\gecko-crash-server-pipe.5896" tab9⤵PID:1164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5668 -childID 5 -isForBrowser -prefsHandle 5764 -prefMapHandle 5760 -prefsLen 27044 -prefMapSize 244710 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {26129a3c-cd4e-403f-85e1-500a1cf91c3b} 5896 "\\.\pipe\gecko-crash-server-pipe.5896" tab9⤵PID:3856
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010530001\42ea973759.exe"C:\Users\Admin\AppData\Local\Temp\1010530001\42ea973759.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6136
-
-
C:\Users\Admin\AppData\Local\Temp\1010531001\d310857788.exe"C:\Users\Admin\AppData\Local\Temp\1010531001\d310857788.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\1010532001\5227c684d3.exe"C:\Users\Admin\AppData\Local\Temp\1010532001\5227c684d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7120 -s 15407⤵
- Program crash
PID:456
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010533001\9da3a09002.exe"C:\Users\Admin\AppData\Local\Temp\1010533001\9da3a09002.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f1822.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f1822.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 16325⤵
- Program crash
PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 16525⤵
- Program crash
PID:2520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3J56t.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3J56t.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4L473M.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4L473M.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 1996 -prefMapHandle 1988 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {57815afe-41e1-4adc-9428-db83e9a6fae3} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" gpu5⤵PID:4328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2520 -parentBuildID 20240401114208 -prefsHandle 2496 -prefMapHandle 2492 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {43ac943c-5a10-4199-95ab-034b449c91d8} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" socket5⤵PID:1164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3196 -childID 1 -isForBrowser -prefsHandle 3208 -prefMapHandle 3204 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6fa9fe70-2653-44fc-8641-cc3172b41197} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" tab5⤵PID:1608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3388 -childID 2 -isForBrowser -prefsHandle 3448 -prefMapHandle 3820 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a602b301-7905-4ad4-80e3-89204645db94} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" tab5⤵PID:1944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4684 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4752 -prefMapHandle 4748 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {703ac5cc-7e22-44d4-80c9-7b4ed62b3197} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" utility5⤵
- Checks processor information in registry
PID:6780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5204 -childID 3 -isForBrowser -prefsHandle 5196 -prefMapHandle 5192 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a09cd82-6785-4f83-8e71-f710b6c054c2} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" tab5⤵PID:1980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5428 -childID 4 -isForBrowser -prefsHandle 5348 -prefMapHandle 5352 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c32a1cc-f50c-4c04-9877-bcc9f0ce73bf} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" tab5⤵PID:2980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 5 -isForBrowser -prefsHandle 5576 -prefMapHandle 5580 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bea141fc-e83c-4370-83a5-6df83f662f2a} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" tab5⤵PID:1660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5956 -parentBuildID 20240401114208 -prefsHandle 2140 -prefMapHandle 3612 -prefsLen 33187 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bdbff510-4b1c-40e0-aa88-3e3aa41095a9} 1400 "\\.\pipe\gecko-crash-server-pipe.1400" gpu5⤵PID:5660
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵PID:5924
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6900 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244710 -appDir "C:\Program Files\Mozilla Firefox\browser" - {79990b50-7eb7-4124-b7c8-1a0c355db1e9} 6900 "\\.\pipe\gecko-crash-server-pipe.6900" gpu5⤵PID:2872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2408 -parentBuildID 20240401114208 -prefsHandle 2400 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a4d08b0c-1495-42ef-94a4-a82b28d8683f} 6900 "\\.\pipe\gecko-crash-server-pipe.6900" socket5⤵PID:1000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3324 -childID 1 -isForBrowser -prefsHandle 3168 -prefMapHandle 3576 -prefsLen 22652 -prefMapSize 244710 -jsInitHandle 928 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {90c5c505-2d0a-48b8-ad22-d249b448c7eb} 6900 "\\.\pipe\gecko-crash-server-pipe.6900" tab5⤵PID:5392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2808 -childID 2 -isForBrowser -prefsHandle 3036 -prefMapHandle 2996 -prefsLen 29090 -prefMapSize 244710 -jsInitHandle 928 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21f03e58-9962-4c66-b486-6bf50ae1030d} 6900 "\\.\pipe\gecko-crash-server-pipe.6900" tab5⤵PID:5688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4720 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4712 -prefMapHandle 4708 -prefsLen 33106 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {58af9e6a-068a-4cae-9e3d-ab693b0a4662} 6900 "\\.\pipe\gecko-crash-server-pipe.6900" utility5⤵
- Checks processor information in registry
PID:6876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5144 -childID 3 -isForBrowser -prefsHandle 2920 -prefMapHandle 5168 -prefsLen 27178 -prefMapSize 244710 -jsInitHandle 928 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1cd618a1-ed4c-46eb-aef2-84bf4368fe6e} 6900 "\\.\pipe\gecko-crash-server-pipe.6900" tab5⤵PID:5724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5392 -childID 4 -isForBrowser -prefsHandle 5396 -prefMapHandle 5400 -prefsLen 27178 -prefMapSize 244710 -jsInitHandle 928 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d848b733-fdf3-4688-9d8d-f00e581f69dc} 6900 "\\.\pipe\gecko-crash-server-pipe.6900" tab5⤵PID:5736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5564 -childID 5 -isForBrowser -prefsHandle 5572 -prefMapHandle 5576 -prefsLen 27178 -prefMapSize 244710 -jsInitHandle 928 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9eef03a-359c-4231-8482-f49be6f5c076} 6900 "\\.\pipe\gecko-crash-server-pipe.6900" tab5⤵PID:5748
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1816 -ip 18161⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1816 -ip 18161⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3420 -ip 34201⤵PID:2520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 7120 -ip 71201⤵PID:5940
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5460
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD554864220613f7fb46e09483b1db3c4d1
SHA1d6a28dff28f570a90122a18cb431906477a7d873
SHA256b05c39ab39e6f7d903c5de73d0850da6eb54c13968f40bbc818efe5bbe379982
SHA512048eafcef53b09a4354a40de850e1b583808c6501fce5c24563161283b245b110b105dae38458f2b199a80617cd2bd7759e0a101748224bdb1b1a81817c86bd9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\254256B27E0C48CF9B80B695F0B3B8CA84610495
Filesize9KB
MD56151b02781e69f7e76ef22b1da91fbd8
SHA1a6fb3b86fd028c334b542c41968fc82216bbfff3
SHA256d363ff9568d3071887d33b8445669030bffaa47a08ef6ff315263bfc0fbe9e46
SHA512e0700db5fd5fb2645795ed26b6e9cce21994b7cf6e0c39a5cf3da801ad2f1d3c568b07fb97118599b74a8a481b285612fe6684bb0c16d45e826d61c10e13afe6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5ad219cac39ac9081f04b8133a8b2c8dd
SHA14e7b91b45f01eb4a9a1cded9b6132b96cf700737
SHA2569ca079bd13e8cd3d5a86b88e6cff9563c71193c43fdbafe6e2c590b7e2776ff4
SHA5120bf2f382c96199ae0fcb0b124c4156e9f16f748d4c55a2ee23d9b41a6f31ff73771b35af9a42e63f2091c2510673974b2e8a168180c41e0d9c648d30b3b2146e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F
Filesize14KB
MD5a388d81a13d41a6cd4228db7db334234
SHA125679fdab1a4c96e5889faf5387891c35b4e8ff1
SHA2565a8b1965e211504de2ae6f66f10af59ca946f31e7641746a83e1cb9fe4eb412f
SHA512e3e80c338db01225bd5af9551733f5bf528d0181a84a08f0e2c43e6acc48b9ca5f0fc407f7a5cf6e5fc3845a15bc9a261f529ce4f4fbf62957582b2553b8ce9f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F
Filesize14KB
MD59d6cfc125124436a0ca16954193a9913
SHA11a1edf6e67c66cae18bfab923845190cb6a47a3c
SHA256b7b40f3672ac65e32c42d2d51590b4643cf8b4fbf180e50bb1780c62515addc7
SHA51202fd3a6088a71a4bdef177bca4ffc55f67edb9d514ffb29fed4c5f16fd4e3ecfac3cddbdb47f3edc8b7dac7d36b52fe7dc6827d6caba3a5062b60df010e04410
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5237f6f29237b9e1ab3846bc1d4c95db4
SHA11dfdfac8ecf6962251027f731649a91313266be1
SHA2568b6c40de0618f84af2cb146418c554f3f14947b32ee885e79966f425c693d3a6
SHA5123f403dd6ad1e487879c1809f5630b0aefa379f63055137d931a72481585557df5d899bc2433d704b989a0ac81fbc2c0cd726f18f0609384f51304683533352a4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
1.8MB
MD582189708266f8458d3eab93a4d50167a
SHA11dd955582cd71386b698bae0a9c4aced22d9b81e
SHA256244100747a2b6b9574b94e0bc2c540ca1f7c63bc9ad809aa6179377ab2317f24
SHA512fa842bfc1fd5f6799d99566735c5f12acce046e363dfdcdd3af2b92a34c01a255ec87a9a5454e7a430e00e1e589bd777af977d56f5debc0d44f75c9a9fcf7a1a
-
Filesize
1.8MB
MD5072f86014743c0d7fd19f7956d86a524
SHA1dccd47c69ddcf241c303fc78176ecb94a82885a7
SHA25618fbb63796dbe6281090f21a8470e7871aa0097b20797aeae859cc6dd999ec8c
SHA512736cf7bce393c0cc9f6b5c22cdb55770ab5be506ba4a4d8742fbed76eab123d95026ab7a7d741680688371dc762b85edfb8212122061d71f33230ea0979533af
-
Filesize
901KB
MD5dced0ad37e18a695550ecf864d9ea8a9
SHA179dcb5eca1492b8df699e7dd9f7c37a1cf0b1976
SHA256c50a53d932b931006ce2e66608b0371fa51e4e45f66417411f7f25d735e3fd2d
SHA512ceb6416d8aaa3cfdf3b0d71a41f3b1319bcb37c66f6b8ed42d1d8767d79de3365e975f4ceab8b7e7d4a56e3f3837fdac006a308059fd586c59787c35ba45c35f
-
Filesize
2.7MB
MD5b23c02a981914caa99e82ca9af468cee
SHA11545ff5435cc072dc4c28550fd901fa6e2ddc3aa
SHA25608fc964a2887da15850ed3fd026ba6d8163434ba707388fe03f0e58efaf70fb8
SHA512a49fcff3d8eacf8e657d9ed47d02a8c4ec68b11595cf206fb66eab6bc1b61f1e2ddfa0688b8cd5a624b7ec6fae2951dc69d70126b10104d241fb24cf3c25a35f
-
Filesize
4.3MB
MD5b8bb65183c5d54a9c5277a1370531e0c
SHA13e59e842a99f43f4d4d030959d201ad9cca26511
SHA2563307b6586d2c4f1aa6265af8e19758d546ce2d6e00757d0ac3fb32c825537c61
SHA512fcccb29214ce8efa52a85e7c6475b3e69f44f21ef6a651d89174e10fe69ae9100307e6c4495a575290cebd636476840d537b1934db4b75aca08cd0d92caf6808
-
Filesize
1.9MB
MD59d2eed099096486e2ae388b2b220497c
SHA1c84457bca7db83641fd56925c6496b4c9a8c6c5b
SHA2565d5a9d7c44e0dbd125b577319dcad5274121c38b6cde03658eb83c49e316d307
SHA512c289c2e38dc49ef5495baf8873f02866c53ce398f991a246148b29db81870e41dba5353691d9b73b071720ad98dfca438b5f5143eb65979e25220971c167dd35
-
Filesize
4.2MB
MD53ba080754b5b55b0f06cfa095c5c04f8
SHA1a628084ef15330b176758a0da02b29aa319c5bf3
SHA25683828009f1377e9adfd5472385f8a23b8bca44d33b0f6ac2ef9e0ffb831382f8
SHA51253e7a9d4de02cdd31221f1215a8104aeac3a2e0bd8dee9253e3d2af4981d6c72a47858426e714d5e1baac891e56338b445b45f1dd6279999661cfc848c93a4a8
-
Filesize
898KB
MD591be16295eaae28cb1ae0a8c5e9bbafc
SHA172d061e83e70c949d93a9961a9a57fec5b675d0c
SHA256c8c2c1213b4c8f578c5e7409b6446081e783fb10bc5633ece1e930fd9107e7b3
SHA512b7c5d24f02295eddd98bbc1cfec915bfcfaa4f2cdd694866592041a53d585043128558c1f37bbaba249981c529fabe29fec0973339ed74ad66d6b57b1a25f965
-
Filesize
5.2MB
MD5d82dcc2e1582f713ee7aabd8e2afda8d
SHA17b48cc0e17a08c130c5f0cc44af54b818e20ea0c
SHA256091801d990182289ecf5b8694d2f18e227610a0dc534f4fc2a196d818165e5a4
SHA5120736a4d1edec86d84d9bae2d881493e8d51ef071b0e7d5f42d22ede7c34212a6edf862c4fc676c2ae9264725b4e335de5a600c5f53048ee1aa7b02b36dc36445
-
Filesize
1.7MB
MD50c9b97b6b3764c32d970b87f9aae9ac9
SHA1d7b286a8102561b449bf3fe295fd920eacbe9fda
SHA256383933ac4e62ba3e68f5f8dc90b8904f943138c17e0313967f9d91ca5a3bd545
SHA5124f8ddfeb0860485932958951d291fd7674c80120192ae9f4728f56f345e72ff26deb6c35158bf3e9f10ea6f3c409665996e71b4a989bc0a8e6cf81c942e33e81
-
Filesize
3.4MB
MD5fd76fcef564b42385d100e896415dd17
SHA1ef7c407bc1bfe4ff70798ef20c287a3799446134
SHA25648e246c4f4fc951ad63cb4402fb5e4cb4a9aa22d9166c91db62cb87e60204fc9
SHA51277e40768b033981d8132bd3858f4bbfe1180f6d2daeb853deaea221c4a7b75f12a3406d18f2f9029f3f5498253d4a20b9726910615b0862623026055b4550c3e
-
Filesize
3.1MB
MD54c02cfe4262cc9d895577ab65299c421
SHA1efbb5eb0b1360ae15e0315eb9e43eda3ea37714a
SHA2560c7c5b69060034b93bd54c1e6d7ab8ba403f03904dc9cf3b1969b26947f20ac1
SHA5125d3085fed43de96b6e1e482a17afb6710e8c09fe9a8ef2e2360ba9c3138da30cc2d2758f7ba57bd3dcdef822eefb2bdbbef4c428a1dcf9c0d4bd9fbf68412ba0
-
Filesize
2.9MB
MD5da8934b00b8d961c58f8c7706ad8dafc
SHA195f396dbfb8d8b97a308354a9ca5e2abde156460
SHA25644ca1daf2b2749aef8d133fa3216da9437292e4d51f78f9bc43bd07dd591a8b8
SHA51290094cd6c1b4548747335098b49de8fd4f73f4f5864b3804bb4e380ec2b133bab7efc2630f8278d6b7ac97ca4e5496324a9cf1a5594d2996a8d5eccd12c7e130
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize13KB
MD5eb8cc1d7d2f7f078329d521abd773353
SHA155a8f5048d762245dbad8a66334854697f4713dc
SHA25602a569a5819af3212b922af66c636130f4c9a32d199f9ed1c1af457e0d71ee57
SHA512a62a0d53a29bb8d0d09aa484b46ab7378ca5a3cfcaf82cc476379c14fd8eb86969b29623cb0f64917a87c0787794fbf26f878f8df96ebf5e5a71ae6539e002c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize15KB
MD5fa1015e5352fe0a9296f81c6b9e78fe7
SHA135ff923aa2d3a896866bc4bdff17a62764310a1b
SHA25650dbe62e4c8fe776c3e115286ce29784897a4ceac098a55fb55687a58d104277
SHA51295ef34fad343f2e2d90c00459f82741976aaac2204a94b08637761c7b94af7173a0d277bd6444f0c70cbc243421c226c864ba00b8d6de54be1c0a10f6e7f77d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize15KB
MD5ba3b15066665f2542d626fd8183a6c5b
SHA16c42a0ae4fab3c7bdee69f9d28daf4fe35a25b16
SHA256f356a4a832b4e737bc22a2ef4984836422d33fac8a69da010a85144ecfdd8065
SHA512f51c9044300848dff8333e0522210036c8422ee3a809dacf0b7d75269aade1033d3da27ea8f9dd52cbb2248bbe6548168f64f85956215706499022e69a62e544
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD5038d9367db8a93b64b074ac0435af8e4
SHA17b16766918f2cf4ffaa00f7458dd3791cd811f19
SHA2561670fce275e6d3fe6ffa72dc5bf8133963c0a191d2cd6de9f7423f55774e2d43
SHA512309f28f3791b44035442357edf7997d3ef0e078009cd165e6e050d3ac305f2022a8173623298b121e7641ab033932b1ad5d7e3e95980389e537ccd2c27c29d3f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize8KB
MD50da714fadccc290da1d5ed5730f56b25
SHA1bb8257d2c1ba19479b2917b1fa212a6b0040beb3
SHA2568fd43624a630a5981ffe7c2b775b61d3f22020ec77967c5b9fc74e0312a7d0c3
SHA512e779819ed186b7fa0d1341e0813168ac0ee771933129c51e9c281279f25deae8f1fd653190f042390e249702d0998c5da71c1fe19afc1f3a4a4e846d35211e4a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize10KB
MD5c7c15ff4d27ee9f99eff297f628437ce
SHA111f6bc033d2adc3ffbc96e654c8c67ae27fd8401
SHA256258dc25183aab0fc7fe0e3e510f739b1e1f7811761bc706125369cf79505c07e
SHA512f97b621f737e4f035813c4d74ebef617037ea1ded6a668db3f4b48d248f4e4af77e12dde89e187299272da718ca7ee419e9a2a4276c238c3a0a7b26d21d8c2f3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\SiteSecurityServiceState.bin
Filesize1KB
MD5e8dfec38841478e0ac3ba1adf3317f23
SHA17bfa02361d57c6f59b9e32bfd64e2cad7515b20d
SHA256286641e99be0a0420cb3e0be44dc403e75881d43e2c3cb75d27a101839f2794a
SHA512dd3155c4e869fb73c021bf1668df0001519b2400342f89cbb87d363c6c0046a42b04fa63a0d27dfe46fb6bde9c029c5a2144102535f893d058551b223fa2af18
-
Filesize
224KB
MD5ff42def152dcde2b273943d9cedbc41f
SHA164b447eee1743096630373351d109ff6f375202e
SHA2564c419b5b3d0b58c4cb9fb4baed3a8a057d968baa8e41705f3c043356e5ff08d5
SHA5129cb10e71715c959f89803ad8e2452aff97b3bbe0873a98031ae98fa371739cd45261528aae33008b602fa467221ed5b8e4e223af774c5e1082291eadfcf049fb
-
Filesize
200B
MD5cc26e3da3f8a18ab0edaa8ba362f9efb
SHA14141308059d17d5d2d075bbbbd93450e2e1d1844
SHA256c17ced564ba3438bd8fa8ca7d3c94897882692fa8676b4ea6bf4e260e971dedb
SHA512a5d1c757788a1b38e2f96cbd814961402bbf0a690b86ccf2a7793aab22e51dc4b5d3a2e18ec6a79fd15126955200b56f12f189e924cd0f6ccaeebb4bb5f9ae34
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\content-prefs.sqlite
Filesize256KB
MD5b41ed219e2c8dac47f2701562d092621
SHA190d507eae3ec943a121dbe5a080412e40470b54f
SHA256cfed019635a1e14f74ae78f2c03fb96b40ac3da37b67489bd98c144afc200f1f
SHA5125c6027ec701055efb3b6c055727af5ed261e8f1d5ba954e64e8a34e5c791679b1e4a6ef49896ab8089ec151fd758ba41efc7333611af42b851606a0544a9b947
-
Filesize
96KB
MD53ada24cd721531a067a8d375a6d349e7
SHA1f8622b4ec27e0c3af6d856f801251c861abdc70d
SHA25637b6da3341f40af6e1985aed958e073c059a632c8d8e0f3da9c2489eeea1b371
SHA5129f01e4d2a6246f8980df4df8780c66767db6f673ad68bb9f345d2e3d262d3ad6dd0fa24be55f06e742fd0c90697a4f8430f16b13ef8ff7b5e3bedbc72a457f90
-
Filesize
320KB
MD577cd01066b90c7757ebceb15a78956fc
SHA10a9087b6f7103908635c7a91d17c4ba2a7623e5b
SHA25632370066aad2e753ede137751eed72f71b3489811ab42e3ad0411e7201e89d20
SHA512d19e3599586336619898d975e697d73d770e8c6c7ae4bdf1092c66555e88b363acb55c1b9007fef7e6a09113140dbef029439638c4d3ea9b25b8a4da59aad07a
-
Filesize
192KB
MD5cb5029d65ff8131ec435e1488fa6ef03
SHA194c09318eda0a5a5b4f078e90179f73000f07275
SHA2563741e8726fc77b15f68c6f0e95083db5b9579a8b7baf74676ffbe24cb01d7cbf
SHA512825a3560e9ea997345000221f0ddfa1ac582cfed63ac7d0988b9c4cac708b7326e9d79ee0c6b367b075264b88e095a35aecbe8b78c8f445808c74135ab1c844d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD59cfb966cc77870e758a701d0bd762814
SHA181c033ef57bf784a4cce8c94103576402ca6e1e3
SHA2569406e36bbbc5c694267d6b1b6ece84eb5f4bb0cb686b81d7e7ba97a7bc898187
SHA51286ba2b7536078c04a554473f592fe0ad61684d92707f754f041eb6740ddcf1ba401ebaf3d9fd5d66628dc6d83c34281f4636b426f6d33f739f4d21166a7d2156
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5f18d6e4d0b5a4ecebd4501f4f206c8c7
SHA16cd70888e1718ad7f3da9fc781cee34465908c84
SHA256fa80a02f87cb75ef51bfefd9f1fb3846edcaf5fb8f44040738d367796c7efcc8
SHA512df0da775ccbef01d41299dc35589eb29b943aaf6ed6857b0fa769bd4394098f738ee197179d864dc5a4822f8398734e50c4a8eeadfe118a07ba6a0bec203fbce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD58f1477d94b8f80243faa81d5bc16c810
SHA1734ebbdde5977d7ef808a56f3a713d3bf7796112
SHA2565ea5a78b23a9751b3594ff310394f7cac02e3d12749f2f1b56eed3301c120f0c
SHA5122e72983fd989d942720b1d0c61e28539f6c9a2d27f3d8eca1ca25c1553d2d1cd2daabbf7d2f6707d1c9a01952bb8a1f844b1c1583c94711c32e4e17be8fa4663
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD5516b82cd327d7a03399a20a1f217ccfc
SHA1976fe88d1dcdb8f4c69a50d9bc76b7c1e54d55ed
SHA256d925c5d6d582abf4ae9de3dd4724c33bc97cc47483642c30e11655b6bf646b51
SHA51233d90ef17b995e7f2a48d04e04ce6d2821b78bb491c07150b5ac940a40cb873e89ccc41b6e5311b6d8b881e3b9f5878f92d29a9c2b0c47ad03bfcb5c3a6347d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD58ba57bfcd46d63b2272ab09c139963e9
SHA1a49a34d5d46d077f11765b70b816b78835e882d1
SHA2560702184e5456d331dc0b12429829e413cf80e7370fd24ef5af22fa558474c00c
SHA512edeb8d03da8ad5074d596528b4e44c7747f9347ea496fd7f816b7e368f28e190fa19a8cbfea3df57055868acd300dbc80f539dfb05ac35018cbd34b48f0a348c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD53652c118eeae1ac274543695332a958d
SHA108b3a39e13d07a0dd2d9d252b31a82e7140dd8bd
SHA256785de69d075f59b820da8e5fb5c3297aa9634868fb67b91a022dfc0282c2e876
SHA512530612c426cbbabb6731dc879bfc0ee28fae24828670b131584faf756e3757fe47fac34436d9ba3fd07417586653fffc7e2dbac1e8c789474f13cbbf50ba03ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD52f4b750bc46fc916fc4cfcfaefa2385d
SHA11c363abfc108002af598e53bb9c789963b1016aa
SHA256ade540fbde4469aea419dc370b4b0c56af1166560693a361763cfc85d2ff4e95
SHA512d5575077abecb8513e487b9ef7490caec749695053f253dca56a62cf571a17a25377b8e28ab4cb1fad1fca3cde664e75d3b2ede48827819795807c0fab7f9bc8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD59361adfe5a4c9856ec7910bdc2df450b
SHA16ae9458c9e811201ecd7f4f3d5d3bd7a7d844cfb
SHA256c4e366f40360547762b92f147c508806be4d586461967b18f7414b55e844e93b
SHA512efa167065800544a619fd8b8ae3c05bb845e65317e3f2b0bc02fb52d84beea1869ef6d9ac15291d2c42077b69a365d7bbcb51e8f3e6f618d9c8ef4757eec44e9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD593a9b7687be50d8d4053b513bed2dd0e
SHA18028cc535118f8d50b71683468341277751aa48f
SHA2563cbc986141d8393aa620745e80104089d3e4c69e42fe56e07ca6ad977a6f7f98
SHA5128f7fec3fbc96b23b7f6feb4c3fadd1ff7b2424e9df7c85248d5cb4f2a81bc077bcd13bb3526572e1d947fa7daeb1686a7f8c9bdeff6acfecc3147784917e988e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5c48fe910ab4edbc2d225fd8c05a3c5f2
SHA108e03ea1b5306cbf826ce35c9a298f4f85832b2d
SHA256f7dfe890d700f8b0f800b74ec3e0792c0d3903f38f162552dd3f07f8850af905
SHA512b1153fc1b5a112da9daa08dc22372e717711e7380afc31bc5caf9fa57114ce529e1e45bbc4051141e1c40e5fb25ff851ab3152e5f2b80bcf93bef0e92ee3c306
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5521ca01c9a9e0cbc40d97d8ecf5c3d78
SHA1437cfa706f2b329ba1f4b2de17f7528bcea375a0
SHA2565fe5c434245b96fdc95b591ccb491dbf5f3c9b32cc0bc15a02d1bb2f332f28ea
SHA51283734ddd491b8d3591710eb3703ef4c5cf99f3006e8c3e875eb9e4a9f53425f9f8db3f12155530b428b1d91f2207ceb19c353e33d62bd5efdfad5c4771ad3860
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5bc5ae17d410edc0980ec8e4fcdf92c56
SHA19437762afb6e6879cfd0415e3019524e47d6809d
SHA2568a29b86721ccd5c95bfee9edc5eac704217869142a3b996ac604710fc33fe9d8
SHA512382f8ded3f25c5aba8e1c9c3d1d4d0e625f77e6a99d340fcfc5f7f7aa5c69df013e58bedd57d523a4dd119dc8811298d21edfec82f72060f8149ce4500881634
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD593c8e1a60c06f5d838c0432cab4e820a
SHA1a949d2e817f3a7c5e0a8db3a667c45bb88970e11
SHA256de9bf50fe9a44192e5896ca969e85d8f642c5324d8c23af0cd06cefdc0290aec
SHA5120b95afa1865589e53dda8f1adf4bc55f33dd286c1551ff3f6b2f81c43fad0412efd32f935ad12cc07824841be11c817f2d921cddaf0058e344b70caed8611820
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5f647dc3a383f4c35853a3e6fb4b60212
SHA174f5042df018ad6718bd5a3ff78448655662d0c3
SHA256fa8384dd5dc859d83a1a943d2d5715f319629c73245bae0e3212e02f4c58c462
SHA5122825cfeadeea5d944f76e26d2cd6953f9e432a68b068c2b612bfd0fec3218e5d2ddb6f28ef223c4b405497461baa150a231d64052e3736d262f7a007d44d3b2d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD527a1eacf838b821bc04db2039474d295
SHA10cf7e823ef912fe2fe4edcffc66b420aae0bfba3
SHA256db7d79e896d00131028d16ee7b9434e308cf3464ac6a1530ec6ae23e9bd9eb13
SHA512186e11d23bcfbdccc6b773be89db4a9a67596ee3180aafabbe622f225b3ec77b0f6baa7bcb8e86876a6389e42360e7eb0271a3bdccd83424dce80f4daed3fec4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\events\events
Filesize104B
MD5defbf00981795a992d85fe5a8925f8af
SHA1796910412264ffafc35a3402f2fc1d24236a7752
SHA256db353ec3ecd2bb41dfbe5ed16f68c12da844ff82762b386c8899601d1f61031d
SHA512d01df9cab58abf22ff765736053f79f42e35153e6984c62a375eb4d184c52f233423bb759a52c8eed249a6625d5b984a575ca4d7bf3a0ed72fc447b547e4f20a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\08287ad3-4c9b-4cbd-a3d5-343f3c36c8c9
Filesize653B
MD5436c695721b87a2ee22c4505bb0b768b
SHA175432aded781d98f8c0af2df12b48ed2bb069ae5
SHA25647762b334ca49292cd3abfd03df71a511a3d3eaa62985cd2d32567b2180c172d
SHA512efa3d917ca2ef104bdd836149a1c043776e7d9cd2ed7802726f3c8f481344d7d26ec7460d0dec3abf0547811475058199cd8fc332a3625b5f9cf96006e0408ea
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\09aa6593-011e-4d18-bab8-3baf9d5677cd
Filesize982B
MD5ddfd1b2ec004203dfb10e4c9ba3a23c9
SHA141d89424d14a1405bbacb093cb5b1ac787781160
SHA256ff7bb238d7be97dd8c1626c01594b5e9453b5580e35713409a012b5dbf46d6c0
SHA51267606540e0b806eb5029389134a6368214e6627cdb16931ff11486905346c8aa5b99b62bd7bb335cb394307fb0c5f33b2f7a4739887dde53bcaaf3783132fd42
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\10124fe3-b243-4e80-bffe-803633615763
Filesize789B
MD51b5fa067b3eced08a6894ab8f728dc77
SHA1b3e7e3d5c1146504b1e991a13c05f837c663b931
SHA2561ef4e3885ad7d5ca58647a1b5b375454ab5b6fd285706f3ea76b66a0a5c29adb
SHA512bcc87fd448f773806251e5e2cbef27cdb300a178630d6f34e58a65072113d5a12e3f80f2ff889bac7746fd20eebbaf29859b4f1bd3fbc6e559f9c738379a3123
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\14284397-649b-4489-bbe6-fb46a40a44b2
Filesize648B
MD587d6706445457fa2080644ff5bd6ac57
SHA193f14df4f4eb337198477a34e7a4476066df7e68
SHA256b8ba420f4df0cfa77fd9622c985a324abfb05ed8f1eed35033a65ea9b37910cc
SHA512135addfe66da5fb852888dd06a9df83cb25fbe698ee0328a744120ebb7eaaef7f03c85b6c9ec0a09d2a78d068a4444b60589de867cca50539e73f85a4d269d92
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\14c1c74d-e1aa-43a3-8e61-4dc10a912f55
Filesize730B
MD5936d3da5dd9828ec1934dfcfe0058b98
SHA1489528c67e3be628b1031c3eee15a353c58f2e73
SHA256f2c2aed69cc5a06566364da855c2e87e598a917f8299b5d0ca2b42874198dbd3
SHA512d35e233fe69de4cc2ba1a4e47fc0fb0e11b239e2f93a542348cb4370e13acb2af96b95980a6d4f38328307142c7524fef9347b359e9289d74c38630b368a02ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\18a9ccf4-c731-4fd5-aefc-0c413b92c87f
Filesize26KB
MD5a44caca47cee693d82e4ffb8223e8c71
SHA1c2e495285084b5db14861a3fccfb5cc8f7010fb1
SHA25667d5c0d46994ac9e73a5aedcc6d8481ac52785ea040cde6216a1697449f5dfc8
SHA51215a5f0cbc3331b12d992b392fdd51d11da5524d311f7e067fe51258c5bc8d174f640adc11b072ce10c09db8bddb50d893bdca72a6d599c76244d69f1921649fb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\635bdc22-7225-4407-97df-63796ae37dd8
Filesize671B
MD531b5565fe50d100d7922af11b9612084
SHA1985a61b27332f93d3f273e00bba6f44c22a7c72a
SHA2568bd108185b4fd286f97f8e8a907010aee64787566b826906676a17ed356660f1
SHA512c7814afd9c70e6645758bf02de48c2a9dfde6249747809375ece1b193a1428736b607a12be342dafac629cb5e93ee606181de2af5b2ddd1aeb6c1e26698e83de
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\657c8395-5ec7-4129-b108-9525acab76aa
Filesize905B
MD53ab66b19b00ee4c20de1b2a419eeedbe
SHA146c92aea3b5ab8f5752a66cbbdc6bf34db529809
SHA256e721920d70dc99377b9e0a5491e20c450579e9416ef00eaaf1c701bc292c9214
SHA51271b17ec69ac85fc75d9b2945d05cd7a0e8329c9ce5cd7c52f2c0db3f0b68f9cd0e10328326d00ad9775e806e2f7942caa529427ae19c2f05023af88f68eb0b53
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\72c34c66-6ddd-4733-a8fc-b7861a4323ed
Filesize982B
MD5293b3d8455996f118ca4e71885212c76
SHA1303f202484d912ac7b1124fca2bc6f14bff90e1b
SHA25600e9aee649a4e6a8c2c6032003f8a171f1dacf73b29a3c914b0e010dead45380
SHA512595466671ae897535eb0dc98a86d446fe75fe7168f7e9c8144a17a422cc2f1d9b25a965485fd2c67c447728f55a97cd461d2615c92e97f3ef4caf5a7f23d473f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\a6eb67d7-99ed-47bd-9c37-c3efc96b413a
Filesize661B
MD5f3ab26c1348e735d0b92ce2623581892
SHA13fd403a95ac8bbddefa0e742957ba2d8188322fc
SHA256e1fe1ceca00bd053db3e3f8382ae09d74031cdf81aa915297ea24f1209048eb6
SHA5129ff72f4f19889d8889a49ed80f129f955d7d21f452ce0d02cf064012c9878a8c19d439754d9e89957d4763389bd063b3f7ec9a118dfa5575a2392884f615ed7d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\extension-preferences.json
Filesize1KB
MD5dde80a7e2b13a8eac58ecdda686c5834
SHA143406428867640d1c6ecc1956d2b0b0676275b19
SHA256f74908a4b049eda4280975022e644ce4a8705c450ca4430940592505587ab5b7
SHA512c9f1d4be88c1648ec7f26505b6083135a054168aa36a15d95fe03376e6910298b0fd9b7ccd1f4ca9805bfcc2c59e246799a2a8c72d93ddfcb6fea334cef9f45d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
96KB
MD5152675f2717f3f0996afd0737d33ec6e
SHA11765493c00e7bcfda843dc61d142bb6a00f8cfed
SHA25640a8ec60e17f03785a99826c7edc02dbb1cd2b346bb6f9f38532c7ca2d82157b
SHA5128d509c7588306ab21e8672a3e476fb8f70b4dbae9b2406e4f0b23f323be827bd9ee586db7b612f5f3fe184f139e35b6c08ad9f976c9beb11071ec51c67c6116f
-
Filesize
96KB
MD58767b7d5f295bf7e1bedb728b1648932
SHA1bd6954deaff7abef31e5902e1d6579a3bb2ae7e0
SHA25688bd6e0a094c74c7fbe6a1826818a7403b4aa0388c43a53c22168079f6e21548
SHA51247ac906ba011e7c7dc2dc090fcf1a6076cf4b1e025b22e166643109d51d21064a1f9f78e548778e2dc3fc00932444525bdc5bf764bb46f943b0d2de54e444a01
-
Filesize
5.0MB
MD5b37e606eb692e54c144e8b14cd14b7aa
SHA1b673d9b131aa8ee926d624d23c1af7e6cdbf58ef
SHA256b4992ef3f6a8ba3e68ed76905b520005b30fbf2b9fccd279ea32049263ff4b8f
SHA512d8732cc9f2efd50cb902247b0330238a7cb797cc604dcc245e264d1881d33c5ddedb2fa415103a72d1427851210b35c8c560fd83683a4d7697d5879dabc83b20
-
Filesize
2.0MB
MD5b75106ba111791a525fd6aacb3489f71
SHA15e904cef68f943b1793f3f57ac597af132734064
SHA25616a7f9e5d1c5dadade6ee72b2dfd34f801dd355e2f156559c523f1348b628223
SHA512230cf3a17c6818aee8aeffba766acfb9c6cae35475c75bd96c03b18a52cce534d417e6debbb9d1e99cbf67f4af41ae734ed37358715dcdf6a176d14c5e7ea4e7
-
Filesize
2.0MB
MD5d1f1160e037e94b45e470a46f7bcc159
SHA1731d8f39e9061afef958b6ca58edd456bbb91d47
SHA2568888b954f98fe582e4f2b372ff4ad946cd8862d81a964bac840d890f0d8643d7
SHA512dabcd3b70e2df30f1152b896362a4ceb7b529b528367cf1a5ec5777d49628a2b53c13c92168a30e5d9dba9c469b1aef2df40406f6ed96bcaeec4df40dcefd329
-
Filesize
10KB
MD503e4e28611d943df5f8dacb2d82a0d61
SHA19f07109ebcf19d67e7e88c6406e6b39bc525a78b
SHA256a2e9aa24eae79ae75ba4ce1758d884de736306e4e5b257949e8cfbb544b99ea6
SHA512ad7690a5d13e466c23e08f146c9931b1b2613d843429a15dfc362f3fc66dc41b71470020b33157ac16daa192ef575f8364d3022f297c8ffbd1d7e053f30fc208
-
Filesize
10KB
MD5fe1842e480e920632a658728ebf36e5f
SHA18d7b5046139a1a5d282fbef4e834c5e8f88c13c7
SHA2564a0ee73c0d8c9c065d77ca8d0c109eb8941fbcf1cb08cd6271e10095739deb4d
SHA512d87dd5093a11efea6fd22d30db8a32db15e32b3663a0683bb192ea47aedf0a4b3089bea50f44932085f72b3f155accaaad38dc6e084b9a08b115992d4302e32f
-
Filesize
12KB
MD55b19595b88d052dd492c6d0985ffbdd3
SHA11b1bdada10803b9bf5f29d3fde3bb6526cad9da9
SHA256a68d69b0c42a374381561d4f9123bf2d63740a67edb56f551663a25673b8cee9
SHA512b42e343ec8717fab5e34728b33eb03d22ae0a12d364a14c7fc8d42a57d2b3c801028fa9ee5a91c2cc7eef1d51dd7057e47f0f10c186427fcc140282664320cfb
-
Filesize
15KB
MD5ea93e54c78eaf9c49c1738be2473409a
SHA14ebe30791c3eb833318e47faa74f051b0f84d60a
SHA256ab91487f27108523a6945ab1c0513102b789d4890dcbfba05b1ebfa610dd528b
SHA5124aa8691830a0535d3d54d7d0cc92aefd6602352613932e5147e3c1b4f27108c0b00fcc8e9c617f08fcb9d20d00f988a850467078c79ddfeb2b53cf0161bb5f38
-
Filesize
10KB
MD5e26d2eb1215946ec965c6ce08f3944dc
SHA181e71781f9c40745a8aee2abbabbfb566e96b362
SHA25651fe2497b59e250c70bfb217b831008d6e8649a36ed1bdf2d274ca0be91a1a73
SHA512feec48cac2ed06b96d0c9ab7768dd4da07c0f358e31526a55e7837998e6d3fde3f81e7ceea65ee820d424b2acc17a0a035022ed0c385f56d67edac71945dbae9
-
Filesize
11KB
MD51742b942dc5bf28d5825bde9eeca704b
SHA1ca92d9dc38c7b968a326e5233339b5e941e125d4
SHA2561f17bbf70a63b2cde8a0cb33a12f3e023a0a5063cc6ef66367e48f151773fb83
SHA5126f679b675b3e7a08177425a491d0ba5c9e157e0e5a8568bebd5765f10ba0a1a6eeadfe416d7b99d7722ab7ecd53cb191a358dc6f055b2f07a7052af3b80b9b1f
-
Filesize
10KB
MD5274c46b0ce854c18b8459aef608b3558
SHA10c1f45786c7281e3404e4353e003ed2e7804dd27
SHA2565613662701fa99edf56df8720191dcc7af918bf2736611ffab4fa4de54b85f4b
SHA512340131294ed2cdd4db96513f7c210a8b1b154c98ebfbd3038182f3e9bcd8544e6bba7742066d936220abebb6417579aada3c80253336732acf8c3e7a340b8b42
-
Filesize
64KB
MD576786a4c0dd19d88d6d3ed95a293bf2f
SHA1b0d6d676127a7694fc6e71ee57fcc2ffaa621ff7
SHA2561a2564c1ba20b8038d35c2319258d94dc15d97914dcf753b31c48b79940dfd31
SHA5128cd3298e2ebba763d3c80ac4b17e44af7eb63b46304967d0c6316d314baf8611c05f7b9979c2c5c329ac167aea0246e8c9f057ffbb272481c13fd5e4b4bcb2d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD53a8617e805514124bf2578892cde3cbc
SHA12f0d5fb45bf31af84260e87741115985ca21b5d0
SHA2569d12d58c4b4374e5679df59db0e092aa7ff91567a6583651b3307368cc73e1ed
SHA512cb309dfdae1cfc8f5d1d7df847e5b5c27c21554446329564ced18d1ef245edcc2b958061e37986f7f784ced7ab3fa61fdb363fe860dac24788fcebae3cef3eb5
-
Filesize
4KB
MD583214e069750e00d09b66090ed0ad0b7
SHA16449874653860e42f45a16dcd114cb7343c6b99e
SHA256d6e38d4e610e1713abc041bc3462ae0e8a2c787bf1a2a17739ebde9caf1d4ca0
SHA512c6f043caaabac654b96365ec000f57edd9899b8228cc1978713ae54c04b2fb41cac65f17139e5fc11bcb14847d497490c94ca1784f0bc1d228a530644d7c7487
-
Filesize
4KB
MD5ec5e1b7a89dd39a2aef55f9f149743f2
SHA1554bfde8b06776a72d63a362710369dded7572fe
SHA2561134e91b9c40a5c1063371117f90079b1aaf4b9bfb629fb6e452947fb9e8ebe0
SHA512f480fd92ae952ebe7958dc7b3fddf3cd51b4ad9605db1cacd4e05382b2f2d15e9e05db4684c0fd5d7c939578a9e1e503b5799198a10251380895095846976825
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize560KB
MD55324372f09b999dff2ef40fa26907dca
SHA1641a1f0f627e922e2aa1a6c77d0448e2c4eadbc5
SHA2562c206463859c6c9ec79d0e57c30a7ce4aa0c32503947ec35ecb60959a00fdd4d
SHA512aa12553eee5008135291857a15d6674c220b2382ec2e4ee9cba5958344c3604a29184d51af97a8b9f449628723d597c846a569980244c11ee4424f16e941be7d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize376KB
MD5754735b641ccbc524222f764978e541d
SHA17684ab35f8da34bbb36f695fc46ec5be690b2b48
SHA2561b0f5b955580b2724e7f2d568e5ea639f6e9303153541065c4e298ad955d1b08
SHA51287e767996cecede829030ac40413c4b620e2bc8d5a9a2e9793a40421f9a5f055378aced397076a82463500d0ceffda90b682617f5d8bf9f659576268d5092a96