Analysis
-
max time kernel
1551s -
max time network
1546s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2023 16:08
Static task
static1
Behavioral task
behavioral1
Sample
Mercurial.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Mercurial.exe
Resource
win10v2004-20230703-en
General
-
Target
Mercurial.exe
-
Size
3.2MB
-
MD5
a9477b3e21018b96fc5d2264d4016e65
-
SHA1
493fa8da8bf89ea773aeb282215f78219a5401b7
-
SHA256
890fd59af3370e2ce12e0d11916d1ad4ee9b9c267c434347dbed11e9572e8645
-
SHA512
66529a656865400fe37d40ae125a1d057f8be5aa17da80d367ebbe1a9dcea38f5174870d0dc5b56771f6ca5a13e2fad22d803f5357f3ef59a46e3bdf0cc5ee9c
-
SSDEEP
98304:5kjozJ9/im8XVBKl6t1buVfRhq+5tXzgCa/T:lzJpjS346t1bIfuq07
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1122239507517931591/t8OIvSAy-gUrhwHF19g2icC0QVzPLTYshtzEpijTbb7noKr_jWj3tRMdREfJ_ScponP8
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
Processes:
nikario.exenikario.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions nikario.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions nikario.exe -
Downloads MZ/PE file
-
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
Processes:
nikario.exenikario.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools nikario.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools nikario.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
nikario.exenikario.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nikario.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nikario.exe -
Executes dropped EXE 2 IoCs
Processes:
nikario.exenikario.exepid process 4348 nikario.exe 4816 nikario.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 229 ip4.seeip.org 230 ip4.seeip.org 217 ip4.seeip.org 218 ip4.seeip.org 219 ip4.seeip.org 220 ip-api.com -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
nikario.exenikario.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum nikario.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 nikario.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum nikario.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 nikario.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1704 444 WerFault.exe 4816 5036 WerFault.exe Mercurial.exe 2228 5036 WerFault.exe Mercurial.exe -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
nikario.exenikario.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S nikario.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S nikario.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
Processes:
nikario.exenikario.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 nikario.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation nikario.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer nikario.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName nikario.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 nikario.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation nikario.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer nikario.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName nikario.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\Local Settings firefox.exe -
NTFS ADS 1 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\nikario.exe:Zone.Identifier firefox.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Mercurial.exepid process 5036 Mercurial.exe 5036 Mercurial.exe 5036 Mercurial.exe 5036 Mercurial.exe 5036 Mercurial.exe 5036 Mercurial.exe 5036 Mercurial.exe 5036 Mercurial.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Mercurial.exefirefox.exenikario.exenikario.exedescription pid process Token: SeDebugPrivilege 5036 Mercurial.exe Token: SeDebugPrivilege 3344 firefox.exe Token: SeDebugPrivilege 3344 firefox.exe Token: SeDebugPrivilege 4348 nikario.exe Token: SeDebugPrivilege 4816 nikario.exe Token: SeDebugPrivilege 3344 firefox.exe Token: SeDebugPrivilege 3344 firefox.exe Token: SeDebugPrivilege 3344 firefox.exe Token: SeDebugPrivilege 3344 firefox.exe Token: SeDebugPrivilege 3344 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
firefox.exepid process 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
firefox.exepid process 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 4100 wrote to memory of 3344 4100 firefox.exe firefox.exe PID 4100 wrote to memory of 3344 4100 firefox.exe firefox.exe PID 4100 wrote to memory of 3344 4100 firefox.exe firefox.exe PID 4100 wrote to memory of 3344 4100 firefox.exe firefox.exe PID 4100 wrote to memory of 3344 4100 firefox.exe firefox.exe PID 4100 wrote to memory of 3344 4100 firefox.exe firefox.exe PID 4100 wrote to memory of 3344 4100 firefox.exe firefox.exe PID 4100 wrote to memory of 3344 4100 firefox.exe firefox.exe PID 4100 wrote to memory of 3344 4100 firefox.exe firefox.exe PID 4100 wrote to memory of 3344 4100 firefox.exe firefox.exe PID 4100 wrote to memory of 3344 4100 firefox.exe firefox.exe PID 3344 wrote to memory of 4264 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 4264 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 3224 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 1968 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 1968 3344 firefox.exe firefox.exe PID 3344 wrote to memory of 1968 3344 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 21322⤵
- Program crash
PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 21322⤵
- Program crash
PID:2228
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 448 -p 444 -ip 4441⤵PID:1572
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 444 -s 7681⤵
- Program crash
PID:1704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5036 -ip 50361⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5036 -ip 50361⤵PID:1936
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.0.1963693741\126151906" -parentBuildID 20221007134813 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 20938 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {aaade573-f616-4b9f-9036-b010f5530f27} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 1980 257dffd6b58 gpu3⤵PID:4264
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.1.1065205095\228340428" -parentBuildID 20221007134813 -prefsHandle 2352 -prefMapHandle 2340 -prefsLen 20974 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6bff2165-03b5-47eb-af5b-16a9deea9461} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 2380 257cc272b58 socket3⤵PID:3224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.2.1075162452\1615549188" -childID 1 -isForBrowser -prefsHandle 2860 -prefMapHandle 2904 -prefsLen 21077 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {16d717df-a8bb-42de-aaf2-1b7449199ff7} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 3024 257e3fa8c58 tab3⤵PID:1968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.3.1056426013\165528133" -childID 2 -isForBrowser -prefsHandle 3592 -prefMapHandle 3588 -prefsLen 26437 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c890fd51-1ab7-45b7-b53e-5c73953ac520} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 3604 257e27b2858 tab3⤵PID:4184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.4.233670698\1224754770" -childID 3 -isForBrowser -prefsHandle 3840 -prefMapHandle 3836 -prefsLen 26496 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {30a2fc03-5d67-4e1d-9b24-d8dfb1d7a0ff} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 3852 257e4ddd558 tab3⤵PID:3472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.5.739571939\1393588278" -childID 4 -isForBrowser -prefsHandle 4976 -prefMapHandle 5076 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a94fc242-962a-4520-ba7c-844171f44016} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 5084 257e5fd6758 tab3⤵PID:2960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.6.1378961879\178027636" -childID 5 -isForBrowser -prefsHandle 5248 -prefMapHandle 5252 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0761952-a634-4c7b-9989-5bbe97663daa} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 5240 257e64aea58 tab3⤵PID:2156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.7.58722991\104349569" -childID 6 -isForBrowser -prefsHandle 5440 -prefMapHandle 5444 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {91377c15-339e-44dd-89fc-0de0f5065b13} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 5432 257e64aff58 tab3⤵PID:1224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.8.31410070\18437227" -parentBuildID 20221007134813 -prefsHandle 5140 -prefMapHandle 2840 -prefsLen 26921 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {69c811ad-4a0a-4f27-9c5a-d1780b91f684} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 1700 257cc265658 rdd3⤵PID:1328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.9.852127177\808048355" -childID 7 -isForBrowser -prefsHandle 4916 -prefMapHandle 2932 -prefsLen 26921 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1bc8083e-7e34-4d56-bbc8-9a28c66fb4be} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 2864 257e65a3f58 tab3⤵PID:116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.10.31157546\749522791" -childID 8 -isForBrowser -prefsHandle 5356 -prefMapHandle 5372 -prefsLen 27096 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d24c73de-cb5d-4049-b765-458579a425dc} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 5348 257e761a558 tab3⤵PID:2996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.11.1078187207\1044921925" -childID 9 -isForBrowser -prefsHandle 5624 -prefMapHandle 6392 -prefsLen 27096 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f746c902-9247-42a3-9a2c-3ffce560a4c7} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 6384 257e6efa458 tab3⤵PID:3764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.12.571768578\1195160043" -childID 10 -isForBrowser -prefsHandle 6584 -prefMapHandle 6568 -prefsLen 27096 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fbb05d90-0da3-4056-9b42-c026f7e6ec24} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 6592 257e8431b58 tab3⤵PID:368
-
-
C:\Users\Admin\Downloads\nikario.exe"C:\Users\Admin\Downloads\nikario.exe"3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Users\Admin\Downloads\nikario.exe"C:\Users\Admin\Downloads\nikario.exe"3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.13.45967577\1003144284" -parentBuildID 20221007134813 -sandboxingKind 1 -prefsHandle 6240 -prefMapHandle 6224 -prefsLen 30696 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02af3dfb-6842-4301-8a8b-ea8991a6bf47} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 5376 257e6ef9858 utility3⤵PID:4808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.15.339726959\2127863985" -childID 12 -isForBrowser -prefsHandle 6032 -prefMapHandle 6052 -prefsLen 30696 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab0f842d-bdee-4f4d-9f36-cc3e8645e2ed} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 5900 257e7640e58 tab3⤵PID:1360
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.14.1393390416\1139431599" -childID 11 -isForBrowser -prefsHandle 1780 -prefMapHandle 3848 -prefsLen 30696 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e58e7934-d2f9-49f1-aee3-a07b27ca143e} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 1456 257e761d558 tab3⤵PID:1632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.16.1778336373\616228393" -childID 13 -isForBrowser -prefsHandle 6600 -prefMapHandle 6616 -prefsLen 30696 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5efeee4-7f7b-4474-852c-02a6b69e82b1} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 6700 257e3f86358 tab3⤵PID:3816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.17.1593411617\1115516375" -childID 14 -isForBrowser -prefsHandle 6604 -prefMapHandle 6804 -prefsLen 30696 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72aa1474-ac1e-472c-a368-b2291c14916a} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 7560 257e8431b58 tab3⤵PID:1892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.18.286391837\124505161" -childID 15 -isForBrowser -prefsHandle 4728 -prefMapHandle 7296 -prefsLen 30696 -prefMapSize 232675 -jsInitHandle 1448 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3581efc3-bba6-4439-9be0-861b7f02d64f} 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 3152 257e761ae58 tab3⤵PID:1312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55f10caf9a498ac924666a121c4b9c7d5
SHA1f1e58e157b3fdffab2addc930918dd78c0020535
SHA25671ad6cc77afd5f7b1e21f9d5946363ebe61662b4dab23d232c5d5d0c0324eeec
SHA5127cdcef79f9df361ba030c7b48cfb8c14e10468b0ef07bb03549c1a528e9a61d80f0b4035360e0c376ecd8bc217918d089e133e3c6908f1f0110b8feca9067411
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\activity-stream.discovery_stream.json.tmp
Filesize143KB
MD51481941820afc5bb92769dfb6eba7f80
SHA171158b4808c6d8a793cf9a543123e5a29eb78715
SHA2565e6a13d665be75e663c4567be6d5d559ecf501683c1ed89610bc6e473eabbd44
SHA512b9361270253fa5ce5d8e764147834b455cf053af9314bb5141996c0e79bc28652a399fb7600ca2097af635c6b00719c9d94079fc2ee39564b5bf032dbbcfc255
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\cache2\entries\57A21233465DD9AAC0FC714659FF75F2F2B0CBB3
Filesize23KB
MD57ecfe3d9d01bfc5b63b0c1af297a7617
SHA1c12c6d1c2de8212777693f1b7b6a218a3c82fcbb
SHA2567ebd752151c1acc13b029cd4cc5cc06c4bccf006370867e0024310c372cca40c
SHA5126e898731212bd14ad020ca27cebff782661a62771835111183f52eb2d206dcb3b2457fc111071492c4dfa0af339da9321fb188c6af44dfe002cfa6b643cab81d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\cache2\entries\ED9826654AE8BD972BDE17A9E0A449D3F881E430
Filesize14KB
MD51c66584e2f1a2784593690b63a7c40bf
SHA19e062cee6b859143a63e15073c725be74e84ae30
SHA2563feb24a190fa28880a826dc4276759905780da2227be7f018bbbad128c4b9045
SHA5129e4b55b9b2448eb08e8252a947e211b80f04bda534b01d86afa13a0d1eff5c0f0f896211b29b03e04c78f56e6b50ea8a5a2b81a3a2002a86f573431df5f081f2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_arts_and_entertainment.json
Filesize67KB
MD56c651609d367b10d1b25ef4c5f2b3318
SHA10abcc756ea415abda969cd1e854e7e8ebeb6f2d4
SHA256960065cc44a09bef89206d28048d3c23719d2f5e9b38cfc718ca864c9e0e91e9
SHA5123e084452eefe14e58faa9ef0d9fda2d21af2c2ab1071ae23cde60527df8df43f701668ca0aa9d86f56630b0ab0ca8367803c968347880d674ad8217fba5d8915
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_autos_and_vehicles.json
Filesize44KB
MD539b73a66581c5a481a64f4dedf5b4f5c
SHA190e4a0883bb3f050dba2fee218450390d46f35e2
SHA256022f9495f8867fea275ece900cfa7664c68c25073db4748343452dbc0b9eda17
SHA512cfb697958e020282455ab7fabc6c325447db84ead0100d28b417b6a0e2455c9793fa624c23cb9b92dfea25124f59dcd1d5c1f43bf1703a0ad469106b755a7cdd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_beauty_and_fitness.json
Filesize33KB
MD50ed0473b23b5a9e7d1116e8d4d5ca567
SHA14eb5e948ac28453c4b90607e223f9e7d901301c4
SHA256eed46e8fe6ff20f89884b4fc68a81e8d521231440301a01bb89beec8ebad296b
SHA512464508d7992edfa0dfb61b04cfc5909b7daacf094fc81745de4d03214b207224133e48750a710979445ee1a65bb791bf240a2b935aacaf3987e5c67ff2d8ba9c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_blogging_resources_and_services.json
Filesize33KB
MD5c82700fcfcd9b5117176362d25f3e6f6
SHA1a7ad40b40c7e8e5e11878f4702952a4014c5d22a
SHA256c9f2a779dba0bc886cc1255816bd776bdc2e8a6a8e0f9380495a92bb66862780
SHA512d38e65ab55cee8fef538ad96448cd0c6b001563714fc7b37c69a424d0661ec6b7d04892cf4b76b13ddbc7d300c115e87e0134d47c3f38ef51617e5367647b217
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_books_and_literature.json
Filesize67KB
MD5df96946198f092c029fd6880e5e6c6ec
SHA19aee90b66b8f9656063f9476ff7b87d2d267dcda
SHA256df23a5b6f583ec3b4dce2aca8ff53cbdfadfd58c4b7aeb2e397eade5ff75c996
SHA51243a9fc190f4faadef37e01fa8ad320940553b287ed44a95321997a48312142f110b29c79eed7930477bfb29777a5a9913b42bf22ce6bb3e679dda5af54a125ea
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_business_and_industrial.json
Filesize45KB
MD5a92a0fffc831e6c20431b070a7d16d5a
SHA1da5bbe65f10e5385cbe09db3630ae636413b4e39
SHA2568410809ebac544389cf27a10e2cbd687b7a68753aa50a42f235ac3fc7b60ce2c
SHA51231a8602e1972900268651cd074950d16ad989b1f15ff3ebbd8e21e0311a619eef4d7d15cdb029ea8b22cf3b8759fa95b3067b4faaadcb90456944dbc3c9806a9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_computers_and_electronics.json
Filesize45KB
MD56ccd943214682ac8c4ec08b7ec6dbcbd
SHA118417647f7c76581d79b537a70bf64f614f60fa2
SHA256ab20b97406b0d9bf4f695e5ec7db4ebad5efb682311e74ca757d45b87ffc106b
SHA512e57573d6f494df8aa7e8e6a20427a18f6868e19dc853b441b8506998158b23c7a4393b682c83b3513aae5075a21148dd8ca854a11dabcea6a0a0db8f2e6828b8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_finance.json
Filesize33KB
MD5e95c2d2fc654b87e77b0a8a37aaa7fcf
SHA1b4b00c9554839cab6a50a7ed8cd43d21fdaf35dc
SHA256384bf5fcc6928200c7ebb1f03f99bf74f6063e78d3cd044374448f879799318e
SHA5129696998a8d0e3a85982016ff0a22bb8ae1790410f1f6198bb379c0a192579f24c75c25c7648b76b00d25a32ac204178acaccd744ee78846dfc62ebf70bf7b93a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_food_and_drink.json
Filesize67KB
MD570ba02dedd216430894d29940fc627c2
SHA1f0c9aa816c6b0e171525a984fd844d3a8cabd505
SHA256905357002f2eced8bba1be2285a9b83198f60d2f9bb1144b5c119994f2ec6e34
SHA5123ae60d0bf3c45d28e340d97106790787be2cc80ba579d313b5414084664b86e89879391c99e94b6e33bdc5508ea42a9fd34f48ca9b1e7adfa7b6dd22c783c263
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_games.json
Filesize44KB
MD54182a69a05463f9c388527a7db4201de
SHA15a0044aed787086c0b79ff0f51368d78c36f76bc
SHA25635e67835a5cf82144765dfb1095ebc84ac27d08812507ad0a2d562bf68e13e85
SHA51240023c9f89e0357fae26c33a023609de96b2a0b439318ef944d3d5b335b0877509f90505d119154eaa81e1097ecfb5aa44dd8bb595497cdecfc3ee711a1fe1d5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_health.json
Filesize33KB
MD511711337d2acc6c6a10e2fb79ac90187
SHA15583047c473c8045324519a4a432d06643de055d
SHA256150f21c4f60856ab5e22891939d68d062542537b42a7ce1f8a8cec9300e7c565
SHA512c2301ed72f623b22f05333c5ecc5ebf55d8a2d9593167cc453a66d8f42c05ff7c11e2709b6298912038a8ea6175f050bbc6d1fc4381f385f7ad7a952ad1e856b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_hobbies_and_leisure.json
Filesize67KB
MD5bb45971231bd3501aba1cd07715e4c95
SHA1ea5bfd43d60a3d30cda1a31a3a5eb8ea0afa142a
SHA25647db7797297a2a81d28c551117e27144b58627dbac1b1d52672b630d220f025d
SHA51274767b1badbd32cacd3f996b8172df9c43656b11fea99f5a51fff38c6c6e2120fae8bdd0dd885234a3f173334054f580164fdf8860c27cbcf5fb29c5bcdc060d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_home_and_garden.json
Filesize33KB
MD5250acc54f92176775d6bdd8412432d9f
SHA1a6ad9ad7519e5c299d4b4ba458742b1b4d64cb65
SHA25619edd15ebce419b83469d2ab783c0c1377d72a186d1ff08857a82bca842eea54
SHA512a52c81062f02c15701f13595f4476f0a07735034fcf177b1a65b001394a816020ee791fed5afae81d51de27630b34a85efa717fe80da733556fdda8739030f49
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_internet_and_telecom.json
Filesize67KB
MD536689de6804ca5af92224681ee9ea137
SHA1729d590068e9c891939fc17921930630cd4938dd
SHA256e646d43505c9c4e53dbaa474ef85d650a3f309ccf153d106f328d9b6aeb66d52
SHA5121c4f4aa02a65a9bbdf83dc5321c24cbe49f57108881616b993e274f5705f0466be2dd3389055a725b79f3317c98bdf9f8d47f86d62ebd151e4c57cc4dca2487c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_jobs_and_education.json
Filesize33KB
MD52d69892acde24ad6383082243efa3d37
SHA1d8edc1c15739e34232012bb255872991edb72bc7
SHA25629080288b2130a67414ecb296a53ddd9f0a4771035e3c1b2112e0ce656a7481a
SHA512da391152e1fbce1f03607b486c5dea9a298a438e58e440ebb7b871bd5c62d7339b540eed115b4001b9840de1ba3898c6504872ff9094ba4d6a47455051c3f1c5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_law_and_government.json
Filesize68KB
MD580c49b0f2d195f702e5707ba632ae188
SHA1e65161da245318d1f6fdc001e8b97b4fd0bc50e7
SHA256257ee9a218a1b7f9c1a6c890f38920eb7e731808e3d9b9fc956f8346c29a3e63
SHA512972e95de7fe330c61cd22111bd3785999d60e7c02140809122d696a1f1f76f2cd0d63d6d92f657cdec24366d66b681e24f2735a8aabb8bcecec43c74e23fb4f5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_online_communities.json
Filesize67KB
MD537a74ab20e8447abd6ca918b6b39bb04
SHA1b50986e6bb542f5eca8b805328be51eaa77e6c39
SHA25611b6084552e2979b5bc0fd6ffdc61e445d49692c0ae8dffedc07792f8062d13f
SHA51249c6b96655ba0b5d08425af6815f06237089ec06926f49de1f03bc11db9e579bd125f2b6f3eaf434a2ccf10b262c42af9c35ab27683e8e9f984d5b36ec8f59fd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_people_and_society.json
Filesize45KB
MD5b1bd26cf5575ebb7ca511a05ea13fbd2
SHA1e83d7f64b2884ea73357b4a15d25902517e51da8
SHA2564990a5d17bea15617624c48a0c7c23d16e95f15e2ec9dd1d82ee949567bbaec0
SHA512edcede39c17b494474859bc1a9bbf18c9f6abd3f46f832086db3bb1337b01d862452d639f89f9470ca302a6fcb84a1686853ebb4b08003cb248615f0834a1e02
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_pets_and_animals.json
Filesize44KB
MD55b26aca80818dd92509f6a9013c4c662
SHA131e322209ba7cc1abd55bbb72a3c15bc2e4a895f
SHA256dd537bfb1497eb9457c0c8ecbd2846f325e13ddef3988fd293a29e68ab0b2671
SHA51229038f9f3b9b12259fb42daa93cdefabb9fb32a10f0d20f384a72fe97214eff1864b7fa2674c37224b71309d7d9cea4e36abd24a45a0e65f0c61dc5ca161ec7c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_real_estate.json
Filesize67KB
MD59899942e9cd28bcb9bf5074800eae2d0
SHA115e5071e5ed58001011652befc224aed06ee068f
SHA256efcf6b2d09e89b8c449ffbcdb5354beaa7178673862ebcdd6593561f2aa7d99a
SHA5129f7a5fbe6d46c694e8bc9b50e7843e9747ea3229cf4b00b8e95f1a5467bd095d166cbd523b3d9315c62e9603d990b8e56a018ba4a11d30ad607f5281cc42b4cd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_reference.json
Filesize56KB
MD5567eaa19be0963b28b000826e8dd6c77
SHA17e4524c36113bbbafee34e38367b919964649583
SHA2563619daa64036d1f0197cdadf7660e390d4b6e8c1b328ed3b59f828a205a6ea49
SHA5126766919b06ca209eaed86f99bee20c6dad9cc36520fc84e1c251a668bcfe0afcf720ea6c658268dc3bbaaf602bfdf61eb237c68e08d5252ea6e5d1d2a373b9fe
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_science.json
Filesize56KB
MD57a8fd079bb1aeb4710a285ec909c62b9
SHA18429335e5866c7c21d752a11f57f76399e5634b6
SHA2569606ce3988b2d2a4921b58ac454f54e53a9ea8f358326522a8b1dcc751b50b32
SHA5128fc1546e509b5386c9e1088e0e3a1b81f288ef67f1989f3e83888057e23769907a2b184d624a4e4c44fcd5b88d719bd4cca94dfb33798804a721b8be022ec0c6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_shopping.json
Filesize67KB
MD597d4a0fd003e123df601b5fd205e97f8
SHA1a802a515d04442b6bde60614e3d515d2983d4c00
SHA256bfd7e68ddca6696c798412402965a0384df0c8c209931bbadabf88ccb45e3bb6
SHA512111e8a96bc8e07be2d1480a820fc30797d861a48d80622425af00b009512aacb30a2df9052c53bfbf4ee0800b6e6f5b56daa93d33f30fecb52e2f3850dfa9130
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_sports.json
Filesize56KB
MD5ce4e75385300f9c03fdd52420e0f822f
SHA185c34648c253e4c88161d09dd1e25439b763628c
SHA25644da98b03350e91e852fe59f0fc05d752fc867a5049ab0363da8bb7b7078ad14
SHA512d119dc4706bbf3b6369fe72553cfacf1c9b2688e0188a7524b56d3e2ac85582a18bbee66d5594e0fb40767432646c23bf3e282090bd9b4c29f989a374aeae61f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\nb_model_build_attachment_travel.json
Filesize67KB
MD548139e5ba1c595568f59fe880d6e4e83
SHA15e9ea36b9bb109b1ecfc41356cd5c8c9398d4a78
SHA2564336ac211a822b0a5c3ce5de0d4730665acc351ee1965ea8da1c72477e216dfa
SHA51257e826f0e1d9b12d11b05d47e2f5ae4f5787537862f26e039918cb14faff4bc854298c0b7de3023e371756a331c0f3ee1aa7cebbbf94ec70cdfc29e00a900ed1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vjiou3c0.default-release\personality-provider\recipe_attachment.json
Filesize1KB
MD5be3d0f91b7957bbbf8a20859fd32d417
SHA1fbc0380fe1928d6d0c8ab8b0a793a2bba0722d10
SHA256fc07d42847eeaf69dcbf1b9a16eb48b141c11feb67aa40724be2aee83cb621b7
SHA5128da24afcf587fbd4f945201702168e7cfc12434440200d00f09ddcd1d1d358a5e01065ac2a411fdf96a530e94db3697e3530578b392873cf874476b5e65d774a
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize12KB
MD5733d182a8a732d130b0828dc903adc7f
SHA177ea43d42425cdb4429f3ea857031dcf586922e2
SHA25614a1def86604a7f7beb57ebbf925fdd4a8d85ffc7e69026d7f1de83b88c181ea
SHA51201a26f88cfaf6cd3e0e21430e82ad531f0f478fe67e5f020b30fb0931e376bf76bf8831f048a5c5a248189a17065329bfedac7db76b31018ff825c435b2757ca
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize13KB
MD5521dbcafde10228e9c0e20e3495c0846
SHA1fa910c18ab0a293303874e993e350d1c6478e4fa
SHA256b43a7f587a0e8c0bd3109068805a7fe54722f4533c9d664f73b6fcd94db60a72
SHA512fad6e08d443201d5eeecbd8afa0b7af09c8de85d27b972efae98a0fbaf38df571707e147150eb6c5d866162221d3d73750fdbf1b4c722a5a9112cf2f90c5e32a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\bookmarkbackups\bookmarks-2023-07-22_11_5lvUX4VxtZi9DpjFVZtFkw==.jsonlz4
Filesize943B
MD5e8b3e1f3bb85aeb75ae5fcb3e798158b
SHA13f357ac30496aca6ed2644caae8a022b774549c1
SHA25622b5d59d809830530b77326409cd68abc78602cba31b0f5f263e947cb5b3d441
SHA51234afdc8ba538494190a4d6ea8e42566babe5e4d88b4a4f8a1cfb4a8608329bb256aa3284d5b36998597935798cdf609abb3f98c144ca291b27a2bb220509b51c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\broadcast-listeners.json
Filesize216B
MD5afede308edcc0eec476b1f2adc2d1ff6
SHA1b844155365c0f6595d79b5b9acd9defd6ec46407
SHA256b0268f965fb4d531abdf774e1bf2fffd5e9a01fe165a7dc6593acce9d86ff8bd
SHA5125210f9241e4f8149aa2a89c4ac6ab8cbe4d018395091755e71ed12e50d55e8c25d4f159ac171289dafa10f060e52e589b771ea168cde78a105974a0edbb4166b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
8KB
MD5a34abb5524559c94e79804947f7705bc
SHA17a5a24c51e6904da916f193e132f68196368e40e
SHA256a16206a92a4d3f291ea7ff22613816123cf8528fa2b4f63fdc1f004354cdec53
SHA5122d48bc30cafc8ab099b2d43d9d9282abd4b1c4aee61438d05bc8288c722a2bc983429c46b1abd16169b5edd0c95c7debf58ff6347967debc40617ad9d126cb94
-
Filesize
10KB
MD5b09235b38467c79b30c10019dcbaef75
SHA16d79a1276487685c3d8186a2559c4217b39c5822
SHA256debb7184ec95e0dd6d1bef0cc02b3a3ef13a1c0511385eff2473f4148469f9f5
SHA512773a750750cfe7fb42e37031a1c29927074ea3203bc3b293dfe75f05c6726c91a0d2f8da6dfbc5d47770ef079f0cfc6c500f54cc136cc4795a236143eda852dd
-
Filesize
6KB
MD5026b54ad29d9a695a5dd786b30bb491d
SHA1ac1596738c3d15ddad5d4fd6625d554b2f055d9d
SHA25694b81cc30ef43677288d4beefc3af4efee6d7bf3e96cf0cbe1d1c8dc486cfa0c
SHA512b43b652856930c2f150b42833ce6d9fa34b31602ab2bec4c7893a999d1eed12539affb6e169d7dbeb63e20e5e7f71fc631d536c9fe8d539cf88fe1e7725a3e08
-
Filesize
6KB
MD528e28fd2a6b47cd6973e820d0d080d51
SHA1f8eef54c0f2eb687b363637578defa54b1db13b4
SHA256f36b5873e70ad396a8fa7d34b0d40ab57dad0cb9fc2c08d77286cb1dc07eda5f
SHA5122217c55a1dd1f4ace50b2b1d2ae8a0b8b56dfa1b29a53999304efa100c20af567e1cfe0789ba4a984bb83c8d84d8edfb670bcffdbadbcabc62edf55425f14d10
-
Filesize
6KB
MD5d95ea1e5e99ac506bef8fe0a1c52948d
SHA13cd316915ee34039174930f44b922b97069073f2
SHA25624b22fe756f81fd8eefc65cd840e2d620af42b7d6ee796cf0d3e602a704d9154
SHA512c4664557b394196c6b32522d729f096044379d5c24f963acd100489dc1d1ca3306c29cfc361aca7b3c41e3f1f4fedcaf611e2cd5ce035cfee6609db3e277b3cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD550ef7ed1745d622b38f68a3b0baac841
SHA1c4af984252a23de2b439c44a0e9c55cf06900552
SHA25630855ddd35b4fd39eac7d6b105b97e22cb90693ae5aa705efb0adb4879d296d2
SHA512b9b91e7605b8e1d83ca1891ec10d171b330d2ef1ab24e7c480a0860c601433a6cbe25447171a370b73f6ebfc215572ba894a0bc95741006254e6e8c608b9ba63
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5a8320d95addef0bb2a23b25d213a29d2
SHA1b2184eda6610fa91be9411941b7be5f5ea3330d1
SHA2561a232c934b82dd0e68edbc06eb1d489a2b8abfb0c45b6bd149fcb5bcbaaf0bf3
SHA5124362c0e83041011310b6831571562558a5b9ae91b58edea4c8bdd47f01e941c9e5ba7d8634f7ebab7afc8893a6dbc7c1a52799c2f17105f2b943f0b0dcf9a5ca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD515a2b14e3ef4a1919a18c33e31997927
SHA16c9fe008a474f57a55e988469f19ade6c0583b83
SHA256de373a6afda409fcd646251c2410e48afc88dca96fdabeecd85bf2cb5345fc89
SHA5121063c846ebc2cc4c96155044e8ec42354dab88867844d794a334b4d0024fc04796ada15370891566ad60d47866ed9df5893cb1fc50dcca62f37529b033408492
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD50aa3a319d18fbf94b59a6510a93aa872
SHA19930685d3944349b298d0e39cc325956d5551806
SHA25636ca66df8ce322516a112a986967daca55a45a6c14e91477cab7fe4263c3c7d9
SHA512aa8b4f07165c4dbc1bbd6020d8397684015bd7ee745c4609048d0efdaff448546fe2d8e836592796bc2d63b52ca74ee6c8171f22d095e522b41e6abbc4739c3f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\storage\default\https+++anonfiles.com\cache\morgue\234\{4cc039e4-efee-47e5-98e6-d3ce58160cea}.final
Filesize22KB
MD57509101d3b592c9336f130526a5dcc65
SHA1b01f59b0e4326318c0c6d7b5c19e57093e11a31f
SHA2567279a0d506c71496d08227fdaeef4d2503186298977186367cf631fa8e8eaa65
SHA512533f642b3a2e18bdd3f48d70cc134acb2b8d9881d24fc1f6dfd0cb9a68a3889ac232f36238be365a1144c27033a4f5a610dda4b15bef44a627cdb019bfe59e5a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\storage\default\https+++anonfiles.com^userContextId=5\idb\2728594770keeryovtasl-.sqlite
Filesize48KB
MD5d6af715172ab8637158dd78ecd8f08f6
SHA1b9d9b7454324f95c63be28ef9b77ed51928a69f1
SHA2565bfc88bef1e5d02c5ca3379210551ae310c03c87095ebe545f2fc69fc6931da4
SHA512751fee0a620c21dafc2373d4c5aec6c265016ab39bbe01c313843332f85df6459266e5cbe042b6d188f7a35bb42dd74915c012583a1283d49235e9fb11304ee7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize384KB
MD588cc2f0bc4cf813cf272279fbd2098f0
SHA17f7ed55b9ec20e5aaa2948d3e2056ffe16eeb4eb
SHA25658c7f560e2f2d2b1b285f14e4858b8d8504627c52996969ee79bbdcbe7021ba3
SHA512b21d509aa15892a06188d239f063c3b2d80f970e4a57d25a4e4865467697e67b2cae7b59f33143677a6def8a66e3078ed90f68afbdad636603a1136d682a15c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vjiou3c0.default-release\targeting.snapshot.json
Filesize4KB
MD50cf00e687b725955c06308f63ba8cc25
SHA134c9982cfd60a6097fad84c72c8b62ceff2e0349
SHA256af9cdcd89baff447323d4546fa3ac943e7fc065dd07898c6b49cb5a8a5d48638
SHA512892fe3cea15351d0350e3e5877f64d913e4ef088c80c9ddec84c45ec129f2b36ffd4f4af117bbc60c190ebf92dc5c338c19c281fc00671d2dffd40542d8a277e
-
Filesize
141B
MD51995825c748914809df775643764920f
SHA155c55d77bb712d2d831996344f0a1b3e0b7ff98a
SHA25687835b1bd7d0934f997ef51c977349809551d47e32c3c9224899359ae0fce776
SHA512c311970610d836550a07feb47bd0774fd728130d0660cbada2d2d68f2fcfbe84e85404d7f5b8ab0f71a6c947561dcffa95df2782a712f4dcb7230ea8ba01c34c
-
Filesize
41KB
MD58e8049d9717c76375b250797c3b72693
SHA1776f7c1801af7acc38b251193334514a2a21dac1
SHA2560422d3cdf21719ea15d48ad333312351130fc9adaab9c92c10e638398232240f
SHA512e53bb520c704631b6a5d473ad9403e4d318a4c8ad5371d789559aeedcfed4d382be326c956d7d3b7424cecc2a74b8b45cb1248324e546275cc1de8b639d1a44c
-
Filesize
41KB
MD58e8049d9717c76375b250797c3b72693
SHA1776f7c1801af7acc38b251193334514a2a21dac1
SHA2560422d3cdf21719ea15d48ad333312351130fc9adaab9c92c10e638398232240f
SHA512e53bb520c704631b6a5d473ad9403e4d318a4c8ad5371d789559aeedcfed4d382be326c956d7d3b7424cecc2a74b8b45cb1248324e546275cc1de8b639d1a44c
-
Filesize
41KB
MD58e8049d9717c76375b250797c3b72693
SHA1776f7c1801af7acc38b251193334514a2a21dac1
SHA2560422d3cdf21719ea15d48ad333312351130fc9adaab9c92c10e638398232240f
SHA512e53bb520c704631b6a5d473ad9403e4d318a4c8ad5371d789559aeedcfed4d382be326c956d7d3b7424cecc2a74b8b45cb1248324e546275cc1de8b639d1a44c
-
Filesize
41KB
MD58e8049d9717c76375b250797c3b72693
SHA1776f7c1801af7acc38b251193334514a2a21dac1
SHA2560422d3cdf21719ea15d48ad333312351130fc9adaab9c92c10e638398232240f
SHA512e53bb520c704631b6a5d473ad9403e4d318a4c8ad5371d789559aeedcfed4d382be326c956d7d3b7424cecc2a74b8b45cb1248324e546275cc1de8b639d1a44c