Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
33a84ea233fe9fe1b4c85e533a228bbd.exe
Resource
win7-20240704-en
General
-
Target
33a84ea233fe9fe1b4c85e533a228bbd.exe
-
Size
1.8MB
-
MD5
33a84ea233fe9fe1b4c85e533a228bbd
-
SHA1
413d73dd32bcce870cf5edd4b777051762882034
-
SHA256
a777bbce91625e3261edebb334be8610372daaf0790763fc2fd085db35b8463d
-
SHA512
0f28610c0396bac87e8eb7c8bceb0cd468cebe4df9bca2a9e8ba2f3f37708317d6e621fdd9a9cdb6046b43eb578237124215f15bc614b016457cb37117e8395a
-
SSDEEP
49152:70jEH8GosswSBQTiNQza4GYnSZrV2azV/r4wCY9W:704cwfSlQeAnSZpTIY9
Malware Config
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Extracted
stealc
sila
http://85.28.47.31
-
url_path
/5499d72b3a3e55be.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 33a84ea233fe9fe1b4c85e533a228bbd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 33a84ea233fe9fe1b4c85e533a228bbd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 33a84ea233fe9fe1b4c85e533a228bbd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 33a84ea233fe9fe1b4c85e533a228bbd.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation explorti.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation dfba16900f.exe -
Executes dropped EXE 5 IoCs
pid Process 3612 explorti.exe 3536 a4950553d1.exe 1976 dfba16900f.exe 7060 explorti.exe 6424 explorti.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Software\Wine 33a84ea233fe9fe1b4c85e533a228bbd.exe Key opened \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Software\Wine explorti.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a4950553d1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000002001\\a4950553d1.exe" explorti.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dfba16900f.exe = "C:\\Users\\Admin\\1000003002\\dfba16900f.exe" explorti.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 264 33a84ea233fe9fe1b4c85e533a228bbd.exe 3612 explorti.exe 7060 explorti.exe 6424 explorti.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job 33a84ea233fe9fe1b4c85e533a228bbd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4388 3536 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33a84ea233fe9fe1b4c85e533a228bbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4950553d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfba16900f.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 264 33a84ea233fe9fe1b4c85e533a228bbd.exe 264 33a84ea233fe9fe1b4c85e533a228bbd.exe 3612 explorti.exe 3612 explorti.exe 872 msedge.exe 872 msedge.exe 4608 msedge.exe 4608 msedge.exe 4736 chrome.exe 4736 chrome.exe 7060 explorti.exe 7060 explorti.exe 6424 explorti.exe 6424 explorti.exe 2092 chrome.exe 2092 chrome.exe 5388 msedge.exe 5388 msedge.exe 5388 msedge.exe 5388 msedge.exe 2092 chrome.exe 2092 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4736 chrome.exe 4736 chrome.exe 4608 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3008 firefox.exe Token: SeDebugPrivilege 3008 firefox.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 264 33a84ea233fe9fe1b4c85e533a228bbd.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 3008 firefox.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3008 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 264 wrote to memory of 3612 264 33a84ea233fe9fe1b4c85e533a228bbd.exe 87 PID 264 wrote to memory of 3612 264 33a84ea233fe9fe1b4c85e533a228bbd.exe 87 PID 264 wrote to memory of 3612 264 33a84ea233fe9fe1b4c85e533a228bbd.exe 87 PID 3612 wrote to memory of 3536 3612 explorti.exe 88 PID 3612 wrote to memory of 3536 3612 explorti.exe 88 PID 3612 wrote to memory of 3536 3612 explorti.exe 88 PID 3612 wrote to memory of 1976 3612 explorti.exe 97 PID 3612 wrote to memory of 1976 3612 explorti.exe 97 PID 3612 wrote to memory of 1976 3612 explorti.exe 97 PID 1976 wrote to memory of 2516 1976 dfba16900f.exe 98 PID 1976 wrote to memory of 2516 1976 dfba16900f.exe 98 PID 2516 wrote to memory of 4736 2516 cmd.exe 101 PID 2516 wrote to memory of 4736 2516 cmd.exe 101 PID 2516 wrote to memory of 4608 2516 cmd.exe 102 PID 2516 wrote to memory of 4608 2516 cmd.exe 102 PID 2516 wrote to memory of 3596 2516 cmd.exe 103 PID 2516 wrote to memory of 3596 2516 cmd.exe 103 PID 3596 wrote to memory of 3008 3596 firefox.exe 105 PID 3596 wrote to memory of 3008 3596 firefox.exe 105 PID 3596 wrote to memory of 3008 3596 firefox.exe 105 PID 3596 wrote to memory of 3008 3596 firefox.exe 105 PID 3596 wrote to memory of 3008 3596 firefox.exe 105 PID 3596 wrote to memory of 3008 3596 firefox.exe 105 PID 3596 wrote to memory of 3008 3596 firefox.exe 105 PID 3596 wrote to memory of 3008 3596 firefox.exe 105 PID 3596 wrote to memory of 3008 3596 firefox.exe 105 PID 3596 wrote to memory of 3008 3596 firefox.exe 105 PID 3596 wrote to memory of 3008 3596 firefox.exe 105 PID 4608 wrote to memory of 1240 4608 msedge.exe 106 PID 4608 wrote to memory of 1240 4608 msedge.exe 106 PID 4736 wrote to memory of 4204 4736 chrome.exe 104 PID 4736 wrote to memory of 4204 4736 chrome.exe 104 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 PID 3008 wrote to memory of 892 3008 firefox.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\33a84ea233fe9fe1b4c85e533a228bbd.exe"C:\Users\Admin\AppData\Local\Temp\33a84ea233fe9fe1b4c85e533a228bbd.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\1000002001\a4950553d1.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\a4950553d1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 13004⤵
- Program crash
PID:4388
-
-
-
C:\Users\Admin\1000003002\dfba16900f.exe"C:\Users\Admin\1000003002\dfba16900f.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9FF9.tmp\9FFA.tmp\9FFB.bat C:\Users\Admin\1000003002\dfba16900f.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffb9975cc40,0x7ffb9975cc4c,0x7ffb9975cc586⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,10145844756071185844,11367348418294111133,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1732 /prefetch:26⤵PID:896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,10145844756071185844,11367348418294111133,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2192 /prefetch:36⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,10145844756071185844,11367348418294111133,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2612 /prefetch:86⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,10145844756071185844,11367348418294111133,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3192 /prefetch:16⤵PID:6612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,10145844756071185844,11367348418294111133,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3448 /prefetch:16⤵PID:6672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=228,i,10145844756071185844,11367348418294111133,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4612 /prefetch:86⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffb995146f8,0x7ffb99514708,0x7ffb995147186⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:26⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:86⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:16⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:16⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:16⤵PID:6956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15452507420598896592,15732248985414759762,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2964 /prefetch:26⤵
- Suspicious behavior: EnumeratesProcesses
PID:5388
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"5⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1952 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 25755 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e0af0f5-aabe-4e30-b351-5b2658d1914d} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" gpu7⤵PID:892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 26675 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0fbfc69-17d3-4244-81be-9831f7e39dd2} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" socket7⤵PID:932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3260 -childID 1 -isForBrowser -prefsHandle 2724 -prefMapHandle 3284 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1164 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ac3fabf-ffbb-4f8a-a663-7be247602b4e} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab7⤵PID:2916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3680 -childID 2 -isForBrowser -prefsHandle 3700 -prefMapHandle 3696 -prefsLen 31165 -prefMapSize 244658 -jsInitHandle 1164 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4fa1bcc9-44f3-4889-a374-81740e62c38e} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab7⤵PID:5632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2988 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4436 -prefMapHandle 4432 -prefsLen 31165 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {768a5949-c12f-4a97-b87f-dde4466bdea3} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" utility7⤵
- Checks processor information in registry
PID:6276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5492 -childID 3 -isForBrowser -prefsHandle 5556 -prefMapHandle 5160 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1164 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5971dbd5-e214-402b-8dfe-73f591838193} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab7⤵PID:6132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5688 -childID 4 -isForBrowser -prefsHandle 5644 -prefMapHandle 5372 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1164 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {176759cc-a207-4008-b62f-8df23c550f6f} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab7⤵PID:5160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5896 -childID 5 -isForBrowser -prefsHandle 5908 -prefMapHandle 5912 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1164 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {20742d25-5ee0-496e-a0c4-f7e3c0f7df90} 3008 "\\.\pipe\gecko-crash-server-pipe.3008" tab7⤵PID:4860
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3536 -ip 35361⤵PID:4868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6720
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:6744
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7060
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6424
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD59fde5445045e43d9507d20a2bba50696
SHA1b996c962d8cf7e073f4bf5bc738e21e3273db649
SHA256aabe8925ffd443357b00bb1eaad58d028090b95ab492fb942c39c12d9bb78abd
SHA512691c143c2bf39a6db457f20ad4c1b1dcc1c5b34b1df85afabd45c6511991171ac2fbb35cdd69f0b02bd9641062af339c442a019d205e12ab8ea8e7bd9d78b5a6
-
Filesize
264B
MD57b861ffe253ed9b69c0efda61ec53439
SHA17600be84dc85a17072b61a1bae359db4e4a42498
SHA2566f9cb4f4c5f880ed30119d02d98c67c4ada3d410b871856987e6ad33c682eea3
SHA51206ced3f56639cf2d7f3cfe6860b27a98606d2b910d04fca867c7310b3bbc36ff10447abf329bc9dc6a0fe389c50ebf29b27bed28eddb6bd6077e5febf8860c81
-
Filesize
3KB
MD5548db249ad637a42efeeefb8214bcef7
SHA13ec69f81075e220e0c0dba998789375fe46202d3
SHA256b380a77597908c98ec1055d94ffd932564e609ba046d8c8d7aab0ed0898e2a82
SHA5123bd0995246d380646ff8fdb877b934c644bc380a32d35fa9dbd5ce01be1a0d693ca507142bc24f956802955636ba30d791a3ced8e47beb6e37f742b2cb34c531
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5ed6ac14df70029a70952a5211fa87433
SHA14aeb5b31f34e98412f0a57da151781321b93c3ac
SHA2563563e673841122887966e08df86037edd2f0790c4da5821a28c60254e13488f0
SHA51211d5ed5900fa4229828a2a4d13d27a42cd530d2ae441dee129df047050a56e6e0262eee43f598f7b6fd834318a2ddc15844deb47c1c8490589aeee379d0b4be3
-
Filesize
9KB
MD5a89da920d7d8b913ae6cf8c55050179e
SHA19239c403b668e7bd448c98d67c96990966e7af64
SHA2566cbb5981a7aaa73d566818340e13b5755cf28b4c7ccaf11e0f0266c9e6ed37c4
SHA512897ff13db8054366f001383519d2ea31e7e6b65161767f0a5919bfd3a18bdf385ee7eaf2c9838f704482e5afb3fd02f0827bf8d8b14dec37861ee38003d52b49
-
Filesize
9KB
MD5252eb94af464cbdfef9e16f3ad2d09f5
SHA14b3582d9993422959bbde492654e22349263a662
SHA2569c0f4b9f7287abca88cb4bd8b5d05b9de846d72762631b498c869b93f401296f
SHA5125e4378d9a2724fbdc3a16b87368aa7088829da72b96527ef30f9d22ae5405e304209b4d8212e7d056db00c7c74318a031f709aaf2f202cef828fe612f320c3e2
-
Filesize
9KB
MD54805d4c8db7ee9104281c644dedf6a33
SHA1292a10cf543267293d0e01d9e18914e1cb71cd30
SHA256ad8f116daa8616560f2598e2d5d0fdb7b911f97da624159056923873cca8ba7f
SHA512d7b9b1adb16b05e35b90a8ec9dd74273205eee1c0166f3e807aa2fcd3ee4ca749ac8dcc7bd7ce86a7a114022f96293bd8e0ccdf634c6c44e4ee04566dca8da33
-
Filesize
9KB
MD5e743dbc78c8bf7953b250749a16270fa
SHA13cedce865626a7aa8fa67c5290502ba7a7e09493
SHA2569b049aa3b935dd4f04a3cc9c0e2118b065bc4ddde3e4f4e3cfa2d5fe03b01893
SHA51230230daf98c6ed65d4f9ef9b2757e6bb605d751d05c58a8d7a9944869388c90a3e46b03a303d664f54d599b4160b614fd4db8425706bd19ead521e00c7190d35
-
Filesize
9KB
MD5fda6c06cb942a466eb6c2918e7b1477f
SHA148c9304384a8daaa47c7ea6d75fe05146e5712fc
SHA256e0e87b5c967610d13a5d196a87e8448a2fc8c17b75e2133ceb54d38d6d5b01d5
SHA512272b225ad644ffd4b8f0f0aade1ccc23c105f9737142375c5ecd3877f13bc79b5fcea4cfd3579f05d620ba1bbf814afb3410db100b6994b1caf2bb3f9197e0b6
-
Filesize
9KB
MD534e63ccc12b5da8a4f6b166a6129f492
SHA16ccb27bee76d791ed100fbacf9d1336419f286a2
SHA256287274d50078655f6f03b92e6bb63c0185a9cef917c1cf5afe2b2c3e7234376b
SHA512dc3d4d3d612bd2532b82efe4e0f6f86217b9f15585d5cf0d4bbcd734cb1d818744f4f8cf4c891351a88a7093dfc4a6406d7b055390d2d9d99118ff6c1c36608a
-
Filesize
9KB
MD50b6bf967f91ac8a504535e37b4bcd5dc
SHA14f9cad9662fa84b727a6625c48ab6042c25c109c
SHA2564b7a97b74ce49d6acb39e1dd135cb44f9e611ac067461393d6e1fc180bd6d998
SHA512f3d202633cf2992cb6d6c39abf436b3cad26d86c187e4fef06274edc2e144c2868023abd3ede172d24479b4dd7106f4a5c3a75f30fd2a0a59d1ccf0c774e4130
-
Filesize
9KB
MD51159db280bbd854fcf4b86ddac8b183c
SHA126bc82cebae818af0921b13d8970128d3620bc09
SHA25631a27102b0473b3baf43e7c5962f619f1b10c2c472a275a1b7fd25ec8381bd6e
SHA512672e881098f1c1e73c7d1903143d62e824bf694dd097fc40ea13321558e4c9e4c3c74fa192d09027a169750fe1fa3e792cf6e2088a3d19fd94e323eff39b56e3
-
Filesize
9KB
MD59baeac1eb64c143d2e9bea5518225cf6
SHA15d343585783c7e5d4737f14b2fd239c0566c4431
SHA2563ed69c7f687a6744530a8a60a5c8b358d7cde0c9a95ff163d6786d5a275aa2c8
SHA512f13c8d30e833719fb7bd6233f6c9543f900d4b313cb4993e24271a4cbef889d5f345fdb1270c0d5ccb36c44bdad80d92e3dba98d6685b05b7a160b8e278caebf
-
Filesize
92KB
MD5ff9291943d99ab899581ba0b3de774eb
SHA17866e011364e636478c6e9b654e90fed0c7d06cd
SHA2561ad62f0304e549c8d300e7285d5db97c52b825620893ef619955066ab2cfdaa8
SHA512a52b2d2835e0ea23e8c5994af884e1ad75e941ebfa4709720cfd59439a9fb7b061b09e42d403871cb0cc7cd47b29685b667aaf8091dbf5baecf340d3a106810d
-
Filesize
92KB
MD515898657c7bb1c20e0768f4db3696cb0
SHA1b54b2e28bea2e747adcfb4711e37fff702940f3b
SHA256556543dad93b7cd0d16c504846015134316db26c91708d9b625fa67643e7be0b
SHA512a58639f8bbc5080a130320f2b9882cc290fff4c38b63e3b1ecc96156c14f85243acc5b7cbab1a7504385e54505e7af472afe936aeb646bba9f5eaa17482680d9
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
33KB
MD5daa6948a37ac312342600f2b96db15ea
SHA10bfa2e04bf51480baf1fc7e7819f65cd3b0c90ba
SHA256de7cf820e8eb0aa51d82aff3a848fd853dfa878674cc67094aee0ac115c85fee
SHA5125af3ceb0a4c56b767792ad349b83a179191d9fe6dca8e3795cb48edb87ae6a8b89e51a64ebedd68857c674befd71dc1664a2e8380ac21abacc9566329d8c2e14
-
Filesize
38KB
MD5a1cbc8600fb0e0b668df61bb5d1737f9
SHA165aaea9cf40ee7aafcf033f35980aac172b0a267
SHA256b0324009cc7d496245d763710959284dbc9eb3c4aa93227cd6fa82772ff5a2bb
SHA512c731cbc3fd2397fea0afdb98ad7e0a2624dfdd9da00da2032cbb425ff653291bd3e9290514d6aac2761923a055c0666b521a61524595c5ab1aa2b56ce18b2338
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD56f63377eef47cabdb6bcfd3e91602b33
SHA18af395b42a34aceaed18ec70caec48fcd5a13eb3
SHA25620d67afaf20abce9a2e70341eecfa48f07145a98e5f6c0e26d822870e4cd7191
SHA512e263c569dafc0f3635eb4295e69354c9e513a0309384a36632963c0f2bcc86ac7ace0d1e9d29e83d454b1ae9b9eff1343bf8c2887d87817e6e702826cfd27c51
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD572dbfca3f9bf24c306424e5cee622ba9
SHA1f80bba831ebeed2d9c08d9c7ee09d218e84d1a11
SHA256a09f8adcea2cc69456ae32a432e5af3322657186deea2baa0aad3e887437b17a
SHA512001ba80fdd15f6796b14e2f2f4fc8d8c76b130c8fb2a28f3db96c1f54dad36d9ad95d1c83885dd37e55fce84f9fe2bb95ca75de97b3e55f8360f801fbc717ebd
-
Filesize
5KB
MD5e9b7dd970ce4f64befbd2a45b75cd645
SHA13a2f4a90697c714c4dd68543a7ba5afee6d8b6b8
SHA256e45b35a030974a5566c6e41553feb567f9ca367ed7d7e9f7b3d4743ed7178f1e
SHA5122918e6f5600c391ed21a8e09fee9c7a7f42377b642ba8f21cd6af4d80ac3e666816337e43d2db3b09ffe711b935471765498a1af1322e5d33f11badf8504981e
-
Filesize
6KB
MD50efb06d467825d884a0384413d0fe82e
SHA14470409cf0d7f08bd3a2b51a8db8534d0990e9ae
SHA25643e5e773c9a784bc36cb587c36c7eadad298017e310f850cb33eb8fc4ab79464
SHA512ebcbca09c926ea4334501999a0ccb5711871a5a1919ce1f4449cf4701973c43ca286b4b88441338e9deba1d024d4238046272c73f15e889a5ffb364d0537b178
-
Filesize
10KB
MD5a2f91699e0680905b6c8476899c82eed
SHA1abaacc867422ca4e2f594e420d42d354bcb05439
SHA2561279aedf07ac7f3195a08a84db1b79bcdd7b34c9bda2a62caeb3ccfcbe604c88
SHA512521ae7d75f68d47250eb66d92fa5af26fa366cb5b41b33702919a27395a31592eecf26d56844be2b2a4caffbf3d18aa6f49c474832e1128a284ca586eb5fae67
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85t3rifc.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD552b44e2a1373625594dcccc9bdcb84de
SHA12052d14c6876986b0b97fba3d094542c93b7e8f8
SHA256d84c8be459a318816360cb56cf7730212deb9fbf51bcb4fc647d191f262d933f
SHA512b658029e67f07916c28d16cfa34a035e3a2738cca7bdc1c31f6a29b5e49a71da42fd5c18357a8ee5e6e0d7ef50e835ab8c792fd75af89dd3c82a0c6da479b621
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85t3rifc.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D
Filesize13KB
MD5bea257f9b203fc393b4d847db55e51ec
SHA164a5875620d79300d432de71fc3e4d1e8dc9c85f
SHA256e832ea0f9c4eedaf5a56627185c1f44d13f8ef043b134ca7f9a034d580bb0ea0
SHA512053da745bb0b2bc3d3d7de5b29f288743835fb430f8a6b4ba8ad7d83c0609e0b99e6c78fc47f36dd592afe9c0af70d32854bf15f12b7e681451639c0368ac711
-
Filesize
1.8MB
MD533a84ea233fe9fe1b4c85e533a228bbd
SHA1413d73dd32bcce870cf5edd4b777051762882034
SHA256a777bbce91625e3261edebb334be8610372daaf0790763fc2fd085db35b8463d
SHA5120f28610c0396bac87e8eb7c8bceb0cd468cebe4df9bca2a9e8ba2f3f37708317d6e621fdd9a9cdb6046b43eb578237124215f15bc614b016457cb37117e8395a
-
Filesize
259KB
MD5268974e398224e4c5f7d30f8221a5f93
SHA15d11a31a4012266bd5bda4f6debb80ca34a13a54
SHA2561c18346eccf2800753f37747b7d4c20d4e778849906186f1bf586244589bfda5
SHA512b21022ba5db5ec9780a91adb375c9d32996f3f6b2049f3506b8dae0c2c9c2a9eb35f3711a87559051f69e5ec395591774c671aba8b47f8d7ec7493d0d7a02d64
-
Filesize
2KB
MD5de9423d9c334ba3dba7dc874aa7dbc28
SHA1bf38b137b8d780b3d6d62aee03c9d3f73770d638
SHA256a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698
SHA51263f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\AlternateServices.bin
Filesize7KB
MD5d886fbc3a4c1eba76e7001c0fb93b568
SHA189df5868df5c83d9f133314ec251a1e71c6cada6
SHA25633f9d5a0644e45cc306cf39c4562e4300ff1540db5546248563f3ec20337f005
SHA5124d262b8d75d06f332fa67675659775ff435c53e7af0496bb352aaf432f037b38a389df58e85d556f707400f800c41ef5284834255f3109efa09825bf34206243
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\AlternateServices.bin
Filesize17KB
MD56ef33a388823612d2e231455e0dcdac9
SHA1ada1165668558a4ae921cc72dbcdb95924eea419
SHA256502e87f33d0b4ed1d301ea86f380d4b6a125ce735985f44d57e3b51dc5589398
SHA512077d2c5b63d04e9006e47e68ef23678a0e793e76e30c0e964aedc1071fd8d9160a3637243cbe9b54117729b0334d4a7e6fbcdb58ee81a0ec43e1fd5a7bc5bcf6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\AlternateServices.bin
Filesize12KB
MD53c61d7954b0fe7cfcf94b327c6a55017
SHA10ef103e26927466d8bdf5e316fc0ef0c8de9c367
SHA256d8da29eaa5952adba48561d4c752a6f31058c89550dc0ae169990ddc78e289d2
SHA51242fb53253975a00a34afd124c8a6fe12c87ae5e8e539dbed276a2a2203ce419452e4aaf74fe5bf17e34e3c4f8d03155f9a01675c277acb0476701b7d9544d27c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5c683a73d5da4528f93332839c69f591b
SHA15b58494724e5a6fb89174c133541fcecf2e3d213
SHA2564cfe111b09226436a1737d39f5c2073b2a68898ba2a946d0bc5d4978307f38f8
SHA51297f114470522e0172aa2a27546bb635cb6bdbc618bf49a8b25d7c29779a2bc8cfd040f0a8075aeefb74b691f3a8c623e3728d57b741002b649968530e03ded45
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD59b3f6fb6d06e49608fd6a1f3612268e7
SHA126cd6bacb2944fccc029eff4e6bce5c7e8dc6294
SHA256bf72af3f2f38bdeca6899ed857197aa9a65007f2926d5a59d496a0d9d148fa32
SHA5125edc9b1b8ebb403443fc5a3a89cd946afdb7df779a067415c9f709c83d34e68f8bd32e6903d366b2870aea871a5fe893755799196526eac10c1e8d016fe42cdd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\datareporting\glean\pending_pings\239de6ed-1c80-4112-929d-9eda2a6e54a2
Filesize982B
MD56cc6e5bc19696e5719e2eb4a68fdb476
SHA1b335f01795e069d945a3e885ee3fc61ba209962b
SHA2563ab89fb6a4bea7fb4b99e069fafb47afc83b1ddb83c6441a60e90e6fb3a27f1f
SHA512b5563c24dbce57e2dc7393f0feaafeaade7720722e1b24c82dd12c09632331bb4648cd65c4f1e5149beca0784fbab387d46ad0797a17446d7ec1b946a7efa95f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\datareporting\glean\pending_pings\bf587f17-cd8c-4f07-a9b7-98ead4bd7eab
Filesize27KB
MD54c422597e768f04a400f05653dbad2b4
SHA1fda2000d13a830e445f32799d48ec282bb1897f6
SHA25638901dae977ecd53ba0facb7a43d20d81a902e043d2c703cc6d0546ff9c6f49c
SHA5120aff7d29ecdb88d2ba2d6a4a51ec40b98ea52449b663200d90fcf7724fd3800a196119ea667f51259160814a13a560a8fe3334792744451f8c10a69510a360d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\datareporting\glean\pending_pings\f33b1abd-b7f6-4d06-ae36-56b0a4c20786
Filesize671B
MD567f0368c341e87a3e245f1ae626446e5
SHA14a508bd42aa5de803fc195c3ad309dcc182694cc
SHA2560a4f946f822522844cdb9b004548848bf27bf068c9d53c34247ec69cd205d799
SHA5126f3804c5691dfe6eddcadb1cc30633a94628b9de410d50c027245b2869bf5163df1ec9529a53c637d09bddd25c838887c7a728ca287d87edfcfb6b808e22ffca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85t3rifc.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD509274c2cb5ed4d7ec36f3e5c363d442c
SHA1dc62dac1cd2c518d691e1ab0027b1e0232531c4b
SHA25699e83cf848d0bd6b7d3b1fbd6009584fa7ab4f7627a833515a8244611a232816
SHA51243923628cbe9272a0986809316fb8dea074e75d51164c7e10ff6887ca0a5ae58f01ee031d5ea773a8f4c516b3c50fc6a065bc051f1c218e30021b12903a0cfd4
-
Filesize
12KB
MD5abb02a2ab6aea4dffff5be1a08337f23
SHA18d14521aafe391869dd190926b32cf01c86a2192
SHA256c876a2e024303a0b527072c851126ba54587240e4b22ce30cdf1b5e5865d40bf
SHA51290e7295ff4c1197dfdbee4472f5bef83c95b3f2598c610416ee7ae8d97a3e6a740e77448a12b1f05079c0d40f1bd19b0522ad12ecb4b60ae0336ef08f8f653bf
-
Filesize
16KB
MD59c5a0bba48f58115e868c851a280bf74
SHA10c146ef045bb9dd4943d1cbe948b33b6611d3de3
SHA2569d37c8af072e6d8772929c1763e3f1fe8a8277a72dfbf4795117174c0ab3f5df
SHA51237305695d5ece56387f322ed2185ee448a18f61964962eba836e3d0795367300cdeeaa1e35510555eb7015bfbbe140ccaf94310d42a48effbff5b9409055c95d
-
Filesize
8KB
MD5d6c5c8bad50a669501823c85e8b37ef5
SHA15bbba062192d531e663315b55b6e096b2a60f573
SHA2568085d893f205cd2264f21a03d6537069401dc70828a0335d97f1b52de9df876f
SHA51280ad0a852d7e5d2ba2e6bd79598ec5ef0968c85563876d5abb845cb39ac7425b723b97d707c0a9ec86db56d8b5e638da5d54fbc9afc1b4e2b1f4f6a190a3ab00