Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
08-08-2024 22:33
Static task
static1
Behavioral task
behavioral1
Sample
181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe
Resource
win7-20240704-en
General
-
Target
181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe
-
Size
1.8MB
-
MD5
f7c74dd7a441a3f0d3a96412625aad8e
-
SHA1
e0bdbf79d446cb07c8ea5cd51e4fa791d486d3b4
-
SHA256
181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682
-
SHA512
08055cd10f7f06464a1526932e01f8e0707efdb8d3a996260d3c3cdffaf9a90276a65df73da2ec60bf78eb989021b7ab4b3e7427181a8f0a170de524b957c173
-
SSDEEP
49152:xq8jM/227ZLnJzEOuTFM2ki2eTu7y7/ZLgx8pdJ:3w22dL5VCW2khWLZBp/
Malware Config
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Extracted
stealc
kora
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Extracted
stealc
default
http://185.215.113.24
-
url_path
/e2b1563c6670f193.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe -
Executes dropped EXE 9 IoCs
pid Process 672 explorti.exe 5064 a06c9dab9f.exe 2096 46dd3fc820.exe 4492 a79a389c13.exe 3148 explorti.exe 2096 explorti.exe 412 explorti.exe 4260 explorti.exe 4480 explorti.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine 181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows\CurrentVersion\Run\a06c9dab9f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000036001\\a06c9dab9f.exe" explorti.exe -
AutoIT Executable 29 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/5064-192-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-250-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-263-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-265-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-330-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-369-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-373-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-379-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-381-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-384-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-388-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-390-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-392-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-399-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-401-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-404-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-412-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-414-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-416-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-419-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-421-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-424-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-428-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-504-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-506-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-518-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-520-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-523-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe behavioral2/memory/5064-531-0x0000000000E00000-0x00000000018E5000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 39 IoCs
pid Process 1448 181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe 672 explorti.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 2096 46dd3fc820.exe 5064 a06c9dab9f.exe 2096 46dd3fc820.exe 5064 a06c9dab9f.exe 3148 explorti.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 2096 explorti.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 412 explorti.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 4260 explorti.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 4480 explorti.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job 181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a06c9dab9f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46dd3fc820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a79a389c13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorti.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1448 181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe 1448 181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe 672 explorti.exe 672 explorti.exe 3148 explorti.exe 3148 explorti.exe 2096 explorti.exe 2096 explorti.exe 412 explorti.exe 412 explorti.exe 4260 explorti.exe 4260 explorti.exe 4480 explorti.exe 4480 explorti.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4120 firefox.exe Token: SeDebugPrivilege 4120 firefox.exe Token: SeDebugPrivilege 4120 firefox.exe Token: SeDebugPrivilege 4120 firefox.exe Token: SeDebugPrivilege 4120 firefox.exe Token: SeDebugPrivilege 4120 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1448 181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 4120 firefox.exe 5064 a06c9dab9f.exe 4120 firefox.exe 4120 firefox.exe 4120 firefox.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 4120 firefox.exe 5064 a06c9dab9f.exe 4120 firefox.exe 4120 firefox.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe 5064 a06c9dab9f.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5064 a06c9dab9f.exe 4120 firefox.exe 2096 46dd3fc820.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1448 wrote to memory of 672 1448 181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe 71 PID 1448 wrote to memory of 672 1448 181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe 71 PID 1448 wrote to memory of 672 1448 181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe 71 PID 672 wrote to memory of 5064 672 explorti.exe 72 PID 672 wrote to memory of 5064 672 explorti.exe 72 PID 672 wrote to memory of 5064 672 explorti.exe 72 PID 5064 wrote to memory of 3468 5064 a06c9dab9f.exe 73 PID 5064 wrote to memory of 3468 5064 a06c9dab9f.exe 73 PID 3468 wrote to memory of 4120 3468 firefox.exe 75 PID 3468 wrote to memory of 4120 3468 firefox.exe 75 PID 3468 wrote to memory of 4120 3468 firefox.exe 75 PID 3468 wrote to memory of 4120 3468 firefox.exe 75 PID 3468 wrote to memory of 4120 3468 firefox.exe 75 PID 3468 wrote to memory of 4120 3468 firefox.exe 75 PID 3468 wrote to memory of 4120 3468 firefox.exe 75 PID 3468 wrote to memory of 4120 3468 firefox.exe 75 PID 3468 wrote to memory of 4120 3468 firefox.exe 75 PID 3468 wrote to memory of 4120 3468 firefox.exe 75 PID 3468 wrote to memory of 4120 3468 firefox.exe 75 PID 4120 wrote to memory of 928 4120 firefox.exe 76 PID 4120 wrote to memory of 928 4120 firefox.exe 76 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 PID 4120 wrote to memory of 4248 4120 firefox.exe 77 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe"C:\Users\Admin\AppData\Local\Temp\181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\1000036001\a06c9dab9f.exe"C:\Users\Admin\AppData\Local\Temp\1000036001\a06c9dab9f.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password4⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4120.0.1074635343\363596267" -parentBuildID 20221007134813 -prefsHandle 1636 -prefMapHandle 1676 -prefsLen 20845 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ad3a9dff-9d03-4ca3-84bd-a49447f73033} 4120 "\\.\pipe\gecko-crash-server-pipe.4120" 1792 1ac653cbb58 gpu6⤵PID:928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4120.1.1668079273\1513546864" -parentBuildID 20221007134813 -prefsHandle 2128 -prefMapHandle 2116 -prefsLen 21706 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59801845-0859-43d1-b9e3-353b3445b107} 4120 "\\.\pipe\gecko-crash-server-pipe.4120" 2140 1ac52e73f58 socket6⤵PID:4248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4120.2.1922870960\1322155011" -childID 1 -isForBrowser -prefsHandle 2880 -prefMapHandle 2876 -prefsLen 21809 -prefMapSize 233444 -jsInitHandle 1376 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {91d029c7-1253-4674-8226-bd17da123ca1} 4120 "\\.\pipe\gecko-crash-server-pipe.4120" 2836 1ac691e0558 tab6⤵PID:2076
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4120.3.2069638748\1259632113" -childID 2 -isForBrowser -prefsHandle 3396 -prefMapHandle 3392 -prefsLen 26214 -prefMapSize 233444 -jsInitHandle 1376 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {affa9287-36a9-47ce-9b04-e4c7031733ef} 4120 "\\.\pipe\gecko-crash-server-pipe.4120" 2888 1ac52e64558 tab6⤵PID:4324
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4120.4.287391848\1096428648" -childID 3 -isForBrowser -prefsHandle 4828 -prefMapHandle 4832 -prefsLen 26354 -prefMapSize 233444 -jsInitHandle 1376 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {73f80896-9e8f-46e7-854e-ae88d440579a} 4120 "\\.\pipe\gecko-crash-server-pipe.4120" 4208 1ac6c4a3f58 tab6⤵PID:1984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4120.5.1597555471\5193487" -childID 4 -isForBrowser -prefsHandle 5036 -prefMapHandle 5032 -prefsLen 26354 -prefMapSize 233444 -jsInitHandle 1376 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e462009-51ca-474b-ae34-466cb4f4b0b9} 4120 "\\.\pipe\gecko-crash-server-pipe.4120" 4952 1ac6c4a2d58 tab6⤵PID:5084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4120.6.448012593\2098961364" -childID 5 -isForBrowser -prefsHandle 5156 -prefMapHandle 5160 -prefsLen 26354 -prefMapSize 233444 -jsInitHandle 1376 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7614268b-2a67-49a8-b89d-ff183f9d781f} 4120 "\\.\pipe\gecko-crash-server-pipe.4120" 5144 1ac6c4a4858 tab6⤵PID:2232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4120.7.1858413844\541221942" -childID 6 -isForBrowser -prefsHandle 4996 -prefMapHandle 5420 -prefsLen 26529 -prefMapSize 233444 -jsInitHandle 1376 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {77e9eaf8-d98d-4c18-a545-9e1df56f51a1} 4120 "\\.\pipe\gecko-crash-server-pipe.4120" 5044 1ac6cf8c958 tab6⤵PID:2124
-
-
-
-
-
C:\Users\Admin\1000037002\46dd3fc820.exe"C:\Users\Admin\1000037002\46dd3fc820.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\1000038001\a79a389c13.exe"C:\Users\Admin\AppData\Local\Temp\1000038001\a79a389c13.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:412
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4480
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD50ba6b7ef538b30997ed3f2dc6b69c534
SHA1b210bee5380a6edfdda30cd203ea84835c6479ba
SHA256f0ae1731e5ab53d57601e839a64b105b821d77de6e3645d5d2156c3172ac0f17
SHA51245d41c2e674269ef68cbff393aa731a57337ffe52d19476e5e259167b1b751885184a93f5ff56d35b3558020d0ad9d58ca0a53a514eb828aea5a8104a7c3d98d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2b7acdhd.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD59f8e26697a66a5081e7db3be012535af
SHA1832e32ba935902ef22743193853e2d8beec5f7b4
SHA2568f814e5d43f851bc4e9da172bd3d1df5ea97319c711192d91f1ecb73506eb603
SHA512a221a0bea851889fe635560b96dc238bbfd350495352084c0fe387c63f8808c8ac880fccde0d37b0e1b8b5416c35b21a291c850a90d937d741920d6af1babe1b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2b7acdhd.default-release\cache2\entries\037778A55E1B7E9BED3390289866D09402D6C913
Filesize9KB
MD5f924e72acc0ec1622ececaf8dd348958
SHA1d00cba5e78853165a26a14eaf2070774b7b62830
SHA2567f9a0ebeabcb4ed685b7701d69486a4a77253664a5067500159f28bb6da64e80
SHA512a24c1066c62646a4ab3adab3f7b10769b5b65a8c9c10d26ab34e96cbcb25aea49dea6c2a4c3d27d4eedf7c7291fa2366dcc2f159166a41d566227937547a47c0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2b7acdhd.default-release\cache2\entries\099EB2BF8827A4F91EAB3E38B14650D0205226F2
Filesize15KB
MD59d600eeba85465a3bb775b077945c290
SHA1e533b579ce5afcdf4f4bf9a676039dbe50323d95
SHA25656644af5dcc89625ff14f7b010f842472170db295b22bf413a55fa6ffb2245c1
SHA5120e3b9b40d2694ed5406253b82ff3c34c92520a626a34ce4fd7b54a6e4301e29e4ddd081562f1ac20f706cb16557f7c833c461ca1142b39403efece4717f49150
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2b7acdhd.default-release\cache2\entries\147753AE9E85D8B715BCEECDEDA35880D4E6D750
Filesize8KB
MD5232fae1741ac3be613b14d94999acf0f
SHA1976c8ff2e62c12c57f0daffcc74e8d633f4c30a1
SHA256acc83e51116574f9ec124af608a4cb79bc3dd6c7bbe167b5bd497e22e3738a9c
SHA51200aa2ddf4d3b48540f476902bc9574b8d0647e5496fe27cfab06049b9be755022c4f38d42bb46087a00dcc2ff1c4ce7a7a7076db05b8586336c55cd0504ff1d7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2b7acdhd.default-release\cache2\entries\254256B27E0C48CF9B80B695F0B3B8CA84610495
Filesize9KB
MD5381f9371d1c32c63b0132b4a43a0de7b
SHA11485d7a34d5a130e36c01846fba9a45cbf7aa6d5
SHA25697f9b185f6a9ced5e9ae393d1e763bfd84cdb910746f06e633e9051533417055
SHA51213b5ac00cca04ff750677490f0bf35a501ff660a916a9611b707a2b825496739cdffaa309518230936f73cf289d3cc2a5dff0c7b2840fe6968d42cbe9bcb0f99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2b7acdhd.default-release\cache2\entries\383A97A57B113BD106DE6984E6DBA5F537327263
Filesize13KB
MD5cc349b54438c009f4f8fb280fe752be0
SHA1a5ae35defd2ccee56c0c4f75ae34c99fd32e5b99
SHA256fd28e55d7d8521a647c490c7111072fb32c1bb1957d339d72f894d424277d000
SHA51252bea4a1249052bf84d950c75a664f99df40bb696ee92274f28eac6e1c169b4a4b512865d7ff45c23b1ebb60302fca4e1ff03b98ad17ffb86d1a4993a966e477
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2b7acdhd.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F
Filesize15KB
MD535c06402b707451f16ca1c03b82aae31
SHA1cc793cdfd012cdd982980309f45b9d6fcc1a809a
SHA2566578cddac3574c57caf18db499e80964ab6f9ab31559c0bcd1339f398727f1a6
SHA512c45db517efcd706c7b79b67feafa997ea339e662dfd34f578cfbb17ec793c68ad29edec2d662c0f58c70ddbad232b04dc330b14dd47210d22bfab9698d8f6cc1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2b7acdhd.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B
Filesize13KB
MD5d67a260103d87ddcb09defad3ada813a
SHA1aa1942b4ac336c728d7852d669d45fd1813cfe4c
SHA2561648b6dfbd77f392df038492ba2afa797e5f4e3b0badc44b1ae54c6edd49e22f
SHA5121d051e95fef27d9ded288840525e3c76eef9548ed5cedc228c77f2b132f3b788e02cb519a2203b1c5870e0ea836f95df5982f7db0e79e8d11a16e772d98355ce
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2b7acdhd.default-release\cache2\entries\F210D48319A1879FD1C5213FA010C613B99BA085
Filesize11KB
MD51ee188ec7f929f26402f54ab3c2ccdb6
SHA194f46a5122f748c0c77abf9be779a44883991685
SHA25638e0286fdb11858a5bf8c00bef5dee5b1c16ba9c8f67ce2277b05f6ebd91616c
SHA5128f3efb3487d9968c169a7c4c652b16381f0c9adf93d911adfd3d38c62fc801b83ec6aba3d8c67017cbd6764f9ff86d5bf06a082cce356646ace739873b65075e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2b7acdhd.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD53b47e60500a548c87d96fd33cc7eefeb
SHA131a659b49cea5fe06d5ce26ffec897caa2098389
SHA256378d3194139911758b88a34e38c5d9ba779ac76d53244e2a822de9e876368f4d
SHA512b7c32daddaa669f8378dd78020d74be7847e97222c887dc16ad49bcf2ff966c79202392db8501ae29fc70eb8aeed8af671e5dbfde5984d34efb90d42b17a63ba
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2b7acdhd.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize7KB
MD5c460716b62456449360b23cf5663f275
SHA106573a83d88286153066bae7062cc9300e567d92
SHA2560ec0f16f92d876a9c1140d4c11e2b346a9292984d9a854360e54e99fdcd99cc0
SHA512476bc3a333aace4c75d9a971ef202d5889561e10d237792ca89f8d379280262ce98cf3d4728460696f8d7ff429a508237764bf4a9ccb59fd615aee07bdcadf30
-
Filesize
1.8MB
MD5f7c74dd7a441a3f0d3a96412625aad8e
SHA1e0bdbf79d446cb07c8ea5cd51e4fa791d486d3b4
SHA256181168bbc882204fb7c4f142f47e0d9e031309b083689b7343e69e674fc0d682
SHA51208055cd10f7f06464a1526932e01f8e0707efdb8d3a996260d3c3cdffaf9a90276a65df73da2ec60bf78eb989021b7ab4b3e7427181a8f0a170de524b957c173
-
Filesize
3.1MB
MD525bcb7ebee3f1cadce066f73f8bf68e6
SHA10f645fe8aacf8ed50efa28d10fcb1e6f7f9eabd1
SHA2569a0d9cd287dd60d8f4aafdcd7020e0ad897fe721a428049c435c24dbcb29bbfc
SHA512235259094a566e4810aaccbab04c73222c18fa0dc25f6ab72802d69c9cf76b06f142d30eca90e31bee6b1ea778a234fe4782e74542fc2e226eaad9476f86cdc4
-
Filesize
187KB
MD5278ee1426274818874556aa18fd02e3a
SHA1185a2761330024dec52134df2c8388c461451acb
SHA25637257ddb1a6f309a6e9d147b5fc2551a9cae3a0e52b191b18d9465bfcb5c18eb
SHA51207ec6759af5b9a00d8371b9fd9b723012dd0a1614cfcc7cd51975a004f69ffb90083735e9a871a2aa0e8d28799beac53a4748f55f4dd1e7495bc7388ebf4d6a0
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize7KB
MD5e02ec4b312c690858d8ee1e4322065d4
SHA14fc5782632f826fd73f869ccf5b32fcb69677afc
SHA256eb8d85ed507ce937311c32eff888a6547a92d4be8abf2367caaa54dd33ff48c9
SHA5124e1feb4924843aa54ce73e4d5e117f8eb5178d50e3410a67b36f6980ab9ca95599b5e78e0b33f979e627196ff26d85b44b4db064436efa09602cdcd1d058c237
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\bookmarkbackups\bookmarks-2024-08-08_11_f70S+BIHcjdozL1H+8sV3g==.jsonlz4
Filesize953B
MD514e152530b0003973263fd54064ea363
SHA198a18c46e4980317a1f795bb0f364f02b7524f06
SHA25698818f8d867aabab23dcf95b03d2d912fd8d6106f1bf48e1f04dc9b5af42f199
SHA51221a75ea8970d68bac8100f499d88b38fbdd904d5217e69492f10f63c9026f43f00508fc62e059f54f82d7a1bb6c16b15f14b281c87542613ddd20893029ce664
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\broadcast-listeners.json
Filesize204B
MD572c95709e1a3b27919e13d28bbe8e8a2
SHA100892decbee63d627057730bfc0c6a4f13099ee4
SHA2569cf589357fceea2f37cd1a925e5d33fd517a44d22a16c357f7fb5d4d187034aa
SHA512613ca9dd2d12afe31fb2c4a8d9337eeecfb58dabaeaaba11404b9a736a4073dfd9b473ba27c1183d3cc91d5a9233a83dce5a135a81f755d978cea9e198209182
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD56e9c3dafa56afd32fc2400a85c96cd91
SHA105b986462b17b6578c7930105725c7adb831ee54
SHA2569f6aeaa4d6beabe88cf256778da7d5973edc4dcce89307ec3d666580de68f5fe
SHA51296883475989692c402b581cd4e833854c3871d4d63a8147a6d6d4c89e4a569c8f4481665b631c3f78a3b0a69b41890a14354b0077c4a38e4d5b10654f1110c0a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5f6a62e86818d51ef3bd5f0922858b441
SHA105bb3dfef14941cefb2ef8b1f12a9674eff1535d
SHA25670cf25c66d4537ef71b0290997cb95ce679d83ff93797eb2bcce924b159ff20c
SHA5125b19552efeb95066eeba94bebd548a26a7f5b51620ae1cba7d2a92057cfdf1666addab39a6e7565347ca87260fdf68f261deb86696fbe4d7b0a2ed53a785fd2a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\datareporting\glean\pending_pings\64091b05-ffc4-4bb0-9506-09c587b69ca8
Filesize746B
MD53845b576fa802bd624379694169cbc4c
SHA14856a86df2528a4bec28806add89a9b270fb9f09
SHA256ed26d02e82078cbd433c8f5b2e9108dc44e367e1b91cb8c07c6a3df08f5c1ec2
SHA51274f86bcfdaf9bf8098dacb37817f819410742d9edc7fc2885f597a864022df7e0aff1bea0cb2bf852310794364b9e149d567e053a4258b00fb046715dfb702da
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\datareporting\glean\pending_pings\9969f634-1e99-4ca5-9274-a0c9606be90a
Filesize10KB
MD5e824e95efaaa7d18960d7d4d88da82f5
SHA1f6628dd5321d0a5b1058171bb31ab188d35184c2
SHA256257b04c4f25473994306f74a3f24e4ce5e2215b89e0c7eab9bd6bc6eac76d07e
SHA5128ff6c94301c591677c4690216e03c2eeb675d556ffc93c061417b39fadffce99801cbe9c99eb8536e00a8aae6ae7daa3742f46d71a07d75504ea2890abb7d0d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5b3a73d4f5f939ea14bcc6773ba262f24
SHA1c4400723104f334c50d83bcd594952ebd6f8169f
SHA256131ba28da03a9ab324b06d55862df7b5f7f1bb9883485375226427d385bd04f5
SHA51228df49a3a365459b6e43278cf28d6289123e3995a343787ddc5da9844b8d1df51c06739ead750a676b22ed980ebeb83071c3b6906acd7a49f7f8e93b03d4309b
-
Filesize
7KB
MD5380f57dfe6141ddc74483c38e4a22e3e
SHA15598a39db6e3a2bbca60a0fb7583ef6524b5cff4
SHA25670e081025dd789ee5a891ef2ae8c98ed9c13f87af9395e2c25fc9429d20d05f5
SHA512fb3d19b1af5f7daba7b34e7c63bc504c90396834093d8fad3965c750e14ce36c8c6e20ba42338c34d39c5447be65de933b3c1ee7f4e0fe77a9c7158b667a96d5
-
Filesize
6KB
MD50fedd09978b70280530843ccff8069cb
SHA1b3e4d14b62c4108655a8198b92d0c4c6c96129cd
SHA256e61fbbafaa104a247122aeca7a293c7f0302b0c4fef2f8c69a4fa38cb190ee66
SHA512b6ade9056079530113e8aae75da9ae75315a6484bc1fa6b0343a4fca080e5e033d04e9eb3e548b4b3483b4672e690115febe7ac2f296ce203108989b28c9d4ee
-
Filesize
6KB
MD5217028f58ca048a4de088c02aacbc504
SHA196396f81d9c66a4ba9ad0815bc9f153ca8d6efc7
SHA25605bdbaf746e9289ce703f01a5055560ff753d10ed2a7eacf12f394a476590a2a
SHA512a13b2b8417391a5dc8f1a8dcaf4109fafb54e06dcfec0c15ad21c02b00ec80ba77a732b95cb9a35faceb92fade3eb326ccf5d94e1dcbe60e9902a110ed6c4004
-
Filesize
6KB
MD5a5ef93919cab5600c35b8d495bcf06f1
SHA1526c86ff1279bda7c6bee423ac4526c97914c58a
SHA2567094e4322440da10f7710c769506003923e5e27a1fa43950c7b67d89c12b14a1
SHA512f5d22dd6a6afb441670be63d44068d9f41a95deac40305a4dc797418e23cae6da265cbd843f41e281ab07569144844f595ed8dd3c71203567bf3b8e0ea44f3c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD51b0374b3771b32424932ce44c83757e2
SHA1a4fa181dec42252e9333a7c3dd3277ebbde495a9
SHA25657602b05cbcd3b58220a953bd8853362e7c7a499a0b0233a52c8223f4aa43952
SHA5125f6e009b6f235a2c5c15acea5c601b87a858ff732ea4bf2d4c496cb44133cad6364271e64a1301cbcc1186b5095a3bc4a7a552ab644c34368a77156ce6d55f52
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5cf49287df9f65b0008074332c65121b6
SHA1c8a80d5386023d3bcc25858be36a1a718bf2fbe2
SHA2565c74325fdae11e1ee97971b0e046fcd3a8b04334ffc0f99f2cb60ffa458165a5
SHA5120c6217e8584fd94809882df86fe882bd0e16c60989209f53314e0d28dd53e4482c53135cafbd9e51765080edd49aaf949c1f2d1b0862faa246fedeac6588dd60
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize200KB
MD59d421b155b5c4b23ba2113cc4c65f3cd
SHA12a3f857df8c656a3241615ca3ee748fbbed91f59
SHA25680f6ed377213b3a308fadda9c21f4003c5ca5e871043f4a39cb6e8242f5f61bb
SHA5128bcf8cf66e5e043bc52be559514a854a87f8a38755a4ec9f362fe584cdb3bb781305c239e365c1eb7718957f82906b471549290a4ba3eab556bfd516ae371dc6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize200KB
MD577b5e4df9da8486a8d65bb23c4187b06
SHA1d3ecd0042cc9df1df2d56beb3fa0bd22ff04d762
SHA256d92314b420d8cb864a94f00fc1eedcfb81faf8afc8d306d57cb2d453a27892fd
SHA5122488abcbffe275ce70d993aca3156b3f3193c5655011bc5348f836b89a537cb70f0505155237bb1fdb946132719f7f7fc42a5d9bb333c19e879149ee73f833ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\targeting.snapshot.json
Filesize4KB
MD51353b23f7688520c1cb0884543153fbe
SHA18a18f06239a0dae262cf46f22a4108043ec1f0c5
SHA2562c43a14556068b4b8b055bcfbe55fbb7ad7b7fbc3500d0022565dab77ac09e8f
SHA512b3f571cce1def9d7a867059b03e042ce61c871d661b46ac7306a877d2de89c687913aa5811ef96b1ae86b6c9c2f1a736fb9e63a9b8034e716ced8cb15d6905b4