Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe
Resource
win7-20240903-en
General
-
Target
97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe
-
Size
1.8MB
-
MD5
d4a45a9b4d6ddbc91920d0f7f6307832
-
SHA1
d18b1b8ddd46b203726b0bbb677861868c7a9b82
-
SHA256
97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4
-
SHA512
9f751da3104ccdb362f1b0e50af7581fa2c89f8cd68719488a0fdc4c328a9a3cf011f46aeab2c66951c7232dea85c154aa56c247654cfc4a5d0a4d697d3118b9
-
SSDEEP
49152:4rSAPj9XBZ4++yD9IbwobQKMpIb9X+0oPJEyeD:4GABXn4VyikJKPHD
Malware Config
Extracted
amadey
4.41
c7817d
http://31.41.244.10
-
install_dir
0e8d0864aa
-
install_file
svoutse.exe
-
strings_key
5481b88a6ef75bcf21333988a4e47048
-
url_paths
/Dem7kTu/index.php
Extracted
stealc
leva
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fb965073c2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 13a7e6337a.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fb965073c2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 13a7e6337a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 13a7e6337a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fb965073c2.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 5d88df0ace.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation svoutse.exe -
Executes dropped EXE 4 IoCs
pid Process 3436 svoutse.exe 2488 13a7e6337a.exe 3264 5d88df0ace.exe 4800 fb965073c2.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Wine 13a7e6337a.exe Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Wine fb965073c2.exe Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Wine 97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Wine svoutse.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fb965073c2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000030001\\fb965073c2.exe" svoutse.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000b0000000233f8-46.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2028 97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe 3436 svoutse.exe 2488 13a7e6337a.exe 4800 fb965073c2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\svoutse.job 97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb965073c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svoutse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13a7e6337a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d88df0ace.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2028 97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe 2028 97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe 3436 svoutse.exe 3436 svoutse.exe 2488 13a7e6337a.exe 2488 13a7e6337a.exe 3264 5d88df0ace.exe 3264 5d88df0ace.exe 4800 fb965073c2.exe 4800 fb965073c2.exe 4940 msedge.exe 4940 msedge.exe 3220 msedge.exe 3220 msedge.exe 5364 identity_helper.exe 5364 identity_helper.exe 6996 msedge.exe 6996 msedge.exe 6996 msedge.exe 6996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2336 firefox.exe Token: SeDebugPrivilege 2336 firefox.exe Token: SeDebugPrivilege 2336 firefox.exe Token: SeDebugPrivilege 2336 firefox.exe Token: SeDebugPrivilege 2336 firefox.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 3264 5d88df0ace.exe 3264 5d88df0ace.exe 3264 5d88df0ace.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of SendNotifyMessage 47 IoCs
pid Process 3264 5d88df0ace.exe 3264 5d88df0ace.exe 3264 5d88df0ace.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 3220 msedge.exe 3220 msedge.exe 2336 firefox.exe 2336 firefox.exe 2336 firefox.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2336 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 3436 2028 97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe 86 PID 2028 wrote to memory of 3436 2028 97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe 86 PID 2028 wrote to memory of 3436 2028 97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe 86 PID 3436 wrote to memory of 2488 3436 svoutse.exe 91 PID 3436 wrote to memory of 2488 3436 svoutse.exe 91 PID 3436 wrote to memory of 2488 3436 svoutse.exe 91 PID 3436 wrote to memory of 3264 3436 svoutse.exe 92 PID 3436 wrote to memory of 3264 3436 svoutse.exe 92 PID 3436 wrote to memory of 3264 3436 svoutse.exe 92 PID 3264 wrote to memory of 3220 3264 5d88df0ace.exe 93 PID 3264 wrote to memory of 3220 3264 5d88df0ace.exe 93 PID 3264 wrote to memory of 4392 3264 5d88df0ace.exe 95 PID 3264 wrote to memory of 4392 3264 5d88df0ace.exe 95 PID 3220 wrote to memory of 4212 3220 msedge.exe 96 PID 3220 wrote to memory of 4212 3220 msedge.exe 96 PID 4392 wrote to memory of 2336 4392 firefox.exe 97 PID 4392 wrote to memory of 2336 4392 firefox.exe 97 PID 4392 wrote to memory of 2336 4392 firefox.exe 97 PID 4392 wrote to memory of 2336 4392 firefox.exe 97 PID 4392 wrote to memory of 2336 4392 firefox.exe 97 PID 4392 wrote to memory of 2336 4392 firefox.exe 97 PID 4392 wrote to memory of 2336 4392 firefox.exe 97 PID 4392 wrote to memory of 2336 4392 firefox.exe 97 PID 4392 wrote to memory of 2336 4392 firefox.exe 97 PID 4392 wrote to memory of 2336 4392 firefox.exe 97 PID 4392 wrote to memory of 2336 4392 firefox.exe 97 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 PID 2336 wrote to memory of 2964 2336 firefox.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe"C:\Users\Admin\AppData\Local\Temp\97d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Roaming\1000026000\13a7e6337a.exe"C:\Users\Admin\AppData\Roaming\1000026000\13a7e6337a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\1000029001\5d88df0ace.exe"C:\Users\Admin\AppData\Local\Temp\1000029001\5d88df0ace.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc5a946f8,0x7ffbc5a94708,0x7ffbc5a947185⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,11216345692756047207,17785736247233127928,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:25⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,11216345692756047207,17785736247233127928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,11216345692756047207,17785736247233127928,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:85⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,11216345692756047207,17785736247233127928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2932 /prefetch:15⤵PID:5776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,11216345692756047207,17785736247233127928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:15⤵PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,11216345692756047207,17785736247233127928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:85⤵PID:6012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,11216345692756047207,17785736247233127928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,11216345692756047207,17785736247233127928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:15⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,11216345692756047207,17785736247233127928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:15⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,11216345692756047207,17785736247233127928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:15⤵PID:6336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,11216345692756047207,17785736247233127928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:15⤵PID:6344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,11216345692756047207,17785736247233127928,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:6996
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd4⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://accounts.google.com/v3/signin/challenge/pwd5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1928 -parentBuildID 20240401114208 -prefsHandle 1844 -prefMapHandle 1836 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5d6fd6cc-274b-4ee7-827f-6b1ba0303c98} 2336 "\\.\pipe\gecko-crash-server-pipe.2336" gpu6⤵PID:2964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2400 -parentBuildID 20240401114208 -prefsHandle 2392 -prefMapHandle 2388 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f335bee3-ef84-4495-a8d7-886093900506} 2336 "\\.\pipe\gecko-crash-server-pipe.2336" socket6⤵PID:1132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3280 -childID 1 -isForBrowser -prefsHandle 3272 -prefMapHandle 3268 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {507ab21a-bf77-440d-aa8f-04f03c646720} 2336 "\\.\pipe\gecko-crash-server-pipe.2336" tab6⤵PID:3736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3652 -childID 2 -isForBrowser -prefsHandle 3664 -prefMapHandle 3184 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9fa585c-1e37-4ae6-9453-4b43fe2df1b9} 2336 "\\.\pipe\gecko-crash-server-pipe.2336" tab6⤵PID:2488
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4164 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4128 -prefMapHandle 1520 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b5f6be1-9ed9-47e2-b59a-7dcdf1e92cfe} 2336 "\\.\pipe\gecko-crash-server-pipe.2336" utility6⤵
- Checks processor information in registry
PID:5504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5160 -childID 3 -isForBrowser -prefsHandle 5152 -prefMapHandle 5148 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53bd5119-e58d-46c0-bd7e-b58c5ccfe3cb} 2336 "\\.\pipe\gecko-crash-server-pipe.2336" tab6⤵PID:5512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5308 -childID 4 -isForBrowser -prefsHandle 5384 -prefMapHandle 5380 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf328f7c-5780-41c5-ab97-bee07041b1aa} 2336 "\\.\pipe\gecko-crash-server-pipe.2336" tab6⤵PID:5524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5604 -childID 5 -isForBrowser -prefsHandle 5524 -prefMapHandle 5528 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bae6a8d1-68a5-4052-a67d-e387a00b1796} 2336 "\\.\pipe\gecko-crash-server-pipe.2336" tab6⤵PID:212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6352 -childID 6 -isForBrowser -prefsHandle 6396 -prefMapHandle 6400 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1ac75f6-8210-43a7-ac39-3b804a9a7ec9} 2336 "\\.\pipe\gecko-crash-server-pipe.2336" tab6⤵PID:5576
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000030001\fb965073c2.exe"C:\Users\Admin\AppData\Local\Temp\1000030001\fb965073c2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1040
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD56d65c348a19fab0e080b976b2a34b1a2
SHA1fec41dcd64e23087dce20e28072c58086c1e4b4f
SHA2563709507eaa8409050be97d7d401c745aa38c7cf677244c6984f38a53bc7442c6
SHA5120f06abf8d9984e15bc89692b1837b6d7094a8d971bd91f6aaacd77eac617a25bca7e9c456f5d994ecf46dd6ec39b8cda6c894582bdf5aacdcce1faf3da06775d
-
Filesize
1KB
MD57610c69ed5e0ae5ca1b5cfd514e87ff4
SHA19e6aa67e38911690dd8e92447d09e60bb5fa7ba1
SHA25672d9be881eb19b21aa3a949c354d2d6fd8f7959536ac45f72fd5f0fabc14fdee
SHA51262bd3661b8ee1f79ecbad9b4ba72d073116f8f3ba23f05c1d5fe0bf84fa34c8cb14f983c67bffd1d9f8c1383fdc7b07ccedcb27c649bc23fe04a42d5e17c2fa2
-
Filesize
1KB
MD504f958d5c8596afc1b7c164f7ccea979
SHA103569689f38310056eb9e85dc305f32c03a5dd9f
SHA256a46700662e2de9aaf1ac0841910f7601b3c04e4f08ebf331f914adec198ba381
SHA512ec1ab2f4a6801bc2524a6bc82f6472434d9194fe76aacfb56ba4d7877c225d83b73d3fa21fbcf558790ea3df42626c0fc1220fb0c88f747e8554e1d423d85fb5
-
Filesize
6KB
MD5ec1227833207324f6c9da902210abddf
SHA1edf3be28546122520d61ec3221e455a8cd155f7f
SHA2562613f69519a9b5ce4708cf0da50372656a01411dd3bef76db7d80b1ffb8f9add
SHA512aa2f414381fa83daca5af817a5db6cc70fb79e6d6d4290c09256a4adc067a30c8be4c0f1179cb442b0edc2ddcc14d81d7a202abcf014c81fe9f62958cb5abeb2
-
Filesize
5KB
MD57fb8c49c0312d52d978b6ee934971f80
SHA1ff5733e3f0fba21bdbf4826acc7a2918be55bd61
SHA2560c58b2c594c982e8b5b020ed1806dff1c9812cfbec7d0fc40de8f7ebff07b6ef
SHA5128ae4e9fd6bbb700ca460984eba2aa90ebeec987f9eb2d70181e5d370f2f69bedd08e87961c7893ec1333a484c9e62e26fbf5349e67588a2df056fe70a25faf5a
-
Filesize
203B
MD506f9c5a8cebe87729b17f0910942fdc0
SHA1b911e458ef466a4c4c049edda53452243a82ac2a
SHA256a2de431c7773ee459bec7653f9eb8a043423ef4c39d847b475987d5204ede91a
SHA512438f544882ad95fe8d56efe735f53d68d1a6501eb17c35dbeeda50991b3b421fa798619e2217fc80dfe5f6d6f881ee700f574c839ace1dcfc8865c972af0fcc4
-
Filesize
203B
MD5cf3b7308670ad91ca577b9bc2c17ecfb
SHA13843a704ea87da6159e0445f85ecdff591b88960
SHA256becf76a64b6d275c73996f08f3c17c3cb8620376bbbd65d46bc393f7a43268ef
SHA51273be9dff87a8a02fc18d4e43e794c380481fdb2600cc92a48b70e4cbd0390dbd40456ca9f4f4ca65c8c03917924087e2cee4b8636a1b0a9a9eb968d63a87999f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57fc98f92e46fa32b9081303d55abeec0
SHA16c411a0afac7e872f4458f77e4e0ce8552d3f478
SHA256a441fc1512c1933c8aef2e85e7ec94b279fe2dcc2441c96157853c6a1e0ad71d
SHA512fce23c3ad003de0cd2efa71ed915933ca0703348d598be02463d24b548b066cd1a1c74b08e63623d682d06cf2c1d8289f6552394117c636ad59cfc198c57f01e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\cache2\entries\58EFA56DB4BFFECB0EDA547894BC9A057159E22F
Filesize13KB
MD5abf1e22db1c50f26d134ea645d217e8f
SHA12339929da35829fa54c0c26f17d0d4f525ef6975
SHA2567650503fbbe51deed52f95fda3490323f4b792b3e77c08314500fd7de0437fbe
SHA5122dfee0f107ba9d65787efbc7b0c13bdf1df2c9738fe6d0f7f1f65bff2b99e6390943de4d73f6a115bd7fa5f9538b1ccaaac362c57e93e03eda3605658200ffec
-
Filesize
1.8MB
MD5d4a45a9b4d6ddbc91920d0f7f6307832
SHA1d18b1b8ddd46b203726b0bbb677861868c7a9b82
SHA25697d03109c0b921c7aa52c43fe2c0da7c528b1af3e185b01421d0dba4c228dec4
SHA5129f751da3104ccdb362f1b0e50af7581fa2c89f8cd68719488a0fdc4c328a9a3cf011f46aeab2c66951c7232dea85c154aa56c247654cfc4a5d0a4d697d3118b9
-
Filesize
896KB
MD511bd4625b4c8f650d10bc4d758dc2f2d
SHA107f5cf0a5dc7138c3d1d482e6b7fee6bc81915f8
SHA2567db1c1f1392f84b88a5100af4042abfd72ee3a7708c67155ad3c6082b7cbd6f4
SHA512070eeb0b6e43654074a8f680f4adba2a4637a72591aeffa9cba1697668d8db82639313e4f8aaeb00341c0e6abc08ddade15e58afce7eb083c5d567d3e80ce839
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
1.7MB
MD553c07d8a0635d22d00ebfce7c37e1bb7
SHA12044708140b4ccf866422eb576c64c82a0e2bd9d
SHA2564b7c4f962efb008258a86ed61d4482ed555a42e635c8ae9d77a5c490cccecefa
SHA512b11ecf998822cb0c78bde20b5ac336a1a01df9d0ac8a735a790e18a94a0bd77e0a12f05cc5c4595d787ac9c5244977cedc5180d8bffac7f27bf51a9ea6355ffe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\AlternateServices.bin
Filesize6KB
MD583bddacbe455910189c8edfd658359c5
SHA112918399a6da3c746069635c5f5d7878a62c65a5
SHA25660d6c8c1ddbbf540fdbc0a56477463fa855137bac923f145d2f0f4045b2fe7a5
SHA512700901e812d927a3303f9c548b9f722f8735788a9d4f62577c9340580ce56579d4cc55922478bea2b41e8b6dabc737951d8d958700f16ffc3666211198e1b368
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\AlternateServices.bin
Filesize10KB
MD5792951325f2cb31c819daf7c04b9cace
SHA155dbbfd3731d992d452893fcfd470b742cce2ede
SHA256fbfb3ad7c1fb856075298c844e406b7615990c082748049dd14e913b22327c1f
SHA512af0e4a6d31cf10147cbcf2deaeaa860aa801034aafba41af9c6eadf836d59cf85cd7263d5ff3b449eee892167279e7dd059cf88dfbd16cf03111cb56070d07bd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\AlternateServices.bin
Filesize12KB
MD5fabb59e24e2cf6c3f007395555e8e3cc
SHA1d1976998c646a004a9c6abd60bcbdaefa845f600
SHA256f3743d5d74b3cfaef9df327971fe76ba91803a30829757519d0b96944f06c897
SHA512c41db5da6c2d886f9ea5281fa57979a0235059775b3f04fdee79f71d1b8faad649bc4ee289482867756ca34302e3c7c8e43a08b8aa979755fd9f80548dd8e6bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\AlternateServices.bin
Filesize16KB
MD5661d2d118eba44b8f6657348ccea626c
SHA1c9c646cffdfad3165cb2276c4670f6bcdeabc839
SHA256937bf904df8d48fe13a0bda8347b0b881bf30527a9487e0e7e14eb38c8b8ea48
SHA512ae51992e127582d6879fedd7e5829ed73ba280e9b918b1ac08190cfb1a94f3c88d494c87b6b9f30abdbb7c08e213009338ca53f46b8a3ed46334d21ba6b36b66
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5821c24a04605918d05f72503264e2255
SHA1efc97c62c9c6a1c7beca7a1bf7655a2cbfebb603
SHA256a4821e574c24be490d692f08c698d3c8bed3a7e5f825cfa7b249de6036b325f3
SHA51209653afc6b7bbd6b31baf0115661e505e11b6e170349f968e6a896bf7524e1f06d10d46b9a36183215523b948f01302697da7bb89ae3d3fad2fc233e4707b682
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD52c2715013ca0e02ca12c22ddda813c25
SHA144e6821bc64df831a071f2c7947d6e2a53c9a41e
SHA256f5942f9e9ddf36c8dc4464026a9c03351dd46e724d0f541b29ae0f107e26015d
SHA512d4130a304ecab64bda8fc5969220ee8ea1d754a0e81dd13908ec72d0d86845f00e04f248126757858c26014921bb75f9cbc580c5b5bb165f785814aa98976469
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5fe4cd478fb76f7096b8b73da045ba07f
SHA10e18f760832637e6fb828e7216a0774c3407a7b5
SHA2560ad15d142be3fe177a39c79931745059415369747e129591c876bf81ae94a6fb
SHA5128e66ee69a9b478d6ac66f8d0688170b870156b3ceabb332a4aebfb723eb87ca2864b103b95586ed72684987dafb6afa48a3260c97598fab82e35f5da2510345c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\datareporting\glean\pending_pings\4ad0cebe-700f-462a-bb9a-88d747f1e947
Filesize671B
MD5101e4f79ba2a4dafabb0570e29589b65
SHA170b11ae9efc55d0b633982e6a559675e83fc0ae5
SHA256a73e52d16483e3070c04b7855c509907b60d0da314f10f988c9461cea5f2d3b6
SHA51293183a3421a18187d9f319801465ccac1f67cd1dd64b599151f5a8108ae8283d746fbb321afe92392224a3bd3dd9726d79c7d3679ae0578e2ded38d5033bd159
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\datareporting\glean\pending_pings\62c49315-8585-40ad-be38-57385247214e
Filesize25KB
MD50e5cf344a3f0ca44d7432720afddfe88
SHA17209b97aeaf4bfe21cc25ded5823e07ebcb84a9b
SHA25624107c0cdfec029b1143fb0fc1adead7b30dec40bb895b22e46074ea031386bc
SHA51249afd09bb7659e9cd96961884812354bcddc7d7c24d583f6965a5577299e30b0317dfaccc98cbd687580388345e817cf364da6637924fc2838f1d3c01523ede3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\datareporting\glean\pending_pings\7c8b26ef-57e2-49f1-abf5-da4eb8df28ba
Filesize982B
MD55df95a4434888dbdb3fcf1d34244cc73
SHA1a8c79b9212e9128113cfe49a86b26fc4e374e4e0
SHA25620dd54fa7990fb5fa6fa2bec01796b11b7e6a89b018d2674eab4594403ddea17
SHA512f1cc014bb35f645ccc21485a3ff8dad870b514e522c4d639d91cab753286398ccd93ffafdd84d7a384c226ee15ce84ad894f0d5792f0315ae308899cc7d862c0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5c727d50ace2230d8951ce69ce5f3fb73
SHA11588bebee3c93f6e63cbb9608da8f0f782ea7c91
SHA256343b2661f4d116c5c7aa3042885ba71a03b0c99ffcbffb74ad1d5e88aca523c2
SHA5121159b1f51b23bd538e19f8f55cbc6eea15f742dd58efaa92a063418a4f10880960187676bf8813dd46f2a3585e6fab882c8bd10c1b0d0a61059a56bf7899e022
-
Filesize
16KB
MD5b26224e0c16f0020794734537a2a5b47
SHA151ec2462fcf8092e2f9148b5592b0353357d89c4
SHA25600af692b774c4746b26e5f1c1c43c6300917a26e3be79653c3d12a04c34d8e90
SHA51207a073740579e34955245748b58cce96ff65fad9fef3d57f7212db9a71f4ddd4df86812a8a52aec13cc57e3b3516f58707ca9471615467c29720a0fa7a500935
-
Filesize
11KB
MD5c8ed156233eaf7726a7fa075a4e1e8e6
SHA1f11cc72a0670f48683a1c98099efb7155967e8d4
SHA25622e7f2027775d30068c4ec40986a964f6e90fa854d9bda1caf95e2df7412f523
SHA5127986763620808d8ab60fa8b2eddd49768bb58c489fd098e6cddddfaa5685a54edc54c61e5b546d1c10847578b65e34f66da383e4465cab2cde48dee50147a7ce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD5c7dd017701f708f0260549286bb8c35d
SHA1875d793e47cc32a428d66b23b5a466faa37da1ba
SHA25687a76e3f192159f8c622de49936ce9b99523d85828d0df6240a30c168a36f1ee
SHA51297df4824ced6f857bfe2a5f06842b7fd2f5b493ea3ebef0a2320763fde36083fd127b84520b7555f6d8ec813d54cc7b3cc5f5fd542a600bddb2c1443b84e16fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize376KB
MD597e39a3bde05fdd6bd0194817342e49e
SHA175f63d9005f5ca6dd2ccbaed4003284b073b9497
SHA256e8a7fb3c47a05f71f63d027f626df3bb597c7dc1bf96ec246ee5847b82b1f1d4
SHA5124e634a745322274a29ed14f7176de1aef6d913b37c9f1ebf71e673c219b9572717d196a3c75bd485d458d8005c4e8d74eb61afe4d4efeed4947fc7073d546055
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.1MB
MD5d7f0cff602ddde448a9cbb4db65fa081
SHA16141b3edb4b39c2cf12e4407b6efa9f90da75a68
SHA25627129b3cdb1264f58df1b0dca82e0baac95c7018933f4a6a2417624a63378cc9
SHA512d51651b2a267f2ac1303dbf4d3d86dac29d35e291b4a5d3c8619d2701a8d782004675ae2bd320b9be042e57006e66dd15c113518ae927960ebbe6e3a0d6dfc67
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vpqsq2xy.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.2MB
MD5f97101b0b3cf41bee03ea63551c70745
SHA18d43c5903d5da40cc76fcc8b8430cbb4138d2806
SHA2561d8865c491236138f1798c832cca082be4df48d68c92678392c63a24bfdee80a
SHA5127048c57fa8cb6a2902ab9911678d470095e0beb8149dca6787d17e9965bd3dc636a9940d02e4fb22f8c525f62656c93bf1876ee32388c287435621e5b8c8d501