Analysis
-
max time kernel
200s -
max time network
207s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 02:31
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
General
-
Target
Setup.exe
-
Size
5.8MB
-
MD5
bbe78d29491c853102a3facc26496d87
-
SHA1
f1f0134922b5bde2037526d9eabb9fdb490bebbf
-
SHA256
ab8eebd2e53caa2b7a5b54fbe1951c048ee4ce1ec1a80f2516b8ea9ef4d6927f
-
SHA512
95e586e7d966c140fca8990620a6de36ed9cf44727bcc0dfdbe30ff8ede278d9fe32ddbbbb66f61d06c1e57a6dbf45f9df625090248f535b944faba38a550930
-
SSDEEP
98304:KqQkJnu+p0Ow4mmrEzmPK0wSsS/YP+UAeEpRdMsPa8V8wirc/cQq8hwqk2y0wgjh:KGHp0OoiEyP+SszP+UA/dMIvV8wiEcRC
Malware Config
Signatures
-
Detect Vidar Stealer 10 IoCs
resource yara_rule behavioral1/memory/2068-41-0x00000000012F0000-0x0000000002336000-memory.dmp family_vidar_v7 behavioral1/memory/2068-45-0x00000000012F0000-0x0000000002336000-memory.dmp family_vidar_v7 behavioral1/memory/2068-42-0x00000000012F0000-0x0000000002336000-memory.dmp family_vidar_v7 behavioral1/memory/2068-46-0x00000000012F0000-0x0000000002336000-memory.dmp family_vidar_v7 behavioral1/memory/2068-49-0x00000000012F0000-0x0000000002336000-memory.dmp family_vidar_v7 behavioral1/memory/2068-48-0x00000000012F0000-0x0000000002336000-memory.dmp family_vidar_v7 behavioral1/memory/2068-47-0x00000000012F0000-0x0000000002336000-memory.dmp family_vidar_v7 behavioral1/memory/2068-44-0x00000000012F0000-0x0000000002336000-memory.dmp family_vidar_v7 behavioral1/memory/2068-98-0x00000000012F0000-0x0000000002336000-memory.dmp family_vidar_v7 behavioral1/memory/2068-348-0x00000000012F0000-0x0000000002336000-memory.dmp family_vidar_v7 -
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
resource yara_rule behavioral1/memory/2068-0-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-33-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-38-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-41-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-40-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-39-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-45-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-43-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-42-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-46-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-49-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-48-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-47-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-44-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-98-0x00000000012F0000-0x0000000002336000-memory.dmp themida behavioral1/memory/2068-348-0x00000000012F0000-0x0000000002336000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2068 Setup.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1560 2068 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings firefox.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Setup.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2068 Setup.exe 2068 Setup.exe 1520 chrome.exe 1520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1980 firefox.exe 1980 firefox.exe 1980 firefox.exe 1980 firefox.exe -
Suspicious use of SendNotifyMessage 35 IoCs
pid Process 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1980 firefox.exe 1980 firefox.exe 1980 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2820 1520 chrome.exe 33 PID 1520 wrote to memory of 2820 1520 chrome.exe 33 PID 1520 wrote to memory of 2820 1520 chrome.exe 33 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 1668 1520 chrome.exe 35 PID 1520 wrote to memory of 3016 1520 chrome.exe 36 PID 1520 wrote to memory of 3016 1520 chrome.exe 36 PID 1520 wrote to memory of 3016 1520 chrome.exe 36 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 PID 1520 wrote to memory of 2996 1520 chrome.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 14482⤵
- Program crash
PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6f99758,0x7fef6f99768,0x7fef6f997782⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1400,i,17747093365639763721,9426541421828603033,131072 /prefetch:22⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1552 --field-trial-handle=1400,i,17747093365639763721,9426541421828603033,131072 /prefetch:82⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1400,i,17747093365639763721,9426541421828603033,131072 /prefetch:82⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2128 --field-trial-handle=1400,i,17747093365639763721,9426541421828603033,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2156 --field-trial-handle=1400,i,17747093365639763721,9426541421828603033,131072 /prefetch:12⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1412 --field-trial-handle=1400,i,17747093365639763721,9426541421828603033,131072 /prefetch:22⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1492 --field-trial-handle=1400,i,17747093365639763721,9426541421828603033,131072 /prefetch:12⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3996 --field-trial-handle=1400,i,17747093365639763721,9426541421828603033,131072 /prefetch:82⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4024 --field-trial-handle=1400,i,17747093365639763721,9426541421828603033,131072 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4088 --field-trial-handle=1400,i,17747093365639763721,9426541421828603033,131072 /prefetch:82⤵PID:716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4152 --field-trial-handle=1400,i,17747093365639763721,9426541421828603033,131072 /prefetch:82⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2416 --field-trial-handle=1400,i,17747093365639763721,9426541421828603033,131072 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3164 --field-trial-handle=1400,i,17747093365639763721,9426541421828603033,131072 /prefetch:12⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1384
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:1932
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1980 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1980.0.1567460117\229247681" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1136 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f45ec17a-0c2a-4d3f-8d64-46747e2655ba} 1980 "\\.\pipe\gecko-crash-server-pipe.1980" 1340 efeb458 gpu3⤵PID:832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1980.1.1494493196\1165274245" -parentBuildID 20221007134813 -prefsHandle 1520 -prefMapHandle 1512 -prefsLen 20928 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd2656b8-b7aa-4b2e-9de0-95e5e9e2723c} 1980 "\\.\pipe\gecko-crash-server-pipe.1980" 1544 efc5a58 socket3⤵PID:1100
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1980.2.1070054506\74072942" -childID 1 -isForBrowser -prefsHandle 1984 -prefMapHandle 1980 -prefsLen 20966 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {40dc20ce-b00e-41ff-8135-b4c3add8a241} 1980 "\\.\pipe\gecko-crash-server-pipe.1980" 1996 ef61458 tab3⤵PID:1672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1980.3.1614070241\860566868" -childID 2 -isForBrowser -prefsHandle 2508 -prefMapHandle 2412 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f9a03669-cdbe-434d-ba7d-6b1e378944d9} 1980 "\\.\pipe\gecko-crash-server-pipe.1980" 2516 e67558 tab3⤵PID:2956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1980.4.139061214\825877696" -childID 3 -isForBrowser -prefsHandle 2892 -prefMapHandle 2888 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {33390413-7452-4152-9efa-98c616e9244a} 1980 "\\.\pipe\gecko-crash-server-pipe.1980" 2896 1bbfa258 tab3⤵PID:1564
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1980.5.1134733394\1235989507" -childID 4 -isForBrowser -prefsHandle 3632 -prefMapHandle 3772 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed33ed34-92e0-42e5-8d98-2ed6268d73d5} 1980 "\\.\pipe\gecko-crash-server-pipe.1980" 3820 1e4fa558 tab3⤵PID:2948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1980.6.1622467793\1986271320" -childID 5 -isForBrowser -prefsHandle 3928 -prefMapHandle 3932 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5dd2f97d-3aa5-4a98-84c0-3eb02a77e386} 1980 "\\.\pipe\gecko-crash-server-pipe.1980" 3912 1e9b7e58 tab3⤵PID:1596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1980.7.1911562870\769225308" -childID 6 -isForBrowser -prefsHandle 4108 -prefMapHandle 4112 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {648e8147-dcd6-493e-bb12-40ef2601c0df} 1980 "\\.\pipe\gecko-crash-server-pipe.1980" 4092 1e9b9c58 tab3⤵PID:2332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1980.8.1912880040\519323235" -childID 7 -isForBrowser -prefsHandle 3976 -prefMapHandle 4356 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 584 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c168f5a1-4ee9-45b8-8920-37fed43d96d0} 1980 "\\.\pipe\gecko-crash-server-pipe.1980" 3964 21b1ba58 tab3⤵PID:2920
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD5521bfcbb635a46e418d003006634c8db
SHA12295bf6165d6ec13df4f15da0399f4d03b3730d0
SHA256bf46ee3bea7b7a77c38df4e68710cc790a1bc0f2584a18aee45cb780333bfb7a
SHA5124968265934059ebe1079a5ea73447f97bdb451f12197a493cc1156d5299dc68037c6a4a89f8e5b1bd6a642295e7ad15aba472c16a3c45a1aa13784f6b21d6c8b
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
361B
MD5cf7d511c99718a35a93e3dd4e08901c8
SHA14f06e9d593782e8c737b7a41136874eef862f174
SHA256472388067f0f115f84826e61c4179082d279b96783bcdd1348083eaa8eb7f396
SHA5125b68d9d6bd851488f34825cd0e30a463dedce4c6a8c9921a1f8dccad0a76473e7aa429eb4fca5c580f5a1f56e3d4c96391bd0dbc84298b9211e1ac3cea58a8ef
-
Filesize
5KB
MD5d7427c08c9bb151d41b587448cc8a67e
SHA1253451ab6a27b08849eff4f8fb067667bb7efea3
SHA2566a03d915ac00a68e0870f745a7e79af15c6f4e62ccbdc1b9c85c54777262564a
SHA51251fc0e3aab096304b6797af68c33a94f34c9f8bdc3987919e111447e6fb815b3adbf9c411cfb787d87ec0379f45ea1a8392ebf83921e17e20bdd3f8ad79b1264
-
Filesize
5KB
MD5cd4a81e3d3f4b9f0e35a3f7edf440cd8
SHA158fe6caae7e7b3212d7b90d08d40888f1acaa66e
SHA25620bf03e102da089482c18767ad767aee2451590842f99850bb796f8f94d4bea6
SHA5122aae8f06176e6fedbfa32965707060b4829fdb64ae68d9fadd90bc317bd66eea460f55e025453be0aa9cc044de468552b41ba260d078eb5179dd1f66f69f4950
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
349KB
MD549f886634b8890b9db1edc14064343d8
SHA133798f8385b7079b7fce848979a29c2dead0aeab
SHA2566677425632edff2d6668cea0ad24ab34a23d4d0b39fb7fdc010f0d892c479d4e
SHA5128c904385ba229914ab426a1d1ae1da6946edba2bc4c065970404e68a1ca1822c5689c4450a2ff4c4fc48622422d3440fb5d790b83270648b09e9d09fd82053fb
-
Filesize
170KB
MD5b10513a0bff03344492c339f8a2a4d5b
SHA15a19c79b4a82d5dfa75dede8811ec2f288b52ac8
SHA256e5be7769e88ac7f08e62125744868ea90d5175d20347e9f7ce008240d9dd45ac
SHA51256f90267b13e7b39d0657ba8f541f7c3ac7cd2933da257ad04781763bb80d2425c8e143b179a76c539807c731a85d72b4858b492715783fb86956c6c7d69c31d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp
Filesize33KB
MD53f39add3c7a0d4344a887f77f94e3dc3
SHA10423216779563ac7fe341166e5c659f74b4e457f
SHA2567176779a7f3246026757b7bd2fffd9432ae00051c5d8a91fb703bb8f09f9a6f5
SHA512711d0317fe9fc237741c9bd2d0e6e420aece7cb300d391e910895964f62f4e2ae6718c73834e76ee09735b44a3ac96544781df6d3b2034a6643ad830ab584113
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\cache2\entries\DF88F41E5DAC45B039B785901EE8352DCC6CDA96
Filesize49KB
MD5c4a943a4de5067de7bd05955b543740a
SHA114b107c17156e1dda465c85493039986a75ab259
SHA256ac7a8b7080654ee2d96ff6b43cd56b5e6102f3a41b20f8444412475904f00408
SHA512c136ea2afb2bef08d0f458e7a95b3be01267eb217635a7040c10ee7971a2627965ccd3c8a1349dbddbb9ed99478bc5d256aa85f762afa891c07cee3c8355baf7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD5ce97034f7e62dd9edb5b1c2d257ae125
SHA1e104a8759e8e3d95b40eb8425c893d43bcebcdd1
SHA256447fa072b65448e54f1a40237fe1c19fc353913d7a8b659321ce35d226157371
SHA5127690900849d7b9b2b31a48999e5c6790cafdce5fdbd571e8a0ed32f1942d59e8e6cd4c6b79a14260eea7308bbaafda2104ee51324cc79dd946b963c04881f9e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\c855ed86-1935-4734-9bcc-cb7442307cf9
Filesize733B
MD5f5d881aa78ba57ae7369e88dedc2a6bf
SHA1d5077dcde144418ac3aeadaaddcd4aa0100b00be
SHA256a743ac56c367dca01d4e7351c843ed45213c4e5f96d87ada9cd62306b58628b0
SHA512bac97e016f2e952bef79fdb591371ef411a85f46423979a85e34d56e1d577edc8c057121488d7155c339822e0966c4a48441f263e430bfd7c9fda1306a7610ce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD5df20629a1844098b0932ed7072406707
SHA12528ee28a3f6562c97d189011dfa2d699b78a21e
SHA256149bf078292378732600585f52ad0666c780019ef63fb1cc225b81dddb98b773
SHA5121454fe0d5e700db99fa91ee17c5336131ea838f60d241349f72c8faa4e118e153de93d9397b0e986c3bf703a5370af2fcc4756b6ac5d20de537bd2fa4deea527
-
Filesize
7KB
MD510afb57103fe9b40fe1714b5f791391c
SHA13eb97ccdf0d2ae567faaad579d9127647fb846db
SHA256434535ea3dcc5a4b62a8c53d253e73c21780356f7c7f41bc066192406df4a62f
SHA51250bf4262c7316758a219d0bf6c910a11652a322462bd576054f2893f060a649873f7bdd68226213cb131b8ec74f78d1ecc9cc06ed50fadacecc5618227d187f6
-
Filesize
6KB
MD5a734f00637f412334a5d7231b53b0a28
SHA16667bdd583e1f5e0b32417e24cfdc1ea4406dda3
SHA2567f4f8fc3a6d0790b6c452dae2a10ce95620049e3ad754d75d83762f42e8cf2e9
SHA5120fae895f6b2d46356d38da0032bc1a5c0b32a4c2153c381a2a0c35696cb1704135d42628e9681b4b2b6eb3bbf7d0dfa57ae607d57fdec8995d8dbf57689f48bb
-
Filesize
6KB
MD5071e80a3bc272b1aa2f2f233b8f21ac7
SHA13691b69fc18dbd5a4388015841c277aaadc71ef9
SHA2564bc77ce30a605a5ef86f72ad63637eb2da4af02dd04e1a8e09c72f9de90a0df6
SHA512a2107d7e0e96b3e9d39888a85a5fdb43e899e9093bcafc483322c6a808c496956206b91ba101241e309f95e125094256af7e3bb74937904c427f05394e88c70b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5704f13c4b8453f138f49b0179e8b90c8
SHA157431acfdaf25741c0cce0ecc4a1505076ff96c3
SHA2566e7888e9305665a9c306269f7c1e5bfee6d718ed319095478999b328ddb332a4
SHA512825ef1472e07064d71a2a33287582d80a5caf7f42466b5f8715892a22807e9538941e521e751ff85bc30260d0f1e9b9316d99a24bfe5ed1cf1aa4278febeff62
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD52d8a02bde99847c1ae1ede6efb5dcdbb
SHA1446cfb9f08f24b6f4abfe45292c730c7be226553
SHA2563c71419dd59b2f2ff621e07bb5c5e367ff3fd3baaf77962b09278bb9c3976017
SHA51254a689134dca44b67b77f051b0c96de4506979c5994d19f123ae2e3012f671974425858230604d1ada1d8c98e057acab442aa171c45033ec74d9ffc8f56dcc65
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD51cbaee85ab0f43178079f48655160a3e
SHA1ecf0c13c92afac325ceb511e2e422ae7faf488d3
SHA256e0b7172daf60a0c365754a1a740e1608b790628580fbdc739f063832c25d7edc
SHA512322b1452d321e0b7b9adc0f5540ed51845fed3a4b66f9d56c23593d3716e30fd2d83e9b5e950bcf1b36bf440c617537858007ef9b2ac67050b81bccff387c749
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5d21064a1620270d8b24b83cc2f584c56
SHA158ad6d7e633fdf79b5c671fb2147bc477faf7e9d
SHA2565378d188bd8733cf5e0dd79de822e7dac3ec5c763d36c7722954a6dc00be9977
SHA5120367d87f66deffd0e9716641002652478fe53e5c820e70b609e5e8eede220bf95d98a4a9624a617a70ae6dc51c610b7423f373012b908bd2947d2b236af1571b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD51aae9894446d7e4ac83cd294301e4070
SHA1f58be2ac12c274770e2357ffbe777e9a36b68283
SHA256c57efba490207cd1d4b080108b25077e6a25abaf8abc6440f5c327ce498c1577
SHA512c457f2d501f72ca42464702c08f1e114ee99db8aec4464d50f0a9c0e86b52b6f7ccb451d19c148b4c2f2f795d9eb402b4263101dcf08a31e16acf6b772c9f0b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD59e21ffef170e9b735ec64d135ac235a3
SHA1ae8e568d88f4371b35d6488f423cc5859f1e4cfc
SHA256ff83d397cfc84a6e63505fc792f892c231484dbd47288aa8e85ae30a871db32e
SHA512044dba50f03c7a974054a2d81fff64f08b0849e7c65443f97f0707bed7b21ae5e30ad141e0fc7321e3637022205d5e01f51a53bfd04f6ec54eadb3a07ef6c7f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5af8778fb7f906a147dcebbc49af1dbf3
SHA14583c1805063a1f229b21faf1ab217500d2486f2
SHA2562d4c8d3e84aaa1d98768703cfff217bc4f8ee606ac5cefc71d9a3b0e3d753b26
SHA512d86dd82c77dd39050d51928aab5904d381c101d4833e97a547e96e2783f1c6d319dabd419fe95b764d1890c28a215d91cdb04e3ca5909747b4d8e672aeb22527