Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
267s -
max time network
269s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/01/2025, 09:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://download2.aida64.com/aida64extreme750.zip
Resource
win11-20241007-en
Errors
General
-
Target
https://download2.aida64.com/aida64extreme750.zip
Malware Config
Signatures
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: aida64.exe File opened (read-only) \??\J: aida64.exe File opened (read-only) \??\T: aida64.exe File opened (read-only) \??\U: aida64.exe File opened (read-only) \??\X: aida64.exe File opened (read-only) \??\E: aida64.exe File opened (read-only) \??\L: aida64.exe File opened (read-only) \??\N: aida64.exe File opened (read-only) \??\O: aida64.exe File opened (read-only) \??\W: aida64.exe File opened (read-only) \??\Z: aida64.exe File opened (read-only) \??\H: aida64.exe File opened (read-only) \??\K: aida64.exe File opened (read-only) \??\M: aida64.exe File opened (read-only) \??\Q: aida64.exe File opened (read-only) \??\R: aida64.exe File opened (read-only) \??\V: aida64.exe File opened (read-only) \??\G: aida64.exe File opened (read-only) \??\P: aida64.exe File opened (read-only) \??\S: aida64.exe File opened (read-only) \??\Y: aida64.exe -
resource yara_rule behavioral1/memory/2080-438-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-452-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-453-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-456-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-463-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-468-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-474-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-480-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-490-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-502-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-508-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-513-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-514-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-517-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-519-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-520-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-523-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-524-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-527-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-528-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-554-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-555-0x0000000000400000-0x0000000004FA4000-memory.dmp upx behavioral1/memory/2080-601-0x0000000000400000-0x0000000004FA4000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\INF\c_display.PNF aida64.exe File created C:\Windows\INF\c_processor.PNF aida64.exe File created C:\Windows\INF\c_monitor.PNF aida64.exe File created C:\Windows\INF\c_volume.PNF aida64.exe File created C:\Windows\INF\c_media.PNF aida64.exe File created C:\Windows\INF\c_diskdrive.PNF aida64.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aida64.exe -
Checks SCSI registry key(s) 3 TTPs 17 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID aida64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LocationInformation aida64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Driver aida64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LocationInformation aida64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 aida64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID aida64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Address aida64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc aida64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName aida64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 aida64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc aida64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName aida64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Driver aida64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Address aida64.exe -
Checks processor information in registry 2 TTPs 23 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier aida64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 aida64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor aida64.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor aida64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier aida64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString aida64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier aida64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString aida64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz aida64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor aida64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 aida64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier aida64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz aida64.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\DESCRIPTION\System\BIOS aida64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct aida64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion aida64.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "183" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings firefox.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\Downloads\aida64extreme750.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\AppData\Local\Temp\AIDA64Driver.sys\:Zone.Identifier:$DATA aida64.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2080 aida64.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 676 Process not Found 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 59 IoCs
description pid Process Token: SeDebugPrivilege 3376 firefox.exe Token: SeDebugPrivilege 3376 firefox.exe Token: SeDebugPrivilege 3376 firefox.exe Token: SeDebugPrivilege 3376 firefox.exe Token: SeDebugPrivilege 3376 firefox.exe Token: SeDebugPrivilege 3376 firefox.exe Token: SeSystemEnvironmentPrivilege 2080 aida64.exe Token: 33 1892 aida_bench64.dll Token: SeIncBasePriorityPrivilege 1892 aida_bench64.dll Token: 33 1892 aida_bench64.dll Token: SeIncBasePriorityPrivilege 1892 aida_bench64.dll Token: 33 964 aida_bench64.dll Token: SeIncBasePriorityPrivilege 964 aida_bench64.dll Token: 33 964 aida_bench64.dll Token: SeIncBasePriorityPrivilege 964 aida_bench64.dll Token: 33 2964 aida_bench64.dll Token: SeIncBasePriorityPrivilege 2964 aida_bench64.dll Token: 33 2964 aida_bench64.dll Token: SeIncBasePriorityPrivilege 2964 aida_bench64.dll Token: 33 4820 aida_bench64.dll Token: SeIncBasePriorityPrivilege 4820 aida_bench64.dll Token: 33 4820 aida_bench64.dll Token: SeIncBasePriorityPrivilege 4820 aida_bench64.dll Token: 33 4620 aida_bench64.dll Token: SeIncBasePriorityPrivilege 4620 aida_bench64.dll Token: 33 4620 aida_bench64.dll Token: SeIncBasePriorityPrivilege 4620 aida_bench64.dll Token: 33 1900 aida_bench64.dll Token: SeIncBasePriorityPrivilege 1900 aida_bench64.dll Token: 33 1900 aida_bench64.dll Token: SeIncBasePriorityPrivilege 1900 aida_bench64.dll Token: 33 4172 aida_bench64.dll Token: SeIncBasePriorityPrivilege 4172 aida_bench64.dll Token: 33 4172 aida_bench64.dll Token: SeIncBasePriorityPrivilege 4172 aida_bench64.dll Token: 33 2564 aida_bench64.dll Token: SeIncBasePriorityPrivilege 2564 aida_bench64.dll Token: 33 2564 aida_bench64.dll Token: SeIncBasePriorityPrivilege 2564 aida_bench64.dll Token: 33 2976 aida_bench64.dll Token: SeIncBasePriorityPrivilege 2976 aida_bench64.dll Token: 33 2976 aida_bench64.dll Token: SeIncBasePriorityPrivilege 2976 aida_bench64.dll Token: 33 4924 aida_bench64.dll Token: SeIncBasePriorityPrivilege 4924 aida_bench64.dll Token: 33 4924 aida_bench64.dll Token: SeIncBasePriorityPrivilege 4924 aida_bench64.dll Token: 33 4068 aida_bench64.dll Token: SeIncBasePriorityPrivilege 4068 aida_bench64.dll Token: 33 4068 aida_bench64.dll Token: SeIncBasePriorityPrivilege 4068 aida_bench64.dll Token: 33 1332 aida_bench64.dll Token: SeIncBasePriorityPrivilege 1332 aida_bench64.dll Token: 33 1332 aida_bench64.dll Token: SeIncBasePriorityPrivilege 1332 aida_bench64.dll Token: SeDebugPrivilege 4548 taskmgr.exe Token: SeSystemProfilePrivilege 4548 taskmgr.exe Token: SeCreateGlobalPrivilege 4548 taskmgr.exe Token: SeDebugPrivilege 3376 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 2080 aida64.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 2080 aida64.exe 4548 taskmgr.exe 4548 taskmgr.exe -
Suspicious use of SendNotifyMessage 54 IoCs
pid Process 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 2080 aida64.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 2080 aida64.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 2080 aida64.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe 2080 aida64.exe 4548 taskmgr.exe 4548 taskmgr.exe 4548 taskmgr.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 3376 firefox.exe 1776 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1920 wrote to memory of 3376 1920 firefox.exe 77 PID 1920 wrote to memory of 3376 1920 firefox.exe 77 PID 1920 wrote to memory of 3376 1920 firefox.exe 77 PID 1920 wrote to memory of 3376 1920 firefox.exe 77 PID 1920 wrote to memory of 3376 1920 firefox.exe 77 PID 1920 wrote to memory of 3376 1920 firefox.exe 77 PID 1920 wrote to memory of 3376 1920 firefox.exe 77 PID 1920 wrote to memory of 3376 1920 firefox.exe 77 PID 1920 wrote to memory of 3376 1920 firefox.exe 77 PID 1920 wrote to memory of 3376 1920 firefox.exe 77 PID 1920 wrote to memory of 3376 1920 firefox.exe 77 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 2412 3376 firefox.exe 78 PID 3376 wrote to memory of 3132 3376 firefox.exe 79 PID 3376 wrote to memory of 3132 3376 firefox.exe 79 PID 3376 wrote to memory of 3132 3376 firefox.exe 79 PID 3376 wrote to memory of 3132 3376 firefox.exe 79 PID 3376 wrote to memory of 3132 3376 firefox.exe 79 PID 3376 wrote to memory of 3132 3376 firefox.exe 79 PID 3376 wrote to memory of 3132 3376 firefox.exe 79 PID 3376 wrote to memory of 3132 3376 firefox.exe 79 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://download2.aida64.com/aida64extreme750.zip"1⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://download2.aida64.com/aida64extreme750.zip2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1972 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1496 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {111e76ed-06eb-4b0b-afc0-e76ba51b6dee} 3376 "\\.\pipe\gecko-crash-server-pipe.3376" gpu3⤵PID:2412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2392 -prefMapHandle 2388 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4534877c-fa32-4576-a8f5-5002f361dc15} 3376 "\\.\pipe\gecko-crash-server-pipe.3376" socket3⤵PID:3132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3272 -childID 1 -isForBrowser -prefsHandle 3264 -prefMapHandle 3168 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8ffd6c8b-9eb8-4dd9-85b4-95728ce8ed37} 3376 "\\.\pipe\gecko-crash-server-pipe.3376" tab3⤵PID:2624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3912 -childID 2 -isForBrowser -prefsHandle 3916 -prefMapHandle 3924 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c1ff7206-eac3-47c7-a6ec-fe33b4326767} 3376 "\\.\pipe\gecko-crash-server-pipe.3376" tab3⤵PID:1888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4224 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 5032 -prefMapHandle 5028 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1f419345-31cb-4557-ae37-2c93a8a223a1} 3376 "\\.\pipe\gecko-crash-server-pipe.3376" utility3⤵
- Checks processor information in registry
PID:4756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5792 -childID 3 -isForBrowser -prefsHandle 5784 -prefMapHandle 5780 -prefsLen 27218 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ab25913-3b18-4ced-a8ae-f2a0733fb79e} 3376 "\\.\pipe\gecko-crash-server-pipe.3376" tab3⤵PID:4256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5812 -childID 4 -isForBrowser -prefsHandle 5804 -prefMapHandle 5800 -prefsLen 27218 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7f96806-ffbc-47ac-a922-e5c5765bd1d8} 3376 "\\.\pipe\gecko-crash-server-pipe.3376" tab3⤵PID:4528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6040 -childID 5 -isForBrowser -prefsHandle 5952 -prefMapHandle 5812 -prefsLen 27218 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2131c32f-5a34-4eec-9282-1471da25f7f0} 3376 "\\.\pipe\gecko-crash-server-pipe.3376" tab3⤵PID:1448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6152 -childID 6 -isForBrowser -prefsHandle 6124 -prefMapHandle 6128 -prefsLen 32602 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d1ea21cb-7dd7-47d4-b750-3863cfac7799} 3376 "\\.\pipe\gecko-crash-server-pipe.3376" tab3⤵PID:3036
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4460
-
C:\Users\Admin\Downloads\aida64extreme750\aida64.exe"C:\Users\Admin\Downloads\aida64extreme750\aida64.exe"1⤵
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2080 -
C:\Windows\System32\ie4uinit.exe"C:\Windows\System32\ie4uinit.exe" -ClearIconCache2⤵PID:1172
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_SST2⤵PID:4608
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_SST2⤵PID:1588
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_SST2⤵PID:1020
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_MTMBW2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_MTMBW2⤵
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_MTMBW2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_NGMemLat2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_MTMBW2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_MTMBW2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_MTMBW2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_NGMemLat2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_MTMBW2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_MTMBW2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_MTMBW2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Users\Admin\Downloads\aida64extreme750\aida_bench64.dllaida_bench64.dll FinalWireBenchmarks_NGMemLat2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4548
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39d0055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5f8fe93124ea91cc09727a707b36ae210
SHA1599963fc3a8925135cb9462993326002c0f8b635
SHA256e2c2919dc867cd4ac774a79e36e2e724f78886f9ea4dfcf481b08eaeefff04d4
SHA5126d51686fb74e0fa4047a01f86a531bd12b4a827f0a5282cc4b1f04b85a0ee08cba0a129e2fed155b708de2a8583ad624637f3ce2f07c75343a25737c965eb868
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\dfn8djy7.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5266fa5fbae2ecec153785628e5c690f9
SHA1d162afaf7af86ef4278f3e5d6968e40bcdfaedc3
SHA2561e53425d75cbe7d0ad623e4000dface3dafb00244bc364535477af8c0e17c779
SHA51214eff85bfef12022819b9cf7f77373dd5cdf939f082e4e61e246d855c75845dc2fde9e486c6353ca6e75738c9cc38d12d4df5b01d02cafab9e26cfbd150756e7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\dfn8djy7.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize7KB
MD5e844b67c2df2c95d082d745d620f54df
SHA133c06915ef954e04db6029bd8c588bb660914ef2
SHA25672fe5671c5b4448a6b9d9e4787ed9f59a9bd2daca39feb6a5bf64a9925ecb8bb
SHA512b8ab1e8ffd9dd700c3982a59c67e071d5e4ff3dfe7ae6604216a064835a56f04b965c35ad0e033634891b4a9cdf5ab5af8d558569b60a4a59e4390f253a4e5cd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize7KB
MD59841db629dfe61816032d3cf7d2e3556
SHA1c86f32b3a4667a77e947fc56120ce3e51a33fe93
SHA2566e836a6e43325522b30cf3e9b88fb50074d3e705e04e79b7facb0f2813e4e115
SHA5124bad5e8fe44f73228000d395fa1bf2b5915ff21ce698711883649c00defd51e24745761b82d87dd82062d00f525f440642ff215c0035391346c6efffc90b8f93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dfn8djy7.default-release\AlternateServices.bin
Filesize8KB
MD5a71ef8c7027aec037a65f35409b3aa94
SHA1046e575d417aa8bdb320c42cc9c466a4d0ddcaf2
SHA256492df0c0e54afb560ecdddaaf2cf0863c74fd2e7379f385d8b2e3627e3453ba4
SHA51278721fffca75d150bf16e4459fa82603cf230ab1d262b7dc76f1b9dbd533ddbe5d0e721f3359707e01b661873e168547450cc58a6094a94c0b361e1f3224d9b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dfn8djy7.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57c2c387b1cd6cd2a069827fb3f95d8df
SHA1109810992ecfd362bc85541d2cd6a6bcf2267c2a
SHA2560f3a9a4077884fec37add644814efec0abc1517913af1f115e1e912c0f218fa2
SHA512c792d57bdf38ec0ca1cfaeb4db62c0f2be6e19aa2cb5cf944c7f4d34f678550c16aa504d216eca9864c4971d29727bc0f9cecb8721d0a6c861b687a0bd01c73f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dfn8djy7.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD523a7135a79278cc169c347691d7ab69d
SHA188ea91bbf1d6d6892f8166069603f6b33e36a0cb
SHA256389ab3f8280301219ec94650652b0b515b332a4038cbcd98958cd8a01570dbdf
SHA5120478ec8190aec89e6ed05c2b0deaf8f7f60f3aa3cbc5f5ccdb4a4b8bcf6dc729351d59163ae127bae988ead823adb061ee907a14105056783d14655fed271781
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dfn8djy7.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c9a39e88fc8c3b1e1247c6c4c2c2195e
SHA17160f748e2ac9306975663f48de93f1a2d3aff17
SHA256b92f0b688cd042cc32f873ac5dbb347308f941efcb662f31968014c83230356f
SHA512ac812d9a8a68d377b9a9beef67fcb7d3aab76c50f5feb56d087449af439560dfdf1edcc9cb32e102fc13f1f32628221c6cf5b9a8cb2ea249c7264590098bb7c0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dfn8djy7.default-release\datareporting\glean\pending_pings\2c22ab9e-62c3-44be-9d06-b065d7c550ca
Filesize982B
MD509181dbc786c7d78a2c6688609464202
SHA18a8e6ebf8fe3b3d7b5fb43c9c42f6258ca854a05
SHA256d72b465b889dbab979b6094b09715ef24613350cac7f2f027ff531e6a9330099
SHA512efb9b31a8fc5755725018184884444ceea8af29300caf662a777c36a4eee21b4205abccf3402bc9a13ff722dd152aa95cfff6c97de448c4ff97a9730cd1c92dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dfn8djy7.default-release\datareporting\glean\pending_pings\2ed89e97-5605-4e5e-b7da-3950fd83b16f
Filesize26KB
MD5666c48d9f6827ccb7e19e1e16d97c6b6
SHA1519b78df0e6962e173679e751745cce9ba2b8e88
SHA256132b0a7e9a9efbdd57b357b09e7181debfdfc9926b89b66ea99ecfa78024fa3b
SHA5120187b3eee19c2bdd29e094f4a97ac98b57a8991ea548949f907a70c713d29e93b5e5920a2318335ebfec2ee1946e332dd3d8d23e81a65d65259f462e44611ba4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dfn8djy7.default-release\datareporting\glean\pending_pings\fc223c4d-f106-4e95-908d-b155445aa436
Filesize671B
MD597cf5a00575869fcd71e0b04958f6f85
SHA1babcaa0d5d86705596f67eaf6cd00b7160a119d9
SHA25673c076a431db3a9c390d37007ce77055069bcf7849d1a5cdb1c52ef964a977c7
SHA512f8c7ec443a46cfb2dcd81615fedcade09886fdb666a781540d88f1183a2e837198ce0488936da31de3e03cf183440667ad6694e99a03a091ff0587b9aa6ab42a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dfn8djy7.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dfn8djy7.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dfn8djy7.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dfn8djy7.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD52328e676a07c0ebfec9f9654055831b2
SHA12b3aa905d589c2988e245fec08ebc7d202060792
SHA256ae061152b062ea6ef732bbf06b6fe8bfb1245713cad18b5856e0c80ba3adff50
SHA512797432c71e50efe0c26055ba5e269b671094380614d403c9099ed542eec187304abee68bc59154f312a1ee9f18261d2271c1a0a251cfe65e7e64d63f9ef58e60
-
Filesize
9KB
MD5c2d0bd5220399ec580088fbb92743520
SHA1c3febf4a2599fafb48ee6e19f5e64d7b3d0919eb
SHA2564a24e4007bc684f72cdb7a87dd31c21994f0bc6ece082094e37a9287eb5ce5e6
SHA512f4c97e75c0dfcd37cc1a3d8668e1da6141e028a156cd7691d07af46f5bc5cee695fc0d457e01fd67aa04e1d74d7bcff43e510f103734712f8af6c84468b02ce3
-
Filesize
10KB
MD5e94bce2ee1dd17b27cb136b205d8e5f5
SHA1051719dec513a3257f889e73e1c62c477f274360
SHA256a8f8b886420695d29a82d691c8fbce2a98442ddea3a178209f4ed3db88776171
SHA51201dc3c1badca62ac6a0970970d0df96b18758477df37f396e55d384e0f08799a804ce231bd75027521c334a401175f5c1ee4dacb057b9ab48d706314da94ee8a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dfn8djy7.default-release\sessionCheckpoints.json.tmp
Filesize259B
MD5700fe59d2eb10b8cd28525fcc46bc0cc
SHA1339badf0e1eba5332bff317d7cf8a41d5860390d
SHA2564f5d849bdf4a5eeeb5da8836589e064e31c8e94129d4e55b1c69a6f98fb9f9ea
SHA5123fa1b3fd4277d5900140e013b1035cb4c72065afcc6b6a8595b43101cfe7d09e75554a877e4a01bb80b0d7a58cdcfe553c4a9ef308c5695c5e77cb0ea99bada4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dfn8djy7.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5d141d866990bf3108daef2715b8d6642
SHA15bf6dbcfd8dc01d4936c8d3fbdeb0e61a25ee74b
SHA2563dc98fb32948306926223dc3fe74f1410b7c59dc51e70abb6c5d6883a20b9a8c
SHA512adfe3a366db962d1119abf0e638f63774bffb8b98d635f37c0208460f2cd5f1191544df24c468ed13e9949de5ee256f8b537955a075d5cc91cc885f14c8de3ea