Resubmissions
08-06-2023 18:19
230608-wx71qahe26 108-06-2023 18:18
230608-wxwmpahe24 1008-06-2023 18:14
230608-wvldyahd89 1008-06-2023 18:05
230608-wpbybaac2s 10Analysis
-
max time kernel
220s -
max time network
222s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
08-06-2023 18:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hello-world-restless-breeze-1237.0d5b.workers.dev/\?email\=\#YXN1dGFudG9AdmlyLmJpbw\=\=
Resource
win10-20230220-en
General
-
Target
https://hello-world-restless-breeze-1237.0d5b.workers.dev/\?email\=\#YXN1dGFudG9AdmlyLmJpbw\=\=
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Checks processor information in registry 2 TTPs 42 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exefirefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURL = "http://www.bing.com/favicon.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\User Preferences\3DB9590C4C4C26C4CCBDD94ECAD790359708C3267B = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\User Preferences\2BB20B33B4171CDAAB6469225AE6A582ED33D7B488 = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000073cad183bf8eb649ab3d4b58ee6f9be100000000020000000000106600000001000020000000d96f24f941ad98f4d424d42c567f33560b0eec8041af3eca48fd4162973063b3000000000e800000000200002000000013fe1ade68a81c67b4dd31b22d672d073df50e82ebad2799ad3dcbcfa067e9461000000075e436f2f476eee4e6d8a9d1aec30b0b4000000089570763c947281b4cfe0d2f554f78fed4b8719f3570562982ae874ea24a6559edac64da04658486095e40d729ae9402371318a55d694d960a678d34cb4a5634 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTLogoPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\UpgradeTime = e9d1f8769d45d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTLogoURL = "http://go.microsoft.com/fwlink/?LinkID=403856&language={language}&scale={scalelevel}&contrast={contrast}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000073cad183bf8eb649ab3d4b58ee6f9be100000000020000000000106600000001000020000000f4616f22945f6e74c8545d4ca698d5c642e459a85eddb6477d3e947c98a5ce63000000000e8000000002000020000000cf8b54759c4b13b510d564847534ffa65b1ae9a6a4b08a883f04852049e4524220000000b69365fd77c7cb7496097a8aa46c2de3675a0495c9070347386071a42ca661124000000044606069f542deab6c90baf535af29cc657b2fbbefce435f6197b3dc930af3b42f182f810ec5899cab26c57a9c366248ef7dc544ba05a28abc67b5bf852a2775 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57AA99EB-0628-11EE-B673-6601CCCDB590} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31038005" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTTopResultURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTTR" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{0633EE93-D776-472f-A0FF-E1416B8B2E3A}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\Version = "5" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08fc32f359ad901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000073cad183bf8eb649ab3d4b58ee6f9be1000000000200000000001066000000010000200000007017443e48b318d91ea2134048a7aa21a230223e4430530adb719eb614e0e334000000000e80000000020000200000001452858db687d344dec95ed116b8e05f176c90413ba06e6b188088c696f87b6a00010000ab9abb115ea90fad21dec7e86595e52d1195d230f1a0b3f6e2ec9c399383a24d745db25103c2c27a1f48c0e2c3ab6566f8db9b09d32383a516cb82c15c55e98de9448b2517a74c3f3b28c9cd7d96f84b274c2a118d71115b08d3fa9b61a844cc78c23c713262a70b62bd9649a77e6e811e3eb10fcd74c14bcd370078937c6c8bad8f7d6bce0034a169d13b5c64a10cb80ebd6eddb855b42a538c19120301a9eb4f3a43a5a6f69b3248fb15da34d0971dd22872926aa73a4af51ed887f5936336a1d60a581c5e95ba20802525912b32da4b5b74ad12e6b9b1e5fe43ee91d37ec7b9f03844e36ed8490e60f0b42f377ad1c800dd3f43222fafeb2279a3544bddc940000000e29b121a6b6ff797936be9a600849455727733298a25689bef7c89104570df17ddaed8f418b53bf20b85e19fad44968bb6bfc249af8a223d2547be0feece5e37 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURLFallback = "http://www.bing.com/favicon.ico" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IESR02" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTSR" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTSuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&market={language}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IENTSS" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "745446329" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\User Preferences iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "745446329" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31038005" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURLFallback = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133307217988234393" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exepid process 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid process 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
firefox.exechrome.exedescription pid process Token: SeDebugPrivilege 3872 firefox.exe Token: SeDebugPrivilege 3872 firefox.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe Token: SeShutdownPrivilege 4308 chrome.exe Token: SeCreatePagefilePrivilege 4308 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
iexplore.exefirefox.exefirefox.exechrome.exepid process 3664 iexplore.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 2532 firefox.exe 2532 firefox.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe -
Suspicious use of SendNotifyMessage 27 IoCs
Processes:
firefox.exechrome.exepid process 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe 4308 chrome.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
Processes:
iexplore.exeIEXPLORE.EXEfirefox.exefirefox.exefirefox.exefirefox.exepid process 3664 iexplore.exe 3664 iexplore.exe 4120 IEXPLORE.EXE 4120 IEXPLORE.EXE 4120 IEXPLORE.EXE 4120 IEXPLORE.EXE 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 3872 firefox.exe 2532 firefox.exe 4928 firefox.exe 4116 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exefirefox.exefirefox.exedescription pid process target process PID 3664 wrote to memory of 4120 3664 iexplore.exe IEXPLORE.EXE PID 3664 wrote to memory of 4120 3664 iexplore.exe IEXPLORE.EXE PID 3664 wrote to memory of 4120 3664 iexplore.exe IEXPLORE.EXE PID 3724 wrote to memory of 3872 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 3872 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 3872 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 3872 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 3872 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 3872 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 3872 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 3872 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 3872 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 3872 3724 firefox.exe firefox.exe PID 3724 wrote to memory of 3872 3724 firefox.exe firefox.exe PID 3872 wrote to memory of 4308 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4308 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe PID 3872 wrote to memory of 4952 3872 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://hello-world-restless-breeze-1237.0d5b.workers.dev/\?email\=\#YXN1dGFudG9AdmlyLmJpbw\=\=1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3664 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3872.0.546620565\741759367" -parentBuildID 20221007134813 -prefsHandle 1668 -prefMapHandle 1632 -prefsLen 20888 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8db0e7f2-90cc-4093-b92f-35fea974c211} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" 1748 18ad6b19b58 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3872.1.2131819639\1685506666" -parentBuildID 20221007134813 -prefsHandle 2076 -prefMapHandle 2072 -prefsLen 20969 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ef54171-29cb-4288-8144-801acbbed3c5} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" 2104 18ac3072b58 socket3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3872.2.514363140\485036610" -childID 1 -isForBrowser -prefsHandle 3032 -prefMapHandle 3028 -prefsLen 21052 -prefMapSize 232675 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {290c3cab-1e64-4a81-8dba-7f03dd5b9502} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" 2748 18ad97e5b58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3872.3.2087298085\2052332917" -childID 2 -isForBrowser -prefsHandle 3496 -prefMapHandle 1316 -prefsLen 26562 -prefMapSize 232675 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {90af5656-c271-4d03-a575-2b225b858684} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" 3508 18ada8c9d58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3872.4.1768161894\1985151764" -childID 3 -isForBrowser -prefsHandle 3900 -prefMapHandle 3960 -prefsLen 26621 -prefMapSize 232675 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {30d16bad-5099-4b02-b5ed-b72c96e9a649} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" 3524 18adae9c558 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3872.7.748927286\465641736" -childID 6 -isForBrowser -prefsHandle 5104 -prefMapHandle 5108 -prefsLen 26621 -prefMapSize 232675 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef7d7d2d-edf0-4bc8-b6ec-d4adb8e6895c} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" 4748 18adc377858 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3872.6.1620250182\1859886062" -childID 5 -isForBrowser -prefsHandle 4912 -prefMapHandle 4916 -prefsLen 26621 -prefMapSize 232675 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9eabc0a4-c180-4e43-b94b-347878e616dd} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" 4904 18adc379958 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3872.5.943078008\1150187920" -childID 4 -isForBrowser -prefsHandle 4660 -prefMapHandle 4700 -prefsLen 26621 -prefMapSize 232675 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {96cfee91-8872-48af-a057-596e9c8c563b} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" 4748 18adc377558 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3872.8.1876557832\2059987221" -childID 7 -isForBrowser -prefsHandle 3624 -prefMapHandle 4348 -prefsLen 26942 -prefMapSize 232675 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6ebad66e-184a-4d52-b0ec-78d8041de456} 3872 "\\.\pipe\gecko-crash-server-pipe.3872" 4416 18ac3068758 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3028.0.1606400563\547756731" -parentBuildID 20221007134813 -prefsHandle 1552 -prefMapHandle 1544 -prefsLen 17556 -prefMapSize 230321 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9815a7b-4efb-4c15-afdd-d4ce3d5d5765} 3028 "\\.\pipe\gecko-crash-server-pipe.3028" 1632 1d6b8dfa958 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3028.1.1616886854\971530164" -parentBuildID 20221007134813 -prefsHandle 1792 -prefMapHandle 1788 -prefsLen 17601 -prefMapSize 230321 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bbc532ac-4c3f-47a3-abcf-f0aed37980a6} 3028 "\\.\pipe\gecko-crash-server-pipe.3028" 1812 1d6b8dfbb58 socket3⤵
- Checks processor information in registry
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4116.0.2133022886\1487727153" -parentBuildID 20221007134813 -prefsHandle 1576 -prefMapHandle 1564 -prefsLen 17556 -prefMapSize 230321 -appDir "C:\Program Files\Mozilla Firefox\browser" - {135075c9-7bdc-484a-94ea-e264a21ec31b} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" 1652 239789fae58 gpu5⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4116.1.41430387\891714804" -parentBuildID 20221007134813 -prefsHandle 1832 -prefMapHandle 1820 -prefsLen 17601 -prefMapSize 230321 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72bbe7c1-c5a5-4d79-b1e5-06de130da313} 4116 "\\.\pipe\gecko-crash-server-pipe.4116" 1844 23978e44258 socket5⤵
- Checks processor information in registry
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2532.0.215156172\294937073" -parentBuildID 20221007134813 -prefsHandle 1460 -prefMapHandle 1448 -prefsLen 20888 -prefMapSize 232711 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1cb47aff-6015-4b0e-be09-410b01cffd31} 2532 "\\.\pipe\gecko-crash-server-pipe.2532" 1536 2b8af5f3d58 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2532.1.910060358\1006387796" -parentBuildID 20221007134813 -prefsHandle 1884 -prefMapHandle 1880 -prefsLen 20933 -prefMapSize 232711 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {694415e5-da5b-4572-ad35-f82ba2a6781c} 2532 "\\.\pipe\gecko-crash-server-pipe.2532" 1904 2b8af03ab58 socket3⤵
- Checks processor information in registry
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2532.2.349796346\1166455953" -childID 1 -isForBrowser -prefsHandle 2816 -prefMapHandle 2512 -prefsLen 21415 -prefMapSize 232711 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e64b4ec-93ec-44c4-a2c1-4882067b1513} 2532 "\\.\pipe\gecko-crash-server-pipe.2532" 2808 2b8b339db58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2532.3.1070089403\451607330" -childID 2 -isForBrowser -prefsHandle 3364 -prefMapHandle 3360 -prefsLen 26051 -prefMapSize 232711 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0716f908-c3f5-450a-a75a-0a1545979350} 2532 "\\.\pipe\gecko-crash-server-pipe.2532" 3148 2b89df69958 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4928.0.1914562734\1316635958" -parentBuildID 20221007134813 -prefsHandle 1572 -prefMapHandle 1556 -prefsLen 17556 -prefMapSize 230321 -appDir "C:\Program Files\Mozilla Firefox\browser" - {49c0cd70-990c-4d60-a1c0-09f4d81819d4} 4928 "\\.\pipe\gecko-crash-server-pipe.4928" 1652 2736bff8e58 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4928.1.859658139\1138803815" -parentBuildID 20221007134813 -prefsHandle 1832 -prefMapHandle 1828 -prefsLen 17601 -prefMapSize 230321 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fcad3386-3cb1-48c5-9e08-371b71a4e7be} 4928 "\\.\pipe\gecko-crash-server-pipe.4928" 1844 2736c451b58 socket3⤵
- Checks processor information in registry
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\d6b3e70388c44ff5bcfb32af2b1ed2dd /t 3604 /p 25321⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe32539758,0x7ffe32539768,0x7ffe325397782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4396 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4532 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4672 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5140 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4672 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4388 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3644 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 --field-trial-handle=1820,i,13925225663413451444,8642830700111797094,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD5c3c5e71878c246f6b12bac00a62ae650
SHA10d3140c52d2eb433ba8a29c242eb9b73233fde8e
SHA256fb2129cd591965afdd2d8e2e545d4040d8b316b98a7a525da31a758ddf24dc1c
SHA512817edaa0738d5357e734381d18c304f9ac396798adb2b4de5774da6c8f28fd2f48247cee21174ce2efadcfde70404ece21b37cd7bc75cea7c341897cd81ac4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD520e784043bf9dd5a4a234ce3703f825e
SHA1178607f94705ec6161c2c3a88177ef6a5aaded49
SHA2561455f3acd9f00c4a3d7fac6caf8566bdffb868aec09f86fea8acc17a525b6c72
SHA5128ae93f0b68ee867a881dcac4628b8ad77c559925f721b46be904d40ec00f909916280057ce09cf8e28cb3eca938aab58d4e210f4c61e56e3443c3555e113f955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DFBAB323384F2C1DDE7639FC988902FC_9C864EA4EA1CF5D240F7F8FD79C29C1CFilesize
311B
MD55b270bd299875ebcbf62717a1993285c
SHA16827ded6e791ca356a20850c081ad017db68ac1c
SHA256c4fd72e09093b864ac610d0a47b1098e14c182bbe7ce2ca62f33819a86562cdb
SHA512f1b3f944d21e0744bd3dee0d6306f14c958ca216033b76bf36fdd1f3d193b4d6711cf13e3b6da0d4921b442d374e90e963d8fed105be84654c7c48af638c7871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD5cfd85c599ce2b81c9138f4f8809b752e
SHA1cdd1b03fc1a59540e42d5b66f88182b1a6391587
SHA256409b5c03dfc63bd508a14c83d8a03a66f0fea69d8bb3081e91828f28a4d01ead
SHA51219c2bda242a53562504e377f94a39c61ae8461999c6785613ace31e96a9ab4d3322803de484e97ed1c85d653473026b31df46f26757d9b4bbdbc13a12c4462ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD514462f5456e334b7957e6e180b482ec0
SHA11f48f124ed02bd8f4b65d000a60e02359a38aa9e
SHA2567f237fa569d88b5426329a0ec2a64b3a0f340b955443fa33610c96b44b29355a
SHA512fd2361c93028f36f4089bd4f78c2cd0f11c0df9e3e548f543716544b3e7cc459cf14f207b3f90eba681adf33d4b4109bf81e8dc33feaeb0ef2daacc5f789309b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DFBAB323384F2C1DDE7639FC988902FC_9C864EA4EA1CF5D240F7F8FD79C29C1CFilesize
404B
MD5a1ab6c1fee9f811f66e8bf96c77ea893
SHA114d6baf336c7511383bdaeed01219a4231aec405
SHA25685df28c60e86b4b1234a2706641d891eb5e746b01c304922d3470d43f4bcf6c1
SHA512f67fb95b01f071031e8f5b47daf374f04b28ec955c894938ac7fe8028b7fbac1ce5b92a7694d9bf9257591534f794c5ed5623fc5a33fb3395e0410f52f48ba07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.icoFilesize
4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\75b18721-61c3-4265-a75c-34c44849ec52.tmpFilesize
72KB
MD501209481dc39107bfc01a10d6fa75f08
SHA14a7c8d54901a8c15d121781fce1b21eae7dcd097
SHA256489ac0dfff1810432e0e5d36aed57f905aa1e95be29b126f53c23a78cfd2d6ea
SHA512926fc5e318fa661b06d46ed656630bf46ecf1d8e74694d1e9bd25c6d01f364026432376b40fc7157f6e2a76cd5888210244ac025e5a985ab741c120eaecd09ea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000008Filesize
29KB
MD5166ee115a59f6def39a4d2fd5ea7581e
SHA1546d8a2ce6b9460f3e9624c789a7ffa3c2ddfe21
SHA256f2f5d40eb28f05160dd27e93b184e7be09473f5e9d4369d55eddc5a999e3cd6b
SHA512d73adab26cfcf15e94862f5ca4c792d04c168faf140f98827bad8f06594d38574990bfba5eb224713b9d4ba953e26cdb37250255716aba5f8e2830bd7d894a02
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
120B
MD53aca3cadc6851b1a1aa47bf02d74b2ed
SHA175f58193ae640a759bbb67b1a44bae7c55b6383e
SHA256cb1c5de1af51fed8d3526128fab487fcea3182fd3daab44eedd87b3b36abd962
SHA5120bd300f173f1bc752cbd248434d7c8ba91e6aed40968ab4301c940c8598d8423eee7731eae088c0866070d67d041fbf031f26780009d03e10d6ca4bd57a887ee
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
120B
MD584153d0d83545b3963840e23e86a4e38
SHA11e59c24e3a221cef296d055551d8a463e6feb311
SHA25617f6aa479945c6c3b890bb08ef0dce9b70fe70d2d407cf423e59a8b3f2425408
SHA512fe0f565d7c0b416c4f6fc0e8f2020913e436aa30026e1faa5e6e65aabd6d67fe397448d96b8e179be7be1952980aa5cf5de4a71e5aae8d008c39e37ae1a53d07
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5725acbbbcd2009e50715698aac6d7d2c
SHA1281f258a20b6060767c28cb9d46e98900807e9e2
SHA256e7a8c435f91577bcebef1267d556032caf87826eb2c11780469182a2216d8d59
SHA512e4db1bfa4037df24541a43b76cade18d036031a9923105993e16914a65eb4940a209cb50e004883f2bcc9f17074abf7d44819ad4a2f510cd0978c113b00e1b1b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
371B
MD546e40fd44f2b71a6e493cbd6885a3989
SHA16ab71603dcffff1462d2881510f45aeb5c4b9f66
SHA25613035733a193049cd38554d08956996ea8679bdc9e275b86431479b6cdef5c12
SHA51239a910405f2787c62176cacffa5653b8f386c875552c52f62afd30cc1eb3043b438c04ceadfcdd30abe225ffa2465014e8bcee10a474d0eda34da03edcac523f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD563aafd25951757a93e166679dfefc85c
SHA1e4be2dc7c961cb92d9fc0e3a04aeb47e1fe6f49b
SHA2567fbc27210634b76ff7349ab4369e47d5b60df4e737c17785cfa231440ce58f1d
SHA512ffaa3404ac24638979263a48bbdb6d6320e654d4cf32e45ff11ec96d0bf79a2e2d61eec47692d3f16ba1067bc4b072190c928671f60da650b60d4328a6f00b48
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5c30e33bf50f8f1119e0acc52c2b45a74
SHA1a3110e5eed7bc9b29bbe2a49e73bc1cf89a9cc87
SHA2566f2f8741caab5c209e79dbc47da5607c144cb44f5301cec74e89b9e708a92032
SHA5129a5a0a4bc98bb0a486a31e56e350716a7e0ccf041c2afdfe9d01e541ac0ac4df1cf2f6fbeb879b63d673e31817586a170346a9304006b2b0cafbe527185b6dce
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5d365693c22143a8b71019ed1b87adf3a
SHA18ee027677ed72a3c0296262a1bef4793a14795f4
SHA2562c197f39507e0131345642ff96ecb5e6a39cd94097819dd593266a7f829830f2
SHA512f40b47f891fe886145817daf7e5c7ec6a6d120121721c90a4f6d2f36674f72470de2cd09f8e131f7e20b6bdc3811bb2f9b777c2cad69bc82ecaab8bdf164e40f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD59813a41a80ee3232c14c50be0199e604
SHA1b6f4c7b66a8bc17c460648c47322c44cc7f56446
SHA256e7d910950973d050fb1996bd7b6b67e4641ecd2aa017618f18b533654f70a382
SHA512484fa44a4be990040736bcf0421c4e42faecd8f24f52f871b2c16ef56e686c24e5bb82fc030b7cef9222f2ade552ce70cb3954ca5ff75796285d450cbe5871c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5c15ab118f02b3882a66d44b19d241105
SHA135b3fd2687322580a1ad18535ced85b957405bb6
SHA2565e564aa945ece2232e011d515eaf3b007a076998ca3907813ad9267304224de6
SHA51286589b60b32797140ae3e42d8a3946b3ccef06a3df6faf277bc1d549b9b9ba445b4567f105c8848436e92ae77a58a735a49edcabe4cb834c56dd4e50ce548021
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD56396ebe8845bcc4c6e3d4fe9bbc411f4
SHA10a404cb79c2c355e4702e0030fbde6cdf7d6eb27
SHA2565ec12805c4fb766f9d5b8b0b1fd0dab98cbd13ce226a9a4cbbc83c88b8f2dd33
SHA512dbfb9cb7fdbdd69aea5748e6ba35e85557aca885a88ef538863f7cab69fd81505db0336fbf0d66a6e3485f57420e9971a140750ee16893dc226a92f7cdc3ac4d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
159KB
MD5a124f58ad25407392b95413732dca825
SHA18b18e8c0e85d6dc07df523cbd1fc779377e0034d
SHA256f081014d2c09567a82997fa9bf41ee78a8ad49dc1b2961cd3665af866c738176
SHA512b8059a29a86952abfc9f809fbf7571c632d95d8428176c156898624bed48ab17442c27d531bd24e143e2adb97a5bbeb8f20d7fa6ff4b7779d2a9a422ad0f3451
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
160KB
MD573534a8debaabaaa1efa8a6c95f5573b
SHA1f076a73b508bc2be6a268da6c03d4cd4dc5d78d7
SHA2560de84fae1f21395dde4d4d585ca991798e4dd755b8a380f9d27b9038fc198442
SHA5127f9c7cf89c7eecaf5839ce3b8e7efbeb087ed6c9b85d23cc2ce8581357d695a2e19651c5c0054257f79d046ea88e9bd9139999b5cd6588cb0e20412f9002e930
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
99KB
MD527d1766cebe622454e372ee568656618
SHA1d7b2920ac3a63586fdc77907777b9c62ace4b59f
SHA2560ec8ac280c3d29f65f32e9b57df7ed72de63f5d84786930b1dbf09ac9d89da2f
SHA512d076224252bda7311fa3557c7e5d2ecce6c4f03eb8f1b6cedc01730933b242389789b10615b27066efa064f08f473ace643c7862183b010c2411b2e8449af95c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
101KB
MD5091f978b8ae17a28e18679c91a848fea
SHA108c344c4bb9ac09be3b0d7d37b7ff926b13419d0
SHA2565296bc83edb475188f2793f125ad728439af1549c3138de2bc7af2347e99f094
SHA5126b04d17811e0e2bf27e629a742295c121e7dd5fa325d3d5d1209d355b3042a6a34710b7b3f6c5c305b2e6d06cdf495c1ecc6a9c692d1a00c7369e9e323f7d931
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe588112.TMPFilesize
93KB
MD56ba2775fb8af13b998ffacea2058a26d
SHA1dcc935419656b8d6020e716c321dfc7d334d1453
SHA25634a3289815295fb7bd27ee8b4639f16ef36ed9ed4df2df2995d4e67c73763e1d
SHA512f08203b6dd552bda5e41736df75aaacf78c34a2e3e26acac3d3d6cdb2eacf44fd2118aaf5ee30cfcf665f27eae939770ec9480e6f072d577fc7278b276cf79ea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\7NLGU3I0.cookieFilesize
241B
MD540a4b235f1bd7e1f686d0fc58bb79b3a
SHA1868c5c047768a8f39813fae91b81eb3ee8585569
SHA2568d8eb1d032d09d9f3dd84245b82df36eb66e9fdac793af39c58c5b54736956cc
SHA5124cbb0d8f0436cd1dcb4c50fb054d0c5812f311fdd4f0f6631f411cac00df126be1d565b5fe32e6f2895414111a712db88c1e6c08d1447c891bb0107887e52311
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\M1NTU5Q2.cookieFilesize
556B
MD595b7e1af586b04b1f32f3894e4e436c3
SHA1e351505aa327dfa1002640703cc9996cb8ee393a
SHA2565b5d551c3134221c8e229dd95c68876737481d08dede0eaa6fb0c6691379f4b7
SHA512fa0613aa1ff051245d0c3cde4042e986deb52481f3ac1ba6890560f677784b5c12259c71a1575e7c687647536bfd4a69f6aa99efe76fb9339aee09bba55e579d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\M2NLFD13.cookieFilesize
876B
MD5f04bd8591d8012f0b0b410b21ecd622a
SHA14ca370625e159481f3a47d88ebb7a18732c37b9d
SHA2566cda35a34e20d4de3784197c68046b14ba259db58209e1ba380b227c7cfc5629
SHA5121c872710d5a361deea76f73e7a7504c60e90aecfb0bfa2b721205c655cf0014ad55f333ff777cde257c240460d2b7c6f7c0c1e43b52398da747c85b9a3418a16
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\evlzgz75.default-release\activity-stream.discovery_stream.json.tmpFilesize
138KB
MD5eaf48d249219edb601157c8b5157100b
SHA1cd6bd446738c0c346ab848c34d1e0b310c70ce92
SHA2563f81c829cd76ad0677429dfe986db01fd7471f2808e37050bb64a926855e24c9
SHA5126d71ecbacd45627355948d47ca6f66d4528f2a2848876ae846f4177f8fd209ee11abe0674fc39e90f5ac5b929413c3a26609f2b3026988aeadf217fed1db76ff
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\evlzgz75.default-release\cache2\entries\F18D85F52EBBBA2AB081EF739ED0D6E8A76D497CFilesize
240B
MD5fcde842cab6bd309dbbef0870e497644
SHA171fcb3b6f29514d9fa274f401e687f74c26311e2
SHA25690d6148983d15e76787099f0d132b4c619ef3561dfe6dd18ee75cf73db907f01
SHA5121c15961cee40d7bd09b4aa5cd2b995c7e13c7a9f40217e138fcbc8074f298e72318d4a29719990aa7ed3b89d96023b13faf21b41899877f6ff60780985872693
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\evlzgz75.default-release\startupCache\scriptCache-child.binFilesize
464KB
MD567f22f27223d6a2da3760b5cf1a92340
SHA170ec506cdbb71d9777baca2232c1ac27d9ea4c93
SHA2564cdd33a28c637663c53970683497e24af6acd0f8e3c8611b65caa3cff47bacd4
SHA512aa218e6a5d52e175abd10da7fb2fcaa59aa1313acfdde24d8732554f8c036a540af8eb3660475b3b403494185e1a509cf42b3fce492b03b76e44d313ee2460ba
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\evlzgz75.default-release\startupCache\scriptCache.binFilesize
7.8MB
MD554bc82d641b8c1e51c64803691371999
SHA10e5666c0643848a6f6dc1f7217f197ea06ebceb2
SHA256205617ed1b677154d1a3c856f816b552f85659e84140bec9a563deb3e8c3b67c
SHA512ab830aa5cc9a9e4493a244a33ec7b143b8135a1e00029866ad0a3c450de152a5fedc80a165c2b2341d673df8c7f2774578360e83788a01338b67f18b019a7d8d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\evlzgz75.default-release\startupCache\startupCache.8.littleFilesize
4.0MB
MD540aa66836bc35b916feaec7c74acb66c
SHA1a5fa2a5e3f8e6067d748d6a49444d9b33dcae435
SHA2566a6bd2d98037291ad670b3c74ed4bae80467554612cef2e754efd562cc41e2a2
SHA512cce65c76e9e4eaa114868497395195e7959c5675ec5d65217aff33b812be3b6ebb32fc3dfa572011883f1b1a86916cf49cc1523f5cff062d64b6d91fddd904bd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\evlzgz75.default-release\startupCache\urlCache.binFilesize
2KB
MD5537ba2ce979c5023430572b7da9ae16b
SHA138b1eb988c90cf9c1f756102f6c9e85079618594
SHA2565cc799f051dc95473a96d3d0b365d66fa666a6a9842d8775f4c8a04bc4123f5d
SHA5122c94442d46224f782c640d622d782adbad9eef6edd32dc2c1b5c4e6bf4965ba579a126cc835d5276c1d8be3c22293ece312a0325b8407e89a8221b1d8279d60d
-
C:\Users\Admin\AppData\Local\Temp\Kno78DE.tmpFilesize
88KB
MD5002d5646771d31d1e7c57990cc020150
SHA1a28ec731f9106c252f313cca349a68ef94ee3de9
SHA2561e2e25bf730ff20c89d57aa38f7f34be7690820e8279b20127d0014dd27b743f
SHA512689e90e7d83eef054a168b98ba2b8d05ab6ff8564e199d4089215ad3fe33440908e687aa9ad7d94468f9f57a4cc19842d53a9cd2f17758bdadf0503df63629c6
-
C:\Users\Admin\AppData\Local\Temp\~DFE7365E62F80C7A8C.TMPFilesize
16KB
MD5785381313c02d965b6acaed1cde7cea6
SHA1beab714fa029fe0b5e41bcd0e50c3596a66cc24c
SHA25604b6adebe394dc1554a2e57b176dc877ee00e6fbc4c202866e61bdda6fd6d9af
SHA5127cc9569cb6a2238d53d628cb3b18efac4163fa82fabf083babf9f9f31a5b4ed973c7d84e09959212b7508de2cbf572f09993e25cd6a443681703b3d9aba3f518
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\Telemetry.FailedProfileLocks.txtFilesize
1B
MD5eccbc87e4b5ce2fe28308fd9f2a7baf3
SHA177de68daecd823babbb58edb1c8e14d7106e83bb
SHA2564e07408562bedb8b60ce05c1decfe3ad16b72230967de01f640b7e4729b49fce
SHA5123bafbf08882a2d10133093a1b8433f50563b93c14acd05b79028eb1d12799027241450980651994501423a66c276ae26c43b739bc65c4e16b10c3af6c202aebb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\cert9.dbFilesize
224KB
MD5b742627171547e95ca5b910b65d48c1a
SHA12d75c91d2e7ea07cbe23ff6f0e4e8fe05c5f81a8
SHA256bfed4a6c0510dff1870709b26802f9325d27b80d052f76c1bf11409b03b5e7bb
SHA5124555e2c6989e9ed1ae2ce07159ef4b31f5a2ec19a0b62ffba6b8b178a267d3217a4a8896bdd09428f07d4e41c4afdac61cacc2cb84a3d9880005baead313643b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\cookies.sqlite-walFilesize
192KB
MD5d7926f6f765c05aedc84744e6387493e
SHA11a12af6b7dd176c48d37c716fdae5ff328838e78
SHA256bf8dc03d9d9cbb290b7bc702edb766347db41995c6c66b8180e8fb6df09ca374
SHA5122b4f998c3a4240c1a9cb8f19eafe2e2aee095901d558b26098d0187c9d188506a9c8d0cdf44a041a5dc0d275434ee13e69a4a943632c5aebd08c3ef5df615dba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\permissions.sqliteFilesize
96KB
MD58935bfb0897f1c174a61f663cf385cf5
SHA1e0aed4cd311b2598d4319ba1b13f808625f7beaf
SHA2560f5e5e8d20c5bd829e2c65b51c586ae660cb90d87b38230ce3da6ce5bf600f51
SHA5127fe63fd3e1d6bf2c9c1fd30f94f90890923ab63ae90e34f6b9b107ea7c1cc1196f0982af53a49c88c94283f04a8c41daff493de05809f8b2c5128f5fa8f2a4d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\places.sqlite-walFilesize
1.4MB
MD5fc72aaa8d74cf517cab213966eb8690c
SHA1b010675aa2a4e9fc06840cecc564c0325c741988
SHA25665fc6ba3c2aad9ed1a1ca47332aca26498ce722d792b9a744999c19176cd5b82
SHA512bedbec013a206aae8113a7bc80825f850a0814f28c61ff41d2f645414b092a3e1ae0ea37d9330c1d5e601ebecbe895babfb889178e7319204c0afdc90d63b7e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\prefs.jsFilesize
6KB
MD5f843fc3b858888d342076c7199266348
SHA197dea7b7d8486f03cc085ef488fda80fe53515a0
SHA25619b6e95d7e0e109333b648d994d42f1f8552467f8f43a4570f84dc5c5e2189a4
SHA5129b25cfb2a279bda5827e7d4c3446c75cb5057e7a886e23b7f3eb44d3a2fbb04d19249ff423c821cc41ea7a6d8585fafb0b4f9ae8d54274883250c4a4a1c7c1f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\prefs.jsFilesize
6KB
MD5f843fc3b858888d342076c7199266348
SHA197dea7b7d8486f03cc085ef488fda80fe53515a0
SHA25619b6e95d7e0e109333b648d994d42f1f8552467f8f43a4570f84dc5c5e2189a4
SHA5129b25cfb2a279bda5827e7d4c3446c75cb5057e7a886e23b7f3eb44d3a2fbb04d19249ff423c821cc41ea7a6d8585fafb0b4f9ae8d54274883250c4a4a1c7c1f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\search.json.mozlz4Filesize
296B
MD5033eb0645837c8b618a593f7b9a72642
SHA1cf4c2e7ccaa275ee47cdd945a7bd1f8b57c61172
SHA2563409fd08295094b37673d748a0374cf0afaecf1671188b2ed012626cad67a582
SHA51227dd0743306b0845c06b3be3e3ae2f515777dced4bbf91a4864bb95c5873e2d6351d99be36d4762a2ba8262130c6d139db3f4f5272afb8717e02b09c1e39c2b4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionCheckpoints.jsonFilesize
53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionCheckpoints.json.tmpFilesize
53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionCheckpoints.json.tmpFilesize
53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionstore-backups\recovery.jsonlz4Filesize
1KB
MD5537c8047d8dc95197d429ae9459abe1a
SHA1f41ce22ff215eb12a9a5251b95acee765deefb25
SHA2564a57df3fe5a3e2964bbfebc32fdc17f428631404f3828e678b92bdec514ece16
SHA512c74640dee21721c8ba772d25e4d3577eb3b02acf9006fe4cf5b52ccadaff42e86f7cfb3c60351d5288e946cb8ab4d6326efd264cc467a92e3e59a418ca491942
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionstore-backups\recovery.jsonlz4Filesize
1KB
MD55b64c5453229aef91ee72527f0f0c514
SHA16843b566f9aa7f1db98eea03fbe09e275ed571e9
SHA256e1acb7374df8e747fffca9df75b5d7f22dc6a9e7308f416f246ad35f15b52ee7
SHA5127b36d84cff28f8a8c00ffb27a0406e17c67f87cae27c0e6cc3bd1c22a31b2abb364e508adedef61da4f28e8c2fed8a308c755844a2f548c99d0b332d880c6734
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionstore-backups\upgrade.jsonlz4-20221007134813Filesize
1KB
MD57042483e7cbab37763891e7555855b46
SHA1aa17f555374858148d5a04e8fc939072b2b4fe92
SHA25636378cd6869e8fad067263d230272e18a148c293b21ab07509feab1bb899e3ca
SHA51295c997d3fcb3a634671575db02f4a1625767d4ba7c43d428268184a4a2f415552491ea799faaa52ae86e1292bc1cc8961ed99c6f523039d74f13bfe6c48703c2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionstore.jsonlz4Filesize
1KB
MD57042483e7cbab37763891e7555855b46
SHA1aa17f555374858148d5a04e8fc939072b2b4fe92
SHA25636378cd6869e8fad067263d230272e18a148c293b21ab07509feab1bb899e3ca
SHA51295c997d3fcb3a634671575db02f4a1625767d4ba7c43d428268184a4a2f415552491ea799faaa52ae86e1292bc1cc8961ed99c6f523039d74f13bfe6c48703c2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionstore.jsonlz4Filesize
1KB
MD57042483e7cbab37763891e7555855b46
SHA1aa17f555374858148d5a04e8fc939072b2b4fe92
SHA25636378cd6869e8fad067263d230272e18a148c293b21ab07509feab1bb899e3ca
SHA51295c997d3fcb3a634671575db02f4a1625767d4ba7c43d428268184a4a2f415552491ea799faaa52ae86e1292bc1cc8961ed99c6f523039d74f13bfe6c48703c2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionstore.jsonlz4Filesize
1KB
MD59e7f32d9ed555331139866bad29dc1d2
SHA13641582be5b705e135641eeb2f61d560c299aa65
SHA256fc6b0daf1de5f72e9f8ec97a0853896f9cd4d64fc27e964fbebea71cbb7eec4a
SHA51213b342d446fdf563473b1d360f50bcceb5f1680b034f42acc0d1076cd6f2b4516d54e7127d63532cc46ab4e4c8683a37dd3e7ee2452ccb2431405371867ed422
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\storage.sqliteFilesize
4KB
MD5e754fbe11ba0e708fa319a0396ff4274
SHA146687e5fe95275f8d9512e64659a7ad985343553
SHA25633f31db8b6798aad9d7752c69ddbf9c4b97621fb924c9171f7f8c4d4e6c59704
SHA512e02fc85d8b3bcc22c33e93dda90993122df5be0dcdff02302577978f47fb202ecb20cfaa899c2c67f4d09c6381b076eae6b2e0af682de10b8df7e187e735bdab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqliteFilesize
184KB
MD54717c6384744c6a03b44c93a5d5b615d
SHA1b321e4266f6c9bf8b03a5a5c5a3abaa02ba44859
SHA256d1e2309fdb2e21869a326e8be4bc1680eaee56c85304663477aa9d1db12ad721
SHA512b0971e922419c207c2398b0e7716e1c967027598ce77be4ca61ef78615622cb332f0c3b12271f2404af5445467d302b1b12e1c158629709dd426d719086f8474
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\xulstore.jsonFilesize
372B
MD5b1b3bdf5247fbeae0844ba6113b209ee
SHA1eb72b21505f6e6178f682137cf1e2a0154ac7452
SHA2560da875cb779d022f1db900e98893565e3de53d5dc76438d249c5cb1e4f32e541
SHA51202a0adaa77378937ff4c7d67455f113bc7d47bcbb7a3af855d520048ef7323de4031cfa3c13529c1f272b47b7de67bfc68a89fbd77c4364a29545273042fe07a
-
\??\pipe\crashpad_4308_UNNPGOATKFDWXCTKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e