Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
301s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
20/12/2023, 11:03
Behavioral task
behavioral1
Sample
FortniteCracker.zip
Resource
win10-20231215-en
General
-
Target
FortniteCracker.zip
-
Size
14.5MB
-
MD5
2ef3a170a6ea1af02de2a4058a39e169
-
SHA1
1ff2ae2aa8d61fe1c1396dc3ef1a30cf2b5ccbb2
-
SHA256
6834e4f3defe1566f5c9fe9b25e8ae29144fcdf16115e14204e29d6ff4efe111
-
SHA512
0ce07ce55ee70e2de8f200fb6ccfb1502b5c47afcc8dc2add2546c01b88e4e926030348b0571225c569773e1a76ea154f9cfa6908d5c6b1677bf4cab6fe01cf5
-
SSDEEP
393216:fR2ZWVhMDn1Owyi7OCg0YrCjjWwVv2csMcX:wZ8hMT1Ow9yCg5rGWwVDsnX
Malware Config
Signatures
-
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FortniteCracker.exe FortniteCracker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FortniteCracker.exe FortniteCracker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FortniteCracker.exe FortniteCracker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FortniteCracker.exe FortniteCracker.exe -
Executes dropped EXE 8 IoCs
pid Process 3680 FortniteCracker.exe 3308 FortniteCracker.exe 4548 FortniteCracker.exe 2948 FortniteCracker.exe 2524 FortniteCracker.exe 3304 FortniteCracker.exe 2180 FortniteCracker.exe 4372 FortniteCracker.exe -
Loads dropped DLL 64 IoCs
pid Process 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 3308 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe 2948 FortniteCracker.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 17 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 54 api.ipify.org 6 api.ipify.org 46 api.ipify.org 151 api.ipify.org 162 api.ipify.org 4 api.ipify.org 149 api.ipify.org 170 api.ipify.org 173 api.ipify.org 176 api.ipify.org 43 api.ipify.org 57 api.ipify.org 28 api.ipify.org 142 api.ipify.org 163 api.ipify.org 13 api.ipify.org 24 api.ipify.org -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File created C:\Windows\rescache\_merged\450179714\1026950413.pri taskmgr.exe -
Detects Pyinstaller 4 IoCs
resource yara_rule behavioral1/files/0x000600000001ac1f-12.dat pyinstaller behavioral1/files/0x000600000001ac1f-15.dat pyinstaller behavioral1/files/0x000600000001ac1f-100.dat pyinstaller behavioral1/files/0x000700000001abe5-1126.dat pyinstaller -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 11 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 3756 tasklist.exe 2432 tasklist.exe 5064 tasklist.exe 4768 tasklist.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133475439922153720" chrome.exe -
Modifies registry class 27 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" EXCEL.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\1 = 7e003100000000009457995811004465736b746f7000680009000400efbe8f57a348945799582e0000008b5101000000010000000000000000003e00000000008cd115004400650073006b0074006f007000000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370036003900000016000000 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" EXCEL.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\1\NodeSlot = "3" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} EXCEL.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 EXCEL.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\1 EXCEL.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 0100000000000000ffffffff EXCEL.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\1\MRUListEx = ffffffff EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" EXCEL.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg EXCEL.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1364394410-760759377-2797241167-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" EXCEL.EXE -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 5008 NOTEPAD.EXE 2176 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1572 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1104 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 5060 7zG.exe Token: 35 5060 7zG.exe Token: SeSecurityPrivilege 5060 7zG.exe Token: SeSecurityPrivilege 5060 7zG.exe Token: SeDebugPrivilege 4768 tasklist.exe Token: SeDebugPrivilege 1104 taskmgr.exe Token: SeSystemProfilePrivilege 1104 taskmgr.exe Token: SeCreateGlobalPrivilege 1104 taskmgr.exe Token: SeDebugPrivilege 3756 tasklist.exe Token: SeDebugPrivilege 2892 firefox.exe Token: SeDebugPrivilege 2892 firefox.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeShutdownPrivilege 3108 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5060 7zG.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 2892 firefox.exe 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 1572 EXCEL.EXE 2816 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 3308 3680 FortniteCracker.exe 79 PID 3680 wrote to memory of 3308 3680 FortniteCracker.exe 79 PID 3308 wrote to memory of 780 3308 FortniteCracker.exe 81 PID 3308 wrote to memory of 780 3308 FortniteCracker.exe 81 PID 3308 wrote to memory of 4492 3308 FortniteCracker.exe 84 PID 3308 wrote to memory of 4492 3308 FortniteCracker.exe 84 PID 4492 wrote to memory of 4768 4492 cmd.exe 85 PID 4492 wrote to memory of 4768 4492 cmd.exe 85 PID 4548 wrote to memory of 2948 4548 FortniteCracker.exe 90 PID 4548 wrote to memory of 2948 4548 FortniteCracker.exe 90 PID 2948 wrote to memory of 4764 2948 FortniteCracker.exe 91 PID 2948 wrote to memory of 4764 2948 FortniteCracker.exe 91 PID 2948 wrote to memory of 2212 2948 FortniteCracker.exe 93 PID 2948 wrote to memory of 2212 2948 FortniteCracker.exe 93 PID 2212 wrote to memory of 3756 2212 cmd.exe 95 PID 2212 wrote to memory of 3756 2212 cmd.exe 95 PID 5024 wrote to memory of 2892 5024 firefox.exe 97 PID 5024 wrote to memory of 2892 5024 firefox.exe 97 PID 5024 wrote to memory of 2892 5024 firefox.exe 97 PID 5024 wrote to memory of 2892 5024 firefox.exe 97 PID 5024 wrote to memory of 2892 5024 firefox.exe 97 PID 5024 wrote to memory of 2892 5024 firefox.exe 97 PID 5024 wrote to memory of 2892 5024 firefox.exe 97 PID 5024 wrote to memory of 2892 5024 firefox.exe 97 PID 5024 wrote to memory of 2892 5024 firefox.exe 97 PID 5024 wrote to memory of 2892 5024 firefox.exe 97 PID 5024 wrote to memory of 2892 5024 firefox.exe 97 PID 2892 wrote to memory of 2176 2892 firefox.exe 98 PID 2892 wrote to memory of 2176 2892 firefox.exe 98 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 PID 2892 wrote to memory of 1396 2892 firefox.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\FortniteCracker.zip1⤵PID:5044
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3572
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap24063:88:7zEvent30661⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5060
-
C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\FortniteCracker\ReadMe.txt1⤵
- Opens file in notepad (likely ransom note)
PID:5008
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1104
-
C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:4764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2892.0.685537983\1760693613" -parentBuildID 20221007134813 -prefsHandle 1696 -prefMapHandle 1688 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fadb4844-97bb-44ae-9c4b-27b99b6ea0a5} 2892 "\\.\pipe\gecko-crash-server-pipe.2892" 1776 26e6f4d9858 gpu3⤵PID:2176
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2892.1.1567362473\1947948587" -parentBuildID 20221007134813 -prefsHandle 2120 -prefMapHandle 2116 -prefsLen 20828 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fe0b294-0d62-4a63-bf03-f751ad16b5d2} 2892 "\\.\pipe\gecko-crash-server-pipe.2892" 2132 26e64370a58 socket3⤵
- Checks processor information in registry
PID:1396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2892.2.28118381\2009308218" -childID 1 -isForBrowser -prefsHandle 2684 -prefMapHandle 2780 -prefsLen 20931 -prefMapSize 233444 -jsInitHandle 1292 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f8aa5fbc-05bc-46e0-9ac3-41c428823f00} 2892 "\\.\pipe\gecko-crash-server-pipe.2892" 2680 26e6f45f658 tab3⤵PID:3048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2892.3.447383099\740357191" -childID 2 -isForBrowser -prefsHandle 3484 -prefMapHandle 3476 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1292 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9dd1abae-d214-4bc4-92bb-760108b48721} 2892 "\\.\pipe\gecko-crash-server-pipe.2892" 3496 26e6435b258 tab3⤵PID:5012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2892.4.125633697\24731801" -childID 3 -isForBrowser -prefsHandle 3804 -prefMapHandle 4200 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1292 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae4c252b-f5ae-44e5-ba73-c3e44cc85339} 2892 "\\.\pipe\gecko-crash-server-pipe.2892" 4260 26e74488f58 tab3⤵PID:1576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2892.6.2007222183\1988079800" -childID 5 -isForBrowser -prefsHandle 4904 -prefMapHandle 4844 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1292 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {db6ace33-ce56-4776-b199-8ce58b2f0316} 2892 "\\.\pipe\gecko-crash-server-pipe.2892" 4744 26e75871258 tab3⤵PID:2392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2892.5.966363478\806697142" -childID 4 -isForBrowser -prefsHandle 5008 -prefMapHandle 5004 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1292 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {db600d82-d7a1-4b76-9128-1c00c9b7afc5} 2892 "\\.\pipe\gecko-crash-server-pipe.2892" 5016 26e725d4658 tab3⤵PID:3528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2892.7.1458759697\14084187" -childID 6 -isForBrowser -prefsHandle 4944 -prefMapHandle 4960 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1292 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d1652132-b314-49fb-8133-f3bb07a2dad0} 2892 "\\.\pipe\gecko-crash-server-pipe.2892" 5216 26e75871e58 tab3⤵PID:3884
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:3108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9edaf9758,0x7ff9edaf9768,0x7ff9edaf97782⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1820 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:82⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:22⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:82⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:12⤵PID:788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3964 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:82⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4816 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:82⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4692 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4008 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:82⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4988 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:82⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4008 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:82⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5024 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:82⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2636 --field-trial-handle=1612,i,15602360877148360202,18136468139970937393,131072 /prefetch:12⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:640
-
C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1572
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\FortniteCracker\ReadMe.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2176
-
C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"1⤵
- Executes dropped EXE
PID:2524 -
C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"2⤵
- Drops startup file
- Executes dropped EXE
PID:3304 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:3392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵PID:3084
-
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:2432
-
-
-
-
C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"1⤵
- Executes dropped EXE
PID:2180 -
C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"C:\Users\Admin\Desktop\FortniteCracker\FortniteCracker.exe"2⤵
- Drops startup file
- Executes dropped EXE
PID:4372 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:3088
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵PID:4352
-
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:5064
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
168B
MD5eab18809e11c43f59a549232c1dd2a31
SHA191cdc702b6b49121d9423ca2027f5aaf818f3ed9
SHA25610a63143adeb8c5e35644928f283953c1da66cba391cbc8349ca465b27399167
SHA5127287a5357c1b127b2386ca446fe6c847f615dd23b9b24ee5b1d031dd5f9026278c871a24f975b8a9a20e149c915c7c1e379acd584fbef41a2222fc6190c05e57
-
Filesize
264KB
MD515370a5ceb638ff5d14b5c6cc28ec31c
SHA1eea36edf0911f4d404e0a69f53d5a924f52ff20f
SHA256ed2c7527dfc492075f544e450910e7099cfd274fe4384fd10cce73d93ff66bb2
SHA512af5c214b6a3e245178c47ce19c8ca1707cef4e3864823d679b48cb54cd7825cc40b3169d9fce89e945a924625545e1de5f2ced528f2ae01ea813b2401e278df7
-
Filesize
2KB
MD5f861991eba51fb2c4db08c469ffabf65
SHA180ee0c8a64953d187c176f9a384804d09678d9fa
SHA256d0c720f29774afcaf77dd0be9854e7d937c0cd1a011481df0fe6c34e85b50a1b
SHA51270f0def7c0dca743bde8a3c0641a6dd17dc530d869df8e7f5299308c8911d10d48ca2877b654f0004ace6b37ae7243080f0e53b0eac7e18fa94e907bd8fa6f7b
-
Filesize
1KB
MD5799c71a2499b00f2a1950b0cb08a89bc
SHA1475c9243f2fbb8660e715489336e5d1f4f740c8f
SHA25625c391bb8ca236411ccd78c549a3c27218cb8bad3ad32d3248ffb3c5f39f4ff4
SHA5121a7e701071fe8c6f8bbe71c258f33839670205a6ffb2711f301747db2f6df3cbfd6646ee6d8349d34a03f7fce81750d748bf2a212c94bad77ed41387ac761179
-
Filesize
371B
MD5fbdf7a009fc7745bf718bdcfa74d18a8
SHA124ba7435444e4a8b8adef2abc65ec863def62f74
SHA2567da4c7d3638b78e3da514bd09d1b57dfe767bb832232247925eea2e14f2314d6
SHA512ace9e402c02617535f3477b1dac457abad513b925b80b0a63199d57482300e65bfe4afe1a6d2dfc752f8adbc090b352f4028cb73fcf176138a20032a48c7fce5
-
Filesize
537B
MD564bc6332a62e6f300326ffe182e6c603
SHA1168b8d7d8abde36020a5098817b0d2348ec4f86f
SHA256daede729edbb7b08ea9c2b9d3a17d625444987dc5a4304aff5232d5b79520b26
SHA5129bb7040c2b94aebee662fac020467feaf4515e6217637c507e513f7faa5bd6dadbb3daf513730bd85c3eda10093b11ec0c25ba1169eded34d3377e5406dc8e15
-
Filesize
6KB
MD561e8c5ac8cfa1000a59687402594970d
SHA1a964da289f11a49359726fb348aa1911bee1c8af
SHA2565b0aa3be516e011aa6911ade1cb956ccf78fe1c116d6cb804a5d6c4619adcd90
SHA512ff0d79a18ae9926677be417a30708e7c5b6eef4e840253bfa171797f6862852bbb422f819e24d0b7b545fa78e125cde7278ee095f45a204a9dba1b393a3c6b59
-
Filesize
6KB
MD55df18cebfd0b7adc13674032e0ce9d68
SHA18be7545b72edff9142b56e630efff550e0e791b7
SHA25679f170e7935e5d9dee22b62ca39d80e13c580b3d870735a6cfcc1dceb9d826d5
SHA512a118161e0c062e8f29de1ca15015f930de2cf8816c1581f9f2bae8cb60cefcb9e83387099c2f294fd4d3198c1756243766b259c3f5e4466e266e9bde0cb20d5d
-
Filesize
6KB
MD51d4811994a51576e68c6bca773c6723d
SHA17f704cc89223a324e8bd6d4d0e5187c7fdd3e5ea
SHA256fea270a6db614db388ff56a243898b1ef4280cf2eb5b8a64b71edfa283ba9d68
SHA51252aa380b960f7000f178bbc77e9a4b671e9325a8ef6e14978af0ae752a4f4983e0e96ad2ff51d6571ea59c532315c853c7639ddb9bf2d0608574fa8fe52a749a
-
Filesize
15KB
MD52137b74a26dfb7ed817b80273d5ac3b5
SHA1b53f901b772db894420520fd8b0102e601eaa8f7
SHA256272f325efdd2581eb53179047b29390835efb483f34f5486cdec2a299aa9ed57
SHA512132a763826710e0f96ddbee3170c1caa4c2af3fca462654dc9f594faba07eacd3f7785387ea0870efba6f02c7be03e26e599c26a64bbfb6f1136d90732ec844d
-
Filesize
224KB
MD50f791fa95dd69115113a6f8f4a3aaf33
SHA197b0cfc0590d27a177308040d2da659e459ab9fd
SHA2565798c1b1d0a275a7a60ed0af50b7e6ba40c635a0aa70aca8a2813f8cc00d21c7
SHA512d47e504e33a773376bb56134a1cb35acb0fe5645309775c013194cf56b4aa14116fecaf7103f4a17967b486bfad8baaf2f83ef2c40777260695b91671bf3a35f
-
Filesize
224KB
MD54cff91faa11d0b28ae452dd3c124edf7
SHA1c8a36192ff206ddcadb3594c245b4c12762662de
SHA25617656e77aef7776bdcfd39aa755c46f6ef5ee606a8297b97e2ede0b73a2930b5
SHA5125d791352f343eefcef41e16e2a368779194dfde12dc8890aa18d41544381baf48f65b497c36b8e8aee5096a018e9164464157b5426a6ebde1ff29d416119d5c4
-
Filesize
12KB
MD50c46d7b7cd00b3d474417de5d6229c41
SHA1825bdb1ea8bbfe7de69487b76abb36196b5fdac0
SHA2569d0a5c9813ad6ba129cafef815741636336eb9426ac4204de7bc0471f7b006e1
SHA512d81b17b100a052899d1fd4f8cea1b1919f907daa52f1bad8dc8e3f5afc230a5bca465bbac2e45960e7f8072e51fdd86c00416d06cf2a1f07db5ad8a4e3930864
-
Filesize
62KB
MD54543813a21958d0764975032b09ded7b
SHA1c571dea89ab89b6aab6da9b88afe78ace90dd882
SHA25645c229c3988f30580c79b38fc0c19c81e6f7d5778e64cef6ce04dd188a9ccab5
SHA5123b007ab252cccda210b473ca6e2d4b7fe92c211fb81ade41a5a69c67adde703a9b0bc97990f31dcbe049794c62ba2b70dadf699e83764893a979e95fd6e89d8f
-
Filesize
177KB
MD5ebb660902937073ec9695ce08900b13d
SHA1881537acead160e63fe6ba8f2316a2fbbb5cb311
SHA25652e5a0c3ca9b0d4fc67243bd8492f5c305ff1653e8d956a2a3d9d36af0a3e4fd
SHA51219d5000ef6e473d2f533603afe8d50891f81422c59ae03bead580412ec756723dc3379310e20cd0c39e9683ce7c5204791012e1b6b73996ea5cb59e8d371de24
-
Filesize
242KB
MD56339fa92584252c3b24e4cce9d73ef50
SHA1dccda9b641125b16e56c5b1530f3d04e302325cd
SHA2564ae6f6fb3992bb878416211221b3d62515e994d78f72eab51e0126ca26d0ee96
SHA512428b62591d4eba3a4e12f7088c990c48e30b6423019bebf8ede3636f6708e1f4151f46d442516d2f96453694ebeef78618c0c8a72e234f679c6e4d52bebc1b84
-
Filesize
60KB
MD5d856a545a960bf2dca1e2d9be32e5369
SHA167a15ecf763cdc2c2aa458a521db8a48d816d91e
SHA256cd33f823e608d3bda759ad441f583a20fc0198119b5a62a8964f172559acb7d3
SHA51234a074025c8b28f54c01a7fd44700fdedb391f55be39d578a003edb90732dec793c2b0d16da3da5cdbd8adbaa7b3b83fc8887872e284800e7a8389345a30a6a4
-
Filesize
32KB
MD562733ce8ae95241bf9ca69f38c977923
SHA1e5c3f4809e85b331cc8c5ba0ae76979f2dfddf85
SHA256af84076b03a0eadec2b75d01f06bb3765b35d6f0639fb7c14378736d64e1acaa
SHA512fdfbf5d74374f25ed5269cdbcdf8e643b31faa9c8205eac4c22671aa5debdce4052f1878f38e7fab43b85a44cb5665e750edce786caba172a2861a5eabfd8d49
-
Filesize
47KB
MD502c0f2eff280b9a92003786fded7c440
SHA15a7fe7ed605ff1c49036d001ae60305e309c5509
SHA256f16e595b0a87c32d9abd2035f8ea97b39339548e7c518df16a6cc27ba7733973
SHA5122b05ddf7bc57e8472e5795e68660d52e843271fd08f2e8002376b056a8c20200d31ffd5e194ce486f8a0928a8486951fdb5670246f1c909f82cf4b0929efedac
-
Filesize
29KB
MD552d0a6009d3de40f4fa6ec61db98c45c
SHA15083a2aff5bcce07c80409646347c63d2a87bd25
SHA256007bcf19d9b036a7e73f5ef31f39bfb1910f72c9c10e4a1b0658352cfe7a8b75
SHA512cd552a38efaa8720a342b60318f62320ce20c03871d2e50d3fa3a9a730b84dacdbb8eb4d0ab7a1c8a97215b537826c8dc532c9a55213bcd0c1d13d7d8a9ad824
-
Filesize
75KB
MD50f5e64e33f4d328ef11357635707d154
SHA18b6dcb4b9952b362f739a3f16ae96c44bea94a0e
SHA2568af6d70d44bb9398733f88bcfb6d2085dd1a193cd00e52120b96a651f6e35ebe
SHA5124be9febb583364da75b6fb3a43a8b50ee29ca8fc1dda35b96c0fcc493342372f69b4f27f2604888bca099c8d00f38a16f4c9463c16eff098227d812c29563643
-
Filesize
95KB
MD59f38f603bd8f7559609c4ffa47f23c86
SHA18b0136fc2506c1ccef2009db663e4e7006e23c92
SHA25628090432a18b59eb8cbe8fdcf11a277420b404007f31ca571321488a43b96319
SHA512273a19f2f609bede9634dae7c47d7b28d369c88420b2b62d42858b1268d6c19b450d83877d2dba241e52755a3f67a87f63fea8e5754831c86d16e2a8f214ad72
-
Filesize
155KB
MD59ddb64354ef0b91c6999a4b244a0a011
SHA186a9dc5ea931638699eb6d8d03355ad7992d2fee
SHA256e33b7a4aa5cdd5462ee66830636fdd38048575a43d06eb7e2f688358525ddeab
SHA5124c86478861fa4220680a94699e7d55fbdc90d2785caee10619cecb058f833292ee7c3d6ac2ed1ef34b38fbff628b79d672194a337701727a54bb6bbc5bf9aeca
-
Filesize
23KB
MD5041556420bdb334a71765d33229e9945
SHA10122316e74ee4ada1ce1e0310b8dca1131972ce1
SHA2568b3d4767057c18c1c496e138d4843f25e5c98ddfc6a8d1b0ed46fd938ede5bb6
SHA51218da574b362726ede927d4231cc7f2aebafbaaab47df1e31b233f7eda798253aef4c142bed1a80164464bd629015d387ae97ba36fcd3cedcfe54a5a1e5c5caa3
-
Filesize
415KB
MD5768317bcc55c9a90af4e5fe6c4cfc284
SHA11b02a3f04e52a8246f2139845a34d6fdec4b8e96
SHA2562c8dd7d451fb02eb730eb49b861ff1df6bc02b49a3f36eb71e03c7df5779209c
SHA5123ea097a5b16eff090e8d3b42ab0fd6491a82a5c1c6a7ffb9e3499587a559becdadfb6ee3eb16bfcae4f3ee71142fc55d7b49fa06feed2f2d6890bf7fa3376a50
-
Filesize
13KB
MD5b740a909ff59dd6d8f81f01f7cad7a53
SHA1fd298ba519e9491aa111e125c2ae7eedf3b6383f
SHA256863af2f72e02b696f04ce6af8164839c9999485fd312f5619c9b8e3135cfc521
SHA512f3ae6fd472cbe58bacc681174e23da6015cdabc576fe274f418ec7d36ff3dbc0e66fc7e5023b4506f789e296719b9a78766cb5501bbd0b38198c75378a088e5d
-
Filesize
442KB
MD5eb07a2adc0a237023a881e7bc6ce5d28
SHA1a54b279d2201c9b855947c37f75417e232714310
SHA256049441d032f9d8bbb3b8476bcf52979ca9c720b2f752ac66ea2b9760bb194c91
SHA512e403729939e5101166fbe458f38a4f1c3a1c0376cd210b7942578e86671b0149b593b16801b7fc40e312a6a7504533f2554064ed14239f6b4e1c73977e20edce
-
Filesize
505KB
MD5532f131c10670e2836b92043d9b92f23
SHA1494c789af204136329e699bfdc3c5558c5d394b8
SHA256917d28f0ad7679f38b320101e3d96884816d0fe000afff3dad8eed0529d25143
SHA5127e676087a43b8890498569c1575f3c0996b5ccda83ea38cd6673df2f9da3c90e07897b7c93ae8b1b415818b2288f71967bca6da33db0f4ee1f34842d3eccf305
-
Filesize
438KB
MD504e6f454ce4cc55793b64248ccf55b22
SHA17a63ce7bd19fe1c6d1b3d37d5d1c89e3b922a48f
SHA256160253a70fb0c50956dac37b29e370a2a93de461a9e371e223d8569dc6dd35a6
SHA5125a86410bb375d1b0cb2ebd752b489581e99ca3c87c9e81e48ab487005d45f107fd43ee97ae1e9c962275c7f55d3220813a1e506ecab40f8b0ed3694d29679f7f
-
Filesize
144KB
MD535e996b12048801b3d65be2f9179c4a0
SHA160938b8a5c688439d43858120171726d135e7ab8
SHA2563bbf844c3a7b783ecec8967cfef2e8e34d670839dc83ccc8c982aba1134175c5
SHA512cecc69f6e569fbcc0796037e189699278a7b2e9221689cb71891e9e0d9b68aeb93ff851b56df1809a23f43e77271a4cbdb7dd605cfbc6ef19a35645b7dd7115a
-
Filesize
432KB
MD5fcee1f7d7397a840aa41139a557c4a50
SHA15b1aa375108fee85c5081c81cbf8be0dd283f0c0
SHA2565776ef18a2a684904900c95a6ff10900943c772d234d2b83ce885dbcae000f26
SHA512f855ab9feb6c90ebe9235c034baf5a0ae425cae78df702206438d6bdb28a3b3c381cf261f181dd44b8f19231571d564e3334eff6f5424e64cb50902a79659579
-
Filesize
453KB
MD58ea7451d66838be8bef3537298fbfb40
SHA1f72c39f7a3124bced4a1cb6adfd38cf6c3b99bc1
SHA256c54b1ce6268fe5956a664bcbdf3a9fd731998ef992b957d19bab1d03e37e7932
SHA5126b3989515292ed76b7cb9d4b5a71cb1ce9958b800290abc3f91be301592afd650ca45e263f5f933217ba3816d3ecca76b0198086916eb72bf01f2434f128361e
-
Filesize
130KB
MD500e5da545c6a4979a6577f8f091e85e1
SHA1a31a2c85e272234584dacf36f405d102d9c43c05
SHA256ac483d60a565cc9cbf91a6f37ea516b2162a45d255888d50fbbb7e5ff12086ee
SHA5129e4f834f56007f84e8b4ec1c16fb916e68c3baadab1a3f6b82faf5360c57697dc69be86f3c2ea6e30f95e7c32413babbe5d29422d559c99e6cf4242357a85f31
-
Filesize
29B
MD5155ea3c94a04ceab8bd7480f9205257d
SHA1b46bbbb64b3df5322dd81613e7fa14426816b1c1
SHA256445e2bcecaa0d8d427b87e17e7e53581d172af1b9674cf1a33dbe1014732108b
SHA5123d47449da7c91fe279217a946d2f86e5d95d396f53b55607ec8aca7e9aa545cfaf9cb97914b643a5d8a91944570f9237e18eecec0f1526735be6ceee45ecba05
-
Filesize
20KB
MD5282b4d37419dc5be3dfd25aa2dddb442
SHA10b2988f51a96486342a01f8f1cc8c824b45fa94c
SHA256ad5adeaf0425094997169cebcd4f0a0d4eec3e5a3edde905ad9f041d872c89be
SHA512a4cc535fa1b571ebfc54a942d2a112b37d198de1274aef6bdcf278b205c4e5177d18d3615b579e92659f690df0f1cc990211f8d063b0f7f04cab60e528bb3ea8
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
238B
MD504ac661f6b25c0e07fce92f25cec7271
SHA10a28072c6807097067f3339196811eac16de33bf
SHA256f6101a9776033be24f9034bf4f95bc426b4299388e26bf7b0608ef70206ceb8f
SHA512de5425f8d5df38eaf33735f2d60c2decad7e8e436a391911cb459825c41636705a065df389a17b6bd900e4970f7cbe8be9f65eb063e8d15c6bf39493b16bbb50
-
Filesize
5.8MB
MD5ab5266a5a75f8c9f9c6ec5f79f51bafb
SHA16928fa411128a6f55cd1cac6d5f6565a904b0ed6
SHA256bc65ff913c7730441ca50529b0e80cee739696bd6deafa711496ed1cd23c3c9a
SHA512e3f2359eae0d385d886b64deeab095ecf695f835709b121d1865bf530c959804fc8c889faceb8c4420c61ca96dc8fa82ff22fb9a68fb457464fe2297634400a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\w1dhfpjv.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD543aa7c79e0caeea5818759038e3e1e95
SHA194f3c01e88d663ec68125a4784769857a6bebb5e
SHA2561cd49410150f786cd516a69c1147cf652c51c4c5f429b6bedba05bb3274d6462
SHA51218de530543654b2134e447ab8395b4bcc814432f5b50925628762b2fcaa3604da79360f5c03511ef6b71012e464056f2c3f61f787161d5eceff11cd858091009
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\w1dhfpjv.default-release\datareporting\glean\pending_pings\fd57cf4d-7a67-4438-8482-d80857d849d1
Filesize9KB
MD55c3e9dfcbb774c4b30c79c2a689d4b55
SHA1df71606a956c204babbcd084d7df969e0442238d
SHA256174a1040caffda61cb181941080100c2063480757089e7f6f40fb4e1e1822da8
SHA512bd1e668d3488ea8ca1ddae6c6f4ae22172585464458bf97daa5e6d7b73c2ce159ce078a9b7c5406d5945a3c7799964c4f4f31d1e1092e2bbcc158a8bb05259f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\w1dhfpjv.default-release\datareporting\glean\pending_pings\ffe94a7c-09d6-4699-875b-fb7969cb0cab
Filesize746B
MD59da632c96e746a8b384ad64be12157f4
SHA102d0266067762400fe8d77da3350eb2f283dd9c9
SHA25673adff27b097481e0fa53d80152fbe020f54fae8d8de2381aef7de6e0d268600
SHA51267c7c532e99af3d8d896cbd8bee6406b07abd47bd9431e4a45fa173014ad14f58ca49cf152d9364c70d2ece0961f913529fa7967f291bb76802978a54c55f569
-
Filesize
6KB
MD57844df03a428d7e535e6fed84de50353
SHA1611af42658822f599bd5c75a08f647407651a658
SHA25621ffe2b2008624b1749f74c7f1890df0b46d9b46833e5e032d6469d83081e1f3
SHA51295867d1172148cbbaa128a386bdfd01bf379dbf99340c2979d71bd16046b8039d19aa666141dd1480ae9e3cde0a78ebe770bbb7b574a174b68755ccb8793e2a3
-
Filesize
6KB
MD586de6c51a7c6725152db679efb51b312
SHA19a4fd4d61d3f68fb397941896458a1e4705268a4
SHA2562f3f73c552d492675fa274aeaba14b50aedda7b34838ac4dbb278bd83d8c8c5e
SHA512d7325fda3551a57578479d83d1eb07c2aaa7016cb89ea9482c7482fce2711fc9146ec5dd692ec3d1c7cf230cde3fb75e39bf64eb31aaca366f8d5da3a682ff80
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\w1dhfpjv.default-release\sessionstore.jsonlz4
Filesize881B
MD561fc28057d10779569658deadcf2df2f
SHA1378f6b3b077732f45ca50301f41de8037990ac7c
SHA256670809471ddd70ba1467c3dbb25c24482e8a6ce6c5ee44a68dac7159ebc7bfcc
SHA5121c1c726563e617d13f73ea9af4384ba6b6319c4cc25d4f2a9a43f2db30cfa066c592d30b52d38ea05fd4e81f98b4c367eb385ea00665a8d941642522b4bd1dce
-
Filesize
156KB
MD5d83935d12dc0e727799d33e95c9788a6
SHA19fe55730b770c5208948616822313f3b8f2083a1
SHA256ef5c9d68d3280e0b5d87412226b6d5d7e34fea1153b65adee6ee50ba88e0ad1d
SHA512d170bc77a70449eac4a7342ba52ff74c9491a4b717984b380f39a31d20bc1cf08c11303a3a0cd1702aa971daa0fb47826f15c7d31d4f9b422da18c2b82d442f7
-
Filesize
611KB
MD5399ac65b4cc11cda0eeb4cf314780f56
SHA1b1b0c59a247bd0b9e714a628662d3801f8f7b602
SHA2568d8d2d82b7103813c71b3357776dbe6d86a2d5892464f38af19ed190424e1486
SHA5120fda261a23ca69fb87dff98b3a258e280f3f5d5cf3f194ed140d1e2f182f4e88d71c42f4d1d2686c2eced8fe2eafd157efc96eebe8fb2a83374f7099c9799991
-
Filesize
2.2MB
MD597c192abf727f08c91c86f132cb20e3d
SHA182faa0b3380a9ca7db97b0d1b10a63b6bfff2183
SHA256676b74cc7041819ccb1e337ef42e35139ce432ab4a1c551b85eb78eeb52a8923
SHA51268147ecd69b51b865dd0a00a665433324149a2b94a198f8dca7d3a2f5e707ceac8255232b7433990ea51dd810625748dee7a12b521dca28688d1a48a4b42e641
-
Filesize
2.2MB
MD50ec3705e1f86ae1d364a66ce8b2dfaf6
SHA11fa6805fee176d6f143805a00ab74e01728b3d44
SHA256f19ea0337f6e7f706fcd641fdc9617c70c08f8430c988fd937be64284c1cfa13
SHA512339951ad160aa3da8a844862cb6b8eb1764b8c63162dc0d0227f0697d800857e86ca90f24ccf385412d4fe5968a07717fa61d97a5fc184ea573888dbc2ed9be8
-
Filesize
10KB
MD5dedae3efda452bab95f69cae7aebb409
SHA1520f3d02693d7013ea60d51a605212efed9ca46b
SHA2566248fdf98f949d87d52232ddf61fada5ef02cd3e404bb222d7541a84a3b07b8a
SHA5128c1cab8f34de2623a42f0750f182b6b9a7e2affa2667912b3660af620c7d9ad3bd5b46867b3c2d50c0cae2a1bc03d03e20e4020b7ba0f313b6a599726f022c6c
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
48KB
MD5bba9680bc310d8d25e97b12463196c92
SHA19a480c0cf9d377a4caedd4ea60e90fa79001f03a
SHA256e0b66601cc28ecb171c3d4b7ac690c667f47da6b6183bff80604c84c00d265ab
SHA5121575c786ac3324b17057255488da5f0bc13ad943ac9383656baf98db64d4ec6e453230de4cd26b535ce7e8b7d41a9f2d3f569a0eff5a84aeb1c2f9d6e3429739
-
Filesize
81KB
MD5bbe89cf70b64f38c67b7bf23c0ea8a48
SHA144577016e9c7b463a79b966b67c3ecc868957470
SHA256775fbc6e9a4c7e9710205157350f3d6141b5a9e8f44cb07b3eac38f2789c8723
SHA5123ee72ba60541116bbca1a62db64074276d40ad8ed7d0ca199a9c51d65c3f0762a8ef6d0e1e9ebf04bf4efe1347f120e4bc3d502dd288339b4df646a59aad0ec1
-
Filesize
119KB
MD5ca4cef051737b0e4e56b7d597238df94
SHA1583df3f7ecade0252fdff608eb969439956f5c4a
SHA256e60a2b100c4fa50b0b144cf825fe3cde21a8b7b60b92bfc326cb39573ce96b2b
SHA51217103d6b5fa84156055e60f9e5756ffc31584cdb6274c686a136291c58ba0be00238d501f8acc1f1ca7e1a1fadcb0c7fefddcb98cedb9dd04325314f7e905df3
-
Filesize
25KB
MD5ae260de204d89b2cf033334cd9a6acf0
SHA1cc8b1a857618713039fb36abe43251510b0526ce
SHA256c3a489f32c8bedac98f25f7b44cd0ecd7c9e2a9659dde2b104332d26e5e743ed
SHA5126c8f550779abbf252b4eea4daa777bcba011695ec0209e2a11be3492770887ba492f03d019ebbb85249e8dc1532a80d6c40d969eab7f1ff10b95b0689a9cbc3d
-
Filesize
153KB
MD50a94c9f3d7728cf96326db3ab3646d40
SHA18081df1dca4a8520604e134672c4be79eb202d14
SHA2560a70e8546fa6038029f2a3764e721ceebea415818e5f0df6b90d6a40788c3b31
SHA5126f047f3bdaead121018623f52a35f7e8b38c58d3a9cb672e8056a5274d02395188975de08cabae948e2cc2c1ca01c74ca7bc1b82e2c23d652e952f3745491087
-
Filesize
64KB
MD5be7d441bbbbbae1988eda5f99c0bb412
SHA138c1835fcb86a6361afff4eb7965605e1d7fe553
SHA2564f928aa738e445cb25da009fabccc20d66174478726243c0264d17f4f8bd546b
SHA5126bc8a1abaec5e9f53e80d21a003c2adb655ad9f4915471ecfcfa440baff6c0735300a49eeee983e3712638a6bbde1b85ae638990bf19e793b4b983143f79b7f9
-
Filesize
82KB
MD5ea07212a905ec3fbf9a78d5a925f0ce3
SHA1e2d99592b3e3100e5c00826bd8538ce3aada1c10
SHA2561d7aec1117caf91e3a3a43dbf2c7d31d689e6971f093092f633c5297d439635a
SHA512048cc45b0bb4be319a004145b61431891af1548a7d620dbeb836abfff9b8962bcd1dbebfa3553fc6ce819db03174aa632c25383abb1bd9d91b5a3a56bcc107d3
-
Filesize
10KB
MD5f33ca57d413e6b5313272fa54dbc8baa
SHA14e0cabe7d38fe8d649a0a497ed18d4d1ca5f4c44
SHA2569b3d70922dcfaeb02812afa9030a40433b9d2b58bcf088781f9ab68a74d20664
SHA512f17c06f4202b6edbb66660d68ff938d4f75b411f9fab48636c3575e42abaab6464d66cb57bce7f84e8e2b5755b6ef757a820a50c13dd5f85faa63cd553d3ff32
-
Filesize
64KB
MD5bc183caf11eb4961601a68c0fa32c0aa
SHA15576d592952f92bea1a55518debc96f150834151
SHA256fc295fac62542b1dbb702fee9782017196835d36824f48beaac2cd9439ec4491
SHA5121f63a6bbc78a48a749aaa786ac430ad2fc08553a8126e64d2aa38e016de5bb5bab9813d05afd27714e01f458eea768542b6c12b09937c153454514671c62bb39
-
Filesize
130KB
MD5c4d95607e40977088cdae78857126978
SHA14b81957e8bedd3eee372a282dea2b22cac83fe25
SHA25614fd8afccf34ddc5ddbc7229162c29c8d827293cd07a5eaca6b99f88af645b04
SHA5126faaa53e0168d4602be3205c2e1ca30a3f7f739ce9ab365fe9bc71ec0b69fa534e7b8b941d0576daa42fdd1dae553d1fada1d921b5c8608d1089a1bbedac0317
-
Filesize
309KB
MD5aa39aca48d2466c566772ed5be89b8e3
SHA13bd2746b4d748467ee19fbf9d8ef06bbbf90e460
SHA256d57c4dab96b66dcb1079a758f45aedf247bed56a8b19487181620a72aff916c7
SHA512db4d466f6104cb076cc55d1ba861ef2b3782e50090c2a684a083dd2e70722ec3bcc78f7afe606358184880b93ad34362ff718f99b4f67f846a9944689969b20c
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
240KB
MD5c9ded74c9a69252af38f7e9b5865a05a
SHA1a3a2d2b7cf3d17e10d9aa2a17be1c3a292445fb0
SHA256e06883bf057640e2dceea0f940d269490068fe368276c85bdcad6817fc6d15ec
SHA5126d4bcca882505f9b4df6c89fb4d63b0c6d16c20f3010139efdc514a9c0d71c5aa875e72f921bf946d2209b5413f72e78f0eb6456108625d917a492bfeaca823c
-
Filesize
193KB
MD543e5a1470c298ba773ac9fcf5d99e8f9
SHA106db03daf3194c9e492b2f406b38ed33a8c87ab3
SHA25656984d43be27422d31d8ece87d0abda2c0662ea2ff22af755e49e3462a5f8b65
SHA512a5a1ebb34091ea17c8f0e7748004558d13807fdc16529bc6f8f6c6a3a586ee997bf72333590dc451d78d9812ef8adfa7deabab6c614fce537f56fa38ce669cfc
-
Filesize
670KB
MD593ec91a92b3f9873686436f78db214d4
SHA1a8e19b4bb759b6b2930a38adc117718118cee7cb
SHA25653adfd72c10e1479f635a2f6db70a9c1cedc24cbf5553a8ca3cadebba1084a99
SHA512e48c334d11f5d6b88a581933987c4db67fae28d881bfab4c8d08863107a19af4fcca009fdce1e8efa40464360c5ef681c93c57468bdee660184af37f212d6ca1
-
Filesize
123KB
MD5a83a3eb18df4360a02df17c292449670
SHA1a4181171490bb7271a4c4b426201e335567f6454
SHA256d9bd04ef645cac6dad06f6f28549c2f1b7e6c3567a3ba51cb8944aa4e877e742
SHA5128ebba8cde26370009ca945baf3083cdab9549bb3ba2a33a9e94ab93f593c7d8dbc71fd76dd9293447eafcefad9d4803f9713dd153ede32a7f4742f811f0442b0
-
Filesize
131KB
MD5ceb06a956b276cea73098d145fa64712
SHA16f0ba21f0325acc7cf6bf9f099d9a86470a786bf
SHA256c8ec6429d243aef1f78969863be23d59273fa6303760a173ab36ab71d5676005
SHA51205bab4a293e4c7efa85fa2491c32f299afd46fdb079dcb7ee2cc4c31024e01286daaf4aead5082fc1fd0d4169b2d1be589d1670fcf875b06c6f15f634e0c6f34
-
Filesize
28KB
MD5c119811a40667dca93dfe6faa418f47a
SHA1113e792b7dcec4366fc273e80b1fc404c309074c
SHA2568f27cd8c5071cb740a2191b3c599e99595b121f461988166f07d9f841e7116b7
SHA512107257dbd8cf2607e4a1c7bef928a6f61ebdfc21be1c4bdc3a649567e067e9bb7ea40c0ac8844d2cedd08682447b963148b52f85adb1837f243df57af94c04b3
-
Filesize
123KB
MD5186a300f6804ef4408c01ec5deaa4b51
SHA1b12ff606f8fc6a43e4a03112807ab7fa3343799a
SHA2564593728313aa5afc5d6bba96b5e7d0cdf67d2255d970f38fa8a0f6f731245e03
SHA5123b318a48406a7ed6a2b16255120e9909bc3904bb267b8a3d69b8c69ff9ee2436fa8b67fa95f097c197fee628ead196a56c14711c2e2b3ccfef874f2fde7f48e0
-
Filesize
1.1MB
MD54c8af8a30813e9380f5f54309325d6b8
SHA1169a80d8923fb28f89bc26ebf89ffe37f8545c88
SHA2564b6e3ba734c15ec789b5d7469a5097bd082bdfd8e55e636ded0d097cf6511e05
SHA512ea127779901b10953a2bf9233e20a4fab2fba6f97d7baf40c1b314b7cd03549e0f4d2fb9bad0fbc23736e21eb391a418d79a51d64402245c1cd8899e4d765c5a