Resubmissions
26-03-2024 18:06
240326-wp3q2abd3x 726-03-2024 18:03
240326-wm9rkagd26 726-03-2024 01:20
240326-bp4ywabc43 725-03-2024 20:21
240325-y5dsysbf7y 725-03-2024 20:21
240325-y47dwabf7w 125-03-2024 20:20
240325-y4vp3sgh74 125-03-2024 18:59
240325-xnhvxaaf41 1Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-03-2024 18:03
Static task
static1
General
-
Target
Windows11InstallationAssistant.exe
-
Size
4.0MB
-
MD5
9efe0c8b7f96c1a7d5bdd52bf07d009d
-
SHA1
dc6ff2f1c0af472cdc81b05f876c10420a6bbb78
-
SHA256
03a9b3163071ecb41e20b95eb664c3165b9fcaba89f5e5433484d65e8cfa0380
-
SHA512
b66772e1faeff8c607b6624106530945997fe2105569cbf92cf0eaa31f7bd02ed46b74bae6e9d79b6f51da76445564ed73fe9eb2a6507e3ce5d543781ba227fb
-
SSDEEP
98304:Fguv/rctyMh4cCE3p8fuCNCzLX/sA2uQqvAVGht5f/LyXtcH//9:SVtyMh9CVPUDk+4QjyXa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 776 Windows10UpgraderApp.exe -
Loads dropped DLL 1 IoCs
pid Process 776 Windows10UpgraderApp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\block.png Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_ca-es.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_uk-ua.htm Windows11InstallationAssistant.exe File opened for modification C:\Program Files (x86)\WindowsInstallationAssistant\Configuration.ini Windows10UpgraderApp.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\default.css Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\default_sunvalley.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_es-es.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_he-il.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_zh-cn.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\marketing.png Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\downloader.dll Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_fi-fi.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_pt-pt.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_ru-ru.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\loading.gif Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\bullet.png Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_hu-hu.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_lv-lv.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_de-de.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_en-us.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_eu-es.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\eula.css Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\css\oobe-desktopRS2.css Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\WinDlp.dll Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_cs-cz.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_fr-ca.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_ja-jp.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\ESDHelper.dll Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_fr-fr.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_lt-lt.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_pt-br.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_sl-si.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_sv-se.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_it-it.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_nb-no.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_pl-pl.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\logo.png Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\js\ui.js Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_hr-hr.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_sr-latn-rs.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_tr-tr.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\appraiserxp.dll Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\GetCurrentDeploy.dll Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_et-ee.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_germany_region.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_ro-ro.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_en-gb.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_sk-sk.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_el-gr.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_gl-es.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_zh-tw.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\css\oobe-desktop.css Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\Microsoft.WinJS\js\base.js Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\GetCurrentRollback.EXE Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\Windows10UpgraderApp.exe Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_ko-kr.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_nl-nl.htm Windows11InstallationAssistant.exe File opened for modification C:\Program Files (x86)\WindowsInstallationAssistant\appraiserxp.dll Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\GetCurrentOOBE.dll Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_ar-sa.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_bg-bg.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_da-dk.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_es-mx.htm Windows11InstallationAssistant.exe File created C:\Program Files (x86)\WindowsInstallationAssistant\resources\ux\EULA\EULA_th-th.htm Windows11InstallationAssistant.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 952 776 WerFault.exe 77 -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Windows10UpgraderApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Windows10UpgraderApp.exe Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000\Software\Microsoft\Internet Explorer\Main Windows10UpgraderApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" Windows10UpgraderApp.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559498423286037" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1637591879-962683004-3585269084-1000\{65809CA5-084E-42A0-B02A-D3D57341BD79} msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2416 chrome.exe 2416 chrome.exe 3760 msedge.exe 3760 msedge.exe 1312 msedge.exe 1312 msedge.exe 2064 identity_helper.exe 2064 identity_helper.exe 400 msedge.exe 400 msedge.exe 3824 msedge.exe 3824 msedge.exe 3204 chrome.exe 3204 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 26 IoCs
pid Process 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 1896 Windows11InstallationAssistant.exe Token: SeRestorePrivilege 1896 Windows11InstallationAssistant.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe Token: SeShutdownPrivilege 2416 chrome.exe Token: SeCreatePagefilePrivilege 2416 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 2416 chrome.exe 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 776 Windows10UpgraderApp.exe 776 Windows10UpgraderApp.exe 776 Windows10UpgraderApp.exe 776 Windows10UpgraderApp.exe 776 Windows10UpgraderApp.exe 4912 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1896 wrote to memory of 776 1896 Windows11InstallationAssistant.exe 77 PID 1896 wrote to memory of 776 1896 Windows11InstallationAssistant.exe 77 PID 1896 wrote to memory of 776 1896 Windows11InstallationAssistant.exe 77 PID 2416 wrote to memory of 3348 2416 chrome.exe 85 PID 2416 wrote to memory of 3348 2416 chrome.exe 85 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 2208 2416 chrome.exe 86 PID 2416 wrote to memory of 3120 2416 chrome.exe 87 PID 2416 wrote to memory of 3120 2416 chrome.exe 87 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 PID 2416 wrote to memory of 4652 2416 chrome.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Windows11InstallationAssistant.exe"C:\Users\Admin\AppData\Local\Temp\Windows11InstallationAssistant.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files (x86)\WindowsInstallationAssistant\Windows10UpgraderApp.exe"C:\Program Files (x86)\WindowsInstallationAssistant\Windows10UpgraderApp.exe" /SkipSelfUpdate /SunValley2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 18123⤵
- Program crash
PID:952
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 776 -ip 7761⤵PID:3128
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffee06c9758,0x7ffee06c9768,0x7ffee06c97782⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1828,i,8498659540141073866,11298891939009534430,131072 /prefetch:22⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1828,i,8498659540141073866,11298891939009534430,131072 /prefetch:82⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1828,i,8498659540141073866,11298891939009534430,131072 /prefetch:82⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1828,i,8498659540141073866,11298891939009534430,131072 /prefetch:12⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1828,i,8498659540141073866,11298891939009534430,131072 /prefetch:12⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4424 --field-trial-handle=1828,i,8498659540141073866,11298891939009534430,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1828,i,8498659540141073866,11298891939009534430,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1828,i,8498659540141073866,11298891939009534430,131072 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4988 --field-trial-handle=1828,i,8498659540141073866,11298891939009534430,131072 /prefetch:82⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:704
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0x7ff63e9c7688,0x7ff63e9c7698,0x7ff63e9c76a83⤵PID:2104
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5004 --field-trial-handle=1828,i,8498659540141073866,11298891939009534430,131072 /prefetch:12⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=216 --field-trial-handle=1828,i,8498659540141073866,11298891939009534430,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1708
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:4976
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4912 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4912.0.1473870692\2054767047" -parentBuildID 20221007134813 -prefsHandle 1764 -prefMapHandle 1756 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ee04fdd-f60f-4a8c-9aec-699e9143217d} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" 1856 2a3899d7058 gpu3⤵PID:2848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4912.1.1652353428\1219263337" -parentBuildID 20221007134813 -prefsHandle 2212 -prefMapHandle 2208 -prefsLen 20783 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {624408e6-0611-4f2e-a31b-0863e3b6397d} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" 2232 2a3fd96f858 socket3⤵
- Checks processor information in registry
PID:1096
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4912.2.525902398\1365741648" -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 3020 -prefsLen 20821 -prefMapSize 233444 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {590b3d0e-203c-4c84-ad39-d9d91f20329d} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" 2744 2a3fd968d58 tab3⤵PID:4980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4912.3.477765413\124662738" -childID 2 -isForBrowser -prefsHandle 3356 -prefMapHandle 3352 -prefsLen 20927 -prefMapSize 233444 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fce1f402-13e6-4fce-8d61-eb3728227969} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" 3368 2a38f180058 tab3⤵PID:3824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4912.4.486418971\187835020" -childID 3 -isForBrowser -prefsHandle 3504 -prefMapHandle 3508 -prefsLen 20927 -prefMapSize 233444 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {41e149ac-5f95-491e-b8cb-62006afd0a36} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" 3500 2a38f180358 tab3⤵PID:1864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4912.5.321628037\1155870642" -childID 4 -isForBrowser -prefsHandle 3708 -prefMapHandle 3712 -prefsLen 20927 -prefMapSize 233444 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ac87d8d-779b-48c1-9556-1f4100b64afd} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" 3696 2a38f181558 tab3⤵PID:1448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4912.6.987004647\328125580" -childID 5 -isForBrowser -prefsHandle 4060 -prefMapHandle 4056 -prefsLen 26064 -prefMapSize 233444 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {88230db8-0312-4d35-a138-a0a35324bb0f} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" 4072 2a390243958 tab3⤵PID:4092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4912.7.1183233277\916746295" -childID 6 -isForBrowser -prefsHandle 5360 -prefMapHandle 5384 -prefsLen 26123 -prefMapSize 233444 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4f61a280-71aa-4a06-9a2c-dd7aff7416a2} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" 5400 2a38e6a9e58 tab3⤵PID:3172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4912.8.240267310\989843684" -childID 7 -isForBrowser -prefsHandle 5048 -prefMapHandle 1600 -prefsLen 26204 -prefMapSize 233444 -jsInitHandle 1328 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7621c85b-36b4-4443-b3b8-72145e10922d} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" 5544 2a3fd96eb58 tab3⤵PID:3716
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ffede1c3cb8,0x7ffede1c3cc8,0x7ffede1c3cd82⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2508 /prefetch:82⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5452 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2932 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2956 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6544 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6644 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,313152658716613461,7152149948355822152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD59e1b5963ac0c44bad9f119097ee0bfc8
SHA1dd1a8692a64ddc5464c5b9737708e945668dabe1
SHA2561b5cf5d28e4b20ed7d12e0f0acf3de6c19cd5694bb228266854d8981e528e4a8
SHA5128ff0cbecb23373f1ce49122264fc037802916a821edccf27da879fdd67da2a38768f19a5dc4f17c9fcfa36082ea7b87506ea04314d58f2a646c8deb76f2be7ec
-
Filesize
3.5MB
MD5a0e338a33da0fdb1bd4810aaec246e13
SHA16a8ece04dc43bcc91826765538b71c12c276bd41
SHA256e4b69eb58da23e8a9006097eba6097f5c593a4a3583b7869c192b91a7f14081c
SHA512250add3d86b0e1383339e26fd784b67a0aa3b965be0e0118821967b584466d011e9dca5db7b939cf615a192c18a77b14d5b8e0abb015b8f81b54b771994e55a0
-
Filesize
82B
MD5b81d1e97c529ac3d7f5a699afce27080
SHA10a981264db289afd71695b4d6849672187e8120f
SHA25635c6e30c7954f7e4b806c883576218621e2620166c8940701b33157bdd0ba225
SHA512e5a8c95d0e9f7464f7bd908cf2f76c89100e69d9bc2e9354c0519bf7da15c5665b3ed97cd676d960d48c024993de0e9eb6683352d902eb86b8af68692334e607
-
Filesize
5KB
MD57f5fcac447cc2150ac90020f8dc8c98b
SHA15710398d65fba59bd91d603fc340bf2a101df40a
SHA256453d8ca4f52fb8fd40d5b4596596911b9fb0794bb89fbf9b60dc27af3eaa2850
SHA512b9fb315fdcf93d028423f49438b1eff40216b377d8c3bc866a20914c17e00bef58a18228bebb8b33c8a64fcaaa34bee84064bb24a525b4c9ac2f26e384edb1ff
-
Filesize
54KB
MD566b63e270cc9186f7186b316606f541f
SHA135468eeefc8d878f843bbf0bb0b4b1d43b843cdf
SHA25600f8f3e4534146858326d6d2524f3360dfc9e5d149e207d61cabac17ad7a5f9f
SHA512b9d1b4b201cabf087a44d958584ecb1c110807b9bd9865f1e76bf9d989d7d000ee84f07558bcae5e05d11f7121fe2c402fcf916b00ff5d8eac7eaf05e21a29f2
-
Filesize
16KB
MD51a276cb116bdece96adf8e32c4af4fee
SHA16bc30738fcd0c04370436f4d3340d460d25b788f
SHA2569d9a156c6ca2929f0f22c310260723e28428cb38995c0f940f2617b25e15b618
SHA5125b515b5975fda333a6d9ca0e7de81dbc70311f4ecd8be22770d31c5f159807f653c87acf9df4a72b2d0664f0ef3141088de7f5aa12efc6307715c1c31ba55bb6
-
Filesize
2KB
MD5afeed45df4d74d93c260a86e71e09102
SHA12cc520e3d23f6b371c288645649a482a5db7ccd9
SHA256f5fb1e3a7bca4e2778903e8299c63ab34894e810a174b0143b79183c0fa5072f
SHA512778a6c494eab333c5bb00905adf556c019160c5ab858415c1dd918933f494faf3650e60845d557171c6e1370bcff687672d5af0f647302867b449a2cff9b925d
-
Filesize
198KB
MD5cda68ffa26095220a82ae0a7eaea5f57
SHA1e892d887688790ddd8f0594607b539fc6baa9e40
SHA256f9db7dd5930be2a5c8b4f545a361d51ed9c38e56bd3957650a3f8dbdf9c547fb
SHA51284c8b0a4f78d8f3797dedf13e833280e6b968b7aeb2c5479211f1ff0b0ba8d3c12e8ab71a89ed128387818e05e335e8b9280a49f1dc775bd090a6114644aaf62
-
Filesize
168B
MD58567a52b60799c43fdde6b0f7ba7e2ba
SHA148fe86dc73c2692f9e166218419c1a6ee3cdc5e9
SHA25649bbcb9642ce6ac9f50e8a53f9c077c4a7a601ba9be20005737f11eff0e96fb9
SHA512e30d386b5cb769786e451743ed18697c965d9f8b1d1bc8ea92fab30da8a87eb6db5293c22e3d34336fb642e9bea199f8dc70d85fe28dc650de1a831c07844afb
-
Filesize
1KB
MD594dd607ea8aad43fe57e95ed1309ecb4
SHA169ce7caf3505b63519ff120b6d06728d72a89477
SHA256f0f9a8c9fce221535714ed5c0e56d697d1526b0d1b12b9a1a9d12b43c1235522
SHA512d7fede4aea27c12f33e121273f671b8a9c7169ea1db8060a8e988482aa0d7e3d38fbfc0d7dd5c4b3ddb38fd5c89cd1ef53d425496f357cf2fdca2a7c6a28f2db
-
Filesize
371B
MD562fb74acb85ff464e8806b976c78bed5
SHA12a8a05edce41f063e36e287fe40414acc7bb9bba
SHA2567fe86e068c17d34641b35a4e2766276d6f79785aa617b959961fe08736f294ea
SHA51274a133d5b71b86266adc2e1ad4f5ef849a4d078a77708c17cb2de5c25b537499ab640f283ab7bc525537506a47cca025bb2ad01650ba70b53d1d6a67a77de9a5
-
Filesize
6KB
MD534d735587099d87390be687f4ee383bd
SHA147b833efe54fd6aa25e38f99c41cd9157f968418
SHA256d9f084cfd2a48d4dc6853370e4238928526cb40e98b5b272330775befd97451d
SHA5122997fffbe4dad7dc0c1a3205a6cb4f40c3e7ebbaa19dd566c45894796163eec2dc8af4577d62ab2425ada99acd33538d00c981d672e4d1660bd81bc12fe27899
-
Filesize
6KB
MD50ee51239613588738886d56b10ae0d8a
SHA1ad9abe437d7d30e6781013449ac57e8a876ba70f
SHA256f4a7e738352816f6edd77adc728f8d58ebf95b67e2f3488ab43b91c0f3863eb5
SHA5127440bba5b1380684c176663c5ae327d105051b0b9969d351a8c948b92f53c242a66137d88cc4c17156d8824088ba26bfedca9aafedaa2e34f42bdc5be4b83b85
-
Filesize
15KB
MD5eed156dac312f2d5d1c9869c4d01dc04
SHA1a1f724cc5866f62ab817629036e2a08e9cda725f
SHA25687f7da55d17217f3e2a0c4b9823fae4952a9c018a555b165ae087fb36362523a
SHA512cb4be51d5f38f9a5169c9d7654098f0b8f5e8b3c685086154eb1e2e12e24771c0ecae8f507364ef0838edac2e011faaea99d65a224cee1f91edfdd881261afe8
-
Filesize
260KB
MD527a26bd176015b584e680d98ba678aad
SHA14e66e25201c22ecc03a7907d46711aeff4dd84d5
SHA256cc580b600a943615dfad96a9ab588118ac18f41e6d3293b36f6f65eda5bc5e4e
SHA512952bb3151280a3d64a871da71b7c345ef5a3a2ca3ad3841a5974c1505c21f08191b0d426acf08d0f76039ec72101dbc0a4f3d46bd8bd3af0cb513c1878f72a33
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
152B
MD5656bb397c72d15efa159441f116440a6
SHA15b57747d6fdd99160af6d3e580114dbbd351921f
SHA256770ed0fcd22783f60407cdc55b5998b08e37b3e06efb3d1168ffed8768751fab
SHA5125923db1d102f99d0b29d60916b183b92e6be12cc55733998d3da36d796d6158c76e385cef320ec0e9afa242a42bfb596f7233b60b548f719f7d41cb8f404e73c
-
Filesize
152B
MD5d459a8c16562fb3f4b1d7cadaca620aa
SHA17810bf83e8c362e0c69298e8c16964ed48a90d3a
SHA256fa31bc49a2f9af06d325871104e36dd69bfe3847cd521059b62461a92912331a
SHA51235cb00c21908e1332c3439af1ec9867c81befcc4792248ee392080b455b1f5ce2b0c0c2415e344d91537469b5eb72f330b79feb7e8a86eeb6cf41ec5be5dfd2f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7bc52e81-35f2-4ba4-9eec-65bf3dcff685.tmp
Filesize5KB
MD5a22baef83e57214c06cb14a002d206ec
SHA1d403fbe64f94d464b1a65e421e3c600c4288ad25
SHA2568db6309fb5490587dc2809b204ee3d7fbf464ae17db853c568ccf8f206f31b7a
SHA512e5a5113dc5d41d0292518da9221e178b802cfc21ba3c1bc573602435091b712c699a2159509397e3d8a328a2b298296192cf56398cac3a7c9bb84337851f57f2
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
69KB
MD5a127a49f49671771565e01d883a5e4fa
SHA109ec098e238b34c09406628c6bee1b81472fc003
SHA2563f208f049ffaf4a7ed808bf0ff759ce7986c177f476b380d0076fd1f5482fca6
SHA51261b54222e54e7ab8743a2d6ca3c36768a7b2cf22d5689a3309dee9974b1f804533720ea9de2d3beab44853d565a94f1bc0e60b9382997abcf03945219f98d734
-
Filesize
34KB
MD53060ac80130d23555fadf4515e40ff70
SHA13cfc80c3d60d120a06b9ed55f3e8e51fd8859d9e
SHA256d910d04b57829fd461019430e1d095960a5c0c5b377533c084430be5cb7b6186
SHA512b1f1a86324c9e34b7eaa1b28badbe3ee4fdc1ff8707451f0f05e6e2abe78d308993f00817f42aa901ce800cbc7507ec0bc8b2a747cb36b96b5b12b40eb1ae7aa
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
84KB
MD574e33b4b54f4d1f3da06ab47c5936a13
SHA16e5976d593b6ee3dca3c4dbbb90071b76e1cd85c
SHA256535fc48679c38decd459ad656bdd6914e539754265244d0cc7b1da6bddf3e287
SHA51279218e8ee50484af968480ff9b211815c97c3f3035414e685aa5d15d9b4152682d87b66202339f212bf3b463a074bf7a4431107b50303f28e2eb4b17843991c2
-
Filesize
1.1MB
MD578791af4e6c4f14d70e36ac7af9a6f29
SHA12210a16bb196f763f2b57d01146d3ef799260077
SHA256f325f50aa80fdd36a4293f14eecb5bec9069d7ef5c9ae822755dff8da614daf2
SHA5124868e4a09d9785a572ca2c55ced4051ca6b4f131be52dee62c41f9e17bba0fba1a29fee9f07066cba14503d6a2fede525f672dfed7a1450721dff43327fd78fd
-
Filesize
33KB
MD53cd0f2f60ab620c7be0c2c3dbf2cda97
SHA147fad82bfa9a32d578c0c84aed2840c55bd27bfb
SHA25629a3b99e23b07099e1d2a3c0b4cff458a2eba2519f4654c26cf22d03f149e36b
SHA512ef6e3bbd7e03be8e514936bcb0b5a59b4cf4e677ad24d6d2dfca8c1ec95f134ae37f2042d8bf9a0e343b68bff98a0fd748503f35d5e9d42cdaa1dc283dec89fb
-
Filesize
74KB
MD5bc9faa8bb6aae687766b2db2e055a494
SHA134b2395d1b6908afcd60f92cdd8e7153939191e4
SHA2564a725d21a3c98f0b9c5763b0a0796818d341579817af762448e1be522bc574ed
SHA512621386935230595c3a00b9c53ea25daa78c2823d32085e22363dc438150f1cb6b3d50be5c58665886fac2286ae63bf1f62c8803cb38a0cac201c82ee2db975c4
-
Filesize
40KB
MD53051c1e179d84292d3f84a1a0a112c80
SHA1c11a63236373abfe574f2935a0e7024688b71ccb
SHA256992cbdc768319cbd64c1ec740134deccbb990d29d7dccd5ecd5c49672fa98ea3
SHA512df64e0f8c59b50bcffb523b6eab8fabf5f0c5c3d1abbfc6aa4831b4f6ce008320c66121dcedd124533867a9d5de83c424c5e9390bf0a95c8e641af6de74dabff
-
Filesize
53KB
MD568f0a51fa86985999964ee43de12cdd5
SHA1bbfc7666be00c560b7394fa0b82b864237a99d8c
SHA256f230c691e1525fac0191e2f4a1db36046306eb7d19808b7bf8227b7ed75e5a0f
SHA5123049b9bd4160bfa702f2e2b6c1714c960d2c422e3481d3b6dd7006e65aa5075eed1dc9b8a2337e0501e9a7780a38718d298b2415cf30ec9e115a9360df5fa2a7
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5290fbcbd0a2ba7cfe6cf552c1eb769fd
SHA1653347fc6da4e40ff19a192f1aad705e925e362d
SHA256ff28f218526d0baddf96c0b44eace689cf309c59bb15c090ffdba3617badec70
SHA512fb86dbe52cc95a806bb5205724f04fed5c161a5940fa45394eaa3be41d2de38f7e099d489aed94861da0e1707114b01dfb003b36ee62a4648dd24ab8ec13ef4b
-
Filesize
7KB
MD526b3cca7b0c879422b87d17d7064f5d7
SHA11e9be57bbd0eb6c0b154dfe16264706af6f61fb5
SHA2568fcf27d7c5283e52c80cd697e34957ed41ec76c5ed6c7b8c3f14ed150fde46f7
SHA5126c444df4b6f3ab5ed6d7c735fd7eb56d23cc5315c4dbe9d2851b35c7f8275196d777d102a16fe6cda797f51a833bfce8e76c17e3332df8a6f9eec71e61d4607e
-
Filesize
6KB
MD5466e11c74ccb4e15322b6652d001db97
SHA1fbb198668a2705cc19c337cdade9c8940130fd48
SHA256aa3223459c4e8c189fc40b2ac9e3b701fbb55d196d3584ff0e5320ac3c193d44
SHA5120ee0c1c2433ee9509fb96aa6c02a839356384488c353248c23a5049ea92d4fcaa756adbe0169dd6d1aecc377581a3dba10d0201dc5238965be5c5750827bb6cd
-
Filesize
5KB
MD58bd5d16af20af4992021cf36965df322
SHA179141411331a0765c3d0bccdaea954f218db1bfb
SHA25650f74716776ceac391b14aadf1142991c470e37eca99982cc82e533007e7fe61
SHA512ff01ced397967704ccef47e2fd1b083c317a65c63918a67a1e30a1cd00f4ff11eeb0ca73a0c9c354fb754bb152b865bf0f9d84c722dddf4ad954a10f127f4bf2
-
Filesize
1KB
MD525745acf663ab2d3dc9d7a524c350d67
SHA1f2845e7dc65c2bfeb0f6082e50c80ea83d5af112
SHA256f26ce602edd0db9cbfe06df6e57d2e24086b3a7ec12cd93ab1978b0550920fd9
SHA5123cd2c222137f99fd696c9c90ff60bf3ca8f3d51a54b2999aa8295d422d8ad4214c6b091f132d752f217b240847a422b3622ec800ab77dccefa5387d3f68e1c2c
-
Filesize
873B
MD597c1df0418561a6d4f2925abb775f4c8
SHA15feaa54180208acd1a307dbeaaf1739be917cb5d
SHA256ab83371af8e4c40684b39611b5e740ba6de69aa63dd9ecc99e1afb1f8db054b7
SHA512b8b4c9fba8644fdb5ca055f477b6b5e5c1e64f56bec06352f7f09d70edfbadf7a914049d92fd28025a56111ce47b6127823c3d2898ce331a900d8c1f60f4f4c3
-
Filesize
1KB
MD5898ea5f21c9ac81b4854f1cb648deffc
SHA1bd3010b62b4504f1aab27dd6f3bb9912fb71370f
SHA25668e1f1c8d09c2a509fda56377ac5384e5cb2442293d08759aa317f5c35f14bc8
SHA51242290b01d93ebcafde426bcd5b289d6d0d95d25550a01462d282d7b7bb4cea9a1c1fc8b5ccec31471a539b54efbb7e83aece847d7b8c2537936fdd4e7c9adb36
-
Filesize
706B
MD56936617d06d0f929276a5f430bb7d198
SHA173be5852b1d0aa92d08680e3bf88e00298c8b911
SHA256dea8d7ab1b7816ca6ce9bd0b0d464336cd54b8aed05c9ecd59d6fc844ca9916f
SHA51228474314f2c30745a7eae2a76b88f38224ba920dffacacd44c60c8a590ea8546c9eed20ffeacf4e13ed2b14e4dbe614e6371c59dde1bdec7d5f6c7ad62027adc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d0024ab51ee3b50b062fbbeeb54e0cf4
SHA19a83e173a04eda8bf067462508a5428175499e94
SHA2569ad08b07c1d53c7dc7408913754028e9c94a3564a42519ae22d109608cd1344f
SHA5121cb4629ce435a3c835e581dc7ff7d7e2140fb51a890088525284ba6c711fc59dcdf769e0cca61d3565fc9cfcd6a48296d36be81519718edb729f0b3a03c4dcd1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\8ypl8oso.default-release\cache2\entries\B15AC7BE7C42117E3F0C3C90EF79C2FB9161E432
Filesize33KB
MD5dcb12d0edddbcdddfff1d12f9ec2e887
SHA17383c869200ed54adfd15b494c2fc97e721eed99
SHA256a5585abf658ec65656c98c222f1bb801cd37b41b4f0fc8bc1b57efe4baa9541c
SHA5123bf2bfdf405a53f242582e0ea90547cc662e3d739601d703802dc0e8c97d58798305243a4e30747addbc2c96fa03c7ebd6395196d628f19013f6a10fd35e8244
-
Filesize
364KB
MD59ae24ddfebb001b9cf15004176e90d89
SHA15fbb398e25611bafc8a115d13d55a4d4b28b96c9
SHA25682f490f1594fe9545af87a7d90f3905fbc0023a273d2df87780023218839313e
SHA512d8a83752c270864e7be1123cae01eafa091f1faf0d274d953bb094f61f27b41f95ea47ef284759335ef84fbb2a522b63b0b2b154572775901279a50a9ef23805
-
Filesize
89KB
MD531a548cd6e0569db0d8d5a766ea2c003
SHA1eca3cba694915df5dddd95790eacc20dda1fdacf
SHA25674a5b919aab524487a9a6b55a2de78d133e8e16c00367a82002d6c9a55d9d34a
SHA5121cb8910b557550b5db5cc46ac325b0924cef6915e30b4daa33975f21d02d521cb0bf8c53723e03bc875928bfb5b30d8f6013d1c5887013fa6b3db084075d7561
-
Filesize
98KB
MD54bce0923de384170225f162240731eb9
SHA121cfe6b950885981d560002f04ad328fe3797b8e
SHA2561bd1d819ef445a5b51929b03ce31ccdb697ba862ccbb603d5440fa89fc585238
SHA5120f2e69e51b28507bf93523dcc8e715dfa3784913f729d242f0efad5e0ce1a3220d80ffe68f47c4de83ff71a0af29225e98ab0c83425ad52db6c41394a8802046
-
Filesize
102KB
MD593246f9e40f56dd432768a4b525ac39f
SHA19bdd2cc9209ac9520d8ac78f21fdb69b045c4cbe
SHA256921b5d35eaa56c62640a4bf37d131fbe8c73deb2d189d01ccce4a451d90759d9
SHA51214b66b268d84e5f90523cffb8a5608c05e928a4e791e61543efcb4897528e40c936c1b54288a93494e9e88c17f1b6343bcf99612bb44bfc5cfc2926d4037f4d8
-
Filesize
39KB
MD55ad8ceea06e280b9b42e1b8df4b8b407
SHA1693ea7ac3f9fed186e0165e7667d2c41376c5d61
SHA25603a724309e738786023766fde298d17b6ccfcc3d2dbbf5c41725cf93eb891feb
SHA5121694fa3b9102771eef8a42b367d076c691b002de81eb4334ac6bd7befde747b168e7ed8f94f1c8f8877280f51c44adb69947fc1d899943d25b679a1be71dec84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8ypl8oso.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD598011023d5548833e93f349962b16e60
SHA1987d280e2daa15d2d18d50f0765cf87f81085a96
SHA2569172db09ed345894f762e82d398a8031e7e78128c673160e4a8f92a123f7c7b1
SHA5129111adae002174ede44cf3174306e80b078dc8bc3c25c66ed4880c2c5860525f9b5cb4fb4b7569141b818dfbe3c166b2c8addd635e46dfd092890c0d5a078aa4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8ypl8oso.default-release\datareporting\glean\pending_pings\394c4468-5443-4cd1-a4cd-48721d61593a
Filesize9KB
MD5ba70734308b6b1bf820e9af6e3a06949
SHA1080a5f6f1baa53c621e6c1ea5bdf35fd9fa12fe3
SHA2567fc6de43f206759c9aba760abc308d8a3c460ca7b726c0582ff6fb03346882bd
SHA512aa9806d1dcf44f41cf008ef5981ddc37d47bb3cf3f3c8c17f27a77f9255b4a544d6c3b9041ed52f69c5f5c1b61dac6e45eee6ef785d0ff5c67fbf13e6f7829fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8ypl8oso.default-release\datareporting\glean\pending_pings\dd9c911c-4bd6-4ec2-b399-a12de1279ac3
Filesize746B
MD51bbc2ea730c7b77d33de0f7689d238f7
SHA11c5fa2ebf53e5197f82ebbbdffbb1828c4a1cf7e
SHA256a2026a983b694588b4b78788e621b027edbb346c16fc059a62b307b9df77b39b
SHA512b0b0eccc8af66f414ef18e419ae6316c9c9b0282048e3581c3580295369d1ec0dfa7b5289b6085709c544561d4b3580b6207161faad642ba2cda6206f5787339
-
Filesize
6KB
MD529974cd8796100997cbd370e717dc674
SHA15f7997d228674d465ceb4a52b8ddf18adfc94141
SHA25662c43259447ee3185c170ad521983e9f6af325ca9f858adafce650470e234950
SHA51219f40488bf0ad0d42d6bc47d7d81ff5d35c238c2c867430320c84ffb4253db044cf93059e290df2baab5ce12d06b4b41e30a5fbc6faeddd13db27cac2e179a47
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8ypl8oso.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5c6b5d711a2f67f90c8847e73fe9da7b2
SHA1a9bd9aea19fe905f3b8a56b581cfaca73f0235f9
SHA2568584785a8c203de4f41f3dc72d427f307a7d7ed9b937b2d768e8092397491def
SHA512c5f9a9614b7ecbfd2e429229142dc8a1835bba0283f5f641a91c7b592586d83021f7cd58009e3d9fc5c2f1aa9411428d54eb25837c5aba659b538be564e0edae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8ypl8oso.default-release\sessionstore.jsonlz4
Filesize4KB
MD591c98f378740e59987c4b9f15257d1f6
SHA1615df580723c7bb550f48727a635825b74b110c6
SHA256a4877fcecd473f767640edfbf94b95659fc731ef3c961bf960375ce4f2fc9bce
SHA512a27a8bf6b2bb7c831dceef6b423f207f956f04750a9127a65252119690a21cf806e46acb7f52bd3c2a84969edbd01ae45ac9495f7c762f99eb57a6eb4f62e4fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8ypl8oso.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD59d58c7a7b8dc1365d0ba450a098e1e33
SHA1a132890478828a4e6d91def9e318b198f6115b28
SHA256ffd82f8142a3de304d919c2657e67b5fed3513611847ff6f48fd16e0082ad012
SHA51286f21fceff416391e62fae0cc9518fbddd4c75b41c7f0793f27b8c71cc18d4df6a74488c1c00b2820485871b061394671704f6c4d82de6ea48de4a2fe4eb15a0