Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2692s -
max time network
2610s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2024, 02:32
Behavioral task
behavioral1
Sample
Yashma ransomware builder v1.2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Yashma ransomware builder v1.2.exe
Resource
win10v2004-20231215-en
General
-
Target
Yashma ransomware builder v1.2.exe
-
Size
538KB
-
MD5
13e878ed7e547523cffc5728f6ba4190
-
SHA1
878ad3025f8ea6b61ad4521782035963b3675a52
-
SHA256
f9a5a72ead096594c5d59abe706e3716f6000c3b4ebd7690f2eb114a37d1a7db
-
SHA512
a7fa4f14deb65aa8de18e37e4fba3d2fa6ed696b70c4d0f1f49a65a4d43da76eff0d9a9c4703a6e3c13a37eb5d1a427e43be8c0ea6b1288a50a1c5175d9392c7
-
SSDEEP
3072:tq0G/vqRT5i2YcRVm16Pn690H7GMgXuD//bFLAkCgkUKEyF9aT5Zt19r+E1/bFLz:U0G/GiWm16YaGMVFLQdD8FLz
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 4 IoCs
resource yara_rule behavioral2/memory/4196-0-0x0000000000660000-0x00000000006EC000-memory.dmp family_chaos behavioral2/files/0x00060000000233e8-1043.dat family_chaos behavioral2/files/0x00060000000233ee-1328.dat family_chaos behavioral2/memory/5568-1456-0x0000000000CB0000-0x0000000000CD2000-memory.dmp family_chaos -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3872 bcdedit.exe 1572 bcdedit.exe -
Renames multiple (196) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 4052 wbadmin.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation Antivirus.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation svchost.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hehehe.txt svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hehehe.txt Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 5568 Antivirus.exe 4996 svchost.exe 3656 Decrypter.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UpdateTask = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini svchost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini svchost.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Decrypter.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Decrypter.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini svchost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Decrypter.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini svchost.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini svchost.exe File opened for modification C:\Users\Public\Downloads\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini svchost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini svchost.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Decrypter.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Decrypter.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini svchost.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini Decrypter.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\desktop.ini svchost.exe File opened for modification C:\Users\Public\Libraries\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini svchost.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini svchost.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini Decrypter.exe File opened for modification C:\Users\Public\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini svchost.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini Decrypter.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini svchost.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Public\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Music\desktop.ini Decrypter.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini svchost.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini svchost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Decrypter.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Decrypter.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lnm9uw52j.jpg" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jjjsulitu.jpg" Decrypter.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ServiceState\WinHttpAutoProxySvc\Data\cachev3.dat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1272 vssadmin.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-b9-f6-09-fc-63\WpadDecisionTime = 14c76fee868cda01 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-b9-f6-09-fc-63\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-b9-f6-09-fc-63 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-b9-f6-09-fc-63\WpadDecisionReason = "1" svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Yashma ransomware builder v1.2.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" Yashma ransomware builder v1.2.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell firefox.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings Yashma ransomware builder v1.2.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" Yashma ransomware builder v1.2.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2\NodeSlot = "3" Yashma ransomware builder v1.2.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" firefox.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Yashma ransomware builder v1.2.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 Yashma ransomware builder v1.2.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" Yashma ransomware builder v1.2.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Yashma ransomware builder v1.2.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0000000001000000ffffffff Yashma ransomware builder v1.2.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2\MRUListEx = ffffffff Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "2" Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" firefox.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Yashma ransomware builder v1.2.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" Yashma ransomware builder v1.2.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Yashma ransomware builder v1.2.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell firefox.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Yashma ransomware builder v1.2.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Version = "1" Yashma ransomware builder v1.2.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Yashma ransomware builder v1.2.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" Yashma ransomware builder v1.2.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" Yashma ransomware builder v1.2.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Yashma ransomware builder v1.2.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} Yashma ransomware builder v1.2.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 020000000000000001000000ffffffff Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Yashma ransomware builder v1.2.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Documents" Yashma ransomware builder v1.2.exe Set value (data) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Yashma ransomware builder v1.2.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Yashma ransomware builder v1.2.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" firefox.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\computer-monitor-showing-hacked-system-alert-message-flashing-screen-dealing-with-hacking-cyber-crime-attack-display-with-security-breach-warning-malware-threat-close-up_482257-62207.jpg:Zone.Identifier firefox.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5760 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 872 msedge.exe 872 msedge.exe 464 msedge.exe 464 msedge.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 5568 Antivirus.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4196 Yashma ransomware builder v1.2.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 4628 firefox.exe Token: SeDebugPrivilege 5568 Antivirus.exe Token: SeDebugPrivilege 4996 svchost.exe Token: SeBackupPrivilege 5500 vssvc.exe Token: SeRestorePrivilege 5500 vssvc.exe Token: SeAuditPrivilege 5500 vssvc.exe Token: SeIncreaseQuotaPrivilege 2972 WMIC.exe Token: SeSecurityPrivilege 2972 WMIC.exe Token: SeTakeOwnershipPrivilege 2972 WMIC.exe Token: SeLoadDriverPrivilege 2972 WMIC.exe Token: SeSystemProfilePrivilege 2972 WMIC.exe Token: SeSystemtimePrivilege 2972 WMIC.exe Token: SeProfSingleProcessPrivilege 2972 WMIC.exe Token: SeIncBasePriorityPrivilege 2972 WMIC.exe Token: SeCreatePagefilePrivilege 2972 WMIC.exe Token: SeBackupPrivilege 2972 WMIC.exe Token: SeRestorePrivilege 2972 WMIC.exe Token: SeShutdownPrivilege 2972 WMIC.exe Token: SeDebugPrivilege 2972 WMIC.exe Token: SeSystemEnvironmentPrivilege 2972 WMIC.exe Token: SeRemoteShutdownPrivilege 2972 WMIC.exe Token: SeUndockPrivilege 2972 WMIC.exe Token: SeManageVolumePrivilege 2972 WMIC.exe Token: 33 2972 WMIC.exe Token: 34 2972 WMIC.exe Token: 35 2972 WMIC.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 4628 firefox.exe 4628 firefox.exe -
Suspicious use of SendNotifyMessage 39 IoCs
pid Process 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 4628 firefox.exe 4628 firefox.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4628 firefox.exe 4196 Yashma ransomware builder v1.2.exe 4196 Yashma ransomware builder v1.2.exe 4628 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3564 wrote to memory of 4628 3564 firefox.exe 94 PID 3564 wrote to memory of 4628 3564 firefox.exe 94 PID 3564 wrote to memory of 4628 3564 firefox.exe 94 PID 3564 wrote to memory of 4628 3564 firefox.exe 94 PID 3564 wrote to memory of 4628 3564 firefox.exe 94 PID 3564 wrote to memory of 4628 3564 firefox.exe 94 PID 3564 wrote to memory of 4628 3564 firefox.exe 94 PID 3564 wrote to memory of 4628 3564 firefox.exe 94 PID 3564 wrote to memory of 4628 3564 firefox.exe 94 PID 3564 wrote to memory of 4628 3564 firefox.exe 94 PID 3564 wrote to memory of 4628 3564 firefox.exe 94 PID 4628 wrote to memory of 4792 4628 firefox.exe 95 PID 4628 wrote to memory of 4792 4628 firefox.exe 95 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 2184 4628 firefox.exe 96 PID 4628 wrote to memory of 4064 4628 firefox.exe 97 PID 4628 wrote to memory of 4064 4628 firefox.exe 97 PID 4628 wrote to memory of 4064 4628 firefox.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Yashma ransomware builder v1.2.exe"C:\Users\Admin\AppData\Local\Temp\Yashma ransomware builder v1.2.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4196 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\flkemmg5\flkemmg5.cmdline"2⤵PID:2960
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1168.tmp" "c:\Users\Admin\Desktop\CSC8DD720183FB543EEA6B8D74B11CF28B.TMP"3⤵PID:5196
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.0.303080503\1591098448" -parentBuildID 20221007134813 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {926908b2-714a-4ee7-90d8-4e8e26fe9cb7} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 2008 21563029e58 gpu3⤵PID:4792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.1.860424235\1211750116" -parentBuildID 20221007134813 -prefsHandle 2396 -prefMapHandle 2384 -prefsLen 20785 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cdd7b2ce-e6c2-4fd0-8cd4-1a628f056fdb} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 2408 21561dfa558 socket3⤵PID:2184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.2.1667301854\1100761863" -childID 1 -isForBrowser -prefsHandle 3100 -prefMapHandle 3116 -prefsLen 20888 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9b1d88d-ff5c-445f-847d-9fbbf53a65f5} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 3088 21561e69358 tab3⤵PID:4064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.3.1798130048\1112465902" -childID 2 -isForBrowser -prefsHandle 3580 -prefMapHandle 3572 -prefsLen 26066 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {41267620-2ea3-46e6-b0a5-efea690e3847} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 3592 21555662558 tab3⤵PID:1512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.4.2090420030\2070039045" -childID 3 -isForBrowser -prefsHandle 4468 -prefMapHandle 4464 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3bc974fc-9d02-4853-a659-ad62d73d2e36} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 4472 21568138b58 tab3⤵PID:3584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.5.1744743064\445920011" -childID 4 -isForBrowser -prefsHandle 5080 -prefMapHandle 5032 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d83edbb5-5988-4bfb-8e76-821c8503a61e} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 5064 2156478ad58 tab3⤵PID:3968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.6.1276417879\905095533" -childID 5 -isForBrowser -prefsHandle 5240 -prefMapHandle 5244 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf4017a3-3547-4eac-9450-976842732163} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 5232 2156478b658 tab3⤵PID:1272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.7.598671384\985898461" -childID 6 -isForBrowser -prefsHandle 5428 -prefMapHandle 5432 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f02f91b3-1b2b-49ad-81dd-f1da84bac9cd} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 5420 2156478b958 tab3⤵PID:3888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.8.570833805\1879426915" -childID 7 -isForBrowser -prefsHandle 5864 -prefMapHandle 5860 -prefsLen 26460 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8454a09d-c5b1-4676-abcd-04a71caad445} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 4872 2156217eb58 tab3⤵PID:4728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.9.1584610703\419659752" -childID 8 -isForBrowser -prefsHandle 10164 -prefMapHandle 10132 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bc09fa4f-eadb-4108-8419-7c3c3465f259} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 10140 2156a9d8e58 tab3⤵PID:1284
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.10.1541792302\1874453254" -childID 9 -isForBrowser -prefsHandle 6008 -prefMapHandle 2888 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1108582e-94cf-412d-8776-d21954abcb28} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 9908 2156b99dc58 tab3⤵PID:4492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.11.1928288198\1086101735" -childID 10 -isForBrowser -prefsHandle 9648 -prefMapHandle 9644 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f5f8bacc-03bf-498a-872d-18429c007349} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 9656 2156bbb1958 tab3⤵PID:448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.12.1254254151\966102904" -childID 11 -isForBrowser -prefsHandle 9448 -prefMapHandle 9444 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21ded989-ba7c-441f-a283-c9a3a1593961} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 5868 2156bbaf258 tab3⤵PID:5104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.13.520437627\1779348700" -childID 12 -isForBrowser -prefsHandle 9588 -prefMapHandle 9584 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0caeb763-8c97-453a-b0d9-998bd9c54dfd} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 9616 2156bfb6a58 tab3⤵PID:1980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.14.829448603\2146446097" -childID 13 -isForBrowser -prefsHandle 9600 -prefMapHandle 9596 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {68cbd16e-ff07-4e5b-9133-363c30b572de} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 6008 2156bfb8858 tab3⤵PID:4980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.15.485241494\909717858" -childID 14 -isForBrowser -prefsHandle 8932 -prefMapHandle 9624 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {402cffd5-3a89-4b06-811c-7e93525d90ef} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 8940 2156c313558 tab3⤵PID:876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.16.1021115441\1582238641" -childID 15 -isForBrowser -prefsHandle 8740 -prefMapHandle 8736 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2b65aad-cf8d-41f9-97f7-bf14112b15c8} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 9008 2156c314d58 tab3⤵PID:2760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.17.1869756604\1786143737" -childID 16 -isForBrowser -prefsHandle 8884 -prefMapHandle 8888 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {79fad346-477d-40ec-ae51-e08088d50437} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 9028 2156c43bd58 tab3⤵PID:4956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.18.1474820491\1181711818" -childID 17 -isForBrowser -prefsHandle 8316 -prefMapHandle 8440 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0cabda06-d49d-43a6-91f6-115ec7f088ca} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 8384 2156c631a58 tab3⤵PID:5132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.19.958052314\655658833" -childID 18 -isForBrowser -prefsHandle 8276 -prefMapHandle 8308 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2cbb530b-6618-4308-97e2-369652ee92bb} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 8068 2156217b258 tab3⤵PID:5452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.20.162000641\886957341" -childID 19 -isForBrowser -prefsHandle 7940 -prefMapHandle 7936 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8edaff5-4f5a-4646-a816-85808ce0c259} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 7948 215621c2758 tab3⤵PID:5460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.21.94651299\1984377567" -childID 20 -isForBrowser -prefsHandle 7744 -prefMapHandle 7740 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c365ab0a-5e56-49ed-9dd1-7da3835917bd} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 7752 215621c2158 tab3⤵PID:5468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.22.1987431613\1753013064" -childID 21 -isForBrowser -prefsHandle 5592 -prefMapHandle 5516 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e62d756-d2fa-4231-a724-cd749f4e217c} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 5568 2156ac14f58 tab3⤵PID:5328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.23.1447470687\1425714737" -childID 22 -isForBrowser -prefsHandle 9100 -prefMapHandle 9096 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {95b8b698-afdf-4ffa-b085-7f9b09521029} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 9184 2156ac15e58 tab3⤵PID:5372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.24.573089409\1240237527" -childID 23 -isForBrowser -prefsHandle 5520 -prefMapHandle 9136 -prefsLen 26725 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {85467ca6-250d-41f2-9641-8d8af0a48167} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 5516 2156af3a258 tab3⤵PID:3060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.25.144705131\1043489772" -childID 24 -isForBrowser -prefsHandle 5496 -prefMapHandle 9820 -prefsLen 26734 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6d3f7bb-7969-4839-8e50-c55126e9d56f} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 7608 2156ce98858 tab3⤵PID:2788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.26.1102286571\95670088" -childID 25 -isForBrowser -prefsHandle 9044 -prefMapHandle 7608 -prefsLen 26734 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a3c7a19-631d-4615-9723-6101fdb83eb1} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 8692 2156ce9be58 tab3⤵PID:2276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.27.15022945\1688390864" -childID 26 -isForBrowser -prefsHandle 8988 -prefMapHandle 8892 -prefsLen 26734 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c8335af-51bf-4cc6-b8e3-927c6f31bf7f} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 8128 2156cfe3258 tab3⤵PID:3868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.28.1801388889\735552477" -childID 27 -isForBrowser -prefsHandle 9840 -prefMapHandle 9812 -prefsLen 26734 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7030b06-73e1-44e3-8efa-b9a8cf9c4c21} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 8852 2156ce70458 tab3⤵PID:3240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.29.1326702741\1789370632" -childID 28 -isForBrowser -prefsHandle 5804 -prefMapHandle 8840 -prefsLen 26734 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a22057a-9ae4-4e8f-802c-32a164d0d6e2} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 5064 215645da158 tab3⤵PID:6024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.30.1610699834\1416869540" -childID 29 -isForBrowser -prefsHandle 5880 -prefMapHandle 10116 -prefsLen 26734 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b81781ab-a27a-45f8-85ef-0ad5e730d9fa} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 9812 215645efd58 tab3⤵PID:6036
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.31.195522479\1844056824" -childID 30 -isForBrowser -prefsHandle 9240 -prefMapHandle 9256 -prefsLen 26734 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1006aa85-49f5-46a2-bd5c-83f773eaf52b} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 9228 2156d244658 tab3⤵PID:6044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.32.1680271383\660496481" -childID 31 -isForBrowser -prefsHandle 8544 -prefMapHandle 8588 -prefsLen 26844 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7695f5c-fa73-4f1f-8a7f-985870c53228} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 8508 2156903ee58 tab3⤵PID:1260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4628.33.1279874320\1568530691" -childID 32 -isForBrowser -prefsHandle 8544 -prefMapHandle 5380 -prefsLen 26844 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c167d9ee-0e35-4873-a612-83091f4a2d4e} 4628 "\\.\pipe\gecko-crash-server-pipe.4628" 8920 2156a657c58 tab3⤵PID:5400
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://appdata/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9ad4c46f8,0x7ff9ad4c4708,0x7ff9ad4c47182⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,3557684939250383513,2508520207132384878,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1960 /prefetch:22⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,3557684939250383513,2508520207132384878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,3557684939250383513,2508520207132384878,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,3557684939250383513,2508520207132384878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,3557684939250383513,2508520207132384878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,3557684939250383513,2508520207132384878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:4588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3108
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4980
-
C:\Users\Admin\Desktop\Antivirus.exe"C:\Users\Admin\Desktop\Antivirus.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5568 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4996 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete3⤵PID:2248
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1272
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no3⤵PID:3508
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:3872
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:1572
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:3172
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:4052
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\hehehe.txt3⤵
- Opens file in notepad (likely ransom note)
PID:5760
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5500
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:4576
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:5020
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:6016
-
C:\Users\Admin\Desktop\decryptor-decrypter\Decrypter.exe"C:\Users\Admin\Desktop\decryptor-decrypter\Decrypter.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
PID:3656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52B
MD5f8f5b009780aaaed87e3da3eac18755f
SHA11139582169a36844b8a637bdff2c99e5e187f779
SHA256f0b0870127af4f58da5dbc9c87bb5f63284c56d471647437dabff5bd051217c7
SHA512355107f39f82d6f01aeba045b74bb37716374ba710e0f895b5a98a531a8133b601aba830dbfbf3650495b8780455c6933cc0502c3832733e2005f298b51bd7af
-
Filesize
660B
MD51c5e1d0ff3381486370760b0f2eb656b
SHA1f9df6be8804ef611063f1ff277e323b1215372de
SHA256f424c891fbc7385e9826beed2dd8755aeac5495744b5de0a1e370891a7beaf7a
SHA51278f5fc40a185d04c9e4a02a3d1b10b4bd684c579a45a0d1e8f49f8dee9018ed7bc8875cbf21f98632f93ead667214a41904226ce54817b85caeeb4b0de54a743
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5d8f52e0286163cd4932a2ffee132417c
SHA14432e1fea79f8762073d1ed35106e86c48548611
SHA256000cc3eebf2bc4f9d6da932c4a280ff92651fa9c5ce8b2464eab1579b93bba83
SHA51206e9774c32cb746750152cddfe7fbf63bcc3aaa7d0a1d1a658b07fa15825435f114cbffd844c50a05c8c78b08436f3581c773c5c9f18f4125f05c59ddda9c5fd
-
Filesize
5KB
MD515b147fbcea70edafc71da8dcf079ade
SHA1c97652a8c78466f1add93bb946862acc9cf6439e
SHA256c3342b352d8bf34cf5825704937e1abebb527a8caea44649d45a56399eff22c0
SHA5125f6c1a976e70b89e99cba4238ca5e66c657fd7a1134e92c499fb59f8d9c7400db94a51c968298afeea6fa7b603f4e33558c7176db354c6d089d1b59d84ff28f8
-
Filesize
24KB
MD51c7ec27d94da04714401b9adf0b17756
SHA13e18d51664cd7c8036552c1557391ae0e7d3363d
SHA25657be391e5772faf9845cc18c3b6c5e428c1181feaa56c5dd4c4d16472c9ebb52
SHA512067ce3414a4fdadf8b1fbc79cd0abfdbde43e60b848d9f06e1310f3c1192ab2135347d570baa9c1eee1da941f70e66a85ff4a82fcd6286268c542c97a5f2ba24
-
Filesize
44KB
MD54d60d1c8f4f3a65aff001a72af46a3eb
SHA16609a093dad7440ff2238b2de7e5c830f6ba6a1d
SHA256809c7eb8a91f03d8d3793b18bd0ec3df8f922840a87d6eefcdd58b6d92146b91
SHA512fc00fba69a69f58ffbf2bc6b0dbd034f3bc39441e6fb4e2cf1293a704c73f5ac3d00b519c562c80119966dcbbbb7927051972e1ab299bd60d971aaf46fb20684
-
Filesize
560B
MD52cf01b36e88b8cc53b897c1c9299edaf
SHA1736b53d83b27cbe0f4ed6a2eab777c0affcb99c2
SHA256165626e69c127948b5ba22291345aaf78a73c2a26a9d3b29cea07adeb195e4f7
SHA51274e1dbd8003682d704ae93f835d0ac1b9f8efadaac55d2cda1150156d9c7c6dcada887d9a049308af3a3e7b5fe3b05419745b12d336ecd055c9cca736efda6b9
-
Filesize
10KB
MD553318572bc85ca1f7baf790a9d290b13
SHA1ca95cc59e58b0754eded5f3ca0c6d6f073ddcf5b
SHA256f0e435c12467e4cd7b3141c1a5266cd7d7e80708bc1cdcf01578ee0dc06cb95d
SHA512aab0dfad9f026be570415e066466cc4e59e70c875a1c57caaddc1250eea6898dfbd7aebd0e13d53e88e2b909cae1154d22e650cb55bdd180a48b4fd6f3bbb260
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4B
MD56dbaa0c3f46296acbf0caa72ba791f28
SHA1b28d157abb4811621c7cbf8459af9c892fca4abc
SHA2563929c7583e7038908e39e26983cfb09addaecd78622ca886479b67e33355e0df
SHA51255709c389610af8927cbceaf89a9a2a6431f68d5005093e4cf2f177d9b7e79f18e68c64a02088b0d4ae056417e8722d6a1f87f2db439c6141af5307977800e86
-
Filesize
10KB
MD5f985b106a03884db7d68f7121a464c23
SHA17e437808fa4f60f15f722fbf3e61aac2d32cfd7a
SHA256e159934a81c44f595c6bf6382b0b5eadea85e22a493bee9395049230e7c7ff89
SHA51215a9098c12e6dec59c405ee834e147e6865535b891cc3a6c354bce587a11a435fedabb1107bca1fe56a17eb72c3613982074a6fd3e609d05bc57c1574892c238
-
Filesize
8KB
MD5008ec66ff0dcc523218fb75f9a99ae3f
SHA10ab5c78646989540cac1dc21a1a7f57e23328a0a
SHA256471ade744ddf5a679177e09015874a51b15609837668ca1c758ada4d5f4fcda7
SHA5125b901d4f76887d3e72c1617bd6b21d8f27f5204fcb9a46ea7b6235f8c57a71e340fee57409810b2801d673d6997f2717b3f25c8b01a8749ab28f635ead364228
-
Filesize
8KB
MD5005f94503b152902d5baadeeebbe6fc8
SHA178c5abd53a3318241245f78862f1a2a8bea1f033
SHA256fd8d3e4facb96e835d45bfef6c8b9870cf52d08a061f22fc0c1b9d1495fc80bd
SHA5129d0f4ccbe1d83361e0d1e4f675aac759f192abf30abe18c53695546dbf0b15eeb8630c325800e2657eb2232b209e67f8f8947a07d41deae713ff8fcb28c70387
-
Filesize
9KB
MD5148ddd537525f405e7cf0ec1884a76e3
SHA1b0030d45ef4f7716a07ba42bf80ed9bec4bb6fc2
SHA256ae21f582f845c923fa675f4be6f2d62834aec47d4f0f7a427009394498c70ded
SHA512a9bc279933722c6853e4c578f70b35bdc35dc967c567580d990ad0e7e356b03ec5dcbb690303ea325e6eb518a04ac4cc32b4d827d7e279a7635f2f52bbd1dca4
-
Filesize
9KB
MD5fb431c131968aca86be1663f603b104f
SHA1fd70e19282eefe86a34a10e3221091b058f6c1bf
SHA256ef3b39e58def27493c8f267a059e5bf702bd3b7858a84e12e9ddae8c84bd44ea
SHA512ad70674f64a29280076c54c9cecd99b2b43793039a168cf02dbfa292297282c925d774d8451cd11492f36ced0f3600bcb913d5f7353e1815fdb5536f725e508d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\92qyi9k9.default-release\jumpListCache\Slm0uyOqZKNfkDO4Kh+zrA==.ico
Filesize2KB
MD523aa7bfd2df99ef8d48bcec7236249c6
SHA1582e080add086dd9e380b2ebad7cd7220e2d3b55
SHA2562b6da58f19ade5e02f9a1ce053620981beaaa9692ac600b67b50fb11817f4994
SHA512dd42b86b56836452a18ba2be58640c0b497bd891ec9e2e371e22134a24d864ee00ddf705c9ffd7176d5c18eb764545f27f611ac02af9f5f89d4771ae90ed57cd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\92qyi9k9.default-release\jumpListCache\YK2s7nA5504wvC7lIXlnrQ==.ico
Filesize443B
MD591f78c43f1d88f943d3f421bf68e2c03
SHA102b2272a64326fa98f5b5ffb81e1f3e2b1c76824
SHA2562dc887ac3c1cbe1c2909fa3df8d162d617bbe75e8bb2852e42e2e53be338c9b2
SHA512feb2a25a71754a84e05137fc4835b14980259906ae2931fefcb552f65a66ad5f1a90b3b4b11102492bcf5dfa47740aa460f9a8838ccf266dd7a1aafca87320c4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\92qyi9k9.default-release\jumpListCache\q4r1qy4MiyPMVovccbye4w==.ico
Filesize1KB
MD51ba3d818f7af986eab1a0f87ecab53db
SHA1fdce729235d43f030938789eb02ae608e9164a6f
SHA25694b4d9f23d18aff5ab9e9abf8f82ac61ad4a76a621bd496c5b24cb262b2a636b
SHA5121653162e3a58a0d77bdf2ec94ecc995638f6b19bd55b62c67c87d4ea97caa647044007fb77591048c4f24700d118cbc1d56bdf87f3d562af0c5c279ed3f6d8a2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\92qyi9k9.default-release\jumpListCache\tyOCzZ2fAB5W+WMccs98Dw==.ico
Filesize691B
MD542ed60b3ba4df36716ca7633794b1735
SHA1c33aa40eed3608369e964e22c935d640e38aa768
SHA2566574e6e55f56eca704a090bf08d0d4175a93a5353ea08f8722f7c985a39a52c8
SHA5124247460a97a43ce20d536fdd11d534b450b075c3c28cd69fc00c48bdf7de1507edb99bef811d4c61bed10f64e4c788ee4bdc58c7c72d3bd160b9b4bd696e3013
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\92qyi9k9.default-release\startupCache\scriptCache.bin
Filesize7.7MB
MD5dfb48432fd1dab350519a364a8edda64
SHA18f7f6114f3821e2e63ec6ed78cad41208b0d88d8
SHA256b2ada89a76e88ffa4e353e8fc5450f137b08f692fe71f681aac9e2e9cc287051
SHA5123fd937f8f03d2a2e02412f835e8427d2a3f4769f9fec88bf19b0aaa895740bf900676b2de115866adf3e530884399accb521fc908eeedbf42a6d5dd66c5790b5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\92qyi9k9.default-release\startupCache\urlCache.bin
Filesize2KB
MD55d13b085e99ec7bd05accb929bcd3f02
SHA16d98904fc953c4a1f52c6c10b6dfefde7ba8a539
SHA256c587574bc6b17b7484fbd0d46938567463e3af7f2078b6668e857e9c366f6478
SHA5120c650e82110cf25cbf85667156d8d341ba7c52f490829bcdb6c164f9730ab00a49a5a8ca90f68c880053d505f998e9b8b5f24a121a37d6b371c38929ab24bf19
-
Filesize
1KB
MD5db023dbca425c08a40bfec0538127784
SHA1929aa98c1abb0be9c89c4768a1b52ffd32e7d891
SHA25627ee6424b5984e735b8ac7a907d40ee02e09b295806f708bad230bae1448d5eb
SHA51211c741f44b8d56763b93d408a8236bda30e29384f3ed5e3b211ca9caededb5e22b2c7c295ea5e712eb0267493f6c168d7f931ea92404ec39b455ca54cfb1a770
-
Filesize
569B
MD545144bd7dffa43c3c39e1c7dd3d3ab75
SHA1d0001dd3cee53bd6ded62fa95a9f9244b514dfd4
SHA256f82fe0b0669ffa1bd44a8b56b33b886dee1758284d87eced0d215535775bb341
SHA512c81748cdfa13590deb148a63c6275a10b0b73e06aa8536eb13b514ab9a387bcd8e93544a07c7049871eb6de37f3870823a4dea03d2f311bd8033a585dffff31a
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize7KB
MD58b4dd14f5489a3801f9f00c945594886
SHA11e621c167f3cfabb44013525ef7528adc038bb1d
SHA2569d62b315bbab3aec14a8c81b14a579cccf25d38ec2c3f1ee5a984e8680060e46
SHA512e2490ec80fcea45a2b16a49874ca325e83aa6c75b668eebcc264e0f724647b6f59b9dfee6dce64b61fe59f8435bb0f66c259bd49134e53eea1d036491a4cc495
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize22KB
MD55e1042c0d7b4ceef7ff9015b3372ddf2
SHA1cf71a392382f4dd53566aeb3044704c0c30186ee
SHA256b7dc5784dbd29e72b4d471b374afb8cf7544841a687d8b610bcf5d0b050194e0
SHA51288fdbe4a5bbd3ec29332ecc6f25818086b754f5e5dd37c27d157e3a92055c9adcb6619b98ad7ced7567617ddda6358c30b458e26892ac6175e7bf3909b7be36f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize19KB
MD542fee737152350d2fd1ec081c26cf3f7
SHA15c5057ed7825dccfda02120c7a0cc7e14d80fec7
SHA256bbe41d3508ad3f8d95668d1018a7c7c7bebd1898192ffd8d630c698566f7843e
SHA512163e8bc891c6bb18984ee710da4f3989d06db44680a44f40cd09b9decda9709b749719c7cedbab054512bd42fc6d1efa513b2a31ff33d6d93626e48bb4116d71
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize22KB
MD53fe7b92e91801afe49a10271310a84f4
SHA17b3f0a69756dc3359e3a7b7b662def92fb8ae874
SHA256afd746f1f791d467bd14ae1a42fdb3c2507e816ebfaa415d7837d0eb825d1ff0
SHA51276403c8b77d1e4b58a87ec518273030af14ed7c1612983a500a2ebf49d342d33dd370aecc041df797871cd3b6345f44ecdbedb87f731244f7d55dfb795991a34
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\SiteSecurityServiceState.txt
Filesize625B
MD5301432e521073a065c77e37faf9aa281
SHA1572e3b7a735c0427b66c989c9e4dd419e8979caa
SHA25681d71c87ebe6db17c6b053dc35817d5fc6f680be7e1d89f2b0e4b261c790ae7a
SHA512ac47b706a19ddf1345db0fa16a40fde913ade085792cca8ea951928eae798d76d86f1fe93834f4afac4a8c6d2c9a2eca16f956a779bc483e6ba62f64af5a02a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\bookmarkbackups\bookmarks-2024-04-12_11_jmRiMPsXI9pol-3VoBdbjg==.jsonlz4
Filesize941B
MD517dec4f1453f38b86e908148f2b558f4
SHA1d1609bf7a9d0e7ab9bad67471d6a900cee976c55
SHA25677b1b00025007b2b3824fb4757c6fb18ea34ea74d71a32e1802e776534d2c185
SHA512e83f4453cedd64bcfe8f3e7dce8038333fdd93e39b45048581ec31b13904bfccb65f26f7af1fc0ed0e1e593f253f2e50b658be3b4ce7c235d1d9effa587d16b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\broadcast-listeners.json
Filesize204B
MD572c95709e1a3b27919e13d28bbe8e8a2
SHA100892decbee63d627057730bfc0c6a4f13099ee4
SHA2569cf589357fceea2f37cd1a925e5d33fd517a44d22a16c357f7fb5d4d187034aa
SHA512613ca9dd2d12afe31fb2c4a8d9337eeecfb58dabaeaaba11404b9a736a4073dfd9b473ba27c1183d3cc91d5a9233a83dce5a135a81f755d978cea9e198209182
-
Filesize
288KB
MD50a2d38f071845c6d3f654647d2aa53c1
SHA1f035bbfbe96f76d51c32ef1d4255dbc4d23a186b
SHA256ddc01be6c9645ac8de36a9cfc44c696616754d3df5d40dffbd492a4dad7c3603
SHA5126ca8cd3cc091f43fae2c23481c2549dcde5e3dd8d7b5ee2a031a56f4635d399d6651e0d6187def64bc221864c1bb1c550441c4d2d6fc620fcca7fa7dcc53477d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD5dada3c219d4357c0b74000c2a5399875
SHA1b03c9ef3d62bfefade27e9dd23752b4dc54310b9
SHA25678ee2cf171cf165abb025fedd695d4e1e7d93cde050c5e57c3857a15c5fd3c84
SHA51298643062e068d5ab1bbf53f22f11d41f32bde68219b2f57f454ba511c11cc336e554b802ef282bf71eb475a842cf8bd6ac01f80fb59978dfa958e452ae00074c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\datareporting\glean\pending_pings\1972a0f0-dccc-40c0-afb1-1be47a041938
Filesize734B
MD54b09a9e44edd3f18d7681e06eba8878d
SHA1167c378ed3ec7c73c6b3e4eda3bbb7b74c5b1a1e
SHA256761dc2f76d7e57c7bfdb21fa20ddc610de8626fe9bfb1dc25b029475383ed981
SHA512ebe891d750f983ea1b6cabd4704ad79015fff6263772d082638f74a9eccfc18a474576484f439b5e8794b1b7ea5b136c1b548af29043bd061423b07116779cb8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\datareporting\glean\pending_pings\af575121-5653-4485-a8d0-e25c47141e07
Filesize855B
MD5a24c4222338058eaa7ff8bd428ddfe37
SHA1840beb14300b147026bb5ed8194b04dc5edee78f
SHA25644df3713cc60df854b6f32399903b95af12482ea4ca5bc86476d9c6d015c8173
SHA5125f15ef0c6c93b0213e2718c0f9d6d5f87b2a1481e8a60f81b6fc7a510470782b72764b90801f0989cc79c896b260db3e8f616b3a6c9dca295d938a32b512d8cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\datareporting\glean\pending_pings\b4349042-f642-48f2-b4c9-c1163df93502
Filesize934B
MD54a38b185eaf2e9e452e36f3c6eb89909
SHA139b0b5f27e278d4aad9fee29410fad4cb0d2c359
SHA256a3594872efb8187e49b2f46bced4906f89ee03869e66162b032b09485503ca75
SHA512fd4c2618beaa45ac3364304d47a07732081b89760d595c07ec8282c45c9b2dbd1e1b067a8f84739723dfb2ab468c35c03bb203abf1ed11de69447577b53c4b15
-
Filesize
36KB
MD531486f86ec607eafaf6557a8306652bf
SHA172ce481a42e11a345288c52ba806ab2df59c5e65
SHA25681144b02daa45eb28506c5aea08dda0eaa1b43623223616924a90a9c0ccb1b5b
SHA51285e9b2f7e86c9b503afcc0144080cb707a9f5411880007f19a89aeb66e75678becb02ce667bf21142e813a0a4fa8d2327f6d1d8a7f7eb72c847313dc2abf7a2e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD59dba31d4eab3ef43a19036cd954cc8e8
SHA1656644a93f38782663d58761b026e616ff6b024f
SHA256719ed603d23264692bbbf7d7bafbf79ae3a2c36ae1849149d75d9898179163dd
SHA512bd1d020a1aa184b41cf0eda58cfd8217d87428c9c320c8d9ab863828053f12ba68666ec2baad4e23b6703dc39068ad2e10cace81e1d00cdfb15ff9c2b5878405
-
Filesize
6KB
MD5639b19797daa9029383a87c6cb988ca9
SHA14d4fb17111c1c7818dccad0217b570e87735a3e3
SHA256b479a525eba41770196ae9dbf08dbe107489edad882e18ff3bbd3e962e5a3ed4
SHA5122dd0b01a2d2893c0f95714eb96c9495053ee9f2d693f7c4dabc741279efc9825c3fcbe28f127da870ef4a2e825fb2a2ecb35b6aa2089f315a823e480c1d030dc
-
Filesize
7KB
MD521ee2e54c25dd9e232393371563eaeef
SHA1397286dcefa9ee6d40b4d2e7612fee7ec8727f56
SHA256d201a81bf3f8ca6c91427b11282e286c14da8f6c4f6158c42b42eb890ebc6292
SHA512e81a533e4b4db4d74e9c56cc9a9d7fee05e200ffd0ee39e543bd66fede758525561c752662aebee6a2a1c51b057ab273bdd474120e72393ff9412635492e15e9
-
Filesize
8KB
MD5f4af1cebaf4f4b9fc51eda1fcaeece34
SHA186ce9088a8e97727e833db88fe7e255cd83584c8
SHA25632ce9d3649ecbe8fe2942e8130f66430f93e3f3a2ea35b3ccb81c258f29e2b62
SHA512b8e2ac09703980804f5dd48ddd198e1b7ebfece017c51df7108c7a75630f9281eed4a06c3c89a800becc7051b9cc2fd0a4ede88adc41b9231ed403570f7ec183
-
Filesize
7KB
MD5f270c4f0e8e247f22ceb30b343b78172
SHA11fcc4de46fc5689a420d9964541097c86ded4fc0
SHA256528dffa2030dc7ac79a5ed625e9f1acf5940aae77f6b69ca4ac58fc95ed4c5f2
SHA5125b3cb89543c4d635aea5a29497a985f5f2a40e29e6d4185681ddd9f763d644b5e313abebf85095e67946b321f9d665ef51d3f0688af68465a8a4fba0b191a417
-
Filesize
6KB
MD5fd1cef5dae50699f7c6d844d74f0d090
SHA10b9bac5c7a314879b1f3972c381aea3ae8a5a870
SHA256a96c783017ba4a81cdf9ff91f806989288e4a3c5f71e55a5500c70399335ec09
SHA5125e0593e6c8dc803241ddf541c6cf072f5c42d74d5d433f34e535646c5362a2700c714a21fa1345c329af317b86cd4533295fb04fe186d555a2684890e9b49355
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD539841f701964d6a925bba510b7a40e9b
SHA10857c39256e118d2d839677fe4618c13bb7f462f
SHA256ffb705135cdaca9cf37a7bd5c3015a8e652fa7ec94cff63ac2ed1495fbd848f5
SHA51280aa5a700df5085002b268bbb77a8121b98cdcef878dcbf3b6cc84d1308338cf759642d98915b63347efdd1c6ea25d8dde4fd465bbd1695cb16a5a5648cc8620
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5a042287c4d3d46ab50061925d8d0bdda
SHA1823c41250258d31c89ee693cb204aa4642d0f34c
SHA2561af79575519ddcf9ff0b93564b0d36810a3c0c6366ad6b2768e24482751aa5d7
SHA512bb200d4e090b6ba6821f5126d6db4a3084c3062810303aa725965fab43fec43316696e6831ce9ffeba6b0c01618ed8863188b1961225f76f70e07164da9aea7d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD53d050d5db60cf9d7590de5cc75835402
SHA131f2b53eaf9864e9b1a7bc3ce9d449757edfeddd
SHA25686dd672d23ee1df21b061cb4b35f7ba5f54def498734b744026722241ab0484f
SHA512c18abe660f74e2064215e46d243ee2ec23ab8b44181dd2a364af517bada74890d29254861e8c53d398c5052c610c31d4a44f5503b6ef7b6b013e5974adbbc0fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD55b41549ead6cfbb847c3b01c133ab190
SHA17f2de5772234e50b122ce1f91959718a94c5e2d3
SHA256a7d8fe19ce8a3e000e8a2778816e65ac8cee53098e06520b975be0c44f5b13ee
SHA512f5181a31cac56af5b1d9a4055f6902a8d39647bc357168b779931d7319729e3688037b3d139a5385991fd696b75dc649dccb7fa8106b950103089880b3246eb8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD55024ebdf3f33faa4fe3f0f0f57fb43e2
SHA18c47d08825ad014b440a08f0162209f8b00e0488
SHA256c84894eb243d005b35a759cf83ed1b97224a2070953c49f18ff4992428b0b402
SHA512e77d0dcdea6591c6c7ca7064acfac0e47f2be0356fefe0e6ff75843b1010af4a8246c4c43f09ab2b9d0020bbbae905a4ed43a0bb6325925ed987784faa48cace
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize5KB
MD55462276066fdf146652f7f5ab220ae0f
SHA13344ecde8e4d0c3da7a4e6a82dc849e25eeb8077
SHA2569a04bc7b73e05b78f37b6375fe5621b598777c35a2f335c0c8561f1928bb4e49
SHA512b0e5227d8af978196d141ca6d537f08da34b0412b4d2548ce00ff5e78b67af8167ac8f5d1bc067e33877e8fceb69594f73d91b57fcc9df4f92432f1a16f2dd07
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD56f379fa7ae48d657cf64357f4a5fd6f5
SHA17a151511d5e65efd50a6fb81471b98baefd830fa
SHA25651fa672490eeaaba1f8a602a31d3db31ab597bf684afab77def3222640a98419
SHA5125c81429a44ae63f7fc24890208d4fbe0d84dc93f4b08f230c5853fdaba5ad1ad1e12fef8d24b80da791b6c3f665fff3ec0811cd78acbb7b588138093d341f004
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize7KB
MD5aae28b5ceb2d73d535cb859700245e99
SHA1e210cda7e7dc2746725a7ac03ccfad17ff9326b2
SHA25613a6c92d21fa970a5e31ba818b4a887d6feda4af108478a73f0807868f0e0e5c
SHA51271b7b03ea42039a044829def2f2f99df4e09a8555abf173f5aab33ebe0400ced9944f2732b08de49f170409608af42da9c40be50fdf8265945e14cb68a8c72f2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize6KB
MD5d78c6e651ca170939793fb11c2bfcfa1
SHA106cb600e88b2ab7e5ff453e759fcc508366d14a8
SHA2568f623ba7f473ef69f463df230a616ce822b387c46e603f915c2c0404f6a4577f
SHA5126a569c1b16466602f7630955309b7065b4de6be311a179e7ba6dffd58120560be507b747e26dead54aeaad554202c72ac10ed1e6aac6d54ceb342fe9ed4a8188
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize8KB
MD567a529a7d79bdba6dc0dc0cca344a8a5
SHA1089e52bde93861cf6bf6c0cfea142ec99575ff9d
SHA2561b2c3152fe741ffd85968435b0b68d4d9476fcb25f119f78a9e702efc41f9e5f
SHA51225f246e307058254fd7fdaea713b4a16161869c453caef8d4d2c931ecc85e1199d6f81aac12314788b12aeccf76f79fe071a8acd3695a072639d08eabb7f03b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize8KB
MD573b7e41c0bcdeba399706ec9bad5eb32
SHA15822781bde9cd9dc9f1a257ba4a3d6d561404c94
SHA2566349c566d10326b91398b9407b5ea0959319c4d3b81b12054b2b08a4db2a6b83
SHA512681c796e1cd99f148ae30102e2df4e468532272b572e5c8d0010b064cbc8e76875e7dec9de3449bb7247c6a38cd0c695e08b9d5590b9d7464e18812a30b6fc42
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5feacfeaa6370d0dd460a0609e1e1435e
SHA11463da69f34d0efa56e61d9dd55ac1f435237b5b
SHA256d57b87db93a487d521c52be8e0d599fcfb17e8012f6066c303f4e48e92c3f439
SHA51261097d4419f67e7b364a5f0f3a248d801e0bbff2283ffce8cb89a5d43309145288c20ce1a6620217c81256db7da81de7d184a0c7eb769ea237902a5abbe5782b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\92qyi9k9.default-release\targeting.snapshot.json
Filesize3KB
MD5aeb5042f01c910c511c6aa9d045632a8
SHA1e79db32c7583eb0db56c79eff6759fb8e6dc1933
SHA2568e1bf09e5dc086ccca93972ada12b8f2e8f3b8420425ffeb89a7f7f297f1b821
SHA51216ba35eef98b844ed7162c37cffe2227d2a1039b85821cd8b3b4b827b0bb3cdc2d637408decb158b9805e15abc3cb52cc78ad17761e90e1f44d17d70240108d7
-
Filesize
141B
MD51995825c748914809df775643764920f
SHA155c55d77bb712d2d831996344f0a1b3e0b7ff98a
SHA25687835b1bd7d0934f997ef51c977349809551d47e32c3c9224899359ae0fce776
SHA512c311970610d836550a07feb47bd0774fd728130d0660cbada2d2d68f2fcfbe84e85404d7f5b8ab0f71a6c947561dcffa95df2782a712f4dcb7230ea8ba01c34c
-
Filesize
111KB
MD5df1ce61fb4869963a1e95a917adef9d0
SHA1bcf132651a5bd948e758441e4733519d1502c8bf
SHA256e58bf0a81866c21e25dbe8f85fd74304259be3e1b53019f857c2354e23f71b1e
SHA512d2867e1b00900098674f1a87653a9f016911649162c66f0eab67336f758a6611a497bc21a6cbe336bbc2464212bfec59e991b99aa92777ad2250e72b4e17888b
-
Filesize
1B
MD5d1457b72c3fb323a2671125aef3eab5d
SHA15bab61eb53176449e25c2c82f172b82cb13ffb9d
SHA2568a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1
SHA512ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0
-
Filesize
209KB
MD5f30ce6004e05994ffd89124c5f0290df
SHA1f797b573c65b1a0fe896fc529cb764da41617026
SHA25600a48c79f453fa1b13c3f37feae3711c7ec35fd82b7bde2432d8c56ccdaf544d
SHA5126eac7bc507b0a7398b9335a67cc1928b4161b11b3a96b9b025225671158945e5ec7df9fd56fd72b46864bd3267b7713a3e7ab12c83621d94c5cb81c7ffb46577
-
Filesize
1KB
MD57e6a26f1fbd44a6d7cfad2a6bb171fd1
SHA15a7b863651deace20424731b01ba70eb573d6741
SHA256b16c8c207e22a7f56f9327b9265028ee1bc4cd5c1fa0352c9cb3ba319ab23587
SHA512d4ca6c5e9a4074ad6ec52b6b530c511d16e55835ef4af0cd4dd4cf1a9b8867e03abe9cecf9afba70d59cbc8a458189d5d9ec82329a2de28cdef3231aa4ca6d5c
-
C:\Users\Admin\Downloads\computer-monitor-showing-hacked-system-alert-message-flashing-screen-dealing-with-hacking-cyber-crime-attack-display-with-security-breach-warning-malware-threat-close-up_482257-62207.jpg
Filesize31KB
MD5914217a3142154db8aefcf0c31cd8c75
SHA1a83348be8b4e3f17e7c0b3dbaf7f8ceca25cbb83
SHA2569702320586a3fcd435c8e1a2c797232769332f62638c222a6b0b90a779207899
SHA51257a3464f40fd97ff49393e9aa04319e7475cc93c0e5f58686c35c93c4f60614814da14afd8b5f1cdcdf3e5bc449b97b8e81a91cfdbc8cbfdf0f9514f96d99d87
-
Filesize
78B
MD523afa9559d7c1149838c8153ffb2687f
SHA1dbe848236a3714f0f26299e75dc8468ffebd5384
SHA256ffc577217f873b828773912f54638f846a118bf116d4b2a51b51b4ddfe7492f0
SHA512bb5879c4f0adfbac37ef67d67cff1908d690431f3fa8781c4b3008a13da2c6add7e68d1041dcffe23d6d3fb6c56c3853b6b53df4b4984d5f7489601ad396d5bc
-
Filesize
1008B
MD5755cce4623d5efb104c6f5070a5abe4d
SHA1f813f7c21d44cded84eef819ec01bdc3b4631da9
SHA256853c12c549decb9642cb0bed63b747d8dabccc031092d37e0e13cd763fb1d829
SHA512fc7913b22acb211f742d6057bf8f02a2d16398dfae790afdfc3bfb2a3edbc2490c5b368b59f3fbe41aac5957f74162bfc95f30f2f3077901ce0f722077477cc9
-
Filesize
80KB
MD56546a8c03db755a26903e652e488371f
SHA118074bdb6f51da3fbd0d8b3bb4dd9904978bdf6a
SHA256f54efc447bf88f233de5cc9bb2e3ae17eb457360f1113d3b56b178a29804dd0d
SHA512fed5b998d33800b5e2c804f67febfd814c83ddee8963e8c93f30a1c0b3ff2e7175e504f43029f121c25cac8abadb76b6cc36d56eb6fcc72ed4f86778d4e30f08
-
Filesize
391B
MD587592f59e3939733c3809a2ebd8eb071
SHA19e3d0b6cab0d217e63d443ffa35dc00f85a0312b
SHA256bef1f70249d5cccb8d71f1083075c80bc322563a666668d13aa3ebac47b9a793
SHA5121b7f9767bea127d677b0754bc2b2c55796d9a19c34ecb022d64d8cb7f6d6fa66cee7c485e2ed9862b46c857b2203316ff26dc91e610bef49ad592511270821ff
-
Filesize
1KB
MD5fba0a4b1f3179dc1913bff122f523b47
SHA1d3ba6421e6de4eae348c7d8ca751f655a3251c11
SHA256b1f544cbe4cbeafd16e7b97222b3d3b42e143e7b06f406fb0cffb2594379bcc1
SHA5123d890b7a5079c1af08a0379b3d16fe1c52885a990ee355c212001ee79be8591896e1449930e6839fb948e4b9441e7137e9891320cc5981aea159cf3f99f8aa58