Analysis
-
max time kernel
1495s -
max time network
1462s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/04/2024, 12:03
Static task
static1
Behavioral task
behavioral1
Sample
s-l1200-removebg-preview.png
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
s-l1200-removebg-preview.png
Resource
macos-20240410-en
General
-
Target
s-l1200-removebg-preview.png
-
Size
166KB
-
MD5
ce7b6ff9b8303ad9d4e5962841d90efb
-
SHA1
92208d22229c59ac6fe7e56708c9148d9393b405
-
SHA256
1fa01d176a3c1524b5471b02b694459dbf513993e87929dd6f7f734a78f29a81
-
SHA512
8627c20a59ec2d7584eab81bf0df8d74f77e3dc390b2765360536a4501ac25611ac21461ecd1eb9147d82a4ad3d9248edefa44e66038748025111ee9e0f0117c
-
SSDEEP
3072:moZLVGqY1szkPtFuDHQyjbz1SN/D5GafmGYNO7wnKTXBWo88f7YVRevAj8FionFc:DdQDm1SZ5Ga+GOewTRYFNC
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133583474360039391" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4464 chrome.exe 4464 chrome.exe 5128 msedge.exe 5128 msedge.exe 6028 msedge.exe 6028 msedge.exe 5828 identity_helper.exe 5828 identity_helper.exe 5892 msedge.exe 5892 msedge.exe 4464 chrome.exe 4464 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeDebugPrivilege 2300 firefox.exe Token: SeDebugPrivilege 2300 firefox.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe Token: SeShutdownPrivilege 4464 chrome.exe Token: SeCreatePagefilePrivilege 4464 chrome.exe -
Suspicious use of FindShellTrayWindow 62 IoCs
pid Process 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 2300 firefox.exe 2300 firefox.exe 2300 firefox.exe 2300 firefox.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 4464 chrome.exe 6108 firefox.exe 6108 firefox.exe 6108 firefox.exe 6108 firefox.exe 6108 firefox.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 4464 chrome.exe 2300 firefox.exe 2300 firefox.exe 2300 firefox.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6028 msedge.exe 6108 firefox.exe 6108 firefox.exe 6108 firefox.exe 6108 firefox.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2300 firefox.exe 6108 firefox.exe 6108 firefox.exe 6108 firefox.exe 6108 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4900 4464 chrome.exe 84 PID 4464 wrote to memory of 4900 4464 chrome.exe 84 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 4304 4464 chrome.exe 85 PID 4464 wrote to memory of 1532 4464 chrome.exe 86 PID 4464 wrote to memory of 1532 4464 chrome.exe 86 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 PID 4464 wrote to memory of 1608 4464 chrome.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\s-l1200-removebg-preview.png1⤵PID:3152
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb2d7aab58,0x7ffb2d7aab68,0x7ffb2d7aab782⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:22⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:82⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:12⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:12⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4252 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:12⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4328 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:82⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4500 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:82⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4956 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:82⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:82⤵PID:5792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:82⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 --field-trial-handle=1868,i,3416796028274398769,4782295288092794919,131072 /prefetch:82⤵PID:5896
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5072
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:4648
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2300.0.431784125\1339263551" -parentBuildID 20230214051806 -prefsHandle 1804 -prefMapHandle 1800 -prefsLen 22074 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {647ffec5-ba3d-4bb4-ac1a-3fbd4adde9dc} 2300 "\\.\pipe\gecko-crash-server-pipe.2300" 1880 1ea8eb03b58 gpu3⤵PID:1688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2300.1.1102861990\642157026" -parentBuildID 20230214051806 -prefsHandle 2392 -prefMapHandle 2388 -prefsLen 22110 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c5835b1-4eb8-4c90-8017-403c1feb273b} 2300 "\\.\pipe\gecko-crash-server-pipe.2300" 2404 1ea81d89358 socket3⤵
- Checks processor information in registry
PID:4756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2300.2.211421386\406993819" -childID 1 -isForBrowser -prefsHandle 3212 -prefMapHandle 3208 -prefsLen 22148 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0285b1fd-2986-41d1-9fe4-2e7c7571cce5} 2300 "\\.\pipe\gecko-crash-server-pipe.2300" 3224 1ea913f5b58 tab3⤵PID:4392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2300.3.869282371\274288436" -childID 2 -isForBrowser -prefsHandle 3576 -prefMapHandle 3572 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {252ab2ce-8e53-44a3-94c2-1e3434398e43} 2300 "\\.\pipe\gecko-crash-server-pipe.2300" 3588 1ea81d41b58 tab3⤵PID:3088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2300.4.294822021\665202127" -childID 3 -isForBrowser -prefsHandle 5224 -prefMapHandle 5220 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {22c08aea-5e20-43d6-8e54-2dcd5a91e279} 2300 "\\.\pipe\gecko-crash-server-pipe.2300" 5232 1ea95fdf558 tab3⤵PID:5264
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2300.5.1757004574\1555655215" -childID 4 -isForBrowser -prefsHandle 5376 -prefMapHandle 5384 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d6297d5-43d3-4db5-9c6a-aa89c1ff8661} 2300 "\\.\pipe\gecko-crash-server-pipe.2300" 5364 1ea96a30b58 tab3⤵PID:5272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2300.6.470572784\1082310197" -childID 5 -isForBrowser -prefsHandle 5600 -prefMapHandle 5596 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0a17668-291a-423e-a7ce-fb701d4ebf30} 2300 "\\.\pipe\gecko-crash-server-pipe.2300" 5608 1ea96a33b58 tab3⤵PID:5288
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xe4,0x10c,0x7ffb19b23cb8,0x7ffb19b23cc8,0x7ffb19b23cd82⤵PID:6040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,13728844437566711622,3399639221408226005,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,13728844437566711622,3399639221408226005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,13728844437566711622,3399639221408226005,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2616 /prefetch:82⤵PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13728844437566711622,3399639221408226005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13728844437566711622,3399639221408226005,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:5608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13728844437566711622,3399639221408226005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13728844437566711622,3399639221408226005,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4496 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,13728844437566711622,3399639221408226005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13728844437566711622,3399639221408226005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13728844437566711622,3399639221408226005,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,13728844437566711622,3399639221408226005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13728844437566711622,3399639221408226005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:4772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:948
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:5812
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6108 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="6108.0.1939802593\2056250199" -parentBuildID 20230214051806 -prefsHandle 1668 -prefMapHandle 1660 -prefsLen 22475 -prefMapSize 235208 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c8bbb7db-aa8c-48c0-bea1-d1af2a3b9fb2} 6108 "\\.\pipe\gecko-crash-server-pipe.6108" 1768 1dbf3728858 gpu3⤵PID:252
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="6108.1.860282442\1606191033" -parentBuildID 20230214051806 -prefsHandle 2192 -prefMapHandle 2180 -prefsLen 22475 -prefMapSize 235208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {33630499-f610-44a5-a58d-5e9d0e655f58} 6108 "\\.\pipe\gecko-crash-server-pipe.6108" 2204 1dbe7589958 socket3⤵
- Checks processor information in registry
PID:6048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="6108.2.731446109\712916804" -childID 1 -isForBrowser -prefsHandle 3064 -prefMapHandle 3160 -prefsLen 22871 -prefMapSize 235208 -jsInitHandle 1336 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9fda9585-70f4-4259-909d-4873d43d6e80} 6108 "\\.\pipe\gecko-crash-server-pipe.6108" 3124 1dbf7419858 tab3⤵PID:4988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="6108.3.30088157\1079610476" -childID 2 -isForBrowser -prefsHandle 3460 -prefMapHandle 3456 -prefsLen 28337 -prefMapSize 235208 -jsInitHandle 1336 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8e9a020-0ccd-4e4c-902f-840152c88b8b} 6108 "\\.\pipe\gecko-crash-server-pipe.6108" 3472 1dbe757ab58 tab3⤵PID:4132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="6108.4.1558282081\7817291" -childID 3 -isForBrowser -prefsHandle 5028 -prefMapHandle 5032 -prefsLen 28337 -prefMapSize 235208 -jsInitHandle 1336 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d600d07a-d20a-4c6c-bdf8-290025f7b176} 6108 "\\.\pipe\gecko-crash-server-pipe.6108" 5020 1dbfc4e0358 tab3⤵PID:3700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="6108.5.168537171\1926413560" -childID 4 -isForBrowser -prefsHandle 5156 -prefMapHandle 5160 -prefsLen 28337 -prefMapSize 235208 -jsInitHandle 1336 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04211264-0c9c-4341-96a0-a96de51931cc} 6108 "\\.\pipe\gecko-crash-server-pipe.6108" 5144 1dbfb5b1558 tab3⤵PID:1336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="6108.6.1257294024\2000897109" -childID 5 -isForBrowser -prefsHandle 5432 -prefMapHandle 5428 -prefsLen 28337 -prefMapSize 235208 -jsInitHandle 1336 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3608391e-1d1c-4d9a-9d65-bdc872ac23dd} 6108 "\\.\pipe\gecko-crash-server-pipe.6108" 5440 1dbfb5b2a58 tab3⤵PID:1516
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5144fae0efe4a395aa1381bf84a0ffc58
SHA1293c92e6722784cbbb622d30bcb45b092e9e1104
SHA256d52b6ac1c4087378c45b3de8da222474d18542d4adccdadd93e4de341601393d
SHA5122867b318c6dd1f8f0d9dacb28753814941dbccb9106d162775488db1e253843fc5a9dcf3856b12a3a3f40255d9e5c5c6b26780aad165b88814136d08d0799870
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD59e149c01bf29f7fc54204833c93f6dae
SHA1b49ec7fa9f4aec650e3829c5bb92ed6e064f9891
SHA2566187285ce6169f5ca620b7ed560cc5d7de3e527a7b4dfa4385859485833de31c
SHA512f2cbd61c4daebdc9d41ab1de5f17af81790be419bb1a9fd6bb70f30c56e2f2d481cbd12dcbe4f00049c8c9384f6ca9613124fe0eea809a8133442547e9b9bab8
-
Filesize
6KB
MD5575185357e1bf95a25b40ced906f6151
SHA1577365de50cf5a3ca72ac226b6a6ee5aeaa372a0
SHA2568a0ba2cdad36f01c9fb5d56634ad2498c6d7193359828fe1413f6ae5e3978f25
SHA5127b98c0d9df01e4a805d31c7be5c77d3cf26e58456472ce1350d6b38c4162d24a55428f715f44eed0ee805dabc8e81e9e8cdb536de85aa065db34e54ce9bb4b05
-
Filesize
16KB
MD541766b79375d2c26820f5f5d215bac77
SHA1d94a671eadb60226faf147b1d2b5c6ce59c7a956
SHA256203f4512a959a955d4bcd2c56749fbb8843797bd0ea44719aad2f532eeb99f71
SHA512dc4eed17f3bd8a252fb6285116fc565cac8db8f21558259d9bdd7a25d463c12b8055241520c6c0c1317b6120655fae09273b46b44be30cd6a06cf43c3686f18d
-
Filesize
128KB
MD5a34b5678d6284aa30c26f17129986766
SHA15f1a8e0b2db66a7780b7bfc88b95d2248f7c2832
SHA256c9438c38e9f09da2037dc1d814273c17891b4279298ee4f72c3d6864aee15cb6
SHA512638b27e937a48acd646960333124d55a1749587cc585d39aa2de0de943337cb63ad2da64222e921e1822fa5b314096662d8d9ef8126b4ee3fb384c8494e1e7a0
-
Filesize
305KB
MD5d6651c8a699ef44ff5d2da138ea54bcf
SHA1262ceb938539b3b66772f63f5689e7938de49d23
SHA256b09b1abd49f3e910a0c9968121936c9a30eb4946807ee6bf6d3da9ccf68185c9
SHA5129cb0e77b1f77585ee704e1fc4f3474f92f64f70031507199e521cd51ec7edf68957f4be672cde339a4ee834dd929dc9c3db3b2d82544fa5ceab886fcb9de911b
-
Filesize
254KB
MD50630cddb735f2d6825568255f136c357
SHA10bcf9fb91c4a415c714e387e0520734914492382
SHA2561c930d4476dc1ab6850b5a4530287ccba9f683d91e613f2db78d082144afe217
SHA512099a3459f4442abe31da6f91f006520e08a31847fcf780bf6ae50bd15f7637a8ad5f97fa1f17ae090d16265b9b796a0cba555519d8c4d503522709163830f7be
-
Filesize
310KB
MD5c36b9943035706737e26d36caa399e53
SHA1fb65050a40e5dc6b45dc5e209f3aca77a3dd193a
SHA25612a7a4d2cf5cf70ac71d7e459592351fabf0d73c38bb83d94614917a3e0f0d50
SHA512f30ef74bb9649b7a9c5bdcb9c7bf087bdccff0260e5bd705bc337cd5085d0575145201bb89d5cb1040b40c944105cb196e309cc4b98892853538cd0aad58ddeb
-
Filesize
86KB
MD5a209b02d1c20c8ca1e1eb604d37f8276
SHA19ccee6ca70d26984d9404783686dd7e274ae4563
SHA256170512bee613f3e7db0b3795178af0ec6afb50efb5f4677fde9a141d79d8c524
SHA5128db11580921fcec3ec4964accbc8cac2afa777525862993c44a6dd1648c143de60a1b004deffea45b27b5f1e3ffd9e46a6d2ca3b467fdc6c8c3d369bc030ead1
-
Filesize
83KB
MD5ae692aa0e5267e2a130a3a9fcd69cf4a
SHA1149b35187282dfc600afb79888a0bd53837010f6
SHA25621504b9f2bd45e96f4db9acc0740c040241ca4ade5860961204233cffe1aea44
SHA51262e3db61a636c562ae1e314eb1901e0bb7aee373512339bbe686a1508e4d5209acfadd542da95a573da713856a35a25ef93f63c3a15f30799b93da3e0e37c459
-
Filesize
152B
MD53e5a2dac1f49835cf442fde4b7f74b88
SHA17b2cf4e2820f304adf533d43e6d75b3008941f72
SHA25630bd1e1bafb4502c91c1fb568372c0fb046d32a4b732e6b88ce59ea23663e4ce
SHA512933ac835894ce6cb8aac0261153823c96b6abec955173653dd56e534d644efd03aec71acb4f8cb0b9af871962296ec06cd03e570a0ac53098b8cd55657543786
-
Filesize
152B
MD56e15af8f29dec1e606c7774ef749eaf2
SHA115fbec608e4aa6ddd0e7fd8ea64c2e8197345e97
SHA256de9124e3fddde204df6a6df22b8b87a51823ba227d3e304a6a6aced9da00c74c
SHA5121c9c9acd158273749e666271a5cdb2a6aebf6e2b43b835ebcc49d5b48490cbbf4deddef08c232417cee33d4809dec9ddac2478765c1f3d7ed8ea7441f5fd1d15
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD513278a0540f803970fe805054d7e0982
SHA198818cc86f6987326d8626738cf357331dfd4d8f
SHA2568069000fd73befd8e6e35299280be18de8d36e4832e01ea68e3bc320fb922c0c
SHA5128664fb3245224bb59d91c547e4e2417d2caa901e6efbd341734d1dbe69ea6ff84f4ca29b343c69750168c472123e0dd55b24867e97b90ca72b46a7168ba39911
-
Filesize
6KB
MD56f1a1a5ba255124534e1dbc04790e04f
SHA1953d5b4625c1ca297ac15ccba5603577ddc06303
SHA25694d9c90b5af15cd19d531ffaa703b449f00028f798c09bc40f4c16fe323d1352
SHA512e4dd845b827bbe19f0a370e2fc0f649379b5c52efb189994c017a785b9cb27f432c6dc134f62c005f72cf88b50629a708e079d35c1e6937f6adb2749c2de33da
-
Filesize
6KB
MD53e22ab02c46616514afaee1eb4a3f571
SHA1b972b1d6ca795c7ce4c55f58da3693a948437596
SHA2564f938ec84b9b781fa710106c889f53c8d7355f7efc2e014509d197da6e663e3a
SHA512617a1bec484547b63e1e0262757a40160ea88b5875199a73fdd7bbb9b57efcbfbff162e71125286a3f21e64062fe05adece08697ed0c7e0f3eada2d8e963720e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e62e7405d3487e212c3e3f60453cb7e4
SHA111536f264c02eba318b69d9a0aef797b772fc815
SHA256a58f3d3874b5c916d4339c3375d293a930efd76318a2d9124505c3bebdb68a10
SHA51281c6148b2b1b3fd21e59f5f90b979c396c740fc2cfe4e50d4cde9e9d506c8a5f73355be00266b521aeaad2f490d7d32e624a02743eccf6d6fafe465575fd45c1
-
Filesize
11KB
MD5ef1d8ddb470cbde1da6a6f7911c07da7
SHA14f0b6098c55bab8c30778f3cae51df4fee27dd70
SHA2562f452f68029b7294fd152e070e9ba3f0d68ec7eeb550a6c024f3f4fa0cac511f
SHA5120fa3c6ab6148412192cb6f215440bd2f5bce96e581e2764199f5579358b3d17cf97cc3de57f2bec660647720cf09bb0403afbc99cf63db3b2d280855f46a877f
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\h668dfji.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD55dc2fe54c6d8888309c13b06e765c04f
SHA10249796edd50160f912046d913a12b1e63665296
SHA256b66cf0298df17bda1abf3e41429027ff4053cc086b5ae06a39c291a3047ec151
SHA5120be4aa77a0f17cebbf5f7cd52ff675963b530cc482379afe540c35dfa63d8d82fb1ee3afcef73d44a411bf70c6623b14a1574ae2157eb2d08e82385fa9c41152
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\h668dfji.default-release\cache2\entries\254256B27E0C48CF9B80B695F0B3B8CA84610495
Filesize9KB
MD520d38bcdf316dacb3782c76be9ca1d81
SHA142f950c215c5dc6227541e0a512e8fe1934c0dc7
SHA25623c742b25fd839270d3e3efedb387557e20f806555f93c8aef8d2311acaacbe9
SHA5129a2bae67387308dc10bdedd057acc7d37bd3d8304850555ea405d131d0cbf058667017679d52c20bf819f7558067f7d8900f6315722f11211edf9845c81ab3ee
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\h668dfji.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F
Filesize11KB
MD5f962e37a78674eceb5ba1b4021133b37
SHA19c4ac4adfc3bc75ae6a1199fc4b4017ff262fe2b
SHA2562f77e6f4884cad32e942d362b8c069b7cd6a34e674af267d0b901d4b0b218149
SHA512be6cd8bf24cb92c2ac46be6eda9ed53dcbad876d69e590fa254d595e0adfeb99ce761d7d05ab20aeeafbad2b1f996096340d3a94d3c52f8cc1450274575f4aad
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\h668dfji.default-release\cache2\entries\C72D4296C2EBC6FD41A9F780CD0C8F30F0FF937C
Filesize13KB
MD5b8fdaa13111bd36535a0f387ddaa05a9
SHA17ccfb2689fb632b66d5c4befa164335f63ee4779
SHA2561c1294d9fe575d8911a0a81d0264c4bfccbb78ae05839642377743d78cc1d605
SHA51259754def0cff5b4bc12139f60cec62b4f310ff074b79b4e766b22014952336aa69f38da485d1babbddb4bf04fa371c25d84c3fe824e1446d1ee1d350acfd4500
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\h668dfji.default-release\startupCache\urlCache.bin
Filesize2KB
MD5d555a36259f801b0ed2d5b235296c132
SHA1bea55df914adafe9a83c4312b2a4cf49e897d426
SHA256133da1441795277bce23ab2181d9333ea351f118da594b12faec48560caf35bb
SHA51242b73a977a13ed61ad2c25b66873c7c891a58540f357a3c03c3a53ff25b19f5fbddacdad1d3a5bbf119c491cd27981e807482ddc950b8300d982e76b970ff6bd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\AlternateServices.txt
Filesize453B
MD50848e710c26de8eb7614d754020fc42a
SHA1278cd82124c07173a9b1d9fc4829e67c7a9a435d
SHA25654dcef8e7fff5eb43f349aa398baab297ba9c808b293d64ade7d8f258c5c5a4f
SHA512da56f6fab4ee219dae77534beb9cef739cbda2c81c52a8c3cd9fea04e47d57252009df81971bcad294b8f6abb3e1f4c1363ee0355053385e409869242c13782a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\SiteSecurityServiceState.txt
Filesize324B
MD5a1442b99d1f38f00f333813bb7efcafe
SHA170b3b56fc15dc911a4987b943b8e9429076733c7
SHA2567a7a7caebacabdd080219f830049b7282904b7eddc63c4c0cf94a02eaaa397e5
SHA512b41f6d2e6bbae497ed9c164b9972cd22c77c54741d04dfcc29db5e59634a7bc8d6625a04ea0087031af4471d4e5c9c9b587a45dfa087633d4927d7bbb4165307
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\datareporting\glean\db\data.safe.bin
Filesize182B
MD563b1bb87284efe954e1c3ae390e7ee44
SHA175b297779e1e2a8009276dd8df4507eb57e4e179
SHA256b017ee25a7f5c09eb4bf359ca721d67e6e9d9f95f8ce6f741d47f33bde6ef73a
SHA512f7768cbd7dd80408bd270e5a0dc47df588850203546bbc405adb0b096d00d45010d0fb64d8a6c050c83d81bd313094036f3d3af2916f1328f3899d76fad04895
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\datareporting\session-state.json
Filesize162B
MD558784d41eb7e0434524300b5f6a388b3
SHA1adb651ec4bb99b82e6f40b141bce9da84665916e
SHA256d5663831248f3feb395a34ae8903613f1daca565a49dc535b9e6bedb8655e6fc
SHA5126f2830037b3c3cc774992fa6425ffeca5aa5acaac1c8f0641868ffb69334c0c4028f9bce752a896306a18ef5cc6bb156221774a751cdca4d8542673b6da41352
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\datareporting\state.json
Filesize51B
MD53e32e2cc1ed028dd8ff9b06f50a4707b
SHA1b3910351bd8e13ad1479db699cf6fac6544a5bef
SHA2564a3a666d98e61b5fe06fecac56807137a0fffb4bb71d4c3b16baa8702dde738c
SHA5124585ee9ec04adf138727cd039a9cbe78db6cf2926f6ce92524312a42efd1250100848a919ec4b833f9a013181ce93734575b86eed37f1bf32effa3237eba84db
-
Filesize
6KB
MD5af3a6797d5c37f4f19cf2ab0b266f68c
SHA1e1ca0df333f3a83e78f13f25915ee93b80b212f0
SHA25670016609cf62095bcd6c319e8a28757581c48023c37802d32a7d873fd1921fbd
SHA5123c959824b3c41159b4c35064ee3fa72e2491141c2835e5d3ac644658db06ab33b49ef15bd7e76b642bef665e242087441933f8506825d71b888795f106d9912f
-
Filesize
7KB
MD5dd84877e0f4f7d05b08bd00391bf9dbe
SHA1a1adb557a99f37f9a63af819abdc5ab67b4d8edf
SHA256e2f84bc2b060575669847f83838737586979ae0a5d6ad9737fff06905b1f3f94
SHA51238580969059caf268f1780355b63b7d823801afb6bc92f62afe072cb0e6a32a8b4e2af94f504626dffa96cd0b2cc152088cd89306a1e687675ef5f436e8f8454
-
Filesize
7KB
MD50282c9dd7a24bd339d9b80e172d1c68b
SHA1cd59b4d9a9e5039583b003b3af4fb7492bd088f2
SHA2561bb0cc636371922b75dbcefc1d6f71b76bd2a3328c1a7e9ca8873e8152ce763c
SHA51246e899109d1dbe109cf96f314cbfc289a8ef345104b4b23a9fe543062461dd50675c8298bab42a5085703808f52869f0c11ea7d54113503c9105531d50d48aad
-
Filesize
7KB
MD5b3ce50cd21e2be3f29845f50313c7819
SHA111847e3a95df443af939936f80c4d5b3d0e7644c
SHA2567dbfb0c5694c7e4ebaf064688d0df8ec403694bff237c660a9bb80734f63b2b6
SHA512b534f0bfc94bd318a1587e2bbf969f677f078ca23852be721c05bb0290ade3c76d6a28c73f0dc4ee02a54ab8ae5136c515fb5f8fbb4e07c0a10f4d88fb16bc33
-
Filesize
64KB
MD549397db0486dc59d607907a086f40c9b
SHA108742ce9db9569062def08e99eea8470702feb7d
SHA256890033ea279f13478e655150a823a5f84176d2f8f2ec3724dc61dfec775707c4
SHA512fc8dad1ae2215cd96c41bb3e683670bb9138467677da46c19d1e58972775842a995b70123c22ea1efb659d043f5116d0c9dca422035a6646b35f81033c9f5f53
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\sessionCheckpoints.json
Filesize228B
MD5a0821bc1a142e3b5bca852e1090c9f2c
SHA1e51beb8731e990129d965ddb60530d198c73825f
SHA256db037b650f36ff45da5df59bc07b0c5948f9e9b7b148ead4454ab84cb04fd0e2
SHA512997528e2ecd24a7e697d95cd1a2a7de46a3d80b37fd67fac4fb0da0db756b60a24648b7074255dc38f7651302f70894a53c3d789f3d7cd9f80fb91bd0cade4be
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\sessionCheckpoints.json
Filesize288B
MD5948a7403e323297c6bb8a5c791b42866
SHA188a555717e8a4a33eccfb7d47a2a4aa31038f9c0
SHA2562fca1f29b73dd5b4159fa1eb16e69276482f5224ba7d2219a547039129a51f0e
SHA51217e2f65c33f47c8bb4beca31db2aff3d4bbb6c2d36924057f9f847e207bdcb85ffcbb32c80dd06862ffc9b7f0bd3f5e2e65b48bb1bc3363732751101d5596b1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\sessionCheckpoints.json.tmp
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\sessionCheckpoints.json.tmp
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\sessionCheckpoints.json.tmp
Filesize122B
MD599601438ae1349b653fcd00278943f90
SHA18958d05e9362f6f0f3b616f7bfd0aeb5d37967c9
SHA25672d74b596f7fc079d15431b51ce565a6465a40f5897682a94a3f1dd19b07959a
SHA512ffa863d5d6af4a48aadc5c92df4781d3aacbf5d91b43b5e68569952ffec513ff95655b3e54c2161fe27d2274dd4778bad517c7a3972f206381ef292808628c55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\sessionCheckpoints.json.tmp
Filesize146B
MD565690c43c42921410ec8043e34f09079
SHA1362add4dbd0c978ae222a354a4e8d35563da14b4
SHA2567343d5a46e2fca762305a4f85c45484a49c1607ede8e8c4bd12bedd2327edb8d
SHA512c0208d51cf1586e75f22764b82c48ecbb42c1ff54aa412a85af13d686e0119b4e49e98450d25c70e3792d3b9c2cda0c5ab0c6931ebaf548693bb970a35ae62b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5af5f8bb4f9a524bb4bcb6ec9775c2bb3
SHA1134c8c032008b55f42de967240b1781aa18f6aac
SHA256f6c529a02deb3618d317f8951c0c3b6cf0ba5fac1087bd4dc748627d676f9ffc
SHA5124e193350c075a4e5d497d9a0e067be424da464b325db3d20a48492ee76cd30a9584c7184b84c26ee9505bd67e6c7261bf2aea50cd69d70d13e8c3a73e6cebb98
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5e074087da1c1d70dde8e8757b4b86363
SHA1a5cd71e22175a5731fb0fdd0ea16fecdcd044706
SHA25670578b6fc7cb3904a4c3a36bdfd3788f9ec3ce70c2b3cc3fd73076651ac7bd30
SHA5128e9040d4a6967794bd7f71dd4236c5bfe9a9c00f33c57704d725de27e54d5226e0443e243f83fe0906469650ef1b51aee6775e6d724451885cc18add4e2bca0e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD52b628d5656d932dd7dc6d2ffc66a249e
SHA13c80150eaa97b6da8fe80d77be2a472730a059ed
SHA2560d374f02084bd7bc84182e79a247967044c255a5420e224db1581be733cf5a00
SHA5121c0cc6cf46d5f550e20596955fb8d5899cad0f01a5058de974a16762f4b5046d0841f10427e24cac2a22e62253693ed8feef5b655fba1c959151d7b8dde612c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\sessionstore.jsonlz4
Filesize904B
MD5694b189047753da2ee0e4183072a0203
SHA1781b606ab8c2da1cc9cade1bcef474fec411fca2
SHA256f87da3c06932b7f3c1250f9695a7ffb1488c6463797a6f3529cd13ec40b939f5
SHA5125222478f5e9a41cf1ff74a6edde85f6f11abb4c24c59ef426319b18ab94eb8e6f9cd4caf48e88d8744ea65bc8494433e398cefec3b3141fd33c6b1eaf223b9bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\sessionstore.jsonlz4
Filesize1KB
MD5e3d36dc9ddf42852112cc010dbbbe4ba
SHA1072bcaab08b337ea8b9782df88936fdcf0b1d791
SHA25611e1a22f30e777cee0097d7d0e18a55eb5a809c704c870d4f21693d2e002e3ca
SHA51219938b09b67ec356adee5244280b977aae6075c42f5c6a9260edb84ab20ab56c460ff714935615e6b57fbca5e5716632e367b82ef25fe8ebaef3ae29a0770015
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite
Filesize48KB
MD5b6271bbed6624f0931b6d35c87dae532
SHA138ec50595054f2d57f1c1bcde0b0a38eddd1ea0f
SHA256c90af374ab48e2e0c86de2ec686acd63a151e9a77b44385bc597a4c0cb68462a
SHA512734ea2283714ef41f5f1f8867e50ce7c9736a1cc809d8132495381a7dc828bac232d3ed75acc2aab004c4130494dd6e185d9e9947d402749df2b63f44a3641bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\h668dfji.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize192KB
MD5a195d97a81310010aaa342389c2b871d
SHA1892d13f907c12b69a2eedc8a8dab610d5b17d6eb
SHA256bfb058f8624a537c19c3c59ea78e4ce0e317351ff1221af6eeaefdec3f103b5e
SHA51246f4825b3231643aeeedc5a002b836ef10b943b4b43f1884e1a59853877eb19fb6ed85de44067e6b13782cceecd715c082f21231c546a8743eedf6cf7c5daa63
-
Filesize
217B
MD56d9b95ac26c346f90f4773f7653b89b7
SHA17fc448b63abe6b9c8549543a7e7a7dde53ff2736
SHA256e881d3d030d2427dd30d05df4e5bf1494af4e14c5440e20772757dd197626d46
SHA5126ee6ca9770956cf67db93a19864cc08b082f3f293510b60b2888b29995a2a296e5dfb06f46e6b2cebb328a7342044092f1444c5ce231284bf5f5e7e8cc68357f