Resubmissions
07/05/2024, 19:29
240507-x7rbdsed93 907/05/2024, 18:20
240507-wyy47she2x 907/05/2024, 17:15
240507-vs3prsac54 907/05/2024, 08:54
240507-ktxvsshc9s 9Analysis
-
max time kernel
1050s -
max time network
1021s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 17:15
Behavioral task
behavioral1
Sample
ByteVault.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
ByteVault.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
ByteVault.exe
Resource
win11-20240419-en
General
-
Target
ByteVault.exe
-
Size
9.8MB
-
MD5
25a7375d3a6597707493a0841e878bce
-
SHA1
173a8e00b00d84830e06b1f3d63988fe895fa001
-
SHA256
7f65b5d7be7a9e563e1b577ff1d95c891b16fa9871dc748c7640e6589e6902db
-
SHA512
110518ee80839dcf0e826bfdb41c16591deac371865b3635ef08b005a823e53c296d9de0be9eeba3d6e1c5413905f4d4d8ef175748c2c6e48801b9149668cee9
-
SSDEEP
196608:fhfefIk7AHkPkRJW9GNZA1HeT39IigaeE9TFa0Z8DOjCdylwo1nz8QW7tx:0QFG8S1+TtIiEY9Z8D8CclPdoPx
Malware Config
Signatures
-
Renames multiple (151) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 8 IoCs
pid Process 5716 netsh.exe 3768 netsh.exe 1936 netsh.exe 3036 netsh.exe 404 netsh.exe 4228 netsh.exe 1560 netsh.exe 1372 netsh.exe -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation FAprotection.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 5400 FAprotection.exe 1908 FAprotection.exe 868 dismhost.exe -
Loads dropped DLL 24 IoCs
pid Process 3548 ByteVault.exe 3548 ByteVault.exe 3548 ByteVault.exe 3548 ByteVault.exe 3548 ByteVault.exe 3548 ByteVault.exe 3548 ByteVault.exe 3548 ByteVault.exe 3548 ByteVault.exe 3548 ByteVault.exe 1908 FAprotection.exe 1908 FAprotection.exe 1908 FAprotection.exe 1908 FAprotection.exe 1908 FAprotection.exe 1908 FAprotection.exe 1908 FAprotection.exe 1908 FAprotection.exe 1908 FAprotection.exe 868 dismhost.exe 868 dismhost.exe 868 dismhost.exe 868 dismhost.exe 868 dismhost.exe -
Drops desktop.ini file(s) 8 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\desktop.ini ByteVault.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini ByteVault.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini ByteVault.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini ByteVault.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini ByteVault.exe File opened for modification C:\Users\Admin\Music\desktop.ini ByteVault.exe File opened for modification C:\Users\Admin\Videos\desktop.ini ByteVault.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini ByteVault.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 219 raw.githubusercontent.com 220 raw.githubusercontent.com 217 raw.githubusercontent.com 218 raw.githubusercontent.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\LogFiles\setupcln\setuperr.log cleanmgr.exe File opened for modification C:\Windows\system32\LogFiles\setupcln\diagerr.xml cleanmgr.exe File opened for modification C:\Windows\system32\LogFiles\setupcln\diagwrn.xml cleanmgr.exe File opened for modification C:\Windows\system32\LogFiles\setupcln\setupact.log cleanmgr.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DISM\dism.log cleanmgr.exe File opened for modification C:\Windows\Logs\DISM\dism.log dismhost.exe File opened for modification C:\Windows\INF\setupapi.dev.log cleanmgr.exe -
pid Process 2984 powershell.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023d6e-1600.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 46 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0004 cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0015 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0067 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0015 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0004 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0004 cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0015 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0067\ cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0015 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0067 cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0004 cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0067\ cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 cleanmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom cleanmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 cleanmgr.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 15 IoCs
pid Process 1256 timeout.exe 4132 timeout.exe 1956 timeout.exe 5732 timeout.exe 1628 timeout.exe 3392 timeout.exe 5852 timeout.exe 2004 timeout.exe 4048 timeout.exe 3368 timeout.exe 5808 timeout.exe 1436 timeout.exe 6104 timeout.exe 3496 timeout.exe 1128 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3036 tasklist.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Gathers network information 2 TTPs 10 IoCs
Uses commandline utility to view network configuration.
pid Process 1804 NETSTAT.EXE 4536 ipconfig.exe 4356 ipconfig.exe 3920 NETSTAT.EXE 6120 NETSTAT.EXE 3588 ipconfig.exe 3544 ipconfig.exe 5172 NETSTAT.EXE 5100 NETSTAT.EXE 3068 NETSTAT.EXE -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
pid Process 4636 systeminfo.exe 2624 systeminfo.exe -
Kills process with taskkill 64 IoCs
pid Process 2104 taskkill.exe 5672 taskkill.exe 856 taskkill.exe 5176 taskkill.exe 5324 taskkill.exe 5808 taskkill.exe 6088 taskkill.exe 4816 taskkill.exe 3588 taskkill.exe 4656 taskkill.exe 1844 taskkill.exe 4256 taskkill.exe 2796 taskkill.exe 3800 taskkill.exe 4920 taskkill.exe 3036 taskkill.exe 556 taskkill.exe 3496 taskkill.exe 216 taskkill.exe 5276 taskkill.exe 2984 taskkill.exe 6116 taskkill.exe 4324 taskkill.exe 4536 taskkill.exe 5596 taskkill.exe 5264 taskkill.exe 5556 taskkill.exe 1964 taskkill.exe 5264 taskkill.exe 2292 taskkill.exe 4360 taskkill.exe 1856 taskkill.exe 5152 taskkill.exe 4080 taskkill.exe 4528 taskkill.exe 4808 taskkill.exe 3908 taskkill.exe 2648 taskkill.exe 4132 taskkill.exe 1576 taskkill.exe 952 taskkill.exe 4000 taskkill.exe 1576 taskkill.exe 4044 taskkill.exe 5968 taskkill.exe 3588 taskkill.exe 2228 taskkill.exe 704 taskkill.exe 868 taskkill.exe 3908 taskkill.exe 5920 taskkill.exe 4348 taskkill.exe 5088 taskkill.exe 220 taskkill.exe 1256 taskkill.exe 2736 taskkill.exe 964 taskkill.exe 5740 taskkill.exe 5396 taskkill.exe 4796 taskkill.exe 1436 taskkill.exe 2864 taskkill.exe 5768 taskkill.exe 436 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133595762007212777" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3726321484-1950364574-433157660-1000\{2D0F5968-8AD7-4B6A-8729-3F572B53EB5F} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\ByteX_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\ByteX_auto_file\shell\edit\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings FAprotection.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\ByteX_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\ByteX_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\ByteX_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\ByteX_auto_file\shell\open\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\ByteX_auto_file\shell\edit OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.ByteX\ = "ByteX_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\ByteX_auto_file\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.ByteX OpenWith.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\Downloads\FA Adv Security Tool.bat:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\FA Installer v.1.1 .bat:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\FAprotection.exe:Zone.Identifier firefox.exe -
Opens file in notepad (likely ransom note) 9 IoCs
pid Process 2296 NOTEPAD.EXE 224 NOTEPAD.EXE 2728 NOTEPAD.EXE 5048 NOTEPAD.EXE 4216 NOTEPAD.EXE 5316 NOTEPAD.EXE 440 NOTEPAD.EXE 3360 NOTEPAD.EXE 4724 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2984 powershell.exe 2984 powershell.exe 2952 msedge.exe 2952 msedge.exe 4496 msedge.exe 4496 msedge.exe 1800 identity_helper.exe 1800 identity_helper.exe 5436 msedge.exe 5436 msedge.exe 5436 msedge.exe 5436 msedge.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 3244 chrome.exe 3244 chrome.exe 4280 taskmgr.exe 4280 taskmgr.exe 4280 taskmgr.exe 4280 taskmgr.exe 4280 taskmgr.exe 4280 taskmgr.exe 4280 taskmgr.exe 4280 taskmgr.exe 4280 taskmgr.exe 4280 taskmgr.exe 4280 taskmgr.exe 4280 taskmgr.exe 4280 taskmgr.exe 5048 chrome.exe 5048 chrome.exe 3052 powershell.exe 3052 powershell.exe 3052 powershell.exe 5912 msedge.exe 5912 msedge.exe 4568 msedge.exe 4568 msedge.exe 4260 msedge.exe 4260 msedge.exe 4024 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 5376 OpenWith.exe 1412 OpenWith.exe 1800 cleanmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2984 powershell.exe Token: SeDebugPrivilege 4120 taskmgr.exe Token: SeSystemProfilePrivilege 4120 taskmgr.exe Token: SeCreateGlobalPrivilege 4120 taskmgr.exe Token: 33 4120 taskmgr.exe Token: SeIncBasePriorityPrivilege 4120 taskmgr.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe Token: SeDebugPrivilege 4280 taskmgr.exe Token: SeSystemProfilePrivilege 4280 taskmgr.exe Token: SeCreateGlobalPrivilege 4280 taskmgr.exe Token: 33 4280 taskmgr.exe Token: SeIncBasePriorityPrivilege 4280 taskmgr.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeDebugPrivilege 2092 firefox.exe Token: SeDebugPrivilege 2092 firefox.exe Token: SeDebugPrivilege 3052 powershell.exe Token: SeDebugPrivilege 2092 firefox.exe Token: SeDebugPrivilege 2092 firefox.exe Token: SeDebugPrivilege 2092 firefox.exe Token: SeDebugPrivilege 3036 tasklist.exe Token: SeDebugPrivilege 2092 firefox.exe Token: SeDebugPrivilege 1804 NETSTAT.EXE Token: SeDebugPrivilege 5172 NETSTAT.EXE Token: SeDebugPrivilege 5100 NETSTAT.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe 4120 taskmgr.exe -
Suspicious use of SetWindowsHookEx 50 IoCs
pid Process 5452 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 5376 OpenWith.exe 1412 OpenWith.exe 1412 OpenWith.exe 1412 OpenWith.exe 1412 OpenWith.exe 1412 OpenWith.exe 1412 OpenWith.exe 1412 OpenWith.exe 1412 OpenWith.exe 1412 OpenWith.exe 2092 firefox.exe 2092 firefox.exe 2092 firefox.exe 2092 firefox.exe 2092 firefox.exe 2092 firefox.exe 2092 firefox.exe 2092 firefox.exe 2092 firefox.exe 2092 firefox.exe 2284 OpenWith.exe 5952 OpenWith.exe 3540 OpenWith.exe 5836 OpenWith.exe 2292 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 3548 2860 ByteVault.exe 83 PID 2860 wrote to memory of 3548 2860 ByteVault.exe 83 PID 3548 wrote to memory of 2984 3548 ByteVault.exe 86 PID 3548 wrote to memory of 2984 3548 ByteVault.exe 86 PID 3548 wrote to memory of 404 3548 ByteVault.exe 89 PID 3548 wrote to memory of 404 3548 ByteVault.exe 89 PID 3548 wrote to memory of 4496 3548 ByteVault.exe 96 PID 3548 wrote to memory of 4496 3548 ByteVault.exe 96 PID 4496 wrote to memory of 1956 4496 msedge.exe 97 PID 4496 wrote to memory of 1956 4496 msedge.exe 97 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 4836 4496 msedge.exe 98 PID 4496 wrote to memory of 2952 4496 msedge.exe 99 PID 4496 wrote to memory of 2952 4496 msedge.exe 99 PID 4496 wrote to memory of 4808 4496 msedge.exe 100 PID 4496 wrote to memory of 4808 4496 msedge.exe 100 PID 4496 wrote to memory of 4808 4496 msedge.exe 100 PID 4496 wrote to memory of 4808 4496 msedge.exe 100 PID 4496 wrote to memory of 4808 4496 msedge.exe 100 PID 4496 wrote to memory of 4808 4496 msedge.exe 100 PID 4496 wrote to memory of 4808 4496 msedge.exe 100 PID 4496 wrote to memory of 4808 4496 msedge.exe 100 PID 4496 wrote to memory of 4808 4496 msedge.exe 100 PID 4496 wrote to memory of 4808 4496 msedge.exe 100 PID 4496 wrote to memory of 4808 4496 msedge.exe 100 PID 4496 wrote to memory of 4808 4496 msedge.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ByteVault.exe"C:\Users\Admin\AppData\Local\Temp\ByteVault.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\ByteVault.exe"C:\Users\Admin\AppData\Local\Temp\ByteVault.exe"2⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Encrypt\encrypt.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff20a446f8,0x7fff20a44708,0x7fff20a447184⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:24⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:84⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:14⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:14⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:84⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:14⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:14⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:14⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:14⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4064 /prefetch:84⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:14⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=3044 /prefetch:84⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2888 /prefetch:24⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,13609588704613298201,5461889190011151622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3812 /prefetch:84⤵PID:5572
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4120
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5452
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5376 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\SyncImport.asf.ByteX2⤵
- Opens file in notepad (likely ransom note)
PID:5316
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1412 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ExitBackup.odt.ByteX2⤵
- Opens file in notepad (likely ransom note)
PID:440
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ClosePop.mpeg.ByteX1⤵
- Opens file in notepad (likely ransom note)
PID:2296
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\DisableTest.mht.ByteX1⤵
- Opens file in notepad (likely ransom note)
PID:224
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ConvertToDisconnect.sql.ByteX1⤵
- Opens file in notepad (likely ransom note)
PID:2728
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RequestReset.ram.ByteX1⤵
- Opens file in notepad (likely ransom note)
PID:3360
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\JoinSave.asf.ByteX1⤵
- Opens file in notepad (likely ransom note)
PID:5048
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:3244 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7fff21c2cc40,0x7fff21c2cc4c,0x7fff21c2cc582⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,2629086458226969168,8908364237568207576,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2176,i,2629086458226969168,8908364237568207576,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2420 /prefetch:32⤵PID:5340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,2629086458226969168,8908364237568207576,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3176,i,2629086458226969168,8908364237568207576,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3336,i,2629086458226969168,8908364237568207576,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4276,i,2629086458226969168,8908364237568207576,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:5896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4256,i,2629086458226969168,8908364237568207576,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4884,i,2629086458226969168,8908364237568207576,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:6076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4928,i,2629086458226969168,8908364237568207576,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4660 /prefetch:82⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4988,i,2629086458226969168,8908364237568207576,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4552 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:4800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:6000
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:5048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff21c2cc40,0x7fff21c2cc4c,0x7fff21c2cc582⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,12050382723191564735,10688475814548219486,262144 --variations-seed-version=20240507-050127.537000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1924,i,12050382723191564735,10688475814548219486,262144 --variations-seed-version=20240507-050127.537000 --mojo-platform-channel-handle=2020 /prefetch:32⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,12050382723191564735,10688475814548219486,262144 --variations-seed-version=20240507-050127.537000 --mojo-platform-channel-handle=2268 /prefetch:82⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,12050382723191564735,10688475814548219486,262144 --variations-seed-version=20240507-050127.537000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:5928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,12050382723191564735,10688475814548219486,262144 --variations-seed-version=20240507-050127.537000 --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:5904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4488,i,12050382723191564735,10688475814548219486,262144 --variations-seed-version=20240507-050127.537000 --mojo-platform-channel-handle=4516 /prefetch:12⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4684,i,12050382723191564735,10688475814548219486,262144 --variations-seed-version=20240507-050127.537000 --mojo-platform-channel-handle=4676 /prefetch:82⤵PID:5288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4664,i,12050382723191564735,10688475814548219486,262144 --variations-seed-version=20240507-050127.537000 --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4708,i,12050382723191564735,10688475814548219486,262144 --variations-seed-version=20240507-050127.537000 --mojo-platform-channel-handle=4692 /prefetch:82⤵PID:5264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5000,i,12050382723191564735,10688475814548219486,262144 --variations-seed-version=20240507-050127.537000 --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:5372
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:2688
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 25457 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c6cb0df-0ddd-4351-93dc-3b4ad4f63e2b} 2092 "\\.\pipe\gecko-crash-server-pipe.2092" gpu3⤵PID:5656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2408 -parentBuildID 20240401114208 -prefsHandle 2384 -prefMapHandle 2380 -prefsLen 25493 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ac5ba15-3fe9-48ce-9ad1-77a5b7b12a14} 2092 "\\.\pipe\gecko-crash-server-pipe.2092" socket3⤵PID:4608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2960 -childID 1 -isForBrowser -prefsHandle 2760 -prefMapHandle 2776 -prefsLen 25634 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {23781342-cac8-4e68-8f54-a725b4db8f88} 2092 "\\.\pipe\gecko-crash-server-pipe.2092" tab3⤵PID:5132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4268 -childID 2 -isForBrowser -prefsHandle 4264 -prefMapHandle 4260 -prefsLen 30867 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c46b6432-309b-48fc-ac09-c423124ab15f} 2092 "\\.\pipe\gecko-crash-server-pipe.2092" tab3⤵PID:2680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4812 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4848 -prefMapHandle 4844 -prefsLen 30867 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7dfb8aa-ffc1-4675-9f0a-1ff637c728f5} 2092 "\\.\pipe\gecko-crash-server-pipe.2092" utility3⤵
- Checks processor information in registry
PID:1408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5268 -childID 3 -isForBrowser -prefsHandle 5260 -prefMapHandle 4732 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b712a350-7c50-4de4-83d8-de82435de288} 2092 "\\.\pipe\gecko-crash-server-pipe.2092" tab3⤵PID:5776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5424 -childID 4 -isForBrowser -prefsHandle 5500 -prefMapHandle 5496 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f33d626c-f1df-40fd-a850-bfa5660bf895} 2092 "\\.\pipe\gecko-crash-server-pipe.2092" tab3⤵PID:1960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5400 -childID 5 -isForBrowser -prefsHandle 5644 -prefMapHandle 5652 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {01b329d5-b4c4-4751-b53e-f8eaf30c5e10} 2092 "\\.\pipe\gecko-crash-server-pipe.2092" tab3⤵PID:1224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4520 -childID 6 -isForBrowser -prefsHandle 4296 -prefMapHandle 2720 -prefsLen 27368 -prefMapSize 244658 -jsInitHandle 1108 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9befc2f3-3367-4236-a806-34a9ea65dace} 2092 "\\.\pipe\gecko-crash-server-pipe.2092" tab3⤵PID:4924
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1308
-
C:\Users\Admin\Desktop\FAprotection.exe"C:\Users\Admin\Desktop\FAprotection.exe"1⤵
- Executes dropped EXE
PID:5400 -
C:\Users\Admin\Desktop\FAprotection.exe"C:\Users\Admin\Desktop\FAprotection.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1908 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:1708
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:5648
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:3068
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:6052
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:6124
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:5572
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:392
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:5964
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:5680
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:3896
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:5672
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:5144
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:4548
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:5916
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FARWARNING.vbs"3⤵PID:680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Installer v.1.1 .bat" "1⤵
- Checks computer location settings
- Modifies registry class
PID:4900 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAinfo4.vbs"2⤵PID:2228
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAinfo3.vbs"2⤵PID:2960
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAinfo2.vbs"2⤵PID:4892
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAinfo1.vbs"2⤵PID:4448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\FA_Antivira\FAshortcutinstallerdesktop.bat"2⤵PID:5472
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "$s=(New-Object -COM WScript.Shell).CreateShortcut('C:\Users\Admin\Desktop\FA Security.lnk');$s.TargetPath='C:\FA_Antivira\Fabi_Antivira_Securety.bat';$s.Save()"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ufile.io/1cs1w93x2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:4568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff2ba646f8,0x7fff2ba64708,0x7fff2ba647183⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:23⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:83⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:13⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:13⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5124 /prefetch:83⤵PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5528 /prefetch:83⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:83⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4340 /prefetch:13⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:13⤵PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:13⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:13⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:13⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,8016943738157020342,12187895748687858657,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:23⤵PID:1628
-
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:4132
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:4048
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:1956
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:5732
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:5808
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:1628
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:5852
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:1436
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:3368
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:2004
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:3392
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAwlc.vbs"2⤵PID:5672
-
-
C:\Windows\system32\timeout.exetimeout /t 602⤵
- Delays execution with timeout.exe
PID:6104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:4244
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:1904
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:1344
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4736
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:2796
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:216
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5768
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:3800
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4012
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4348
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:3908
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:6116
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5808
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4372
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:3440
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4080
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:2104
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:680
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5088
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:220
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5264
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4868
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5852
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:3588
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5672
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5556
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:3688
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:900
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5276
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:6088
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:2236
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4304
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4436
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:436
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:1256
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:2436
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5224
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4656
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:624
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5468
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4360
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:3844
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5860
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4816
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5052
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:1244
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:2736
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:856
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:1576
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5740
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:1964
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:2292
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:2984
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:3768
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:2232
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5448
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4044
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:2648
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4580
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:3396
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:1844
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:1744
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4268
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4528
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:3392
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:1856
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5460
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4000
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4348
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:3908
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:6116
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5152
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4584
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5968
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5472
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4256
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4920
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5076
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:1568
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5264
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4868
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:3284
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:3588
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:1900
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5556
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4132
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5396
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5276
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4324
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5144
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:704
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4216
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:612
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:1572
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:1436
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:2228
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:964
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:4828
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5292
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:2864
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5072
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:556
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4816
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:5052
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:3488
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:2736
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:856
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:1576
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5740
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5176
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:2292
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:952
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4796
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:6048
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:3036
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4536
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:2648
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:1616
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:2748
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:3068
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:5596
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:3496
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:868
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵PID:1776
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:4808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:6092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:5264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:5672
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\FA Adv Security Tool.bat"1⤵PID:4132
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\FA Adv Security Tool.bat"1⤵PID:4360
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\FA Adv Security Tool.bat"1⤵PID:5900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:4900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:1904
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:4892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:6136
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:4576
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:1816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:216
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:5996
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:4012
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:3548
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:5364
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\FA Adv Security Tool.bat"1⤵
- Checks computer location settings
- Modifies registry class
PID:4400 -
C:\Windows\system32\netsh.exenetsh wlan show profiles2⤵PID:5680
-
-
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:3588
-
-
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:3544
-
-
C:\Windows\system32\find.exefind /i "IPv4"2⤵PID:5672
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -an2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -anob2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:5172
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -anob2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:4636
-
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get size2⤵PID:3908
-
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name2⤵PID:5520
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\FAallinfo.txt2⤵
- Opens file in notepad (likely ransom note)
PID:4724
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles2⤵PID:1844
-
-
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:4536
-
-
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:4356
-
-
C:\Windows\system32\find.exefind /i "IPv4"2⤵PID:3396
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -an2⤵
- Gathers network information
PID:3920
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -anob2⤵
- Gathers network information
PID:6120
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -anob2⤵
- Gathers network information
PID:3068
-
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:2624
-
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get size2⤵PID:4412
-
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name2⤵PID:3588
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\FAallinfo.txt2⤵
- Opens file in notepad (likely ransom note)
PID:4216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\FA Adv Security Tool.bat" "1⤵PID:1660
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\FA Adv Security Tool.bat"1⤵PID:4012
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\FA Adv Security Tool.bat"1⤵PID:5360
-
C:\Windows\System32\cleanmgr.exe"C:\Windows\System32\cleanmgr.exe" /D C1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\542E700A-F854-4B88-94A0-FAAC980C4E11\dismhost.exeC:\Users\Admin\AppData\Local\Temp\542E700A-F854-4B88-94A0-FAAC980C4E11\dismhost.exe {233A3FFC-1FEA-4F31-A51A-622423FE55AA}2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:868
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\FA Adv Security Tool.bat"1⤵PID:4024
-
C:\Windows\system32\netsh.exenetsh firewall set opmode enable2⤵
- Modifies Windows Firewall
PID:4228
-
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=ENABLE2⤵
- Modifies Windows Firewall
PID:1560
-
-
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state on2⤵
- Modifies Windows Firewall
PID:1372
-
-
C:\Windows\system32\netsh.exenetsh advfirewall set domainprofile state on2⤵
- Modifies Windows Firewall
PID:5716
-
-
C:\Windows\system32\netsh.exenetsh advfirewall set privateprofile state on2⤵
- Modifies Windows Firewall
PID:3768
-
-
C:\Windows\system32\netsh.exenetsh advfirewall set publicprofile state on2⤵
- Modifies Windows Firewall
PID:1936
-
-
C:\Windows\system32\netsh.exenetsh advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
PID:3036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\FA_Antivira\Fabi_Antivira_Securety.bat" "1⤵
- Checks computer location settings
- Modifies registry class
PID:2964 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAwlc.vbs"2⤵PID:5568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\FA_Antivira\FASecLogsTxT\FAupLOG.bat"2⤵PID:5420
-
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3496
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAvbs\FAbuttenUser.vbs"2⤵PID:5544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\FA_Antivira\FAcmd.bat"2⤵PID:3988
-
C:\Windows\system32\taskkill.exetaskkill /f /im cmd.exe3⤵
- Kills process with taskkill
PID:5920
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2284
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\FA_Antivira\Fabi_Antivira_Securety.bat" "1⤵
- Checks computer location settings
- Modifies registry class
PID:4868 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAwlc.vbs"2⤵PID:5416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\FA_Antivira\FASecLogsTxT\FAupLOG.bat"2⤵PID:680
-
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1256
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAvbs\FAbuttenUser.vbs"2⤵
- Checks computer location settings
PID:5848 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\FA_Antivira\FA_URLscan.bat" "3⤵PID:2272
-
C:\Windows\system32\findstr.exefindstr /i "amongus.io" "C:\FA_Antivira\FAurlDataBank.txt"4⤵PID:5232
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\FA_Antivira\FAcmd.bat"2⤵PID:1448
-
C:\Windows\system32\taskkill.exetaskkill /f /im cmd.exe3⤵PID:5648
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5952
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\FA_Antivira\Fabi_Antivira_Securety.bat" "1⤵
- Checks computer location settings
- Modifies registry class
PID:2096 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAwlc.vbs"2⤵PID:4888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\FA_Antivira\FASecLogsTxT\FAupLOG.bat"2⤵PID:1768
-
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1128
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAvbs\FAbuttenUser.vbs"2⤵PID:5480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\FA_Antivira\FAcmd.bat"2⤵PID:4604
-
C:\Windows\system32\taskkill.exetaskkill /f /im cmd.exe3⤵
- Kills process with taskkill
PID:5324
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3540
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\FA_Antivira\Fabi_Antivira_Securety.bat" "1⤵
- Checks computer location settings
- Modifies registry class
PID:5284 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAvbs\FAbuttenUser.vbs"2⤵PID:2748
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5836
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\FA_Antivira\Fabi_Antivira_Securety.bat" "1⤵
- Checks computer location settings
- Modifies registry class
PID:5484 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAvbs\FAbuttenUser.vbs"2⤵
- Checks computer location settings
PID:2192 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\FA_Antivira\FAantivirusopener.bat" "3⤵
- Checks computer location settings
- Modifies registry class
PID:1544 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAvbs\FAbuttenAntiVirusUser.vbs"4⤵PID:1800
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2292
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\FA_Antivira\Fabi_Antivira_Securety.bat" "1⤵
- Checks computer location settings
- Modifies registry class
PID:2984 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\FA_Antivira\FAvbs\FAbuttenUser.vbs"2⤵PID:4644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50b8e6e89d7ea9193b4c2b2a1fc84c22c
SHA19574d0561e2ec4276adb0e5e18e217344af09519
SHA256c8d8c17a0a38fa7031794f4180903d628d04266cfd273fc1fa82222f3b958abf
SHA51291fe291c4648ccaf10eaf01fb5e33ce5132dc03ee31b577bbc3a8d00fb115b2e8f3e9616f4b11b9f728302cca5fad7dbfbb2e09502c3e3d0fcb03384f7e280b0
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
40B
MD5692ba4a31613528eefba473322fda752
SHA1eef30cd5f29b2cd001204d06df221c91b1743b1a
SHA2565a5d26fce375a9387bf4696b6f8f138fd73d986b62cdd0479bb9028b2c9923d2
SHA51254fc61bac0cc91e787f1b59af162d9f31ba963e5e886f3be2a1333e1ed97a382857af3f3091ce54552a508c69a3059bf8beabe8e23556b55245b41dc0814b040
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1e706fcd-e7c6-478a-8553-8a43524dbe3f.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
649B
MD5dbc2c0f850adfa802d1f7bd7170aa854
SHA132ad5aed582ed511abae5e1383a0c20913ab222b
SHA2569363699b8d14113528e0cd10cecaebdc41bbc3ca56d5fa5b1fce56825aba5562
SHA5128957df864451fcc0eed7f3db098b8e14bd71b2b7f309c4de0e24465ce09c299215dcc2b6149489cfca91662a238fac7cd9c4dcabb3977752fd8b42bd8d54e9a9
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD50e0e8d7e10db61e97449de02d6414644
SHA10f9fb01cad173c83187b6031098f660196d7d5f1
SHA2566fdd9bf6b302f273bc5961b1899997ca54800338c4b22577604b8b01757b5694
SHA512cf6139bfe998d802e64d6ee1f8b53ba91ad2c48693438e59848fc6d305b0c215876ed48bc868333ddabb3ca7eb707aad38a6b4dcf96455f1a16222e29f18c05d
-
Filesize
2KB
MD5e995c9d1806adea0649d5fa3a4e3aa57
SHA10a6794472c1a5a65262eefd41fcf346d544059ee
SHA25691f34f8397242eba81d31e125e3abd8d2f019da139da0a0a9366267ace2dafba
SHA512be2e11bf5184d4c3b61693c252ab116e40e2976da500a5b73a1b8b77cff0dc813fa080c4de36c3154950777645c081c4a36cd27c7dad71eb5d7f4f1f76446300
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD56b4321af94b153b48661b5b1e05f6773
SHA1955ca2a68b6459d00e575945dd0bc2ddaad3061d
SHA2561ba2cea57d9d4b9af863e9644523531f67240e08c8bc030500287ab7f2e32fef
SHA512bbdace88dfc71bb0bdaf67ea3df86028b512d328e779b58e3bc67e1c079ff178eaaf204f8ed832a358a47fcad1056b52483466ca995a8b75485b68fdfa89f481
-
Filesize
8KB
MD5817119ff9e235ce90a3b14ee2683768d
SHA1962d8c1946b1f1ae1f0daf0fc4c63aafabe79b5f
SHA25626ae83cc33ea4c87ff0557cf9475e33b709508266c041d02b853eb0f983d9878
SHA5121d1386be93841aaac6d07d307570db8acc2a49aa7a12e976729652fcca867ac9d2e330683de023f3058fdcf403ee540f26a05abbf783434da7af02aad2edc3d2
-
Filesize
9KB
MD56ba7cdcbc4c0f010c7d3b3891b51b198
SHA1e2d850554c4eaede33f24b8ea1a7db603bca7104
SHA256fe87db0a3f5932dd5186bf3dc3874eabd20c163b2c6b0fc2afff91a124be0149
SHA51207cbad2c6bf6cfb9d2a5808dc6d6030dc76430d06765a8a04a28a3f519100b60119620891a6358b28b99461d83f33848724ce9e04d840f12cfcc8248ea1bb111
-
Filesize
9KB
MD5934861ff22725dcff5e025999f19a779
SHA10f7c54a4c4562ab42428a96f23a22d1337d9e91e
SHA25621e38b8be4ca9675b95659bb2821a2ceb5203d6dd04d0504ad1b29ffaea6f4d8
SHA512a2208a137356c93e0366f30c21f93453e76e9462da3164a13507b99af40f19bda17fe98edc09f82b0608a91639afdcb9d938248997beb693791f6b337b9a50d6
-
Filesize
15KB
MD57c1e63f3f071d10b690d775721b8487f
SHA19a541d8030afc9a0376468edd56e11606e6d641b
SHA256da2e96b5e898d19731a5f79c8251cac9cf8c223117203ade7d260f5b8445fe52
SHA512ba9986cc80c6c727b7abd243cca197a5ea3ffa2302bbe011120a95f48f067628b741e6b1fe0a2d520a73f87e85acaa9b6296373618abc1560ef7819fe1a8dfd3
-
Filesize
78KB
MD5172129a8b4984a17741d61c2d9228561
SHA1feb188de311d099502eb6aeb20dba3cc8f36c7da
SHA25659bc5d097310a626e473e4433b5457b87a31b4e6487bd6c53d24f56df61ff5db
SHA512a794d36557f42c0ce693f669027652a28898609f57b2a5ed4c2535ddcbb8716f2184fadba6d288729f45ba5fc0ccd0419869f792fdab1c1d8031a00b1ae1df46
-
Filesize
78KB
MD574a9c5fd137503246cc6f024337fd1c5
SHA19b1bcaa9ef1eea58b5742800cc67312aea0a1085
SHA256b94f67d33235580533c74f98588c89bce2b3beabe4085c0686883584364463d4
SHA512ec9862153e00916d5e4a553d2c8348d3ee453c1a291cc3778067f847f7f1064f7e5a1de298ce5eaa6b4523f3d318ba9f4b39e1f9f0f99c9ce209de219c33ce04
-
Filesize
152KB
MD50f3e72c5e047609a667252eb8c7e520e
SHA153efb0c8d2006a4e4f551cc0d58c6c3da7282d64
SHA25647f1ec5acdaf4962b59f68996c40ebde05f0862f1408986cff9ebdfa252a530d
SHA512469256e8a55c85fa4255b35a189bf507f91f70bef992b6bff83857003b6498231a75575d246291d14d906f008cff39839ba02351ccf063bba42dd54baa84df11
-
Filesize
85B
MD5bc6142469cd7dadf107be9ad87ea4753
SHA172a9aa05003fab742b0e4dc4c5d9eda6b9f7565c
SHA256b26da4f8c7e283aa74386da0229d66af14a37986b8ca828e054fc932f68dd557
SHA51247d1a67a16f5dc6d50556c5296e65918f0a2fcad0e8cee5795b100fe8cd89eaf5e1fd67691e8a57af3677883a5d8f104723b1901d11845b286474c8ac56f6182
-
Filesize
152B
MD53faa64217a07241616fd762384359d69
SHA1eabfcd9308b69d08e4739c46d6d87422b83243e8
SHA25628d9b2fd2d28f294183ba6f960296a6b7ef9ed312b67f97016ab528189bdf4ee
SHA5127b5c13fc338a401724528f944eea0ecfbd4949c179f1044a21c670155a3604ddc6190b732f7957f8a3fd01e298195a1a99134f77f8f1273f1dc3a9fed40b6d96
-
Filesize
152B
MD5553e78e9368f47c6de1004590b953f7c
SHA1c9cf553c2a9dac21274500d46463784536a3d032
SHA2566ce04ac470378b8f67701d1ae479112c93d2fc8222f61cdddd520a8db9ca6431
SHA512cc2c5c52a68a9867ab224c7236719c0071b1de295884ba12244ef76c384466233cac9434b0117e0ec594d8925c7e8d5103bb56d3d4ca90d89062211af07464d8
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
200KB
MD5a484f2f3418f65b8214cbcd3e4a31057
SHA15c002c51b67db40f88b6895a5d5caa67608a65ce
SHA25679cbe928773386d07f0127f256f383debed5ccea5ff230465bf46ec7c87319d6
SHA5120be1bb8db08f6e6041a85cfee90cd36a5b595afbca34d52a125465454fc806b4bb7ae569eaf4c882922fb1b962b6060534e597791cd0ad23483be5981d9be85c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD554893f72f8ef28b0b48bdfdd37a31b78
SHA10b6f11d5a6cbc59da86f1758e1df3bc957d990a9
SHA25696d3791a92452040d93dfd5c47c5a455f6267903385a3b4e2168902f03ed8b31
SHA512de5ca82e232fc2d11c6b8fdaff9eae557c94298568cd41d3ca3fcc12525471c10a0201200c445c4d349b3d223eea83aa80b3dd5f8435e23982b2d7a01a2bf8a3
-
Filesize
2KB
MD5994bfb74f1475034274087e39a920766
SHA16a61481da191af2a383a4c1032976b50bd57a6c5
SHA25621c539e3e72229fbc8de8739eea6c11701a024e109d7063459abd9d8aae12bbd
SHA512f881592434277063baa5362daa060857b152168a8e2faeea13998b9e944beb4763fa1a53ee30d4a912fcec13f747a0284637651425b9c5221640ce1a46d5f0ac
-
Filesize
2KB
MD5b899d5674216e9506b5bce2286969769
SHA15bd28b593185304f6e9d5a3bf3d20ecdddadf59c
SHA256cd987a5756ab2d58bee6dcd258405147146980c996555c07dda4021b57f4dc84
SHA512fa8c4bbae88e9e78f4afb5ac41404cf476603b26aa31a3fb7cba47194f2be38e7fc2e54d95b8593eea3949641dc958772fecef3c061360c8cc4760966dcf4300
-
Filesize
2KB
MD5a9679e319fe2c9a6f19a54e0f747d891
SHA19035ad3465cb96a480f5457b80f3fc2b491c5ea5
SHA2567a4656ad276bbac50c762fd544734e6eb9bf22d3e4e46c16a5a3073c289b96aa
SHA5128a69a0e94ffc26a87f99c43c2e4455a82300ce5c0829cfc62b984b34713c2bd9241334f49893601ee4a82925f0ff7c053794446c512d1eabfbc630a33890dea4
-
Filesize
6KB
MD52f32c771e7a89d200959de78f0213242
SHA15a6e1b483e0990ba012461f37747762798426c5a
SHA256debe7a010993fdad97aed2b9962385823e98aa19db8e94976bd01d8c42fed486
SHA512df240c14aa06f57022cdb0516298704720eabf95241718ffbd358c768c1918f1f04b02abf4ca1195fd556238834d6340589ffdd577283a1cdb3e10b3c7d1d7f6
-
Filesize
7KB
MD5732cc9cdf2a35cf78d47021d18d6ab8e
SHA1a58e3169decb821ddca60545368c83f7a0c74841
SHA25606a9606b6d4085630255980c673235fbb06c1b75994c34b720ec61aa108ef7f7
SHA5123b14ccabb37a4d0848102f84643beb86b6390524503010ceb46c3fa7c759575d500d7e5b4f3854cc0bc5ceb9e0595509321beb064d49a99b2ffb74555ea71977
-
Filesize
6KB
MD53a860183c2a2d26834c87b93ff30e584
SHA1bfa78f328097f2d23c551cbeab755f0d524a161f
SHA256f7b361f70e10da0a13c8267f3dd5a4f88eac0c6f9d2c040a96a9cc1d4f223fb9
SHA512d73969a0f5a48b49a64f4201f367bf8da6d11b0de561fcae29148774f45d065ea3a580b0ceb200295f3d1fdea969c67eaac1b2ff330bc388f7e1a21565357aec
-
Filesize
7KB
MD50d822e4f6e675b5f14ed4feb3873fc94
SHA1c9caa24c5e31b5c385833e7014fd1d733b2896b4
SHA2561d129b2882e80ccb76ee1b5ffcc152b6b81189219a32f187c4f42c679b10bab3
SHA512a6eef21a659568691b5f685b37e5541bb3d1d45ff22ff70cf3c5c7dda4bf803addb95b34a4888f4622b5afe586e83347559aea3ae0195e71ea4b5c595ea6080e
-
Filesize
6KB
MD509f9cc21080d0343347091f5da1b2bb4
SHA148702b1f2694ef66a6b2b230e5f28f1fad3b01a5
SHA256192f7c3cd994c32750e1666988f185cdfad597e00126cdb37276342920073c08
SHA5122485e724182cfb09d0cbd935b8b0b736743dfaf2e501bd82a0a2fbf23212b01517c97d0782d229748675a13a08bdf4147b70d1978df9775fe32e2990ae765c46
-
Filesize
7KB
MD5f0643ff520bb2dcd97314df1a1ef0222
SHA1211273d6ca0c402e9e5f87837a595af0021f3349
SHA256c9cd94972c02495c1d00400633252ab0d54b2b946f9668b052e0625b744d614a
SHA512c1094e2fe9f8e28867a01472121a17ccd4ce57d7b6aba31b6f8dddc6ad7c044650dbb23693eaaf655976b44a16d65a774810e26fff9520314c7f3e80ba2a2e4e
-
Filesize
6KB
MD503ef6dfcddc35bb80133b6c8183e8d4a
SHA157ec30e6eb1301a4074e9af6cccb39be5a3e69b5
SHA256f24eb68840ece718201ca7a33922541da372ae13dbba9bd70a9b77a28aa7cab7
SHA512a90d227dbdefe80948c258e54f3153de0e7e8a206432d5ce499b41bed1eaf2783fda21bc2a83ad3cf766aca57fc7b37d604aa02aa06d42fc9005764e2d513037
-
Filesize
6KB
MD5b28963838834c7d43f17a08bc15eca93
SHA1039cb5b5039c02b4e89d76ef6b0d97b67a6a7d84
SHA25621d3aeda5c6fe79cfc34b8fdd31beda4ba2d7c0cea37d55b2819df9005dce4f3
SHA512c494a6161f1595e9a81b99f170600e416e30e88462da7bf24ef2e1173037463b333caf5cb41fe4f0f918eed96fbe0714d84bf6f46ed4e9060dd14dff3c0b9a90
-
Filesize
5KB
MD508fec3c9cd0dc36178983dde965b6c6b
SHA1f025bc16369109951611700ebf30c0bbbb482145
SHA256a3265ba76c26d50c57acbf5f6186e606f182835c2a469bd16860a15097aa900e
SHA51209503cb5dc650a3be57480d7383d4ffc987975cead649a84b8ba4d4353193a68772c35f49060777c027847e08f209006f0da61e0e441d379b1396939a74b647d
-
Filesize
6KB
MD55aed937df9177c7af64a3c039c98663c
SHA1be8295984d97826c3b51cf52f2cb67aa8cbc2ad9
SHA256aa7fb75f0e7470a2cc1e520b697bcb59ded8cdf2b68bffaf290464f3d336cfdb
SHA5127eaa03bb683d714d143c96d9029c6bba7f9d899d2b42cc5ecb4abfe67821b299789390c2a34d5dcb0ea29d422179c72993f207af7ba466d4ee71540467e3992a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
11KB
MD57bbffa2cde3ad505254e4ecc7cd1e7b4
SHA13d903535ba16b888b268eca20bd3460bb5d8555b
SHA256f0a78ce4db3235551c8ca7ce90921f2cdbd7f88413dfde21aa7061c0d92c5a35
SHA512d3be50b3947fc932039bfcb1ec6f1cad7bdeb988f3d06748dc94b93b5f93fed93119482b6ac2ea30d64da9f63afd8d1dd3c84e046904885d7b23f9ee15d67f19
-
Filesize
12KB
MD5f6db3de6a0eb24c4de408ab4e487f1a8
SHA15de18351a956089394444020313b418f97b21058
SHA25658b841f14ff83aafdedf33c2488c5015b7a5d2071b8eac492429c2b3c7cb6fdc
SHA5122e4944b768b5cdb2a990187d48dd02e6faac9b00979db3005e40f285254f8e43dc2fdc1d85c4b65a7470583c7458b0ee8b53e471003810199773fa994d3b0fa6
-
Filesize
12KB
MD541bd7a82aa656aad80ec8cc374ed0b53
SHA1ffe3d483883bfe3fcca77463240c90fa4121564c
SHA256f0a305566de48e1684b6a79a04b4d4e9ce73f741123c8292399a11f5a695f957
SHA5124ba233d575e797ad78cee1a351d9922b4c4d2ae29c2e308cc380dbf8d7187f914a63c88f2dd32d510928d0dc7d2fd0a0cb1ed0a7893b1cbc106499bb792d9c60
-
Filesize
12KB
MD55312370aa0861f7087c9ee1279fa0939
SHA18da218fe2177f13c475a7849225b15b74c97d90f
SHA2562184d52e372bc86009e2c0f17367be2f01a069673fc395d189d894562ba98d0d
SHA512769843a0d5afcca424488ed8cc19d8f4e6ec164dea7e278058fa075ba4e926ba0365c99669ffddfb958a233d383a677750a641ea97065541e90037d9fea0350b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5302814718ce714938c4fcf775895ebf2
SHA185e46bd48239eeef8e1fc0a4fe9771d1415d0f8f
SHA256512fc18c178142e33d2a87c39b70c3b92aebfc4666c96fd53b01e783e755798b
SHA512a128143e2037bb63a5e617ab5e720562f3c147293af3c153a9edf46b11965faaedecc38689ae80c51d4941dfb1ff48b9fb3bbf03040d784d3ef8c6c73c025b79
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\0037F283B8D748CCC1EEB184774A9FF740FA2A07
Filesize46KB
MD5e0a5318b510bf89acba9a5fe42d93f82
SHA1c840764c6b02c6206bc3fdb231d4ab44cc188424
SHA256d825e767c1586ab31498a7c4cbc6fd652eb1635568b986b5d00c26edc7d32950
SHA512d1013e7f26224efe8b791abd95da1a7c5abcb8a15b55f6cea9e6beba0df172baf075786693a2259aed2d62cb07cb24ef6bf3c1779333cbcac54758d5a3c0303e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\043A462E92F8DC6E26E0E2080340639DC7035F1C
Filesize40KB
MD553c2477c7f8ab11512185f083d4616d0
SHA1358c537f529f471183c1571a4cb521698585c213
SHA256c4a764fafdb07e1dd281e53218aabd6311eae61eba55a861b5e171cfa3bf19d8
SHA512624e1f233c817127fd660729ca32a72b1e64275d94b5a4827a6aa5f38ede7b915a0ea1e3c8672283ab28dbad9562cb9f3aa27537319a2ce82211ac5a62b13ebe
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\175FC1F27DF5030D57F8D0FF3A5E0CD7039CB332
Filesize35KB
MD5c13c79d9c915ddd52de7f83ef4503ec3
SHA1d8c2a1dcae73b4d6e60ef3b9a7e15b7bc9d72a49
SHA256e5ae49b1af7d4208b9baf664ab1103d937020646fc9808362d9040b4478538c0
SHA5126a39826ec8e63a2fefd2c218eb2863fd14e6111aa49e651718f5a578741563c9a0c8c135057aaa38dab83cb2937f62c101f160cc9ac96fdf07f0d8fcf5465827
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\186C95AB6EF39D38E7D72D839A6896FF58908570
Filesize16KB
MD50ea103b838655f3261d54bd0fc831540
SHA1ac495db0caf4b93d8cd1cea4c62a713e17fbc148
SHA2562ff15bc54dbfe89b6d22371c308b977d8d87e2a6e7d258296770d2eeca2d8ce3
SHA512b0084d2825aab61a0d52e37d575987fcd79881ad5e630378331419a3bf1f9ee77dcd16bf29b50a3e4d660ee17c901afb48d04a0207635152c46176be8af0d799
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\31030CF07484CB99AA3512011B20FFC4D0F8CFBD
Filesize78KB
MD5e1afe08b9bd17a728eea0fd6d7b84374
SHA1a440f819fec3e39385e4043d9f39d5901a56d018
SHA256e403225a1f7563b24f2e8066e4ceb5f7e312149762e9ae8ac9c84f8b865fccb7
SHA5120938cf6379a37e134d07a7f498adc93c28e18fe664ad9f6785242e08ca71a63ddd0b01a43a32121c6c656eda5f0ad89dc7212500b29d211b729441428de94135
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\3F67F21AFABA3604E498EA33D92B357A3D546E86
Filesize14KB
MD509ad1df870c79ea0f0dab2b29ae532ca
SHA16cc99202b342be56096cf09f5153e358c9fbd4af
SHA256d266f6ff26c2c26e60a73c786a79631c07917952d32751d069d4ed184f323477
SHA512bce0a49fe8983970b11ff7f2a95d3000a6345377a06a83b23f9ffcc3b10238d8e8e66514c24e1b837b7e0184f3d7a383610610f6c0d4ef397088ff59019f193f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\3F8F389BCD0BE34982249FF47A485DE4843718FF
Filesize41KB
MD5855709847b0d0ad9631a5a6c2273e968
SHA1479b6d66ba21bdf1f54652b2ddbfb20545826e66
SHA25605fdc43181370b36b884ee346153b6f2e3bd983b4704e6eb0d338f4336e863ec
SHA51221d1a17d351a018f7490bbf7f4b035fa04975989178ec8ff0d8c4e685d2f2fc58dd3ca5c7999a7a8efabbdc9c63f4da4fe61eaca6a06a8dd4069a5a6ba0d212c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\5DA90209A0E977CC1619187C88C5417F603D28B0
Filesize60KB
MD51fd6fdaac25a79f159aa275c2a5f3b88
SHA14d826c0189a96580bf5d7f33a203057736650a32
SHA2561859d170219d5034a7c1e059a9c8df18fe5c4bcea5e94efbb0508ac6df5a0fdf
SHA51225bdf163067c91726f364df790aa0d13cc861777750781c31d83172695ad746b81431cb0eb5a51c82e7c7163f0ee52e7aea50dc0626425e62226d047750d43d4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\6AA37A0F51195218A134D2DCE0A7F76191B5AA52
Filesize37KB
MD598e52a1c8de0ef2eff31656d4cf52d18
SHA13b1b337578addfab3f81474a874a9c316a71eba9
SHA256174174ef63afb7a49b46e193210da4936f8cb3b27aaab2073e2e1838cbdc440d
SHA512fb6a675157d72bcde3a186f718227f0cf54f035cd162108b7c73a179c908b1276f80a0e5bdeaacdfbf18bedbcd79d90ea0ede5a510cda0016f80b5fe31a159bb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\7D680FE1A5FF233E580C805E9D283DE80B9E2B3F
Filesize56KB
MD50e4b180ba4d1c01e2bc42386cbff288d
SHA1f6ea286fdce7c1d2ca83b5f037becdbfbc35c9b8
SHA256887fa1fcf021b6924a34ca7b0c68a7e36191df8bc97a9fa4b0b3300c467a99c8
SHA512c776d97ca3f4024badffa0ee4afe434e33e10a6b2eb58263e6938f0b0fef2d8aa2d2d57c5b8d6394a9fa8faa16a30f61afd2a07f0eb6caef8b874caf261cf65b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\82A62E2507E5D0DD42BF01DDB42F451BB5C2AFD8
Filesize14KB
MD5253650eadaacc9926cd68f68d40d15db
SHA1abd9d4a91a5206e2f823c1b482c8d9aed6bdd4c9
SHA25611f871f5f39b305d7404342bfb8cce2a9c883f9a03f0943ef621060b6ac2113f
SHA5129215ab5887831310e4885fa0906dc039dc729dceb6b90b649142a10284ffc23087e06958bd4293537f92d2ea3f8a0ec32f6f00dc5744be7c865ac6043c343561
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\9C2BBC7137762B4CA02A130A09A82F71C29112CE
Filesize327KB
MD503884e96fbe29ae16342b7dbd9e09c0a
SHA1d600c37b1b11f7cda3f96c62cf6388120a50c3c5
SHA2569760bb4d7a97f53efd5d7fc52fef94f2ffa3af3ade3f6772494a5666ab35555b
SHA51257be6855802bddb78410798f349cb766eb766a1383ce1d140dd696001d57bdc97703ef967bb6bdd09e3df6396b945219e0ad429953af7254e9770429c65e831d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\A4A26A10596BE7DC53B276682BB52E61221037DC
Filesize31KB
MD5c99059e90c4578d65ff8a4c66874640c
SHA14482745ebe7dbd92d298a3d06c6cf8c1db3c3567
SHA256edb0fa850b57bd2901b31f5e527a97e6d9bac0ef29679b9fedba2e4824e374b2
SHA512f010d47eeeae6f3781118b0e74172b8fd0073c8b163679c1738ead32dcdb7907101db86c21b880f0ecf850e8d7ddb6561efd6b22a48047837fd1aa8d98e3f5a7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\AC89153B3BBC863316BF97ADBA9A93CB62F0A987
Filesize39KB
MD5bd01c4bd27cf46ea89004f51cddf8e23
SHA19c430a375925ce135841981c477cc07b5056e3df
SHA25609f54144940be416d872a946c43a5192838a7a5702c29a623bd7a9db092f70be
SHA512b7110712c58b4f632b940b6a7a96b3ee2f3d10bb5b434018881d92fd910b2a7071b55c67a0fe608fd823552781e6c0db2f31c14f380cd9cc279cd474352e8776
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\E0B46A203FF7FE1ABB3989B015ADF65BE03664A9
Filesize33KB
MD5ddd87e4ba416c6f4bbd1beba12be0ccd
SHA17022e7d640f42da88549aaab9260684938d3c3f5
SHA256f542f89744c60c1a61f84f1f250e7c4f2a3559f3fde5bea71bf122b3a41a1448
SHA5122b545766167803d401da627f172141486c2ef63f7589d6807a19f7d985b6320d9998353ec79b70fccbbcc2f29a74b5547ded9e9b90b3a21205c807e4f3c25593
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\cache2\entries\FFAFBFA30B8A5B3743B2995F9FAB3E2954703B29
Filesize951KB
MD586d8e8fb04a7487e03134381948bdfad
SHA1b1ff21e5d696979d638f693e7227b810c45ea808
SHA256739826fe6f3e4626a62cbe1c4cf7871a9e1ac1ba3c48c2f738f7c4a4948eb1ce
SHA5120c6821d52d32c0970762e18778929623f87fc6878ac7c226a6ef8058cd3435b002a37059d206b57b0ef67f2aaf9165382c6a2c9b887920af7cdc9504ffb6ed7a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\l594d31n.default-release\jumpListCache\049b+BlQDtVxNI85ZLwvIEntYAQ0_sWDx7Kcy106clA=.ico
Filesize25KB
MD56b120367fa9e50d6f91f30601ee58bb3
SHA19a32726e2496f78ef54f91954836b31b9a0faa50
SHA25692c62d192e956e966fd01a0c1f721d241b9b6f256b308a2be06187a7b925f9e0
SHA512c8d55a2c10a2ef484dedded911b8f3c2f5ecb996be6f6f425c5bd4b4f53eb620a2baccd48bac1915a81da9a792971d95ff36c3f216075d93e5fd7a462ecd784f
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
83KB
MD5223fd6748cae86e8c2d5618085c768ac
SHA1dcb589f2265728fe97156814cbe6ff3303cd05d3
SHA256f81dc49eac5ecc528e628175add2ff6bda695a93ea76671d7187155aa6326abb
SHA5129c22c178417b82e68f71e5b7fe7c0c0a77184ee12bd0dc049373eace7fa66c89458164d124a9167ae760ff9d384b78ca91001e5c151a51ad80c824066b8ecce6
-
Filesize
178KB
MD50572b13646141d0b1a5718e35549577c
SHA1eeb40363c1f456c1c612d3c7e4923210eae4cdf7
SHA256d8a76d1e31bbd62a482dea9115fc1a109cb39af4cf6d1323409175f3c93113a7
SHA51267c28432ca8b389acc26e47eb8c4977fddd4af9214819f89df07fecbc8ed750d5f35807a1b195508dd1d77e2a7a9d7265049dcfbfe7665a7fd1ba45da1e4e842
-
Filesize
245KB
MD53055edf761508190b576e9bf904003aa
SHA1f0dc8d882b5cd7955cc6dfc8f9834f70a83c7890
SHA256e4104e47399d3f635a14d649f61250e9fd37f7e65c81ffe11f099923f8532577
SHA51287538fe20bd2c1150a8fefd0478ffd32e2a9c59d22290464bf5dfb917f6ac7ec874f8b1c70d643a4dc3dd32cbe17e7ea40c0be3ea9dd07039d94ab316f752248
-
Filesize
64KB
MD5eedb6d834d96a3dffffb1f65b5f7e5be
SHA1ed6735cfdd0d1ec21c7568a9923eb377e54b308d
SHA25679c4cde23397b9a35b54a3c2298b3c7a844454f4387cb0693f15e4facd227dd2
SHA512527bd7bb2f4031416762595f4ce24cbc6254a50eaf2cc160b930950c4f2b3f5e245a486972148c535f8cd80c78ec6fa8c9a062085d60db8f23d4b21e8ae4c0ad
-
Filesize
156KB
MD505e8b2c429aff98b3ae6adc842fb56a3
SHA1834ddbced68db4fe17c283ab63b2faa2e4163824
SHA256a6e2a5bb7a33ad9054f178786a031a46ea560faeef1fb96259331500aae9154c
SHA512badeb99795b89bc7c1f0c36becc7a0b2ce99ecfd6f6bb493bda24b8e57e6712e23f4c509c96a28bc05200910beddc9f1536416bbc922331cae698e813cbb50b3
-
Filesize
81KB
MD5dc06f8d5508be059eae9e29d5ba7e9ec
SHA1d666c88979075d3b0c6fd3be7c595e83e0cb4e82
SHA2567daff6aa3851a913ed97995702a5dfb8a27cb7cf00fb496597be777228d7564a
SHA51257eb36bc1e9be20c85c34b0a535b2349cb13405d60e752016e23603c4648939f1150e4dbebc01ec7b43eb1a6947c182ccb8a806e7e72167ad2e9d98d1fd94ab3
-
Filesize
1.3MB
MD508332a62eb782d03b959ba64013ac5bc
SHA1b70b6ae91f1bded398ca3f62e883ae75e9966041
SHA2568584f0eb44456a275e3bc69626e3acad595546fd78de21a946b2eb7d6ba02288
SHA512a58e4a096d3ce738f6f93477c9a73ddbfcb4b82d212c0a19c0cf9e07f1e62b2f477a5dd468cd31cc5a13a73b93fa17f64d6b516afef2c56d38ede1ace35cf087
-
Filesize
6.9MB
MD561d63fbd7dd1871392997dd3cef6cc8e
SHA145a0a7f26f51ce77aa1d89f8bedb4af90e755fa9
SHA256ae3a2936b138a2faa4d0cd6445fae97e441b23f6fdafb1a30e60fd80c37d7df5
SHA512c31f1f281d354acb424a510d54790ee809364b55425b1d39429e1bb7c379126578260c6f197834339a34833c90e748483aabd426295731f78fcde9580fcd8f9f
-
Filesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
Filesize
66KB
MD579b02450d6ca4852165036c8d4eaed1f
SHA1ce9ff1b302426d4c94a2d3ea81531d3cb9e583e4
SHA256d2e348e615a5d3b08b0bac29b91f79b32f0c1d0be48976450042462466b51123
SHA51247044d18db3a4dd58a93b43034f4fafa66821d157dcfefb85fca2122795f4591dc69a82eb2e0ebd9183075184368850e4caf9c9fea0cfe6f766c73a60ffdf416
-
Filesize
6.6MB
MD53c388ce47c0d9117d2a50b3fa5ac981d
SHA1038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35
-
Filesize
29KB
MD592b440ca45447ec33e884752e4c65b07
SHA15477e21bb511cc33c988140521a4f8c11a427bcc
SHA256680df34fb908c49410ac5f68a8c05d92858acd111e62d1194d15bdce520bd6c3
SHA51240e60e1d1445592c5e8eb352a4052db28b1739a29e16b884b0ba15917b058e66196988214ce473ba158704837b101a13195d5e48cb1dc2f07262dfecfe8d8191
-
Filesize
1.1MB
MD516be9a6f941f1a2cb6b5fca766309b2c
SHA117b23ae0e6a11d5b8159c748073e36a936f3316a
SHA25610ffd5207eeff5a836b330b237d766365d746c30e01abf0fd01f78548d1f1b04
SHA51264b7ecc58ae7cf128f03a0d5d5428aaa0d4ad4ae7e7d19be0ea819bbbf99503836bfe4946df8ee3ab8a92331fdd002ab9a9de5146af3e86fef789ce46810796b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7.1MB
MD50fca70c27fe5caf3b62629d1916900b2
SHA1804617f5aceb0ae6ca8cae3d998cb5dbbcf25526
SHA256482d1dd27b4990b58822e49097fd7d2616aaf72eb553c796cbaf97d7ece2df0c
SHA5129f19205c45f7dcb19dcdf4dc5f9a269a689c4f3fdc2b9eb6289f7932ddfd5941c62fe524f788224079141545aa5bae9690c49c48ad5bf9e761540ccb42536fc4
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize16KB
MD52a8b49a2d09a091a012b39da44049771
SHA16f5e0b6189f2e5ba98013eb8085e750693ffc81f
SHA25619d769b4a80127dd0c5e0e6cd9d77535f5e683d7ce48acc65f133ab7483005a4
SHA51200a2086ebbb31de96d5ded43afcee0445c90ce5f392a4f9130ac944f799dcfc7ee18ff0e7a54000672c3f2c26f84ce37fe474baa0212b8e583577b8f27254cf5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LBN4BV0ITFYJ4SMMPNN2.temp
Filesize16KB
MD56190bf5a8ae72de73385ab6ede9f33a3
SHA17b029d0a06f464a56d68cd5ceaf8fb74075bab33
SHA256ee935622844a5f3457f7ba85f053d19084ba6a0c23abde6cd294cf5c5580acb3
SHA512f3c52d8a46fae2f396eed04f6a5f70ee5bbdbb0888fa65485916ae9ef33afa6ad6b11913b9d748fe5fc87a7e14731d01a3fb12f1ee6a1857a885f09e6c957891
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\AlternateServices.bin
Filesize7KB
MD5eb01c429a1566376800c317447cbed12
SHA11592960e6f297606d7031ec2bfbf741b081babe6
SHA2566fdfe6c1b427b6664a318a833018c75a245875417e8d6fd9b3826440ec4cda71
SHA512c3186ce699023ee0c2e529c7b03b25b45f997c2c7fa20ee739a71ec0fd7bd5043e365318fc4a22a1c8b7970293cd78eec198fdd159a93391a2dcf62a997cd4e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD529de4f39fb979c608aa5ab751dbfc5a1
SHA183def5014492698131881fe813074de7048739bc
SHA25644822d5e75a967b381f9d268ff884dd32c1786f6ce453251b8945334efc8fae6
SHA5129bfa880e01da5e69b942007bd1d1e801736e6fcfa0d4f50038cb99395a00580fc98edb113e44c9acc7675a76bccf481b1099b48557763eb00d7d7754e13d72c7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5472053287d869eee4e392adf971a5593
SHA14881d50e29cc90e1bf119ec5bafbe8d99ba6bf65
SHA256edb4c202043b3b36afaacf9d79aad76a703e905b0fca35dfda4f068cc1563709
SHA5126358e69f071d1ee33c11139171a47cd914913c03d658c1cab709b8d8246a0c2045c46f0384896bbcca3363c787d856cf8124f8345e2a47f3fc2d319a103e6028
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5bd529199d714a6c074ff70b8cd59066b
SHA1a60f2b8e209fb5a88318794707f802bd2ede3cc9
SHA256b9d9d1868d3ded134f6666d9effac7fc1ba3c1b75c0eae9615da15f0bdd937e9
SHA51256e8cbdff6e485b4126a19489cf42abdbd08973a3c14560ff63a161a0d9edab54dba9723ad0ced1d1c6663ef02ab6576f1fde85324a24decd2cfb055e8d3aef6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\datareporting\glean\pending_pings\232ed4e7-d385-4d0d-a3af-4ed6f80f6bc6
Filesize982B
MD5e61fe7a3f57909ce68d72f2dbe56b996
SHA1d57e04ee2c53780e9d579efba2660e9e35408ac1
SHA256be6802c27da645fb853869493f25b3ee7062d74e4e41a5848ee562dd6470fbcc
SHA5128f383285475a9b2525c55da595a9041daca5612fcbf4c7e267307352b259b0e06e2d946bb3b6f05903242d418819111fe02239e39b46ef8545048468ab6721e7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\datareporting\glean\pending_pings\7daef740-eb46-49de-84d8-5bdf43ad70ad
Filesize671B
MD5da68ff1fc5cf593b7cac4206f24760c0
SHA17136cd9258c04988cd7e4203dcd3b3c33e658bd9
SHA2566f39261059a3e43bcfbd404165b937c6f0dac1627fd15ed03bf75462b8568958
SHA51205275e0b594a363e6cfbb7830468333283446cb6f92a007ae22f8ca4df90fe3c4de8c85e16f816dcbfa89ec99b722a4efbd27bc7a58ec1cc76f8e4a41a7ecfc7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\datareporting\glean\pending_pings\bfc6f292-d833-4fc4-9ecc-02f168a5c4a4
Filesize26KB
MD5e0ac4ea228b04312b2a89c9bd275b035
SHA10ebe57b055d5e8add2ae11f63320b1be591d6f54
SHA2569e2fa7e7bca6c34015451dab18d469e72e604869cf52ef4d5fb17f3bf2e5e4b8
SHA5127c90eb34bd8f8af84e3e805973e2c65e378730e35f706b52f217221f58aa25214c1250053caa239b4c64e9781417377558bcc46c68e5235869c03b30c0940636
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
8KB
MD59deb8cd2018aa88de8485ef7f2f46edf
SHA1bc5523506b003f13f1227cb1b4438ac30c09cda1
SHA256646adbf10547d08c9c612d75e9e387d2052529c5fc6df9b8086095ba9c00c21c
SHA512389975ec1d1cf988537042b209447182821cf0c2df8e3b7437e4d8ddc50dab2d2b5bde209760b33e3877cb5a4da27a91e09680c82388607b43d62501b60598d4
-
Filesize
9KB
MD5446a4bc449ec5b5ad597ea6ae203eb83
SHA1937c839975649bf53700228acd9e42c703460421
SHA256d891d607acf994614f4a081edd4db8f9ebc1fef07e6e64dc5ff0ba6f5eae5271
SHA51234adbc4b4300093ee393988aa43c4b5a798f26b760b4d8b6e3650c085b4e314e953b3b80699bb8ca43d50201bf39f887cebdc6e4fd7280776aa613e660938032
-
Filesize
8KB
MD53af3cfa9477c1ac8dc66219c4dfe4e87
SHA1705f2c74a19a5532bde8d1e4075b8526820f2382
SHA25620245575d230e6491b82750d3548d3fd7c6812b05e43f394b552143ca0fa6c46
SHA51229fe402a9f29f81a0984c7e68c8469b8401749f99125a7943240ad5db31e234309025d3afac2e718ae1a4a49dd4e787d40c6b24c776a820f230ebf04086d0011
-
Filesize
8KB
MD51cbf947cb4004de9769291710f4889a4
SHA1cedb3147b35af4ba83125f52a27a03e3bfd2320c
SHA256d65ca1666e0069e4670ab2a494997f93e3968945a7beceacac57afb699778116
SHA512486130fac821545d518a52507180d134f8d6618e5f262e6d6ebe47734af5bca6a39ee90fb2e3e721525b944f0909691e59638f47210cb612f613536f6a7eafab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5cd0340ab6ecc3681f6cfe22d31007655
SHA1d9331dc532a07f97381b04e909c8e3289a3eec34
SHA25698e5771712ebed248d04fc78bca45c0f8c92eae3b851715b7bb1a21f87719f49
SHA51244ef9f69188a4bd1df950d04919491868b84f4d1009e195870bb6199c2130d4d1c8aa686f964264601c60069f144fd1351d2e55ee6d5d36cc3a9f22488fc2c21
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5c20c8ba855e2c9989ec1642b5c2c762e
SHA1e20ff88386fc8c3b35099f73be976b2e16f75625
SHA25671d988b10fe8eda2a69bd9ddb29ff564f1a1684cf9a3a952f4191fda9d868f1d
SHA51221ffb5f573e360a8a9c255b80cf1e1b0cb01cdd7e03f8d1e46b1e76ec8ce0b1b7643631ecc91767237361ea5ee5b4ba7978a19993c9c06f4f76c3d3e2bc148a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\sessionstore-backups\recovery.baklz4
Filesize2KB
MD5b723a77946b92fa3eb815b6203358475
SHA149958f7fc62e221e97a0df4890e246e871a2bcf7
SHA25679bb931520190c4d1bb51cc8fc366559b6d77576042fcc6f616feacf73549593
SHA512f0b8b4daaafdbbc342ec4636b387f512f2fefca15e547e17938ef10f2eccc5b4359ce258db660215d655c04eb8ac6959f6fb8b32c938579432de0fa3db485735
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\l594d31n.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5a9c41807b262ff07ef18b59343c17a16
SHA125c645259c6811420964c4207747d478b136d02a
SHA2565d13372fc07d35a6d3721ef9a94769e5a379078cb6c981cf6b8aef93396e3013
SHA5123943dd13d0981adb8f4e978ee8badac23f22a5cc23aa9d3c73259896d1cb9f8b60f5bafad4ad450788f3fa86256973ee98087f545e3f14b39ae3f2f0fb397795
-
Filesize
574KB
MD56795953d76ab8588137242f2bc5bfedb
SHA194cc3bf6de761a3b9564298c36249e2add32098d
SHA256be3d05a73389c32139b79a4043303f0a8afe0e142270f98170d0438700e34507
SHA5122d847fe003abbd15c0546dda07b424a5987bece972c84e9f641d62ec3c0d6058d6c106e4cd17e698c3b5bce9d7d581a9ae9e9fbc95b9eb96bde4d368a03f0119
-
Filesize
633KB
MD56cf77bc11fc3b7ba28bb81f94cb33aa4
SHA1691574e4ae8c88fdec6b8fb67eea7e344ffcfbc0
SHA256da37c9ce9514cfd63eb079ab738c9fb4cd0c8396df39a2f535b90add48d09f8b
SHA512c49a4f6203e1602938ba620b59c8555211256fe0bbc7fc40724eb214adbe010b400a5b685df5e0b16c899a2d9cc1d7eba163606f1ed457568b9dcac841f0a693
-
Filesize
808KB
MD563c44cf392bc1ac970c25938f9b1eba1
SHA1b9fd63ba8142df59a6255c4102feb90d7039cebb
SHA256d166c1de153896c4534330d1170b6909e9bd806b0b163dc809986e79988efbe7
SHA512e31306b0385a959bef5a33e74f192ee38f1c2b9047cf53168d4cb3770235d16c8fc213549dd7fa7f8399475d8949db3002cc1195f65d1a958879440c14186a8b
-
Filesize
555KB
MD53c2114207ba0954e897533815e86a976
SHA1aa6d966d63c7ba8006b716fe87ba40c2f49f51a6
SHA2568bd035474a7d25c79ee2efc2c664f7406e30f571d5c7e84ddc840c9deccd9de2
SHA512a90dbffade37ccfee15ec3cf0b6121c4f747c4715392dbcb2ec3394b58f2215fec5c5d85a2e5f915d3556e1671022224853be5603f4479afe4858e3c6759f411
-
Filesize
5KB
MD5f504617f2df339516412eab6027b939f
SHA1af47ebc52603f8f1a1c9d0bd1b3434b5225678aa
SHA2565bddbe3d549af96baa466139e38883a78eeb492df256b4d60d5b499ecf8dd915
SHA512774147758ce82827b6aa65929e3203b8752e9453acde29ec3ed0112a49d8338e4a8659e5eecdd257381e5c87c09ab1cc1691f342eb93e1fc4d5c14f4d511e426
-
Filesize
5KB
MD5b22a8632cd09bfcd193ea33eb0face30
SHA186fdc59008b6fc3aa5807d17d55b06bad1795f2a
SHA2565fce9176cad65108178c0f2615c37994e5ced56187769b0f354eeb1cea46927a
SHA5126173650d09d9a4ac15cf475b8dce752830c52f5897998f8b5f86bedbdda7c1122197f6fd70181dac340bd5caf74d39c362940169c3d9e600cede1478d3cbda56
-
Filesize
496KB
MD58519eb5532c019878f66ce415540cc09
SHA11d074876d10b471d2fdcd0ae855ae525a001ef00
SHA25605b6da11ec39b3efea3d8b94a29855f5c8075d408ac7faf928e16873dbceb071
SHA5125aad4265d7f379423547e62d0ffba707a9970dcf018f2aa7074c9603860efc20d908a9e0d4611592f6f035d25354f27087777556d6a023f7daf73f59622e244d
-
Filesize
457KB
MD53b51298281fd9e43e19566603002ca5b
SHA1ff8760fe7cb0cc224a2e2f613e7294d9446aad0e
SHA25640e560c3fef44286944423f6388203cbbae9b2356d72405da28ea9d9539013ac
SHA5126d55d2a2ac60d942d809305960baa7460d932640fe2c356bcba6b6a30ec8abe5a8626cdf3d7ff51f6769c953fd9e5c2738704bc2bb5c58020f0161b917330389
-
Filesize
594KB
MD56bbdcae19eca1e3175d3ff77516b7d7d
SHA165fad78b7702f7f747be0a57dfee18bc3707ce60
SHA2567498eec12db65f2ae78f1cd4ef30823705ac0e3ab18fc9aeeb2ccf176b6bb731
SHA512c1969f57d5ea3283013518581d73da4def28cdfc9b8083608577bd2d2a9900f798f45579711ec244c1c258a27d7d0539caeacceafcabcd85d4b529c17e96227e
-
Filesize
45KB
MD596c5128f97b7253582ae17598798fa7a
SHA170a3474d90a17e5eb78490d9833f9fbb84d1ea6d
SHA2568b443805f8d3046c465ea3851e9902a4e5a470b8fce9062e5e11e5aaa88fa7e9
SHA512cf80b90841c4fb32c594a53927f6cbddb2a63247ac0ef4657cb43a4617aa55ffe496424eac3315689c10db026ff67a3da77b7c2098fe65b882f443886f550037
-
Filesize
13KB
MD56a846650ea369817a9e9363f12242495
SHA1e7795c593ef1bcae963f1c4eb446df572b1e61e4
SHA2564d44e01eeeaaa5d3813d9f11ef2037ee6cc9e73b147d78d9e57d2037b9417f44
SHA512a4ab4f08dcf752d836f8df640da1d05ac403e8a0604a539ef0b908673e79d1e6b3e6c2916aaa09b3189fde7c1c526290871763625f8f5f125d4c2c5e3245d5ff
-
Filesize
2.1MB
MD59af92b90c75bf963ac6bb6e13bf0cfa9
SHA17c67b022b33b3cd8b6ce0de1dbd947344973a72e
SHA2561ff921b4cf7928007ea202e54ea7f9dc8c3196cd64a226772b3f68e8609a08fe
SHA51288875fc754aba503826498a2e2abb85ef1ad57d8cac9d9da386720015ee7a80e3222d30b7165efea83a102cb5542454fb763d80a991d691c9037dac0494341fb