Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/07/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
b1ec0b98ac56456d2c741c3b1987d7673df2ba8a5d910cc1347a42dcfba22c12.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
b1ec0b98ac56456d2c741c3b1987d7673df2ba8a5d910cc1347a42dcfba22c12.exe
Resource
win11-20240709-en
General
-
Target
b1ec0b98ac56456d2c741c3b1987d7673df2ba8a5d910cc1347a42dcfba22c12.exe
-
Size
89KB
-
MD5
3434a556a7957a8610f65e10ce008f1c
-
SHA1
ee849b019291920e96fb1957567947f0ded15f32
-
SHA256
b1ec0b98ac56456d2c741c3b1987d7673df2ba8a5d910cc1347a42dcfba22c12
-
SHA512
978df2eec45724a5a3e89101f00529c8a7bb521e1d12b733aca5e3607f1770a149c90cc6b2db27ee1df66f439745a440bb816e3b71a553eafe1ea90c55bf25ea
-
SSDEEP
1536:L7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIfrxNKsOq:Hq6+ouCpk2mpcWJ0r+QNTBfrPKa
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133652701347158359" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3171217504-1685128607-2237314850-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 5056 msedge.exe 5056 msedge.exe 2180 msedge.exe 2180 msedge.exe 3456 chrome.exe 3456 chrome.exe 5828 msedge.exe 5828 msedge.exe 6700 identity_helper.exe 6700 identity_helper.exe 4392 chrome.exe 4392 chrome.exe 6216 msedge.exe 6216 msedge.exe 6216 msedge.exe 6216 msedge.exe 4392 chrome.exe 4392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 3456 chrome.exe 3456 chrome.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeDebugPrivilege 1804 firefox.exe Token: SeDebugPrivilege 1804 firefox.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 1804 firefox.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1804 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1780 wrote to memory of 3976 1780 b1ec0b98ac56456d2c741c3b1987d7673df2ba8a5d910cc1347a42dcfba22c12.exe 82 PID 1780 wrote to memory of 3976 1780 b1ec0b98ac56456d2c741c3b1987d7673df2ba8a5d910cc1347a42dcfba22c12.exe 82 PID 3976 wrote to memory of 3456 3976 cmd.exe 86 PID 3976 wrote to memory of 3456 3976 cmd.exe 86 PID 3976 wrote to memory of 2180 3976 cmd.exe 87 PID 3976 wrote to memory of 2180 3976 cmd.exe 87 PID 3976 wrote to memory of 3140 3976 cmd.exe 88 PID 3976 wrote to memory of 3140 3976 cmd.exe 88 PID 3456 wrote to memory of 1704 3456 chrome.exe 89 PID 3456 wrote to memory of 1704 3456 chrome.exe 89 PID 2180 wrote to memory of 1640 2180 msedge.exe 90 PID 2180 wrote to memory of 1640 2180 msedge.exe 90 PID 3140 wrote to memory of 1804 3140 firefox.exe 91 PID 3140 wrote to memory of 1804 3140 firefox.exe 91 PID 3140 wrote to memory of 1804 3140 firefox.exe 91 PID 3140 wrote to memory of 1804 3140 firefox.exe 91 PID 3140 wrote to memory of 1804 3140 firefox.exe 91 PID 3140 wrote to memory of 1804 3140 firefox.exe 91 PID 3140 wrote to memory of 1804 3140 firefox.exe 91 PID 3140 wrote to memory of 1804 3140 firefox.exe 91 PID 3140 wrote to memory of 1804 3140 firefox.exe 91 PID 3140 wrote to memory of 1804 3140 firefox.exe 91 PID 3140 wrote to memory of 1804 3140 firefox.exe 91 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 PID 1804 wrote to memory of 1216 1804 firefox.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1ec0b98ac56456d2c741c3b1987d7673df2ba8a5d910cc1347a42dcfba22c12.exe"C:\Users\Admin\AppData\Local\Temp\b1ec0b98ac56456d2c741c3b1987d7673df2ba8a5d910cc1347a42dcfba22c12.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FB77.tmp\FB78.tmp\FB79.bat C:\Users\Admin\AppData\Local\Temp\b1ec0b98ac56456d2c741c3b1987d7673df2ba8a5d910cc1347a42dcfba22c12.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"3⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffae803cc40,0x7ffae803cc4c,0x7ffae803cc584⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,8839274348899421402,115227355214571763,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1820 /prefetch:24⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1952,i,8839274348899421402,115227355214571763,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2348 /prefetch:34⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2076,i,8839274348899421402,115227355214571763,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2456 /prefetch:84⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3048,i,8839274348899421402,115227355214571763,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2764 /prefetch:14⤵PID:5232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3056,i,8839274348899421402,115227355214571763,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1548 /prefetch:14⤵PID:5440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4572,i,8839274348899421402,115227355214571763,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4588 /prefetch:84⤵PID:5856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4740,i,8839274348899421402,115227355214571763,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4760 /prefetch:84⤵PID:5264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4704,i,8839274348899421402,115227355214571763,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4688 /prefetch:84⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffae7ef3cb8,0x7ffae7ef3cc8,0x7ffae7ef3cd84⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1836,4679830359005086384,10619660097879683796,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:24⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1836,4679830359005086384,10619660097879683796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1836,4679830359005086384,10619660097879683796,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:84⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4679830359005086384,10619660097879683796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:14⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4679830359005086384,10619660097879683796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:14⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4679830359005086384,10619660097879683796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:14⤵PID:6328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1836,4679830359005086384,10619660097879683796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1836,4679830359005086384,10619660097879683796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:6700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4679830359005086384,10619660097879683796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:14⤵PID:6796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4679830359005086384,10619660097879683796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3588 /prefetch:14⤵PID:6804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4679830359005086384,10619660097879683796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:14⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,4679830359005086384,10619660097879683796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:14⤵PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1836,4679830359005086384,10619660097879683796,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4944 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:6216
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"3⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1956 -parentBuildID 20240401114208 -prefsHandle 1872 -prefMapHandle 1864 -prefsLen 25751 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b0a30cc5-a5a1-416b-9c02-d2ed646e2c8d} 1804 "\\.\pipe\gecko-crash-server-pipe.1804" gpu5⤵PID:1216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2400 -parentBuildID 20240401114208 -prefsHandle 2384 -prefMapHandle 2380 -prefsLen 26671 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {daee9066-947f-498c-b4d7-b200751b994f} 1804 "\\.\pipe\gecko-crash-server-pipe.1804" socket5⤵PID:2828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3124 -childID 1 -isForBrowser -prefsHandle 3120 -prefMapHandle 3116 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a8ba5b7-6783-4ed2-b873-24b37e9bf239} 1804 "\\.\pipe\gecko-crash-server-pipe.1804" tab5⤵PID:1436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3812 -childID 2 -isForBrowser -prefsHandle 3776 -prefMapHandle 3772 -prefsLen 31161 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {84795163-4f09-4dee-99ba-98987ea26d5b} 1804 "\\.\pipe\gecko-crash-server-pipe.1804" tab5⤵PID:3988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4780 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4664 -prefMapHandle 4328 -prefsLen 31161 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {38099bcd-a448-4968-8d3c-16c6d9a4649a} 1804 "\\.\pipe\gecko-crash-server-pipe.1804" utility5⤵
- Checks processor information in registry
PID:5592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5324 -childID 3 -isForBrowser -prefsHandle 5380 -prefMapHandle 5368 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3bf8b34a-035c-4be7-9194-ac724e25688e} 1804 "\\.\pipe\gecko-crash-server-pipe.1804" tab5⤵PID:6872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5608 -childID 4 -isForBrowser -prefsHandle 5528 -prefMapHandle 5532 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {146b3fe1-b1fe-4add-84b2-41a1e7b84a70} 1804 "\\.\pipe\gecko-crash-server-pipe.1804" tab5⤵PID:6884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5796 -childID 5 -isForBrowser -prefsHandle 5716 -prefMapHandle 5720 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ded87c2-fbfc-4a59-a2f4-0be45c174a02} 1804 "\\.\pipe\gecko-crash-server-pipe.1804" tab5⤵PID:6896
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5188
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:5480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
288B
MD5237f0fee93b30019126f14e89f1f2895
SHA17df0a90d280588ac47a749544a7eba8aa3b3a77b
SHA2567b1af1df14b0bb493c69b62471a35377be85257cc32c13ee9e93137b357348b6
SHA51206d83a077280f00d6749972082c9ec3d6738d6a6ac561ebdd3fff2e0a23bb6fb6b5aa3e94300bf20fd3777d2e58c83c8adc1d0af7d4f8bc60ad9b13aff5364a7
-
Filesize
3KB
MD5704493310bc03670f1b4e39cc13b6cf0
SHA1c56be9c2aae1cc0478af5728087d2a8d128d8a0d
SHA2565ccbf9dd705574751c24f576a78dcfb4f4ec3ae568502833d981bc6c1b50276d
SHA5127c3bc480084b87bff6e52f33a2f2a1c0410679faecb677e8d74e9c15251f119d319bbd5f9c0637f41b7af3b32bc72ce71a7794450202ed6fb4e620b7d99c88fe
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5668e0b8b97d1eea549ad6bbd11c0935b
SHA16e6dcdcd5e9047a89fbef0512ae717bd6d9c661d
SHA256109afa415adaa5426ff63e997600f05bfd4f3f61022c8f92875d22507d99000a
SHA51216dd29d7a2bc7e41549a20063c6ab873f6528e2cadcc5e535f49945cf5e282c56d6c7120d2bf37f849e3bce7756fe08c87a184225e0e2a49c1a0ef3ee6824475
-
Filesize
9KB
MD599e78042698d3d1e66ff5847ccf85dab
SHA10de88ecc0f843ad06cdf00c6f4f3f14e9bea014a
SHA256b291cd7eacc495e822ad66bd628fe1b524a89a6b545e62398a4eb723c1dc42cf
SHA5128aa5862c14bdefbea6f0450d840c5f3ca722ce224a02718e990414b3ea42b1cf7777f1aab258f30418ec31372e0106dafd3ad29410d3fe3c407c7090a22fd6f6
-
Filesize
9KB
MD55b5dff91dc0e2e53b27d5b61b77d8c1a
SHA1b98676860c9f4fc943f5641e8860f4dd6c49b65e
SHA2569ec2b9acffdef012843e76c3b0bae4628aef76c7e1f6b93cb2d6aed6761c7216
SHA5122478207585d86a85d15b8d98b4b65bec28e71e6b479d88dfd076afb7ee4010207c93f52830ecc97e99f563e8267e226310aa186bde7f164af9ebca18aa578d1c
-
Filesize
9KB
MD5710f11fb374b1bdadcec88a3b5fad2fb
SHA1da0a0dda4bf9d92bde318f3570251a66a8a033d0
SHA256c88e7928980cc3f5dbb2fa9b51d7dfcff2747fdd9f9605f84b24758ca7fafdf1
SHA512e51cd145c0b172718a76eae4136c3b610fc903ac13620ba42166dc4c6cd06c66526871ed48b86e3be3a6b5d5e54312c7737393a1e51b73f199f331972e8acc3a
-
Filesize
9KB
MD5ea266189046488bc2932958bce96445b
SHA1e961f586dea596f7a959323cc0bfd38f08d07c49
SHA25692ba630cc32c05ca5804523c38e6fb4d3c78828bbf8a47c3e771eb0d653bd00d
SHA5125ce48f480d129e452e37a143fca3faee8fd5e7e00a5977be5eff1d5ef59ad5b4290fcaf7950cbcea3aa2df92218473ef549ec9cca185a738bf9a28a0fff64422
-
Filesize
9KB
MD5bc01d6fe48ddbf4454ff85a069a6db37
SHA14fad16dac3bbbd97d7886f555f960040b7111dbd
SHA256c27207a825ee7f99e47a4b33823efdbd86e71dea7bcbe7f7f11156520d9390ff
SHA512b5264f31e350452869c10bd681753a603a248c09c46fa5b11f4a0cf4a22a81ce7ebcb0ce284fac172d6e114bbdb162a1218d3cf43e3fc326f587990f480c27b9
-
Filesize
9KB
MD521e7ec318df03047d27dd04cdd76db6d
SHA141a53d207b7becd22e7cd8c43a3133a56127da7d
SHA2560027a952cc7b8377ffd9911ebaa3686e6e4907f781bffbe065ec51e8c23663ed
SHA512e1d995a13f1117201993225503214ec0fa0dcec8b55e5fc886412798d7ed514ef9dd6c2fca2c39e8a323ac4db0906f3db78dc2de66de11e0edba4cf2d10c9d07
-
Filesize
9KB
MD5940efd71af37062fdfb519aaac6706bb
SHA1fba9bf499fa9858083f65b2c6322b6bf8d7b7a3f
SHA256713a6415757275662c56e86edcbac8c4166d0bf0daec505232349ef24c7a84ad
SHA512c43822f352ffe9306fe4b1fd2dd556268a17636c99d383bd0e7c0a3d83d560992056123b57767dbab33118c3fa5b9a74c57bd2709d983c8884c5adbf6473cb57
-
Filesize
9KB
MD51e9094d4d287e15badc6b7fe45319c59
SHA18b875544ce6d68531d0acbe2d38b29848e15a394
SHA256e59ad5581d5290d045a5eec21e6bfaa989a3b57805033d45cbe6811d834f540d
SHA512035d4c2033b6320c8f55b3cb877b1cef66a74d38a43b1a9ec98245355b3a53e94cf5422e3592b3a63214ceab02954dfd0ad67bf3e83c8f74545dcf019ba828cb
-
Filesize
9KB
MD57f227ffd766cf5cfa76a3190a1b4dc77
SHA185d12a5a9050ebf6071999f141a95ab11fa8a12b
SHA2566941062362d03afc73cd1890ce2783b60e94442fd8c9fce4a17495e2b87f6adc
SHA5129dac5cee3d3b4f2a293f03b3e31cb3f69ca791d19c0643ec4a337e7e20f7c09ec3f56ab6181adc5f58b930e8ca1ee164cc0f2e8f2870a40bbf6f3fb208bba10a
-
Filesize
9KB
MD5448656ee49f05344530116c5d3fb15e2
SHA166a1068ec4ffb4f2d5d162146bc276b15bbf08be
SHA25674270fcf0ead01c84210308018c58dff097f28f328b69abbaa023163080b036f
SHA512be54f2fd069b73855579d3b477c118f70ee70b2be08e59f3a5216ff5ab08895917dafbf085e3d3e6a55b920ba04e1b6ff80b4a78fb645506303d5305fef8be6a
-
Filesize
15KB
MD5f9b648114ec718dcaddf4c4bba07ce52
SHA181aa7babfde9fc9412c30fa7f6bc253f9fcfd208
SHA25623756e0a4d97b636be92b93adf3acd6efd0acf0a56f1f362b245667560d3f6a8
SHA512df5cf3c3e054a34a5b9c7d16d0950b0cd91fc53cddd18d7ab2cf339f612075c569224ac83911f95d1b24926b24a0058bd9da301555af1d3ca75fdd0a1fdc2931
-
Filesize
182KB
MD51a731156e38c75e76a36d887074707fa
SHA1a171c3670e4d60c0d7901d636829c4045a76d2f2
SHA256304e81acb0258b80507b3418562fbe117ba877aba011bc7c93dd2da8872e47c2
SHA51254469da416d16be6721b91594fe4a0c5753fa811d5000b34a8e26ddbfa506e2656a12e208e3ba14d9997037c85a749d29a80a886781c83b4c0c03eac832180af
-
Filesize
182KB
MD51c16c9398154e8682e8907c4b2f39af6
SHA1766f99455109af4cd82308369a04e821b1896431
SHA25644b02f4ee8536b977c57e2800c9033d8736e477f5f10802281e6f0abf58b6428
SHA5129b47c0af0bd05e5244333a219224e5536e53fd9cd322d5d2b0e670a25daaeaa51c299e9d30b158f691c60cfffb2a7d75a9b135183406379a95b53d77281c2c05
-
Filesize
152B
MD54656c526f71d2c1122865ef7c6af3ff5
SHA161684265064c225f323d304931ff7764f5700ac2
SHA2567172417b8464d5c2f52edfc867f4d83e475b58fd316b1916cdde30ed5bdde80e
SHA512c3e4fc0baa216ef561a448e42378af01a50e0ebd9b5fe554c9af0ea3362b9ca2f4a1b99cfab66c18df085250dd7a5ca1b01ab256e28156d657c579f5518aa56a
-
Filesize
152B
MD5bc5eae38782879246edf98418132e890
SHA146aa7cc473f743c270ed2dc21841ddc6fc468c30
SHA256b9dd7185c7678a25210a40f5a8cac3d048f7774042d93380bbbd1abb94d810d7
SHA51273680b22df232f30faa64f485a4c2f340ba236b5918915866f84053f06532b0a722c4ee8038af3689ac04db41277c7852f7a11a0a15833ef66bcc046ee28afb7
-
Filesize
38KB
MD5c3aa6e31c125d83fb2eabcc9e33843dd
SHA1ad91b78e1a9853ee876b77b82f75100ff5690d11
SHA256c32b5cffb8ac92df9bd9340b75b8d0772a071af36df5b27879e45f6112f9b5b4
SHA512897efddeb2d96e24aca43385cfb86a065034c4bb045c2e2b7391572e0ddd4a820b70fa83854de5048d7b7316fc9fa2f078924aab62206a7a135aaf91176a4c6b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5f3c0367373a824f66af8c13543873b8b
SHA153461e89f8e008ce562fc79879b28862e7d976af
SHA25662a33ccd66a24fcdd8a2aa4d199c71f17d6d499f6f6adb0e4dc2ffa608265ddc
SHA512c92a550f52b8750fd80eed8db03eafd27fc386dc2a06c8095a811a9a67d3744cda93dec3c1380d099920958875663cb6af7499ba4d779fe8f6ceeccec2f93e0b
-
Filesize
1KB
MD5520aa74bc009bffea2246e0439b1c5c4
SHA11f9e8f48fb455896dfea7073ff3efb92dbfaed94
SHA2563ce35b984ad9e2cc3a01eac7dcca70a5162a0bef61ede35db4cb0ac9bef94c34
SHA5127827f2f902e687d829dfd7fff545c448a9c6d4bc572c0cd1bdb1aca27413b366d6e24e0a84c56d09e04325258ae2013aef7b53782ed681f98e0acb13b2e84b0d
-
Filesize
5KB
MD568356ed42697b50fca8bb56b8d8b236f
SHA1609ef42f28ba549901754863aef964ddd72b09ec
SHA2562b8b870fdd19a9f043e3af89fb806549bb083cf42e85ce8be511ce52102d4742
SHA512dbaed438f908292c6a3fab41576e41af3e99db93f3942912223f9f90817245534af8a191787693eff0bef4ed1e80e2a792b4efe2456069770a9d0f1e2f8c6611
-
Filesize
6KB
MD54054c184026c43ef17cbb9897f43fbfb
SHA1a13e760e93441eaff68179c5ca22c573a5779d61
SHA256ed16a91b16a53cf13c784a8714a3c0f724a3576444bae42a53e733abd44d4345
SHA512da2b1a4d20743f4e821d246b35641ff04c636426dd683f5132beeb179a7d3f63ecf4150a682342e3425cb134295324b52c51a400eeea2ee7d16dc958bd35874a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5196a0b2a5a8c68e2e096f9ca10f40f62
SHA18ed683e50cd82050e35cb557d482f8ba561f6d6a
SHA25687f4052ef8e8cbe57442654acd62a4dfd8083788c89b40f74deda377a4de2c5b
SHA51278fb7dee0a65e63bf20b99066640cf227a4d38a7f7d63221176e0dcc899510006d1ecafac8154ab37b8d835f739665eb67e20a8c5db0d982a0e2e2bc596a5c35
-
Filesize
11KB
MD54f954353c3e7bdb31d527da1d4937996
SHA19c1af94aba5ddc8579f747e7638771145e816b1f
SHA256cdd549445148e2555d319785ee4db0e17366faa73b3bc7aac6a6071def205fea
SHA512adb30d702f62583e33586318cc876dbb27b2ab7df7eadcb129870aba01f8c13ada406b5414180ec70bdf617e43bb6e1c5cc402274119dee0b1df4cd4f658d3c4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\activity-stream.discovery_stream.json.tmp
Filesize18KB
MD56fa1898b88d51781f25125a191be9c8f
SHA18ef9b2561ba07fddb2e69270a167b33a0594b091
SHA25646a982a0dbffc5b38c82c0fb819b9c0ca9f8f60b4e689168074b1113361f441c
SHA512a71ac3d1a0751fc1e2e646cb94a1ee7b3ee47ba852ff4a0959b7336f5d47424830f591d9972b95d5dace1bffcbbce74654915aa6077514acb393ffee5ff08834
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\cache2\entries\5CD1EBDF6B57F13C7E783CE5E6D8E9C44014FE1A
Filesize13KB
MD5330c665ad52c6fc7f61215dd6c3d4ccb
SHA1e5138a73508bf235f31873cd546e3ff6441f63f8
SHA25654b6bae392c69de5a5cee98e0ffa3997bfb2abd6cd86a24060e6dfac941301e0
SHA5124fd8c6853e0f7517a9e1232ed598e7aa343cada9d6b6ecef713b1040821e08ae3f617eafecfbb84aa2377beaff24d67ecd5fcb6174b107f964ad508344318008
-
Filesize
2KB
MD5de9423d9c334ba3dba7dc874aa7dbc28
SHA1bf38b137b8d780b3d6d62aee03c9d3f73770d638
SHA256a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698
SHA51263f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\AlternateServices.bin
Filesize7KB
MD577ba96bc9c2b1ae3223b9ebb7bf30521
SHA1a2ae834b32393dc4e6e077f5546f5e4eb918c96d
SHA256a5fdf9f3ce1d2b31002393a37b028f34408bcce8ff4bdb29bf368e8ad8f1b975
SHA512ef9aec9b3fbf28446ba38affe3cc2c9155dff0c8d149cbdde262572354ba9d7a45a9470230ff12b2014cb96c900e6070288c6d97d43f27376a97626e59bfa0de
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\AlternateServices.bin
Filesize17KB
MD5807b0ea2d346d8824356a0af35d48327
SHA1a2fbd60516c1202823061b3e4505723cad42dd46
SHA25643bde50341063d6dc57daa5b83b15915464712833ad3581aa4d1a60eecca34af
SHA51261ed57155222cfdfa781dfe1df7ba197c0f0d8d5cf4aab65f0a63ac21f6aaba7d8e8772d1ce473194ebeb98bcaf088dceb6d10e2b18a0f50b904ebc7317490f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\AlternateServices.bin
Filesize11KB
MD527f28618ff39e1e68f3b0967a0e91540
SHA1a0ed74171bcadd70ecf2a5ae0e7a51371085002f
SHA256ec4c118a348ff62e2ccc08aac028073fb98144a10b9de0c3f7ac173922ce57a8
SHA5129b782bd68cafc0137008365dc335bccf9499e344ef29fee3f881737febf089b88914d3ff957c121b3ea52813360c8ef88ef6fd791dcc7154a20ef9bba4106814
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ead9dbbc14fb0c6e00344969d812dd69
SHA11341426cafb7dfde060c24f0568d6813772cfa4a
SHA256705501d141142892506428fe2e19290e27bd5415c60e36760c6d698e610dab4b
SHA5121bbff2838e76501332cac878faa45452c45a6aca9fbe75d1639802f5e26aa7067f9d3a9d1c2579efc02ca0daf6a0c221e3fa3a41273ab5f7994ada8c6bf209b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD517f0d1e627193b660abd91bf1d8aa17d
SHA1f2b39778953430e8a21f9a3e65a90b1d913c4046
SHA256d423f9f87e961077df35259950aa8d2b42da0ac022ec9bc50ce06567b626fea3
SHA512099b5c8aa8b77e9c5f67ebffc0406a35d2e33875ca79b3704cee55b0bcdc0f767e39faa011481f5967c2a9ef347e069d8aebbe76ed805aa516f8ed192d8f35fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD58a609eb098136aa0d84d74278aed5e9d
SHA1e3d3254d16d7fa4ec9f1064e1b03b4b221be463c
SHA256ddd219271e4bd020831b0b1fbadef3cb86742b35056af5d507fb92c29b47921c
SHA5127196bd0c672d8ef155b791275837d9f300e099891a1351c02069f2e920ddbc36e29143262d3873021fbd7e596a7618182e01935096b41b8be83cfdb3021d2b52
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5857acd9dd9b1ebd974aa432060d56a72
SHA1d8f8d8062729fa5e6c6b6019f0f55c256b3292ea
SHA256296a2a811fe2d5e5af3908154df80a697c0c4da0457662b67fc363a74b760407
SHA512a46560947b32094c65ffd589f452fd911ccc741d6ebbcddb01f07955fda4946b94be2ed49cf4ffaccc5f514f4c2a4d3d5f79c3f8dfc746dc20f5fa7549986790
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5125c41f0f284018a9a5a4d959b0be703
SHA1ea39e4d47e026a69a5efaa4d131f2067043e36e5
SHA256bb6b9cf1c361b54818e7c083434114681b5f6d56d19d96a7122b4240d780f1cd
SHA512993ef40bef4e481a02b6fad93ff1fabeb8cfbfeb55657a60f01df43842092133086ab75552007d203650fdf0cde76aa5a14e6d8d3dd3985d5f401bd570740d21
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD527b8ec9c004997a494e375ea8c0620f5
SHA1472c4c0db0cc5eae6f6537c0260814baca819944
SHA25653c3f78af0c0e73c8669888b4ef620ac0ed20f2f4c94edcd77888c40e77f70da
SHA512d45df38614d98f069c2df2f714dec9838dc95986d011163e379b7d411ff54fbf034b95559aad65516bfabb389171fdefd06186e814a09a2ee3058e311192b0a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\datareporting\glean\pending_pings\5b17335c-1a49-43da-8a91-fbece32ec2d1
Filesize27KB
MD5aac94dd70001ca92c6a31d95b7ed0ee9
SHA1920dc334d81962c9351d73607d064c71c45451d9
SHA2564f3ffa4a2b40d422a89743be9b1e18ce10516a24b9b179e08c9102d3385ecf00
SHA5129d502da28b859ab5c6208b4ee14a55e79476c3f082095e168b297db7bddc8b29059af3a0af6bcc2ad1f4db0cbbd6375a8cdc24aa63e9a27f493fd28465427a47
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\datareporting\glean\pending_pings\7151bf9a-eec1-475f-b1e1-55b4a290fc4d
Filesize982B
MD56fc18dbe53e13f78b5b9fd3cc4af1fbd
SHA1638c144464223a0ecf2525974e20dc279887ca04
SHA2569e479e129e649a1e58ca0e3b9baa5342ece7d2a9ee752f4a898f0e0afb98d86e
SHA51233901078173b155723f94fecbb5f4ced191bc02e5e8127688fa50b569d5bbaa0919b26b6a18f8865bc26baa446fcb6b64018268fce06640e5bd7ee0220085e95
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\datareporting\glean\pending_pings\d409ab0f-d128-4e64-bed6-b9dd6244dd64
Filesize671B
MD503e1d804eb383280bef9bada697776f8
SHA1f3494a9d19c9124bcb27ba18e8492d01815c0a4a
SHA256dd9cb26638713aa8a82bb04d753fa8b96a39cf01e6bc57bc6d4e1293bca28778
SHA512d10cfc06350332ebfdcb37e84db3f63c940816ee42633b92c6be61f227756056b6a884e6c8910138e4ba625c2191211411185166f83e2c69b98af013e77b14b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\m7qr6qvv.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
16KB
MD5725908f9bb9cb7dcb9131875b977d214
SHA13c4edc5a6f712d492dce622be7626c82cdff382c
SHA25608b3917e9308c78d303b840298da537b2f4cbafd87d9bdfe1048a289ce08b697
SHA512db4098d01f42f00ed5b50b1dbd6dbd79b0af8557dca1d905c0fa2d79c290deb3cadedf7827cfd76e04c1cd696bdad1a671c43d4160de0f8d0f1d7c0a2df4b86c
-
Filesize
12KB
MD50cbb3b28ce2ce90452ec4fdfbebe751a
SHA1f97478b0b8953af32ad8cdf05cdcb598fd7358b2
SHA256be2aecb99e7264dd5d08523d7f9a5b5501ebfd50601d0f7c5f4ecc03a4674354
SHA5120fff2328b0b89caf18f609684e9c4c4197d738e95cef360310f34bd5152ca4336e5719cf8ee0fea00a8fc4dd2088cd926bcffa4ab34ea68f052063408ed96156
-
Filesize
11KB
MD5f9360c259b9df7ce1e5e44954956261f
SHA19ab4b1580d87d2d41785f4c6f8b0001d9cf4fbbf
SHA256b2d68995c98eb4a23ca8e8a92dfac22f40d7709e702f341724d90fc55f3cc844
SHA512176ec9fb296419298659644dbbac74a29eddef02cb49ba469f0e081788a38d9f77b9a068988b82e2ed8edd1f000000dad864eae9153b785528fea58abffbfdf1
-
Filesize
8KB
MD5631bed57ebb0f0feaefb452ea3052199
SHA13dc8c36ec57dfccc593b01f5b70e444ec21e921e
SHA2563c2e037c7ba978b8cdb797cb7d51b070611445261535f3291f6ec9e8ee8d57b7
SHA5121ddd3514047f9e5729f2df0e3fe338a86a1b17814e09aee6eab4a51e00535606254125688939cddc4fae037cac9bc9909af84f1519c524d60c548a8aa80f26d3